SuccessConsole Output

Skipping 9,008 KB.. Full Log
=== RUN   TestGetFileType
--- PASS: TestGetFileType (0.00s)
=== RUN   TestParseFindMnt
--- PASS: TestParseFindMnt (0.00s)
=== RUN   TestGetPidOnHost
--- PASS: TestGetPidOnHost (0.00s)
=== RUN   TestSafeFormatAndMount
E0601 20:55:50.384225   20275 mount_linux.go:567] format of disk "/dev/foo" failed: type:("ext4") target:("/tmp/mount041642811") options:(["defaults"])error:(formatting failed)
E0601 20:55:50.385761   20275 mount_linux.go:606] Could not determine if disk "/dev/foo" is formatted (exit 4)
--- PASS: TestSafeFormatAndMount (0.00s)
PASS
coverage: 57.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/mount	1.064s	coverage: 57.7% of statements
=== RUN   TestIsIPv6String
--- PASS: TestIsIPv6String (0.00s)
=== RUN   TestIsIPv6
--- PASS: TestIsIPv6 (0.00s)
=== RUN   TestIsIPv6CIDR
--- PASS: TestIsIPv6CIDR (0.00s)
=== RUN   TestFilterIncorrectIPVersion
--- PASS: TestFilterIncorrectIPVersion (0.00s)
=== RUN   TestFilterIncorrectCIDRVersion
--- PASS: TestFilterIncorrectCIDRVersion (0.00s)
PASS
coverage: 100.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/net	1.011s	coverage: 100.0% of statements
=== RUN   TestIPNets
--- PASS: TestIPNets (0.00s)
=== RUN   TestIPNetSetDeleteMultiples
--- PASS: TestIPNetSetDeleteMultiples (0.00s)
=== RUN   TestNewIPSet
--- PASS: TestNewIPSet (0.00s)
=== RUN   TestIPNetSetDifference
--- PASS: TestIPNetSetDifference (0.00s)
=== RUN   TestIPNetSetList
--- PASS: TestIPNetSetList (0.00s)
PASS
coverage: 91.9% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/net/sets	1.013s	coverage: 91.9% of statements
=== RUN   TestEnsurePortProxyRule
--- PASS: TestEnsurePortProxyRule (0.00s)
=== RUN   TestDeletePortProxyRule
--- PASS: TestDeletePortProxyRule (0.00s)
=== RUN   TestEnsureIPAddress
--- PASS: TestEnsureIPAddress (0.50s)
=== RUN   TestDeleteIPAddress
--- PASS: TestDeleteIPAddress (0.00s)
=== RUN   TestGetInterfaceToAddIP
--- PASS: TestGetInterfaceToAddIP (0.00s)
=== RUN   TestRestore
--- PASS: TestRestore (0.00s)
=== RUN   TestCheckIPExists
--- PASS: TestCheckIPExists (0.00s)
=== RUN   TestGetIP
--- PASS: TestGetIP (0.00s)
PASS
coverage: 98.5% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/netsh	1.526s	coverage: 98.5% of statements
=== RUN   TestGetPreferredAddress
--- PASS: TestGetPreferredAddress (0.00s)
PASS
coverage: 10.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/node	1.032s	coverage: 10.4% of statements
=== RUN   TestOOMScoreAdjContainer
--- PASS: TestOOMScoreAdjContainer (0.00s)
=== RUN   TestPidListerFailure
--- PASS: TestPidListerFailure (0.00s)
PASS
coverage: 35.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/oom	1.016s	coverage: 35.7% of statements
=== RUN   TestParseImageName
--- PASS: TestParseImageName (0.00s)
PASS
coverage: 92.9% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/parsers	1.031s	coverage: 92.9% of statements
=== RUN   TestAllPtrFieldsNil
--- PASS: TestAllPtrFieldsNil (0.00s)
PASS
coverage: 55.6% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/pointer	1.009s	coverage: 55.6% of statements
=== RUN   TestContainerNameFromProcCgroup
--- PASS: TestContainerNameFromProcCgroup (0.00s)
=== RUN   TestPidOf
--- PASS: TestPidOf (0.01s)
=== RUN   TestPKill
--- PASS: TestPKill (0.01s)
PASS
coverage: 66.1% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/procfs	1.039s	coverage: 66.1% of statements
=== RUN   TestRemoveAllOneFilesystem
--- PASS: TestRemoveAllOneFilesystem (0.00s)
PASS
coverage: 77.5% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/removeall	1.016s	coverage: 77.5% of statements
=== RUN   TestCopyStrings
--- PASS: TestCopyStrings (0.00s)
=== RUN   TestSortStrings
--- PASS: TestSortStrings (0.00s)
=== RUN   TestShuffleStrings
--- PASS: TestShuffleStrings (0.00s)
=== RUN   TestContainsString
--- PASS: TestContainsString (0.00s)
=== RUN   TestRemoveString
--- PASS: TestRemoveString (0.00s)
PASS
coverage: 96.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/slice	1.010s	coverage: 96.7% of statements
=== RUN   TestEscapePluginName
--- PASS: TestEscapePluginName (0.00s)
=== RUN   TestEscapeQualifiedNameForDisk
--- PASS: TestEscapeQualifiedNameForDisk (0.00s)
=== RUN   TestSplitQualifiedName
--- PASS: TestSplitQualifiedName (0.00s)
=== RUN   TestJoinQualifiedName
--- PASS: TestJoinQualifiedName (0.00s)
=== RUN   TestShortenString
--- PASS: TestShortenString (0.00s)
=== RUN   TestIsVowel
--- PASS: TestIsVowel (0.00s)
=== RUN   Example_trailingNewline
--- PASS: Example_trailingNewline (0.00s)
=== RUN   Example_noTrailingNewline
--- PASS: Example_noTrailingNewline (0.00s)
PASS
coverage: 86.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/strings	1.021s	coverage: 86.7% of statements
=== RUN   TestIsMasterNode
--- PASS: TestIsMasterNode (0.00s)
PASS
coverage: 100.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/system	1.020s	coverage: 100.0% of statements
=== RUN   TestTail
--- PASS: TestTail (0.00s)
	tail_test.go:42: TestCase #0: {n:-1 start:0}
	tail_test.go:42: TestCase #1: {n:0 start:4100}
	tail_test.go:42: TestCase #2: {n:1 start:3075}
	tail_test.go:42: TestCase #3: {n:9999 start:0}
PASS
coverage: 48.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/tail	1.031s	coverage: 48.7% of statements
=== RUN   TestTaintsVar
--- PASS: TestTaintsVar (0.00s)
=== RUN   TestAddOrUpdateTaint
--- PASS: TestAddOrUpdateTaint (0.00s)
=== RUN   TestTaintExists
--- PASS: TestTaintExists (0.00s)
=== RUN   TestRemoveTaint
--- PASS: TestRemoveTaint (0.00s)
=== RUN   TestDeleteTaint
--- PASS: TestDeleteTaint (0.00s)
=== RUN   TestDeleteTaintByKey
--- PASS: TestDeleteTaintByKey (0.00s)
=== RUN   TestCheckIfTaintsAlreadyExists
--- PASS: TestCheckIfTaintsAlreadyExists (0.00s)
=== RUN   TestReorganizeTaints
--- PASS: TestReorganizeTaints (0.00s)
=== RUN   TestParseTaints
--- PASS: TestParseTaints (0.00s)
PASS
coverage: 80.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/taints	1.039s	coverage: 80.4% of statements
=== RUN   TestWrap
--- PASS: TestWrap (0.00s)
	template_test.go:39: "before ->**Hodor, hodor; hodor hodor; hodor hodor... Hodor hodor hodor? Hodor. Hodor\n**hodor hodor hodor... Hodor hodor hodor; hodor hodor hodor! Hodor, hodor.\n**Hodor. Hodor, HODOR hodor, hodor hodor; hodor hodor; hodor HODOR hodor, hodor\n**hodor? Hodor. Hodor hodor - hodor hodor. Hodor hodor HODOR! Hodor hodor -\n**hodor... Hodor hodor HODOR hodor, hodor hodor hodor! Hodor, hodor... Hodor\n**hodor hodor hodor hodor hodor! Hodor, hodor; hodor hodor. Hodor.\n<- after"
=== RUN   TestTrim
--- PASS: TestTrim (0.00s)
	template_test.go:58: "before ->stuff<- after"
PASS
coverage: 100.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/template	1.023s	coverage: 100.0% of statements
=== RUN   TestMaxLockPeriod
--- PASS: TestMaxLockPeriod (0.00s)
=== RUN   TestDeadlockWatchdogLocked
--- PASS: TestDeadlockWatchdogLocked (0.00s)
=== RUN   TestDeadlockWatchdogUnlocked
--- PASS: TestDeadlockWatchdogUnlocked (0.01s)
=== RUN   TestDeadlockWatchdogLocking
--- PASS: TestDeadlockWatchdogLocking (0.07s)
PASS
coverage: 61.3% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/threading	1.095s	coverage: 61.3% of statements
=== RUN   TestVerifyAgainstWhitelist
--- PASS: TestVerifyAgainstWhitelist (0.00s)
=== RUN   TestIsConflict
--- PASS: TestIsConflict (0.00s)
PASS
coverage: 52.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/tolerations	1.026s	coverage: 52.4% of statements
=== RUN   TestSemanticVersions
--- PASS: TestSemanticVersions (0.01s)
=== RUN   TestBadSemanticVersions
--- PASS: TestBadSemanticVersions (0.00s)
=== RUN   TestGenericVersions
--- PASS: TestGenericVersions (0.01s)
=== RUN   TestBadGenericVersions
--- PASS: TestBadGenericVersions (0.00s)
=== RUN   TestComponents
--- PASS: TestComponents (0.00s)
PASS
coverage: 86.9% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/version	1.036s	coverage: 86.9% of statements
=== RUN   TestMetricsNilGetCapacity
--- PASS: TestMetricsNilGetCapacity (0.00s)
=== RUN   TestSpecSourceConverters
--- PASS: TestSpecSourceConverters (0.00s)
=== RUN   TestVolumePluginMgrFunc
--- PASS: TestVolumePluginMgrFunc (0.00s)
=== RUN   Test_ValidatePodTemplate
--- PASS: Test_ValidatePodTemplate (0.00s)
=== RUN   TestMetricsDuGetCapacity
--- PASS: TestMetricsDuGetCapacity (0.10s)
=== RUN   TestMetricsDuRequirePath
--- PASS: TestMetricsDuRequirePath (0.00s)
=== RUN   TestMetricsDuRequireRealDirectory
--- PASS: TestMetricsDuRequireRealDirectory (0.00s)
=== RUN   TestGetMetricsStatFS
--- PASS: TestGetMetricsStatFS (0.00s)
PASS
coverage: 39.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume	1.176s	coverage: 39.0% of statements
=== RUN   TestGetVolumeName_Volume
--- PASS: TestGetVolumeName_Volume (0.00s)
=== RUN   TestGetVolumeName_PersistentVolume
--- PASS: TestGetVolumeName_PersistentVolume (0.00s)
=== RUN   TestAttachDetach
E0601 20:56:05.330620   20982 attacher.go:65] Error attaching volume "disk" to node "instance": Fake attach error
E0601 20:56:05.359440   20982 attacher.go:303] Error detaching volumeID "disk": Fake detach error
--- PASS: TestAttachDetach (0.03s)
	attacher_test.go:138: Test "Attach_Positive" succeeded
	attacher_test.go:138: Test "Attach_Negative" succeeded
	attacher_test.go:138: Test "Detach_Positive" succeeded
	attacher_test.go:138: Test "Detach_Negative" succeeded
=== RUN   TestGetVolumeSpecFromGlobalMapPath
--- PASS: TestGetVolumeSpecFromGlobalMapPath (0.00s)
=== RUN   TestGetPodAndPluginMapPaths
--- PASS: TestGetPodAndPluginMapPaths (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
=== RUN   TestMounterAndUnmounterTypeAssert
--- PASS: TestMounterAndUnmounterTypeAssert (0.00s)
PASS
coverage: 23.6% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/aws_ebs	1.233s	coverage: 23.6% of statements
=== RUN   TestIoHandler
--- PASS: TestIoHandler (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
PASS
coverage: 10.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/azure_dd	1.079s	coverage: 10.7% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPluginAzureCloudProvider
E0601 20:56:06.924280   21024 azure_blobDiskController.go:70] azureDisk - getAllStorageAccounts error: storage.AccountsClient#ListByResourceGroup: Invalid input: autorest/validation: validation failed: parameter=resourceGroupName constraint=MinLength value="" details: value length must be greater than or equal to 1
--- PASS: TestPluginAzureCloudProvider (0.00s)
=== RUN   TestPluginWithoutCloudProvider
--- PASS: TestPluginWithoutCloudProvider (0.00s)
=== RUN   TestPluginWithOtherCloudProvider
--- PASS: TestPluginWithOtherCloudProvider (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
=== RUN   TestMounterAndUnmounterTypeAssert
--- PASS: TestMounterAndUnmounterTypeAssert (0.00s)
=== RUN   TestGetSecretNameAndNamespaceForPV
--- PASS: TestGetSecretNameAndNamespaceForPV (0.00s)
=== RUN   TestAppendDefaultMountOptions
--- PASS: TestAppendDefaultMountOptions (0.00s)
PASS
coverage: 39.2% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/azure_file	1.093s	coverage: 39.2% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestConstructVolumeSpec
--- PASS: TestConstructVolumeSpec (0.00s)
=== RUN   TestGetSecretNameAndNamespaceForPV
--- PASS: TestGetSecretNameAndNamespaceForPV (0.00s)
PASS
coverage: 67.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/cephfs	1.112s	coverage: 67.0% of statements
=== RUN   TestGetDeviceName_Volume
--- PASS: TestGetDeviceName_Volume (0.00s)
=== RUN   TestGetDeviceName_PersistentVolume
--- PASS: TestGetDeviceName_PersistentVolume (0.00s)
=== RUN   TestGetDeviceMountPath
--- PASS: TestGetDeviceMountPath (0.00s)
=== RUN   TestAttachDetach
E0601 20:56:13.686489   21161 attacher.go:220] Error checking if Volumes ([disk]) are already attached to current node ("nodeName"). Will continue and try attach anyway. err=Fake DisksAreAttached error
E0601 20:56:13.687708   21161 attacher.go:453] Error checking if volume ("disk") is already attached to current node ("nodeName"). Will continue and try detach anyway. err=Fake DiskIsAttached error
E0601 20:56:13.687849   21161 attacher.go:453] Error checking if volume ("disk") is already attached to current node ("nodeName"). Will continue and try detach anyway. err=Fake DiskIsAttached error
E0601 20:56:13.687911   21161 attacher.go:469] Error detaching volume "disk" from node "nodeName": Fake detach error
--- PASS: TestAttachDetach (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
PASS
coverage: 33.9% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/cinder	1.090s	coverage: 33.9% of statements
=== RUN   TestMakePayload
--- PASS: TestMakePayload (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestPluginReboot
--- PASS: TestPluginReboot (0.00s)
=== RUN   TestPluginOptional
--- PASS: TestPluginOptional (0.00s)
=== RUN   TestPluginKeysOptional
--- PASS: TestPluginKeysOptional (0.00s)
PASS
coverage: 77.1% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/configmap	1.099s	coverage: 77.1% of statements
=== RUN   TestAttacherAttach
E0601 20:56:17.627354   21185 csi_attacher.go:211] kubernetes.io/csi: attachment for vol02 failed: attacher error
--- PASS: TestAttacherAttach (3.09s)
	csi_attacher_test.go:122: test case: test ok 1
	csi_attacher_test.go:122: test case: test ok 2
	csi_attacher_test.go:122: test case: mismatch vol
	csi_attacher_test.go:169: attachment not found for id:csi-70fa8b122628ff5436f098759b79c93487b3894e2bff5637c618405a059b0b47
	csi_attacher_test.go:122: test case: mismatch driver
	csi_attacher_test.go:169: attachment not found for id:csi-70fa8b122628ff5436f098759b79c93487b3894e2bff5637c618405a059b0b47
	csi_attacher_test.go:122: test case: mismatch node
	csi_attacher_test.go:169: attachment not found for id:csi-70fa8b122628ff5436f098759b79c93487b3894e2bff5637c618405a059b0b47
	csi_attacher_test.go:122: test case: attacher error
=== RUN   TestAttacherWaitForVolumeAttachment
E0601 20:56:17.632436   21185 csi_attacher.go:163] kubernetes.io/csi: attachment for test-vol-1 failed: missing volume
E0601 20:56:17.644585   21185 csi_attacher.go:211] kubernetes.io/csi: attachment for test-vol-3 failed: missing volume
E0601 20:56:17.695434   21185 csi_attacher.go:228] kubernetes.io/csi: attacher.WaitForAttach timeout after 50ms [volume=test-vol-4; attachment.ID=csi-ced5316437a6465310c0972f1e4d06c056d5dba86e8dae9c0c783e85a776a794]
--- PASS: TestAttacherWaitForVolumeAttachment (0.07s)
	csi_attacher_test.go:248: running test: attach success at get
	csi_attacher_test.go:248: running test: attachment error ant get
	csi_attacher_test.go:248: running test: attach success at watch
	csi_attacher_test.go:248: running test: attachment error ant watch
	csi_attacher_test.go:248: running test: time ran out
=== RUN   TestAttacherVolumesAreAttached
--- PASS: TestAttacherVolumesAreAttached (0.00s)
=== RUN   TestAttacherDetach
E0601 20:56:17.704233   21185 csi_attacher.go:465] kubernetes.io/csi: detacher.Detach failed to delete VolumeAttachment [csi-10bb7c4b51a0491a15790880990c3bd42fbf3f20b8e8271a53cbf12be8fa4b63]: volumeattachments.storage.k8s.io is forbidden: mock error
--- PASS: TestAttacherDetach (0.00s)
	csi_attacher_test.go:376: running test: normal test
	csi_attacher_test.go:376: running test: normal test 2
	csi_attacher_test.go:376: running test: object not found
	csi_attacher_test.go:376: running test: API error
=== RUN   TestAttacherGetDeviceMountPath
E0601 20:56:17.706761   21185 csi_attacher.go:279] kubernetes.io/csi: attacher.GetDeviceMountPath failed to make device mount path: makeDeviceMountPath failed, pv name empty
--- PASS: TestAttacherGetDeviceMountPath (0.00s)
	csi_attacher_test.go:456: Running test case: normal test
	csi_attacher_test.go:456: Running test case: no pv name
=== RUN   TestAttacherMountDevice
E0601 20:56:17.709240   21185 csi_attacher.go:419] kubernetes.io/csi: attacher.MountDevice failed: missing volume id
E0601 20:56:17.709464   21185 csi_mounter.go:483] kubernetes.io/csi: failed to delete volume path [.]: remove .: invalid argument
E0601 20:56:17.709549   21185 csi_attacher.go:422] kubernetes.io/csi: attacher.MountDevice failed to remove mount dir after a NodeStageVolume() error [path2]: remove .: invalid argument
--- PASS: TestAttacherMountDevice (0.00s)
	csi_attacher_test.go:533: Running test case: normal
	csi_attacher_test.go:533: Running test case: no vol name
=== RUN   TestAttacherUnmountDevice
E0601 20:56:17.711136   21185 csi_attacher.go:570] kubernetes.io/csi: attacher.UnmountDevice failed to get driver and volume name from device mount path: getDriverAndVolNameFromDeviceMountPath failed, path did not end in globalmount
--- PASS: TestAttacherUnmountDevice (0.00s)
	csi_attacher_test.go:651: Running test case: normal
	csi_attacher_test.go:651: Running test case: no device mount path
=== RUN   TestClientNodePublishVolume
--- PASS: TestClientNodePublishVolume (0.00s)
	csi_client_test.go:60: test case: test ok
	csi_client_test.go:60: test case: missing volID
	csi_client_test.go:60: test case: missing target path
	csi_client_test.go:60: test case: bad fs
	csi_client_test.go:60: test case: grpc error
=== RUN   TestClientNodeUnpublishVolume
--- PASS: TestClientNodeUnpublishVolume (0.00s)
	csi_client_test.go:98: test case: test ok
	csi_client_test.go:98: test case: missing volID
	csi_client_test.go:98: test case: missing target path
	csi_client_test.go:98: test case: grpc error
=== RUN   TestClientNodeStageVolume
--- PASS: TestClientNodeStageVolume (0.00s)
	csi_client_test.go:127: Running test case: test ok
	csi_client_test.go:127: Running test case: missing volID
	csi_client_test.go:127: Running test case: missing target path
	csi_client_test.go:127: Running test case: bad fs
	csi_client_test.go:127: Running test case: grpc error
=== RUN   TestClientNodeUnstageVolume
--- PASS: TestClientNodeUnstageVolume (0.00s)
	csi_client_test.go:163: Running test case: test ok
	csi_client_test.go:163: Running test case: missing volID
	csi_client_test.go:163: Running test case: missing target path
	csi_client_test.go:163: Running test case: grpc error
=== RUN   TestMounterGetPath
--- PASS: TestMounterGetPath (0.00s)
	csi_mounter_test.go:67: test case: simple specName
	csi_mounter_test.go:81: *** GetPath: /tmp/csi-test545972291/pods/test-pod/volumes/kubernetes.io~csi/spec-0/mount
	csi_mounter_test.go:67: test case: specName with dots
	csi_mounter_test.go:81: *** GetPath: /tmp/csi-test545972291/pods/test-pod/volumes/kubernetes.io~csi/test.spec.1/mount
=== RUN   TestMounterSetUp
--- PASS: TestMounterSetUp (0.00s)
=== RUN   TestUnmounterTeardown
--- PASS: TestUnmounterTeardown (0.00s)
=== RUN   TestSaveVolumeData
--- PASS: TestSaveVolumeData (0.00s)
	csi_mounter_test.go:219: test case: test with data ok
	csi_mounter_test.go:219: test case: test with data ok 2 
=== RUN   TestPluginGetPluginName
--- PASS: TestPluginGetPluginName (0.00s)
=== RUN   TestPluginGetVolumeName
--- PASS: TestPluginGetVolumeName (0.00s)
	csi_plugin_test.go:111: testing: alphanum names
	csi_plugin_test.go:111: testing: mixchar driver
	csi_plugin_test.go:111: testing: mixchar volume
	csi_plugin_test.go:111: testing: mixchars all
=== RUN   TestPluginCanSupport
--- PASS: TestPluginCanSupport (0.00s)
=== RUN   TestPluginConstructVolumeSpec
--- PASS: TestPluginConstructVolumeSpec (0.00s)
	csi_plugin_test.go:154: test case: valid spec name
=== RUN   TestPluginNewMounter
--- PASS: TestPluginNewMounter (0.00s)
=== RUN   TestPluginNewUnmounter
--- PASS: TestPluginNewUnmounter (0.00s)
=== RUN   TestPluginNewAttacher
--- PASS: TestPluginNewAttacher (0.00s)
=== RUN   TestPluginNewDetacher
--- PASS: TestPluginNewDetacher (0.00s)
PASS
coverage: 59.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/csi	4.249s	coverage: 59.7% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestDownwardAPI
--- PASS: TestDownwardAPI (0.04s)
	downwardapi_test.go:186: Test case: "test_labels" Step: "labels"
	downwardapi_test.go:186: Test case: "test_annotations" Step: "annotations"
	downwardapi_test.go:186: Test case: "test_name" Step: "name_file_name"
	downwardapi_test.go:186: Test case: "test_namespace" Step: "namespace_file_name"
	downwardapi_test.go:186: Test case: "test_write_twice_no_update" Step: "resetup"
	downwardapi_test.go:186: Test case: "test_write_twice_no_update" Step: "labels"
	downwardapi_test.go:186: Test case: "test_write_twice_with_update" Step: "resetup"
	downwardapi_test.go:186: Test case: "test_write_twice_with_update" Step: "labels"
	downwardapi_test.go:186: Test case: "test_write_with_unix_path" Step: "these/are/my/labels"
	downwardapi_test.go:186: Test case: "test_write_with_unix_path" Step: "these/are/your/annotations"
	downwardapi_test.go:186: Test case: "test_write_with_two_consecutive_slashes_in_the_path" Step: "this/labels"
	downwardapi_test.go:186: Test case: "test_default_mode" Step: "name_file_name"
	downwardapi_test.go:186: Test case: "test_item_mode" Step: "name_file_name"
PASS
coverage: 51.1% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/downwardapi	1.126s	coverage: 51.1% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestPluginEmptyRootContext
--- PASS: TestPluginEmptyRootContext (0.00s)
=== RUN   TestPluginHugetlbfs
--- PASS: TestPluginHugetlbfs (0.00s)
=== RUN   TestPluginBackCompat
--- PASS: TestPluginBackCompat (0.00s)
=== RUN   TestMetrics
--- PASS: TestMetrics (0.01s)
=== RUN   TestGetHugePagesMountOptions
--- PASS: TestGetHugePagesMountOptions (0.00s)
PASS
coverage: 49.3% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/empty_dir	1.076s	coverage: 49.3% of statements
=== RUN   TestParseFSDevice
--- PASS: TestParseFSDevice (0.00s)
	quota_test.go:51: running TestParseFSDevice: happy path
	quota_test.go:51: running TestParseFSDevice: happy path multi-token
	quota_test.go:51: running TestParseFSDevice: invalid tmpfs
	quota_test.go:51: running TestParseFSDevice: invalid empty
	quota_test.go:51: running TestParseFSDevice: invalid one line
	quota_test.go:51: running TestParseFSDevice: invalid blank second line
	quota_test.go:51: running TestParseFSDevice: invalid too many lines
=== RUN   TestApplyQuota
--- PASS: TestApplyQuota (0.00s)
	quota_test.go:184: running TestApplyQuota: no FSGroup
	quota_test.go:184: running TestApplyQuota: happy path
	quota_test.go:184: running TestApplyQuota: zero quota
	quota_test.go:184: running TestApplyQuota: invalid filesystem device
	quota_test.go:184: running TestApplyQuota: error checking filesystem device
	quota_test.go:184: running TestApplyQuota: non-xfs filesystem type
	quota_test.go:184: running TestApplyQuota: error checking filesystem type
=== RUN   TestIsMountedWithGrpquota
--- PASS: TestIsMountedWithGrpquota (0.00s)
	quota_test.go:305: running TestIsMountedWithGrpquota: grpquota
	quota_test.go:305: running TestIsMountedWithGrpquota: gquota
	quota_test.go:305: running TestIsMountedWithGrpquota: gqnoenforce
	quota_test.go:305: running TestIsMountedWithGrpquota: noquota
	quota_test.go:305: running TestIsMountedWithGrpquota: device not in output
PASS
coverage: 48.6% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/emptydirquota	1.052s	coverage: 48.6% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPluginVolume
--- PASS: TestPluginVolume (0.00s)
=== RUN   TestPluginPersistentVolume
--- PASS: TestPluginPersistentVolume (0.00s)
=== RUN   TestPluginVolumeWWIDs
--- PASS: TestPluginVolumeWWIDs (0.00s)
=== RUN   TestPluginPersistentVolumeWWIDs
--- PASS: TestPluginPersistentVolumeWWIDs (0.00s)
=== RUN   TestPluginVolumeNoDiskInfo
--- PASS: TestPluginVolumeNoDiskInfo (0.00s)
=== RUN   TestPluginPersistentVolumeNoDiskInfo
--- PASS: TestPluginPersistentVolumeNoDiskInfo (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
=== RUN   Test_getWwnsLun
--- PASS: Test_getWwnsLun (0.00s)
=== RUN   Test_getWwids
--- PASS: Test_getWwids (0.00s)
=== RUN   Test_getWwnsLunWwidsError
--- PASS: Test_getWwnsLunWwidsError (0.00s)
=== RUN   Test_ConstructVolumeSpec
--- PASS: Test_ConstructVolumeSpec (0.00s)
=== RUN   Test_ConstructVolumeSpecNoRefs
--- PASS: Test_ConstructVolumeSpecNoRefs (0.00s)
=== RUN   TestSearchDisk
--- PASS: TestSearchDisk (0.00s)
=== RUN   TestSearchDiskWWID
--- PASS: TestSearchDiskWWID (0.00s)
PASS
coverage: 22.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/fc	1.236s	coverage: 22.7% of statements
=== RUN   TestAttach
--- PASS: TestAttach (0.00s)
=== RUN   TestWaitForAttach
--- PASS: TestWaitForAttach (0.00s)
=== RUN   TestMountDevice
--- PASS: TestMountDevice (0.00s)
=== RUN   TestIsVolumeAttached
--- PASS: TestIsVolumeAttached (0.00s)
=== RUN   TestDetach
--- PASS: TestDetach (0.00s)
=== RUN   TestUnmountDevice
--- PASS: TestUnmountDevice (0.00s)
=== RUN   TestHandleResponseDefaults
--- PASS: TestHandleResponseDefaults (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestSetUpAt
--- PASS: TestSetUpAt (0.00s)
=== RUN   TestInit
--- PASS: TestInit (0.00s)
=== RUN   TestGetVolumeName
--- PASS: TestGetVolumeName (0.00s)
=== RUN   TestProberExistingDriverBeforeInit
--- PASS: TestProberExistingDriverBeforeInit (0.00s)
=== RUN   TestProberAddDriver
--- PASS: TestProberAddDriver (0.00s)
=== RUN   TestEmptyPluginDir
--- PASS: TestEmptyPluginDir (0.00s)
=== RUN   TestRemovePluginDir
--- PASS: TestRemovePluginDir (0.00s)
=== RUN   TestProberMultipleEvents
--- PASS: TestProberMultipleEvents (0.00s)
=== RUN   TestProberRateLimit
--- PASS: TestProberRateLimit (0.00s)
=== RUN   TestProberError
--- PASS: TestProberError (0.00s)
=== RUN   TestTearDownAt
--- PASS: TestTearDownAt (0.00s)
PASS
coverage: 61.8% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/flexvolume	1.096s	coverage: 61.8% of statements
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestGetByName
--- PASS: TestGetByName (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetFlockerVolumeSource
--- PASS: TestGetFlockerVolumeSource (0.00s)
=== RUN   TestNewMounterDatasetName
--- PASS: TestNewMounterDatasetName (0.00s)
=== RUN   TestNewMounterDatasetUUID
--- PASS: TestNewMounterDatasetUUID (0.00s)
=== RUN   TestNewUnmounter
--- SKIP: TestNewUnmounter (0.00s)
	flocker_test.go:291: broken
=== RUN   TestIsReadOnly
--- PASS: TestIsReadOnly (0.00s)
=== RUN   TestFlockerUtil_CreateVolume
--- PASS: TestFlockerUtil_CreateVolume (0.00s)
=== RUN   TestProvision
--- PASS: TestProvision (0.00s)
PASS
coverage: 27.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/flocker	1.092s	coverage: 27.4% of statements
=== RUN   TestGetDeviceName_Volume
--- PASS: TestGetDeviceName_Volume (0.00s)
=== RUN   TestGetDeviceName_PersistentVolume
--- PASS: TestGetDeviceName_PersistentVolume (0.00s)
=== RUN   TestAttachDetachRegional
--- PASS: TestAttachDetachRegional (0.00s)
	attacher_test.go:104: Test "Attach_Regional_Positive" succeeded
=== RUN   TestAttachDetach
E0601 20:56:28.175943   21587 attacher.go:68] Error checking if PD ("disk") is already attached to current node ("instance"). Will continue and try attach anyway. err=Fake DiskIsAttached error
E0601 20:56:28.177040   21587 attacher.go:68] Error checking if PD ("disk") is already attached to current node ("instance"). Will continue and try attach anyway. err=Fake DiskIsAttached error
E0601 20:56:28.177107   21587 attacher.go:82] Error attaching PD "disk" to node "instance": Fake attach error
E0601 20:56:28.177333   21587 attacher.go:288] Error checking if PD ("disk") is already attached to current node ("instance"). Will continue and try detach anyway. err=Fake DiskIsAttached error
E0601 20:56:28.177441   21587 attacher.go:288] Error checking if PD ("disk") is already attached to current node ("instance"). Will continue and try detach anyway. err=Fake DiskIsAttached error
E0601 20:56:28.177499   21587 attacher.go:304] Error detaching PD "disk" from node "instance": Fake detach error
--- PASS: TestAttachDetach (0.00s)
	attacher_test.go:228: Test "Attach_Positive" succeeded
	attacher_test.go:228: Test "Attach_Positive_AlreadyAttached" succeeded
	attacher_test.go:228: Test "Attach_Positive_CheckFails" succeeded
	attacher_test.go:228: Test "Attach_Negative" succeeded
	attacher_test.go:228: Test "Detach_Positive" succeeded
	attacher_test.go:228: Test "Detach_Positive_AlreadyDetached" succeeded
	attacher_test.go:228: Test "Detach_Positive_CheckFails" succeeded
	attacher_test.go:228: Test "Detach_Negative" succeeded
=== RUN   TestGetVolumeSpecFromGlobalMapPath
--- PASS: TestGetVolumeSpecFromGlobalMapPath (0.00s)
=== RUN   TestGetPodAndPluginMapPaths
--- PASS: TestGetPodAndPluginMapPaths (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
PASS
coverage: 26.8% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/gce_pd	1.124s	coverage: 26.8% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.01s)
PASS
coverage: 60.9% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/git_repo	1.194s	coverage: 60.9% of statements
=== RUN   TestNewFree
--- PASS: TestNewFree (0.00s)
=== RUN   TestNewInvalidRange
--- PASS: TestNewInvalidRange (0.00s)
=== RUN   TestSetRange
--- PASS: TestSetRange (0.00s)
=== RUN   TestAllocateNext
--- PASS: TestAllocateNext (0.00s)
=== RUN   TestAllocateMax
--- PASS: TestAllocateMax (0.00s)
=== RUN   TestAllocate
--- PASS: TestAllocate (0.00s)
=== RUN   TestAllocateConflict
--- PASS: TestAllocateConflict (0.00s)
=== RUN   TestAllocateOutOfRange
--- PASS: TestAllocateOutOfRange (0.00s)
=== RUN   TestRelease
--- PASS: TestRelease (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPluginVolume
--- PASS: TestPluginVolume (0.00s)
=== RUN   TestPluginPersistentVolume
--- PASS: TestPluginPersistentVolume (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
=== RUN   TestParseClassParameters
E0601 20:56:32.131185   21666 glusterfs.go:1027] failed to get secret: default/mysecret: Test missing secret did not set a secret
--- PASS: TestParseClassParameters (0.00s)
PASS
coverage: 34.8% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/glusterfs	1.110s	coverage: 34.8% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestRecycler
--- PASS: TestRecycler (0.00s)
=== RUN   TestDeleter
--- PASS: TestDeleter (0.00s)
=== RUN   TestDeleterTempDir
--- PASS: TestDeleterTempDir (0.00s)
=== RUN   TestProvisioner
--- PASS: TestProvisioner (0.00s)
=== RUN   TestInvalidHostPath
--- PASS: TestInvalidHostPath (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
=== RUN   TestOSFileTypeChecker
--- PASS: TestOSFileTypeChecker (0.00s)
=== RUN   TestHostPathTypeCheckerInternal
--- PASS: TestHostPathTypeCheckerInternal (0.00s)
PASS
coverage: 70.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/host_path	1.119s	coverage: 70.7% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPluginVolume
--- PASS: TestPluginVolume (0.00s)
=== RUN   TestPluginPersistentVolume
--- PASS: TestPluginPersistentVolume (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
=== RUN   TestPortalMounter
--- PASS: TestPortalMounter (0.00s)
=== RUN   TestGetSecretNameAndNamespaceForPV
--- PASS: TestGetSecretNameAndNamespaceForPV (0.00s)
=== RUN   TestGetISCSIInitiatorInfo
--- PASS: TestGetISCSIInitiatorInfo (0.00s)
=== RUN   TestGetISCSICHAP
--- PASS: TestGetISCSICHAP (0.00s)
=== RUN   TestGetVolumeSpec
--- PASS: TestGetVolumeSpec (0.00s)
=== RUN   TestGetVolumeSpec_no_lun
--- PASS: TestGetVolumeSpec_no_lun (0.00s)
=== RUN   TestGetVolumeSpec_no_iface
--- PASS: TestGetVolumeSpec_no_iface (0.00s)
=== RUN   TestGetDevicePrefixRefCount
--- PASS: TestGetDevicePrefixRefCount (0.00s)
=== RUN   TestExtractDeviceAndPrefix
--- PASS: TestExtractDeviceAndPrefix (0.00s)
=== RUN   TestExtractIface
--- PASS: TestExtractIface (0.00s)
=== RUN   TestExtractPortalAndIqn
--- PASS: TestExtractPortalAndIqn (0.00s)
=== RUN   TestRemoveDuplicate
--- PASS: TestRemoveDuplicate (0.00s)
=== RUN   TestExtractTransportname
--- PASS: TestExtractTransportname (0.00s)
=== RUN   TestWaitForPathToExist
--- PASS: TestWaitForPathToExist (0.00s)
=== RUN   TestParseIscsiadmShow
--- PASS: TestParseIscsiadmShow (0.00s)
=== RUN   TestClonedIface
--- PASS: TestClonedIface (0.00s)
=== RUN   TestClonedIfaceShowError
--- PASS: TestClonedIfaceShowError (0.00s)
=== RUN   TestClonedIfaceUpdateError
--- PASS: TestClonedIfaceUpdateError (0.00s)
PASS
coverage: 29.9% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/iscsi	1.136s	coverage: 29.9% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestGetVolumeName
--- PASS: TestGetVolumeName (0.00s)
=== RUN   TestInvalidLocalPath
--- PASS: TestInvalidLocalPath (0.00s)
=== RUN   TestMountUnmount
--- PASS: TestMountUnmount (0.00s)
=== RUN   TestMapUnmap
--- PASS: TestMapUnmap (0.00s)
=== RUN   TestFSGroupMount
--- PASS: TestFSGroupMount (0.00s)
=== RUN   TestConstructVolumeSpec
--- PASS: TestConstructVolumeSpec (0.00s)
=== RUN   TestConstructBlockVolumeSpec
--- PASS: TestConstructBlockVolumeSpec (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
=== RUN   TestUnsupportedPlugins
--- PASS: TestUnsupportedPlugins (0.00s)
PASS
coverage: 61.5% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/local	1.103s	coverage: 61.5% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestRecycler
--- PASS: TestRecycler (0.00s)
=== RUN   TestPluginVolume
--- PASS: TestPluginVolume (0.00s)
=== RUN   TestPluginPersistentVolume
--- PASS: TestPluginPersistentVolume (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
PASS
coverage: 39.3% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/nfs	1.129s	coverage: 39.3% of statements
=== RUN   TestGetDeviceName_Volume
--- PASS: TestGetDeviceName_Volume (0.00s)
=== RUN   TestGetDeviceName_PersistentVolume
--- PASS: TestGetDeviceName_PersistentVolume (0.00s)
=== RUN   TestAttachDetach
E0601 20:56:38.739372   21800 attacher.go:282] Error checking if persistent disk ("000-000-000") is already attached to current node ("instance"). Will continue and try detach anyway. err=Fake DiskIsAttached error
E0601 20:56:38.739820   21800 attacher.go:282] Error checking if persistent disk ("000-000-000") is already attached to current node ("instance"). Will continue and try detach anyway. err=Fake DiskIsAttached error
E0601 20:56:38.739884   21800 attacher.go:298] Error detaching volume "000-000-000": Fake detach error
--- PASS: TestAttachDetach (0.00s)
	attacher_test.go:163: Test "Attach_Positive" succeeded
	attacher_test.go:163: Test "Attach_Positive_AlreadyAttached" succeeded
	attacher_test.go:163: Test "Detach_Positive" succeeded
	attacher_test.go:163: Test "Detach_Positive_AlreadyDetached" succeeded
	attacher_test.go:163: Test "Detach_Positive_CheckFails" succeeded
	attacher_test.go:163: Test "Detach_Negative" succeeded
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestMounterAndUnmounterTypeAssert
--- PASS: TestMounterAndUnmounterTypeAssert (0.00s)
PASS
coverage: 27.8% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/photon_pd	1.078s	coverage: 27.8% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
PASS
coverage: 25.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/portworx	1.095s	coverage: 25.7% of statements
=== RUN   TestCollectDataWithSecret
E0601 20:56:43.923000   21926 secret.go:272] references non-existent secret key
E0601 20:56:43.924596   21926 projected.go:285] Couldn't get secret payload test_projected_namespace/non existent key: references non-existent secret key
--- PASS: TestCollectDataWithSecret (0.01s)
=== RUN   TestCollectDataWithConfigMap
E0601 20:56:43.929313   21926 projected.go:320] Couldn't get configMap payload test_projected_namespace/non existent key: configmap references non-existent config key: zab
--- PASS: TestCollectDataWithConfigMap (0.00s)
=== RUN   TestCollectDataWithDownwardAPI
E0601 20:56:43.932374   21926 downwardapi.go:241] Unable to extract field metadata.annotations['']: invalid key subscript in metadata.annotations['']: name part must be non-empty;name part must consist of alphanumeric characters, '-', '_' or '.', and must start and end with an alphanumeric character (e.g. 'MyName',  or 'my.name',  or '123-abc', regex used for validation is '([A-Za-z0-9][-A-Za-z0-9_.]*)?[A-Za-z0-9]')
--- PASS: TestCollectDataWithDownwardAPI (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestPluginReboot
--- PASS: TestPluginReboot (0.00s)
=== RUN   TestPluginOptional
--- PASS: TestPluginOptional (0.00s)
=== RUN   TestPluginOptionalKeys
--- PASS: TestPluginOptionalKeys (0.00s)
PASS
coverage: 62.8% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/projected	1.127s	coverage: 62.8% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPluginVolume
--- PASS: TestPluginVolume (0.00s)
=== RUN   TestPluginPersistentVolume
--- PASS: TestPluginPersistentVolume (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
PASS
coverage: 24.3% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/quobyte	1.167s	coverage: 24.3% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
=== RUN   TestGetSecretNameAndNamespace
--- PASS: TestGetSecretNameAndNamespace (0.00s)
=== RUN   TestGetDeviceMountPath
--- PASS: TestGetDeviceMountPath (0.00s)
=== RUN   TestConstructVolumeSpec
--- PASS: TestConstructVolumeSpec (0.00s)
PASS
coverage: 22.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/rbd	1.132s	coverage: 22.4% of statements
=== RUN   TestMgrNew
--- PASS: TestMgrNew (0.00s)
=== RUN   TestMgrGetClient
--- PASS: TestMgrGetClient (0.00s)
=== RUN   TestMgrCreateVolume
--- PASS: TestMgrCreateVolume (0.00s)
=== RUN   TestMgrAttachVolume
--- PASS: TestMgrAttachVolume (0.51s)
=== RUN   TestMgrAttachVolume_AlreadyAttached
--- PASS: TestMgrAttachVolume_AlreadyAttached (0.50s)
=== RUN   TestMgrAttachVolume_VolumeNotFoundError
E0601 20:56:48.993268   22064 sio_mgr.go:139] scaleio: failed to find volume test-vol-0002: volume not found
--- PASS: TestMgrAttachVolume_VolumeNotFoundError (0.00s)
=== RUN   TestMgrAttachVolume_WaitForAttachError
E0601 20:56:48.996016   22064 sio_mgr.go:163] scaleio: failed while waiting for device to attach: attached device timeout
--- PASS: TestMgrAttachVolume_WaitForAttachError (0.00s)
=== RUN   TestMgrDetachVolume
--- PASS: TestMgrDetachVolume (0.51s)
=== RUN   TestMgrDetachVolume_VolumeNotFound
--- PASS: TestMgrDetachVolume_VolumeNotFound (0.50s)
=== RUN   TestMgrDetachVolume_VolumeNotAttached
--- PASS: TestMgrDetachVolume_VolumeNotAttached (0.00s)
=== RUN   TestMgrDetachVolume_VolumeAlreadyDetached
--- PASS: TestMgrDetachVolume_VolumeAlreadyDetached (0.50s)
=== RUN   TestMgrDetachVolume_WaitForDetachError
--- PASS: TestMgrDetachVolume_WaitForDetachError (0.50s)
=== RUN   TestMgrDeleteVolume
--- PASS: TestMgrDeleteVolume (0.00s)
=== RUN   TestMgrDeleteVolume_VolumeNotFound
--- PASS: TestMgrDeleteVolume_VolumeNotFound (0.00s)
=== RUN   TestUtilMapVolumeSource
--- PASS: TestUtilMapVolumeSource (0.00s)
=== RUN   TestUtilValidateConfigs
--- PASS: TestUtilValidateConfigs (0.00s)
=== RUN   TestUtilApplyConfigDefaults
--- PASS: TestUtilApplyConfigDefaults (0.00s)
=== RUN   TestUtilDefaultString
--- PASS: TestUtilDefaultString (0.00s)
=== RUN   TestUtilSaveConfig
--- PASS: TestUtilSaveConfig (0.00s)
=== RUN   TestUtilAttachSecret
--- PASS: TestUtilAttachSecret (0.00s)
=== RUN   TestUtilLoadConfig
--- PASS: TestUtilLoadConfig (0.00s)
=== RUN   TestVolumeCanSupport
--- PASS: TestVolumeCanSupport (0.00s)
=== RUN   TestVolumeGetAccessModes
--- PASS: TestVolumeGetAccessModes (0.00s)
=== RUN   TestVolumeMounterUnmounter
E0601 20:56:51.014224   22064 sio_util.go:177] scaleio: failed to open config file /tmp/scaleio-test012176152/pods/sio-pod/plugins/kubernetes.io/scaleio/sioconf.dat: open /tmp/scaleio-test012176152/pods/sio-pod/plugins/kubernetes.io/scaleio/sioconf.dat: no such file or directory
--- PASS: TestVolumeMounterUnmounter (0.50s)
=== RUN   TestVolumeProvisioner
E0601 20:56:51.518901   22064 sio_util.go:177] scaleio: failed to open config file /tmp/scaleio-test407142807/pods/sio-pod/plugins/kubernetes.io/scaleio/sioconf.dat: open /tmp/scaleio-test407142807/pods/sio-pod/plugins/kubernetes.io/scaleio/sioconf.dat: no such file or directory
--- PASS: TestVolumeProvisioner (0.51s)
=== RUN   TestVolumeProvisionerWithIncompleteConfig
E0601 20:56:52.023903   22064 sio_plugin.go:185] scaleio: provisioner missing parameters, unable to continue
--- PASS: TestVolumeProvisionerWithIncompleteConfig (0.00s)
=== RUN   TestVolumeProvisionerWithZeroCapacity
--- PASS: TestVolumeProvisionerWithZeroCapacity (0.00s)
=== RUN   TestVolumeProvisionerWithSecretNamespace
--- PASS: TestVolumeProvisionerWithSecretNamespace (0.00s)
PASS
coverage: 46.9% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/scaleio	5.148s	coverage: 46.9% of statements
=== RUN   TestMakePayload
E0601 20:56:50.336056   22093 secret.go:297] references non-existent secret key
--- PASS: TestMakePayload (0.00s)
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.01s)
=== RUN   TestPluginReboot
--- PASS: TestPluginReboot (0.00s)
=== RUN   TestPluginOptional
--- PASS: TestPluginOptional (0.00s)
=== RUN   TestPluginOptionalKeys
--- PASS: TestPluginOptionalKeys (0.02s)
PASS
coverage: 67.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/secret	1.126s	coverage: 67.4% of statements
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestGetAccessModes
--- PASS: TestGetAccessModes (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
=== RUN   TestPersistentClaimReadOnlyFlag
--- PASS: TestPersistentClaimReadOnlyFlag (0.00s)
=== RUN   TestClient
--- PASS: TestClient (0.00s)
=== RUN   TestCreateVolume
--- PASS: TestCreateVolume (0.00s)
=== RUN   TestAttachVolume
--- PASS: TestAttachVolume (0.00s)
PASS
coverage: 36.1% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/storageos	1.065s	coverage: 36.1% of statements
=== RUN   TestNewAtomicWriter
--- PASS: TestNewAtomicWriter (0.00s)
=== RUN   TestValidatePath
--- PASS: TestValidatePath (0.00s)
=== RUN   TestPathsToRemove
--- PASS: TestPathsToRemove (0.01s)
=== RUN   TestWriteOnce
E0601 20:56:52.351989   22131 atomic_writer.go:59] -test-: invalid payload: invalid path: must not start with '..': ..bar
E0601 20:56:52.354322   22131 atomic_writer.go:59] -test-: invalid payload: invalid path: must not contain '..': foo/../bar
--- PASS: TestWriteOnce (0.02s)
=== RUN   TestUpdate
--- PASS: TestUpdate (0.04s)
=== RUN   TestMultipleUpdates
--- PASS: TestMultipleUpdates (0.04s)
=== RUN   TestValidatePayload
--- PASS: TestValidatePayload (0.00s)
=== RUN   TestCreateUserVisibleFiles
--- PASS: TestCreateUserVisibleFiles (0.00s)
=== RUN   TestFindMultipathDeviceForDevice
--- PASS: TestFindMultipathDeviceForDevice (0.00s)
=== RUN   TestFindDeviceForPath
--- PASS: TestFindDeviceForPath (0.00s)
=== RUN   TestFindSlaveDevicesOnMultipath
--- PASS: TestFindSlaveDevicesOnMultipath (0.00s)
=== RUN   TestGetNestedMountpoints
--- PASS: TestGetNestedMountpoints (0.00s)
=== RUN   TestMergeResizeCondition
--- PASS: TestMergeResizeCondition (0.00s)
=== RUN   TestCheckAlphaNodeAffinity
--- PASS: TestCheckAlphaNodeAffinity (0.00s)
=== RUN   TestCheckVolumeNodeAffinity
--- PASS: TestCheckVolumeNodeAffinity (0.00s)
=== RUN   TestLoadPodFromFile
--- PASS: TestLoadPodFromFile (0.01s)
=== RUN   TestZonesToSet
--- PASS: TestZonesToSet (0.00s)
=== RUN   TestDoUnmountMountPoint
--- PASS: TestDoUnmountMountPoint (0.00s)
=== RUN   TestCalculateTimeoutForVolume
--- PASS: TestCalculateTimeoutForVolume (0.00s)
=== RUN   TestGenerateVolumeName
--- PASS: TestGenerateVolumeName (0.00s)
=== RUN   TestMountOptionFromSpec
--- PASS: TestMountOptionFromSpec (0.00s)
=== RUN   TestChooseZoneForVolume
--- PASS: TestChooseZoneForVolume (0.00s)
=== RUN   TestChooseZonesForVolume
--- PASS: TestChooseZonesForVolume (0.00s)
=== RUN   TestValidateZone
--- PASS: TestValidateZone (0.00s)
=== RUN   TestGetWindowsPath
--- PASS: TestGetWindowsPath (0.00s)
PASS
coverage: 58.3% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/util	1.243s	coverage: 58.3% of statements
=== RUN   Test_NewGoRoutineMap_Positive_SingleOp
--- PASS: Test_NewGoRoutineMap_Positive_SingleOp (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_TwoOps
--- PASS: Test_NewGoRoutineMap_Positive_TwoOps (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_TwoSubOps
--- PASS: Test_NewGoRoutineMap_Positive_TwoSubOps (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_SingleOpWithExpBackoff
--- PASS: Test_NewGoRoutineMap_Positive_SingleOpWithExpBackoff (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_SecondOpAfterFirstCompletes
--- PASS: Test_NewGoRoutineMap_Positive_SecondOpAfterFirstCompletes (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_SecondOpAfterFirstCompletesWithExpBackoff
--- PASS: Test_NewGoRoutineMap_Positive_SecondOpAfterFirstCompletesWithExpBackoff (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_SecondOpAfterFirstPanics
E0601 20:56:52.576954   22153 nestedpendingoperations.go:231] operation "volume-name" failed with: recovered from panic "testing panic". (err=<nil>) Call stack:
/go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/apimachinery/pkg/util/runtime/runtime.go:72
/go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/apimachinery/pkg/util/runtime/runtime.go:155
/usr/local/go/src/runtime/asm_amd64.s:509
/usr/local/go/src/runtime/panic.go:491
/go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/util/nestedpendingoperations/nestedpendingoperations_test.go:541
github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/util/nestedpendingoperations/_test/_obj_test/nestedpendingoperations.go:115
/usr/local/go/src/runtime/asm_amd64.s:2337
--- PASS: Test_NewGoRoutineMap_Positive_SecondOpAfterFirstPanics (0.02s)
	nestedpendingoperations_test.go:200: Warning: NewGoRoutine failed with Failed to create operation with name "\"volume-name\"". An operation with that name is already executing.. Will retry.
=== RUN   Test_NewGoRoutineMap_Positive_SecondOpAfterFirstPanicsWithExpBackoff
E0601 20:56:52.597653   22153 nestedpendingoperations.go:257] Operation for "\"volume-name\"" failed. No retries permitted until 2018-06-01 20:56:53.097210759 +0000 UTC m=+0.539726623 (durationBeforeRetry 500ms). Error: "recovered from panic \"testing panic\". (err=<nil>) Call stack:\n/go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/apimachinery/pkg/util/runtime/runtime.go:72\n/go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/apimachinery/pkg/util/runtime/runtime.go:155\n/usr/local/go/src/runtime/asm_amd64.s:509\n/usr/local/go/src/runtime/panic.go:491\n/go/src/github.com/openshift/origin/_output/local/go/src/github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/util/nestedpendingoperations/nestedpendingoperations_test.go:541\ngithub.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/util/nestedpendingoperations/_test/_obj_test/nestedpendingoperations.go:115\n/usr/local/go/src/runtime/asm_amd64.s:2337\n"
--- PASS: Test_NewGoRoutineMap_Positive_SecondOpAfterFirstPanicsWithExpBackoff (0.50s)
	nestedpendingoperations_test.go:230: Warning: NewGoRoutine failed with Failed to create operation with name "\"volume-name\"". An operation with that name is already executing.. Will retry.
=== RUN   Test_NewGoRoutineMap_Negative_SecondOpBeforeFirstCompletes
--- PASS: Test_NewGoRoutineMap_Negative_SecondOpBeforeFirstCompletes (0.00s)
=== RUN   Test_NewGoRoutineMap_Negative_SecondSubOpBeforeFirstCompletes2
--- PASS: Test_NewGoRoutineMap_Negative_SecondSubOpBeforeFirstCompletes2 (0.00s)
=== RUN   Test_NewGoRoutineMap_Negative_SecondSubOpBeforeFirstCompletes
--- PASS: Test_NewGoRoutineMap_Negative_SecondSubOpBeforeFirstCompletes (0.00s)
=== RUN   Test_NewGoRoutineMap_Negative_SecondOpBeforeFirstCompletesWithExpBackoff
--- PASS: Test_NewGoRoutineMap_Negative_SecondOpBeforeFirstCompletesWithExpBackoff (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_ThirdOpAfterFirstCompletes
--- PASS: Test_NewGoRoutineMap_Positive_ThirdOpAfterFirstCompletes (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_ThirdOpAfterFirstCompletesWithExpBackoff
--- PASS: Test_NewGoRoutineMap_Positive_ThirdOpAfterFirstCompletesWithExpBackoff (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_WaitEmpty
--- PASS: Test_NewGoRoutineMap_Positive_WaitEmpty (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_WaitEmptyWithExpBackoff
--- PASS: Test_NewGoRoutineMap_Positive_WaitEmptyWithExpBackoff (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_Wait
--- PASS: Test_NewGoRoutineMap_Positive_Wait (0.00s)
=== RUN   Test_NewGoRoutineMap_Positive_WaitWithExpBackoff
--- PASS: Test_NewGoRoutineMap_Positive_WaitWithExpBackoff (0.00s)
PASS
coverage: 81.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/util/nestedpendingoperations	1.558s	coverage: 81.4% of statements
=== RUN   TestOperationExecutor_MountVolume_ConcurrentMountForNonAttachablePlugins
--- PASS: TestOperationExecutor_MountVolume_ConcurrentMountForNonAttachablePlugins (0.00s)
=== RUN   TestOperationExecutor_MountVolume_ConcurrentMountForAttachablePlugins
--- PASS: TestOperationExecutor_MountVolume_ConcurrentMountForAttachablePlugins (5.00s)
=== RUN   TestOperationExecutor_UnmountVolume_ConcurrentUnmountForAllPlugins
--- PASS: TestOperationExecutor_UnmountVolume_ConcurrentUnmountForAllPlugins (0.00s)
=== RUN   TestOperationExecutor_UnmountDeviceConcurrently
--- PASS: TestOperationExecutor_UnmountDeviceConcurrently (5.00s)
=== RUN   TestOperationExecutor_AttachVolumeConcurrently
--- PASS: TestOperationExecutor_AttachVolumeConcurrently (5.00s)
=== RUN   TestOperationExecutor_DetachVolumeConcurrently
--- PASS: TestOperationExecutor_DetachVolumeConcurrently (5.00s)
=== RUN   TestOperationExecutor_VerifyVolumesAreAttachedConcurrently
--- PASS: TestOperationExecutor_VerifyVolumesAreAttachedConcurrently (0.00s)
=== RUN   TestOperationExecutor_VerifyControllerAttachedVolumeConcurrently
--- PASS: TestOperationExecutor_VerifyControllerAttachedVolumeConcurrently (5.00s)
=== RUN   TestOperationExecutor_MountVolume_ConcurrentMountForNonAttachablePlugins_VolumeMode_Block
--- PASS: TestOperationExecutor_MountVolume_ConcurrentMountForNonAttachablePlugins_VolumeMode_Block (0.00s)
=== RUN   TestOperationExecutor_MountVolume_ConcurrentMountForAttachablePlugins_VolumeMode_Block
--- PASS: TestOperationExecutor_MountVolume_ConcurrentMountForAttachablePlugins_VolumeMode_Block (5.00s)
=== RUN   TestOperationExecutor_UnmountVolume_ConcurrentUnmountForAllPlugins_VolumeMode_Block
--- PASS: TestOperationExecutor_UnmountVolume_ConcurrentUnmountForAllPlugins_VolumeMode_Block (0.00s)
=== RUN   TestOperationExecutor_UnmountDeviceConcurrently_VolumeMode_Block
--- PASS: TestOperationExecutor_UnmountDeviceConcurrently_VolumeMode_Block (5.00s)
PASS
coverage: 5.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/util/operationexecutor	36.092s	coverage: 5.7% of statements
=== RUN   TestRecyclerPod
--- PASS: TestRecyclerPod (0.00s)
	recycler_client_test.go:153: Test "RecyclerSuccess"
	recycler_client_test.go:153: Test "RecyclerFailure"
	recycler_client_test.go:153: Test "RecyclerDeleted"
	recycler_client_test.go:153: Test "RecyclerRunning"
PASS
coverage: 42.2% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/util/recyclerclient	1.050s	coverage: 42.2% of statements
=== RUN   TestValidatePersistentVolumes
--- PASS: TestValidatePersistentVolumes (0.00s)
=== RUN   TestValidatePathNoBacksteps
--- PASS: TestValidatePathNoBacksteps (0.00s)
PASS
coverage: 100.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/validation	1.033s	coverage: 100.0% of statements
=== RUN   TestGetDeviceName_Volume
--- PASS: TestGetDeviceName_Volume (0.00s)
=== RUN   TestGetDeviceName_PersistentVolume
--- PASS: TestGetDeviceName_PersistentVolume (0.00s)
=== RUN   TestAttachDetach
E0601 20:57:00.016477   22337 attacher.go:63] Error attaching volume "[local] volumes/test" to node "host": Fake attach error
E0601 20:57:00.018677   22337 attacher.go:291] Error checking if volume ("[local] volumes/test") is already attached to current node ("host"). Will continue and try detach anyway. err=Fake DiskIsAttached error
E0601 20:57:00.018859   22337 attacher.go:291] Error checking if volume ("[local] volumes/test") is already attached to current node ("host"). Will continue and try detach anyway. err=Fake DiskIsAttached error
E0601 20:57:00.018928   22337 attacher.go:309] Error detaching volume "[local] volumes/test": Fake detach error
--- PASS: TestAttachDetach (0.00s)
	attacher_test.go:161: Test "Attach_Positive" succeeded
	attacher_test.go:161: Test "Attach_Negative" succeeded
	attacher_test.go:161: Test "Detach_Positive" succeeded
	attacher_test.go:161: Test "Detach_Positive_AlreadyDetached" succeeded
	attacher_test.go:161: Test "Detach_Positive_CheckFails" succeeded
	attacher_test.go:161: Test "Detach_Negative" succeeded
=== RUN   TestCanSupport
--- PASS: TestCanSupport (0.00s)
=== RUN   TestPlugin
--- PASS: TestPlugin (0.00s)
PASS
coverage: 24.3% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/vsphere_volume	1.081s	coverage: 24.3% of statements
=== RUN   TestAdmissionNonNilAttribute
--- PASS: TestAdmissionNonNilAttribute (0.00s)
=== RUN   TestAdmissionNilAttribute
--- PASS: TestAdmissionNilAttribute (0.00s)
=== RUN   TestHandles
--- PASS: TestHandles (0.00s)
PASS
coverage: 57.1% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/admit	1.027s	coverage: 57.1% of statements
=== RUN   TestAdmission
--- PASS: TestAdmission (0.00s)
=== RUN   TestValidate
--- PASS: TestValidate (0.00s)
=== RUN   TestOtherResources
--- PASS: TestOtherResources (0.00s)
PASS
coverage: 67.9% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/alwayspullimages	1.033s	coverage: 67.9% of statements
=== RUN   TestInterPodAffinityAdmission
--- PASS: TestInterPodAffinityAdmission (0.00s)
=== RUN   TestHandles
--- PASS: TestHandles (0.00s)
=== RUN   TestOtherResources
--- PASS: TestOtherResources (0.00s)
PASS
coverage: 88.2% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/antiaffinity	1.026s	coverage: 88.2% of statements
=== RUN   TestForgivenessAdmission
--- PASS: TestForgivenessAdmission (0.00s)
=== RUN   TestHandles
--- PASS: TestHandles (0.00s)
PASS
coverage: 80.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/defaulttolerationseconds	1.050s	coverage: 80.0% of statements
=== RUN   TestAdmission
--- PASS: TestAdmission (0.00s)
=== RUN   TestHandles
--- PASS: TestHandles (0.00s)
PASS
coverage: 57.1% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/deny	1.031s	coverage: 57.1% of statements
=== RUN   TestEventRateLimiting
=== RUN   TestEventRateLimiting/event_not_blocked_when_tokens_available
=== RUN   TestEventRateLimiting/non-event_not_blocked
=== RUN   TestEventRateLimiting/event_blocked_after_tokens_exhausted
=== RUN   TestEventRateLimiting/non-event_not_blocked_after_tokens_exhausted
=== RUN   TestEventRateLimiting/non-events_should_not_count_against_limit
=== RUN   TestEventRateLimiting/event_accepted_after_token_refill
=== RUN   TestEventRateLimiting/event_blocked_by_namespace_limits
=== RUN   TestEventRateLimiting/event_from_other_namespace_not_blocked
=== RUN   TestEventRateLimiting/events_from_other_namespaces_should_not_count_against_limit
=== RUN   TestEventRateLimiting/event_accepted_after_namespace_token_refill
=== RUN   TestEventRateLimiting/event_from_other_namespaces_should_not_clear_namespace_limits
=== RUN   TestEventRateLimiting/namespace_limits_from_lru_namespace_should_clear_when_cache_size_exceeded
=== RUN   TestEventRateLimiting/event_blocked_by_source+object_limits
=== RUN   TestEventRateLimiting/event_from_other_source+object_not_blocked
=== RUN   TestEventRateLimiting/events_from_other_source+object_should_not_count_against_limit
=== RUN   TestEventRateLimiting/event_accepted_after_source+object_token_refill
=== RUN   TestEventRateLimiting/event_from_other_source+object_should_not_clear_source+object_limits
=== RUN   TestEventRateLimiting/source+object_limits_from_lru_source+object_should_clear_when_cache_size_exceeded
=== RUN   TestEventRateLimiting/source_host_should_be_included_in_source+object_key
=== RUN   TestEventRateLimiting/involved_object_kind_should_be_included_in_source+object_key
=== RUN   TestEventRateLimiting/involved_object_namespace_should_be_included_in_source+object_key
=== RUN   TestEventRateLimiting/involved_object_name_should_be_included_in_source+object_key
=== RUN   TestEventRateLimiting/involved_object_UID_should_be_included_in_source+object_key
=== RUN   TestEventRateLimiting/involved_object_APIVersion_should_be_included_in_source+object_key
=== RUN   TestEventRateLimiting/event_blocked_by_user_limits
=== RUN   TestEventRateLimiting/event_from_other_user_not_blocked
=== RUN   TestEventRateLimiting/events_from_other_user_should_not_count_against_limit
--- PASS: TestEventRateLimiting (0.01s)
    --- PASS: TestEventRateLimiting/event_not_blocked_when_tokens_available (0.00s)
    --- PASS: TestEventRateLimiting/non-event_not_blocked (0.00s)
    --- PASS: TestEventRateLimiting/event_blocked_after_tokens_exhausted (0.00s)
    --- PASS: TestEventRateLimiting/non-event_not_blocked_after_tokens_exhausted (0.00s)
    --- PASS: TestEventRateLimiting/non-events_should_not_count_against_limit (0.00s)
    --- PASS: TestEventRateLimiting/event_accepted_after_token_refill (0.00s)
    --- PASS: TestEventRateLimiting/event_blocked_by_namespace_limits (0.00s)
    --- PASS: TestEventRateLimiting/event_from_other_namespace_not_blocked (0.00s)
    --- PASS: TestEventRateLimiting/events_from_other_namespaces_should_not_count_against_limit (0.00s)
    --- PASS: TestEventRateLimiting/event_accepted_after_namespace_token_refill (0.00s)
    --- PASS: TestEventRateLimiting/event_from_other_namespaces_should_not_clear_namespace_limits (0.00s)
    --- PASS: TestEventRateLimiting/namespace_limits_from_lru_namespace_should_clear_when_cache_size_exceeded (0.00s)
    --- PASS: TestEventRateLimiting/event_blocked_by_source+object_limits (0.00s)
    --- PASS: TestEventRateLimiting/event_from_other_source+object_not_blocked (0.00s)
    --- PASS: TestEventRateLimiting/events_from_other_source+object_should_not_count_against_limit (0.00s)
    --- PASS: TestEventRateLimiting/event_accepted_after_source+object_token_refill (0.00s)
    --- PASS: TestEventRateLimiting/event_from_other_source+object_should_not_clear_source+object_limits (0.00s)
    --- PASS: TestEventRateLimiting/source+object_limits_from_lru_source+object_should_clear_when_cache_size_exceeded (0.00s)
    --- PASS: TestEventRateLimiting/source_host_should_be_included_in_source+object_key (0.00s)
    --- PASS: TestEventRateLimiting/involved_object_kind_should_be_included_in_source+object_key (0.00s)
    --- PASS: TestEventRateLimiting/involved_object_namespace_should_be_included_in_source+object_key (0.00s)
    --- PASS: TestEventRateLimiting/involved_object_name_should_be_included_in_source+object_key (0.00s)
    --- PASS: TestEventRateLimiting/involved_object_UID_should_be_included_in_source+object_key (0.00s)
    --- PASS: TestEventRateLimiting/involved_object_APIVersion_should_be_included_in_source+object_key (0.00s)
    --- PASS: TestEventRateLimiting/event_blocked_by_user_limits (0.00s)
    --- PASS: TestEventRateLimiting/event_from_other_user_not_blocked (0.00s)
    --- PASS: TestEventRateLimiting/events_from_other_user_should_not_count_against_limit (0.00s)
=== RUN   TestSingleCache
--- PASS: TestSingleCache (0.00s)
=== RUN   TestLRUCache
--- PASS: TestLRUCache (0.00s)
PASS
coverage: 60.2% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/eventratelimit	1.038s	coverage: 60.2% of statements
=== RUN   TestValidateConfiguration
--- PASS: TestValidateConfiguration (0.00s)
PASS
coverage: 100.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/eventratelimit/apis/eventratelimit/validation	1.031s	coverage: 100.0% of statements
=== RUN   TestAdmission
--- PASS: TestAdmission (0.00s)
=== RUN   TestDenyExecOnPrivileged
--- PASS: TestDenyExecOnPrivileged (0.00s)
PASS
coverage: 77.5% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/exec	1.081s	coverage: 77.5% of statements
=== RUN   TestAdmit
--- PASS: TestAdmit (0.00s)
=== RUN   TestHandles
--- PASS: TestHandles (0.00s)
PASS
coverage: 80.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/extendedresourcetoleration	1.065s	coverage: 80.0% of statements
=== RUN   TestGCAdmission
--- PASS: TestGCAdmission (0.00s)
=== RUN   TestBlockOwnerDeletionAdmission
--- PASS: TestBlockOwnerDeletionAdmission (0.00s)
PASS
coverage: 83.5% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/gc	1.120s	coverage: 83.5% of statements
=== RUN   TestNewFromConfig
--- PASS: TestNewFromConfig (0.02s)
=== RUN   TestTLSConfig
2018/06/01 20:57:08 http: TLS handshake error from 127.0.0.1:36008: remote error: tls: bad certificate
2018/06/01 20:57:08 http: TLS handshake error from 127.0.0.1:47870: tls: failed to verify client's certificate: x509: certificate signed by unknown authority (possibly because of "crypto/rsa: verification error" while trying to verify candidate authority certificate "webhook_imagepolicy_ca")
2018/06/01 20:57:08 http: TLS handshake error from 127.0.0.1:41980: remote error: tls: bad certificate
--- PASS: TestTLSConfig (0.59s)
=== RUN   TestWebhookCache
--- PASS: TestWebhookCache (8.74s)
=== RUN   TestContainerCombinations
--- PASS: TestContainerCombinations (0.68s)
=== RUN   TestDefaultAllow
--- PASS: TestDefaultAllow (18.05s)
=== RUN   TestAnnotationFiltering
--- PASS: TestAnnotationFiltering (0.21s)
=== RUN   TestConfigNormalization
--- PASS: TestConfigNormalization (0.00s)
PASS
coverage: 83.2% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/imagepolicy	29.313s	coverage: 83.2% of statements
=== RUN   TestEstimateReturnsErrorFromSource
E0601 20:57:09.501137   22659 admission.go:164] Error while trying to estimate resources: Example error
E0601 20:57:09.503069   22659 admission.go:164] Error while trying to estimate resources: Example error
E0601 20:57:09.503124   22659 admission.go:164] Error while trying to estimate resources: Example error
E0601 20:57:09.503175   22659 admission.go:164] Error while trying to estimate resources: Example error
E0601 20:57:09.503225   22659 admission.go:164] Error while trying to estimate resources: Example error
E0601 20:57:09.503268   22659 admission.go:164] Error while trying to estimate resources: Example error
E0601 20:57:09.503313   22659 admission.go:164] Error while trying to estimate resources: Example error
E0601 20:57:09.503357   22659 admission.go:164] Error while trying to estimate resources: Example error
--- PASS: TestEstimateReturnsErrorFromSource (0.00s)
=== RUN   TestEstimationBasedOnTheSameImageSameNamespace7d
--- PASS: TestEstimationBasedOnTheSameImageSameNamespace7d (0.00s)
=== RUN   TestEstimationBasedOnTheSameImageSameNamespace30d
--- PASS: TestEstimationBasedOnTheSameImageSameNamespace30d (0.00s)
=== RUN   TestEstimationBasedOnTheSameImageAllNamespaces7d
--- PASS: TestEstimationBasedOnTheSameImageAllNamespaces7d (0.00s)
=== RUN   TestEstimationBasedOnTheSameImageAllNamespaces30d
--- PASS: TestEstimationBasedOnTheSameImageAllNamespaces30d (0.00s)
=== RUN   TestEstimationBasedOnOtherImages
--- PASS: TestEstimationBasedOnOtherImages (0.00s)
=== RUN   TestNoData
--- PASS: TestNoData (0.00s)
=== RUN   TestManyContainers
--- PASS: TestManyContainers (0.00s)
=== RUN   TestNamespaceAware
--- PASS: TestNamespaceAware (0.00s)
=== RUN   TestInfluxDBDataSource
--- PASS: TestInfluxDBDataSource (0.00s)
=== RUN   TestGCMDataSource
--- PASS: TestGCMDataSource (0.00s)
=== RUN   TestHawkularDataSource
--- PASS: TestHawkularDataSource (0.00s)
=== RUN   TestNoDataSourceFound
--- PASS: TestNoDataSourceFound (0.00s)
=== RUN   TestGCMReturnsErrorIfClientCannotConnect
--- PASS: TestGCMReturnsErrorIfClientCannotConnect (0.00s)
=== RUN   TestTaqQuery
--- PASS: TestTaqQuery (0.00s)
=== RUN   TestInsecureMustBeBool
--- PASS: TestInsecureMustBeBool (0.00s)
=== RUN   TestCAFileMustExist
--- PASS: TestCAFileMustExist (0.00s)
=== RUN   TestServiceAccountIsMutuallyExclusiveWithAuth
E0601 20:57:09.514932   22659 hawkular.go:162] Could not read contents of /var/run/secrets/kubernetes.io/serviceaccount/token, no token authentication is used
--- PASS: TestServiceAccountIsMutuallyExclusiveWithAuth (0.00s)
=== RUN   TestGetUsagePercentile
--- PASS: TestGetUsagePercentile (0.00s)
=== RUN   TestInfluxDBGetUsagePercentileCPU
--- PASS: TestInfluxDBGetUsagePercentileCPU (0.00s)
=== RUN   TestInfluxDBGetUsagePercentileMemory
--- PASS: TestInfluxDBGetUsagePercentileMemory (0.00s)
PASS
coverage: 79.8% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/initialresources	1.046s	coverage: 79.8% of statements
=== RUN   TestDefaultContainerResourceRequirements
--- PASS: TestDefaultContainerResourceRequirements (0.00s)
=== RUN   TestMergePodResourceRequirements
--- PASS: TestMergePodResourceRequirements (0.00s)
=== RUN   TestPodLimitFunc
--- PASS: TestPodLimitFunc (0.00s)
=== RUN   TestPodLimitFuncApplyDefault
--- PASS: TestPodLimitFuncApplyDefault (0.00s)
=== RUN   TestLimitRangerIgnoresSubresource
--- PASS: TestLimitRangerIgnoresSubresource (0.00s)
=== RUN   TestLimitRangerAdmitPod
--- PASS: TestLimitRangerAdmitPod (0.00s)
=== RUN   TestPersistentVolumeClaimLimitFunc
--- PASS: TestPersistentVolumeClaimLimitFunc (0.00s)
PASS
coverage: 87.2% of statements
E0601 20:57:13.379215   22695 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.LimitRange: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"limitranges"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/limitranger	1.101s	coverage: 87.2% of statements
=== RUN   TestAdmission
E0601 20:57:13.815448   22702 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
--- PASS: TestAdmission (0.10s)
=== RUN   TestAdmissionNamespaceExists
E0601 20:57:13.916251   22702 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
--- PASS: TestAdmissionNamespaceExists (0.10s)
=== RUN   TestIgnoreAdmission
--- PASS: TestIgnoreAdmission (0.00s)
=== RUN   TestAdmissionWithLatentCache
E0601 20:57:14.017510   22702 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
E0601 20:57:14.017689   22702 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
--- PASS: TestAdmissionWithLatentCache (0.10s)
PASS
coverage: 69.2% of statements
E0601 20:57:14.817647   22702 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
E0601 20:57:14.916999   22702 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
E0601 20:57:15.018293   22702 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
E0601 20:57:15.019253   22702 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/namespace/autoprovision	1.375s	coverage: 69.2% of statements
=== RUN   TestAdmissionNamespaceExists
E0601 20:57:17.978026   22749 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
--- PASS: TestAdmissionNamespaceExists (0.10s)
=== RUN   TestAdmissionNamespaceDoesNotExist
E0601 20:57:18.078094   22749 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
--- PASS: TestAdmissionNamespaceDoesNotExist (0.10s)
PASS
coverage: 66.7% of statements
E0601 20:57:18.981199   22749 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
E0601 20:57:19.078806   22749 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/namespace/exists	1.346s	coverage: 66.7% of statements
=== RUN   Test_nodePlugin_Admit
=== RUN   Test_nodePlugin_Admit/allow_creating_a_mirror_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_update_of_mirror_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/allow_delete_of_mirror_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_create_of_mirror_pod_status_bound_to_self
=== RUN   Test_nodePlugin_Admit/allow_update_of_mirror_pod_status_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_status_bound_to_self
=== RUN   Test_nodePlugin_Admit/allow_create_of_eviction_for_mirror_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_update_of_eviction_for_mirror_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_eviction_for_mirror_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/allow_create_of_unnamed_eviction_for_mirror_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_creating_a_mirror_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_update_of_mirror_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_create_of_mirror_pod_status_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_update_of_mirror_pod_status_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_status_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_create_of_eviction_for_mirror_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_update_of_eviction_for_mirror_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_eviction_for_mirror_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_mirror_pod_to_another
=== RUN   Test_nodePlugin_Admit/forbid_creating_a_mirror_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_update_of_mirror_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_create_of_mirror_pod_status_unbound
=== RUN   Test_nodePlugin_Admit/forbid_update_of_mirror_pod_status_unbound
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_status_unbound
=== RUN   Test_nodePlugin_Admit/forbid_create_of_eviction_for_mirror_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_update_of_eviction_for_mirror_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_eviction_for_mirror_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_mirror_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_creating_a_normal_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_update_of_normal_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/allow_delete_of_normal_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_create_of_normal_pod_status_bound_to_self
=== RUN   Test_nodePlugin_Admit/allow_update_of_normal_pod_status_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_normal_pod_status_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_update_of_eviction_for_normal_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_eviction_for_normal_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/allow_create_of_unnamed_eviction_for_normal_pod_bound_to_self
=== RUN   Test_nodePlugin_Admit/forbid_creating_a_normal_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_update_of_normal_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_normal_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_create_of_normal_pod_status_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_update_of_normal_pod_status_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_normal_pod_status_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_create_of_eviction_for_normal_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_update_of_eviction_for_normal_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_eviction_for_normal_pod_bound_to_another
=== RUN   Test_nodePlugin_Admit/forbid_create_of_eviction_for_normal_pod_bound_to_another#01
=== RUN   Test_nodePlugin_Admit/forbid_creating_a_normal_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_update_of_normal_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_normal_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_create_of_normal_pod_status_unbound
=== RUN   Test_nodePlugin_Admit/forbid_update_of_normal_pod_status_unbound
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_normal_pod_status_unbound
=== RUN   Test_nodePlugin_Admit/forbid_create_of_eviction_for_normal_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_update_of_eviction_for_normal_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_eviction_for_normal_pod_unbound
=== RUN   Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_normal_unbound
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_unknown_pod
=== RUN   Test_nodePlugin_Admit/forbid_create_of_eviction_for_unknown_pod
=== RUN   Test_nodePlugin_Admit/forbid_update_of_eviction_for_unknown_pod
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_eviction_for_unknown_pod
=== RUN   Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_unknown_pod
=== RUN   Test_nodePlugin_Admit/allow_create_of_eviction_for_unnamed_pod
=== RUN   Test_nodePlugin_Admit/forbid_update_of_eviction_for_unnamed_pod
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_eviction_for_unnamed_pod
=== RUN   Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_unnamed_pod
=== RUN   Test_nodePlugin_Admit/forbid_create_of_pod_referencing_service_account
=== RUN   Test_nodePlugin_Admit/forbid_create_of_pod_referencing_secret
=== RUN   Test_nodePlugin_Admit/forbid_create_of_pod_referencing_configmap
=== RUN   Test_nodePlugin_Admit/forbid_create_of_pod_referencing_persistentvolumeclaim
=== RUN   Test_nodePlugin_Admit/allow_create_of_my_node
=== RUN   Test_nodePlugin_Admit/allow_create_of_my_node_pulling_name_from_object
=== RUN   Test_nodePlugin_Admit/allow_update_of_my_node
=== RUN   Test_nodePlugin_Admit/allow_delete_of_my_node
=== RUN   Test_nodePlugin_Admit/allow_update_of_my_node_status
=== RUN   Test_nodePlugin_Admit/forbid_create_of_my_node_with_non-nil_configSource
=== RUN   Test_nodePlugin_Admit/forbid_update_of_my_node:_nil_configSource_to_new_non-nil_configSource
=== RUN   Test_nodePlugin_Admit/forbid_update_of_my_node:_non-nil_configSource_to_new_non-nil_configSource
=== RUN   Test_nodePlugin_Admit/allow_update_of_my_node:_non-nil_configSource_unchanged
=== RUN   Test_nodePlugin_Admit/allow_update_of_my_node:_non-nil_configSource_to_nil_configSource
=== RUN   Test_nodePlugin_Admit/forbid_create_of_other_node
=== RUN   Test_nodePlugin_Admit/forbid_create_of_other_node_pulling_name_from_object
=== RUN   Test_nodePlugin_Admit/forbid_update_of_other_node
=== RUN   Test_nodePlugin_Admit/forbid_delete_of_other_node
=== RUN   Test_nodePlugin_Admit/forbid_update_of_other_node_status
=== RUN   Test_nodePlugin_Admit/forbid_create_of_unbound_token
=== RUN   Test_nodePlugin_Admit/forbid_create_of_token_bound_to_nonexistant_pod
=== RUN   Test_nodePlugin_Admit/forbid_create_of_token_bound_to_pod_without_uid
=== RUN   Test_nodePlugin_Admit/forbid_create_of_token_bound_to_pod_scheduled_on_another_node
=== RUN   Test_nodePlugin_Admit/allow_create_of_token_bound_to_pod_scheduled_this_node
=== RUN   Test_nodePlugin_Admit/allow_create_of_unrelated_object
=== RUN   Test_nodePlugin_Admit/allow_update_of_unrelated_object
=== RUN   Test_nodePlugin_Admit/allow_delete_of_unrelated_object
=== RUN   Test_nodePlugin_Admit/allow_unrelated_user_creating_a_normal_pod_unbound
=== RUN   Test_nodePlugin_Admit/allow_unrelated_user_update_of_normal_pod_unbound
=== RUN   Test_nodePlugin_Admit/allow_unrelated_user_delete_of_normal_pod_unbound
=== RUN   Test_nodePlugin_Admit/allow_unrelated_user_create_of_normal_pod_status_unbound
=== RUN   Test_nodePlugin_Admit/allow_unrelated_user_update_of_normal_pod_status_unbound
=== RUN   Test_nodePlugin_Admit/allow_unrelated_user_delete_of_normal_pod_status_unbound
--- PASS: Test_nodePlugin_Admit (0.04s)
    --- PASS: Test_nodePlugin_Admit/allow_creating_a_mirror_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_mirror_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_delete_of_mirror_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_mirror_pod_status_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_update_of_mirror_pod_status_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_status_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_create_of_eviction_for_mirror_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_eviction_for_mirror_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_eviction_for_mirror_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_create_of_unnamed_eviction_for_mirror_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_creating_a_mirror_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_mirror_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_mirror_pod_status_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_mirror_pod_status_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_status_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_eviction_for_mirror_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_eviction_for_mirror_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_eviction_for_mirror_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_mirror_pod_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_creating_a_mirror_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_mirror_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_mirror_pod_status_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_mirror_pod_status_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_mirror_pod_status_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_eviction_for_mirror_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_eviction_for_mirror_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_eviction_for_mirror_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_mirror_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_creating_a_normal_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_normal_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_delete_of_normal_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_normal_pod_status_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_update_of_normal_pod_status_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_normal_pod_status_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_eviction_for_normal_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_eviction_for_normal_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_create_of_unnamed_eviction_for_normal_pod_bound_to_self (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_creating_a_normal_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_normal_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_normal_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_normal_pod_status_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_normal_pod_status_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_normal_pod_status_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_eviction_for_normal_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_eviction_for_normal_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_eviction_for_normal_pod_bound_to_another (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_eviction_for_normal_pod_bound_to_another#01 (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_creating_a_normal_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_normal_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_normal_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_normal_pod_status_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_normal_pod_status_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_normal_pod_status_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_eviction_for_normal_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_eviction_for_normal_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_eviction_for_normal_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_normal_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_unknown_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_eviction_for_unknown_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_eviction_for_unknown_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_eviction_for_unknown_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_unknown_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_create_of_eviction_for_unnamed_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_eviction_for_unnamed_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_eviction_for_unnamed_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_unnamed_eviction_for_unnamed_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_pod_referencing_service_account (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_pod_referencing_secret (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_pod_referencing_configmap (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_pod_referencing_persistentvolumeclaim (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_create_of_my_node (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_create_of_my_node_pulling_name_from_object (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_update_of_my_node (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_delete_of_my_node (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_update_of_my_node_status (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_my_node_with_non-nil_configSource (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_my_node:_nil_configSource_to_new_non-nil_configSource (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_my_node:_non-nil_configSource_to_new_non-nil_configSource (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_update_of_my_node:_non-nil_configSource_unchanged (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_update_of_my_node:_non-nil_configSource_to_nil_configSource (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_other_node (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_other_node_pulling_name_from_object (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_other_node (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_delete_of_other_node (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_update_of_other_node_status (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_unbound_token (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_token_bound_to_nonexistant_pod (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_token_bound_to_pod_without_uid (0.00s)
    --- PASS: Test_nodePlugin_Admit/forbid_create_of_token_bound_to_pod_scheduled_on_another_node (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_create_of_token_bound_to_pod_scheduled_this_node (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_create_of_unrelated_object (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_update_of_unrelated_object (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_delete_of_unrelated_object (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_unrelated_user_creating_a_normal_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_unrelated_user_update_of_normal_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_unrelated_user_delete_of_normal_pod_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_unrelated_user_create_of_normal_pod_status_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_unrelated_user_update_of_normal_pod_status_unbound (0.00s)
    --- PASS: Test_nodePlugin_Admit/allow_unrelated_user_delete_of_normal_pod_status_unbound (0.00s)
PASS
coverage: 69.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/noderestriction	1.127s	coverage: 69.4% of statements
=== RUN   TestAdmission
--- PASS: TestAdmission (0.00s)
PASS
coverage: 39.8% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/persistentvolume/label	1.083s	coverage: 39.8% of statements
=== RUN   TestPVCResizeAdmission
pvc-resize, update, no error
<nil>
pvc-resize, update, volume plugin error
persistentvolumeclaims "foo" is forbidden: volume plugin does not support resize
pvc-resize, update, dynamically provisioned error
persistentvolumeclaims "foo" is forbidden: only dynamically provisioned pvc can be resized and the storageclass that provisions the pvc must support resize
pvc-resize, update, dynamically provisioned error
persistentvolumeclaims "foo" is forbidden: only dynamically provisioned pvc can be resized and the storageclass that provisions the pvc must support resize
PVC update with no change in size
<nil>
expand pvc in pending state
persistentvolumeclaims "foo" is forbidden: Only bound persistent volume claims can be expanded
--- PASS: TestPVCResizeAdmission (0.00s)
PASS
coverage: 72.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/persistentvolume/resize	1.076s	coverage: 72.4% of statements
=== RUN   TestPodAdmission
E0601 20:57:28.040572   22863 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
--- PASS: TestPodAdmission (0.10s)
=== RUN   TestHandles
--- PASS: TestHandles (0.00s)
=== RUN   TestIgnoreUpdatingInitializedPod
--- PASS: TestIgnoreUpdatingInitializedPod (0.00s)
PASS
coverage: 64.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/podnodeselector	1.181s	coverage: 64.4% of statements
=== RUN   TestMergeEnv
--- PASS: TestMergeEnv (0.00s)
=== RUN   TestMergeEnvFrom
--- PASS: TestMergeEnvFrom (0.00s)
=== RUN   TestMergeVolumeMounts
--- PASS: TestMergeVolumeMounts (0.00s)
=== RUN   TestMergeVolumes
--- PASS: TestMergeVolumes (0.00s)
=== RUN   TestAdmitConflictWithDifferentNamespaceShouldDoNothing
--- PASS: TestAdmitConflictWithDifferentNamespaceShouldDoNothing (0.00s)
=== RUN   TestAdmitConflictWithNonMatchingLabelsShouldNotError
--- PASS: TestAdmitConflictWithNonMatchingLabelsShouldNotError (0.00s)
=== RUN   TestAdmitConflictShouldNotModifyPod
--- PASS: TestAdmitConflictShouldNotModifyPod (0.00s)
=== RUN   TestAdmit
--- PASS: TestAdmit (0.00s)
=== RUN   TestAdmitMirrorPod
--- PASS: TestAdmitMirrorPod (0.00s)
=== RUN   TestExclusionNoAdmit
--- PASS: TestExclusionNoAdmit (0.00s)
=== RUN   TestAdmitEmptyPodNamespace
--- PASS: TestAdmitEmptyPodNamespace (0.00s)
PASS
coverage: 82.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/podpreset	1.099s	coverage: 82.4% of statements
=== RUN   TestPodAdmission
E0601 20:57:32.942428   22924 reflector.go:322] github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/client/informers/informers_generated/internalversion/factory.go:86: Failed to watch *core.Namespace: unhandled watch: testing.WatchActionImpl{ActionImpl:testing.ActionImpl{Namespace:"", Verb:"watch", Resource:schema.GroupVersionResource{Group:"", Version:"", Resource:"namespaces"}, Subresource:""}, WatchRestrictions:testing.WatchRestrictions{Labels:labels.internalSelector(nil), Fields:fields.andTerm{}, ResourceVersion:""}}
--- PASS: TestPodAdmission (0.11s)
=== RUN   TestHandles
--- PASS: TestHandles (0.00s)
=== RUN   TestIgnoreUpdatingInitializedPod
--- PASS: TestIgnoreUpdatingInitializedPod (0.00s)
PASS
coverage: 66.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/podtolerationrestriction	1.188s	coverage: 66.4% of statements
=== RUN   TestValidateConfiguration
--- PASS: TestValidateConfiguration (0.00s)
PASS
coverage: 100.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/podtolerationrestriction/apis/podtolerationrestriction/validation	1.048s	coverage: 100.0% of statements
=== RUN   TestPriorityClassAdmission
--- PASS: TestPriorityClassAdmission (0.00s)
=== RUN   TestDefaultPriority
--- PASS: TestDefaultPriority (0.00s)
=== RUN   TestPodAdmission
--- PASS: TestPodAdmission (0.00s)
PASS
coverage: 75.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/priority	1.135s	coverage: 75.0% of statements
=== RUN   TestPrettyPrint
--- PASS: TestPrettyPrint (0.00s)
=== RUN   TestAdmissionIgnoresDelete
--- PASS: TestAdmissionIgnoresDelete (0.00s)
=== RUN   TestAdmissionIgnoresSubresources
--- PASS: TestAdmissionIgnoresSubresources (0.00s)
=== RUN   TestAdmitBelowQuotaLimit
--- PASS: TestAdmitBelowQuotaLimit (0.00s)
=== RUN   TestAdmitHandlesOldObjects
--- PASS: TestAdmitHandlesOldObjects (0.01s)
=== RUN   TestAdmitHandlesNegativePVCUpdates
--- PASS: TestAdmitHandlesNegativePVCUpdates (0.00s)
=== RUN   TestAdmitHandlesPVCUpdates
--- PASS: TestAdmitHandlesPVCUpdates (0.00s)
=== RUN   TestAdmitHandlesCreatingUpdates
--- PASS: TestAdmitHandlesCreatingUpdates (0.00s)
=== RUN   TestAdmitExceedQuotaLimit
--- PASS: TestAdmitExceedQuotaLimit (0.00s)
=== RUN   TestAdmitEnforceQuotaConstraints
--- PASS: TestAdmitEnforceQuotaConstraints (0.00s)
=== RUN   TestAdmitPodInNamespaceWithoutQuota
--- PASS: TestAdmitPodInNamespaceWithoutQuota (0.00s)
=== RUN   TestAdmitBelowTerminatingQuotaLimit
--- PASS: TestAdmitBelowTerminatingQuotaLimit (0.00s)
=== RUN   TestAdmitBelowBestEffortQuotaLimit
--- PASS: TestAdmitBelowBestEffortQuotaLimit (0.00s)
=== RUN   TestAdmitBestEffortQuotaLimitIgnoresBurstable
--- PASS: TestAdmitBestEffortQuotaLimitIgnoresBurstable (0.00s)
=== RUN   TestHasUsageStats
--- PASS: TestHasUsageStats (0.00s)
=== RUN   TestAdmissionSetsMissingNamespace
--- PASS: TestAdmissionSetsMissingNamespace (0.00s)
=== RUN   TestAdmitRejectsNegativeUsage
--- PASS: TestAdmitRejectsNegativeUsage (0.00s)
=== RUN   TestAdmitWhenUnrelatedResourceExceedsQuota
--- PASS: TestAdmitWhenUnrelatedResourceExceedsQuota (0.01s)
=== RUN   TestAdmitLimitedResourceNoQuota
--- PASS: TestAdmitLimitedResourceNoQuota (0.00s)
=== RUN   TestAdmitLimitedResourceNoQuotaIgnoresNonMatchingResources
--- PASS: TestAdmitLimitedResourceNoQuotaIgnoresNonMatchingResources (0.00s)
=== RUN   TestAdmitLimitedResourceWithQuota
--- PASS: TestAdmitLimitedResourceWithQuota (0.00s)
=== RUN   TestAdmitLimitedResourceWithMultipleQuota
--- PASS: TestAdmitLimitedResourceWithMultipleQuota (0.00s)
=== RUN   TestAdmitLimitedResourceWithQuotaThatDoesNotCover
--- PASS: TestAdmitLimitedResourceWithQuotaThatDoesNotCover (0.00s)
PASS
coverage: 70.1% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/resourcequota	1.184s	coverage: 70.1% of statements
=== RUN   TestValidateConfiguration
--- PASS: TestValidateConfiguration (0.00s)
PASS
coverage: 100.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/resourcequota/apis/resourcequota/validation	1.026s	coverage: 100.0% of statements
=== RUN   TestAdmitSeccomp
--- PASS: TestAdmitSeccomp (0.01s)
=== RUN   TestAdmitPrivileged
--- PASS: TestAdmitPrivileged (0.01s)
=== RUN   TestAdmitPreferNonmutating
--- PASS: TestAdmitPreferNonmutating (0.01s)
=== RUN   TestFailClosedOnInvalidPod
--- PASS: TestFailClosedOnInvalidPod (0.00s)
=== RUN   TestAdmitCaps
--- PASS: TestAdmitCaps (0.02s)
=== RUN   TestAdmitVolumes
--- PASS: TestAdmitVolumes (0.11s)
=== RUN   TestAdmitHostNetwork
--- PASS: TestAdmitHostNetwork (0.01s)
=== RUN   TestAdmitHostPorts
--- PASS: TestAdmitHostPorts (0.02s)
=== RUN   TestAdmitHostPID
--- PASS: TestAdmitHostPID (0.00s)
=== RUN   TestAdmitHostIPC
--- PASS: TestAdmitHostIPC (0.01s)
=== RUN   TestAdmitSELinux
--- PASS: TestAdmitSELinux (0.01s)
=== RUN   TestAdmitAppArmor
--- PASS: TestAdmitAppArmor (0.01s)
=== RUN   TestAdmitRunAsUser
--- PASS: TestAdmitRunAsUser (0.01s)
=== RUN   TestAdmitSupplementalGroups
--- PASS: TestAdmitSupplementalGroups (0.01s)
=== RUN   TestAdmitFSGroup
--- PASS: TestAdmitFSGroup (0.00s)
=== RUN   TestAdmitReadOnlyRootFilesystem
--- PASS: TestAdmitReadOnlyRootFilesystem (0.00s)
=== RUN   TestAdmitSysctls
--- PASS: TestAdmitSysctls (0.03s)
=== RUN   TestAssignSecurityContext
--- PASS: TestAssignSecurityContext (0.00s)
=== RUN   TestCreateProvidersFromConstraints
--- PASS: TestCreateProvidersFromConstraints (0.00s)
=== RUN   TestPolicyAuthorization
--- PASS: TestPolicyAuthorization (0.01s)
=== RUN   TestPolicyAuthorizationErrors
=== RUN   TestPolicyAuthorizationErrors/policies_not_allowed
=== RUN   TestPolicyAuthorizationErrors/policy_allowed_by_user
=== RUN   TestPolicyAuthorizationErrors/policy_allowed_by_service_account
=== RUN   TestPolicyAuthorizationErrors/multiple_policies_allowed
--- PASS: TestPolicyAuthorizationErrors (0.00s)
    --- PASS: TestPolicyAuthorizationErrors/policies_not_allowed (0.00s)
    --- PASS: TestPolicyAuthorizationErrors/policy_allowed_by_user (0.00s)
    --- PASS: TestPolicyAuthorizationErrors/policy_allowed_by_service_account (0.00s)
    --- PASS: TestPolicyAuthorizationErrors/multiple_policies_allowed (0.00s)
=== RUN   TestPreferValidatedPSP
=== RUN   TestPreferValidatedPSP/no_policy_saved_in_annotations,_PSPs_are_ordered_lexicographically
=== RUN   TestPreferValidatedPSP/policy_saved_in_annotations_is_preferred
=== RUN   TestPreferValidatedPSP/policy_saved_in_annotations_is_invalid
=== RUN   TestPreferValidatedPSP/policy_saved_in_annotations_is_disallowed_anymore
=== RUN   TestPreferValidatedPSP/policy_saved_in_annotations_is_disallowed_anymore,_but_find_another_one
--- PASS: TestPreferValidatedPSP (0.00s)
    --- PASS: TestPreferValidatedPSP/no_policy_saved_in_annotations,_PSPs_are_ordered_lexicographically (0.00s)
    --- PASS: TestPreferValidatedPSP/policy_saved_in_annotations_is_preferred (0.00s)
    --- PASS: TestPreferValidatedPSP/policy_saved_in_annotations_is_invalid (0.00s)
    --- PASS: TestPreferValidatedPSP/policy_saved_in_annotations_is_disallowed_anymore (0.00s)
    --- PASS: TestPreferValidatedPSP/policy_saved_in_annotations_is_disallowed_anymore,_but_find_another_one (0.00s)
PASS
coverage: 80.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/security/podsecuritypolicy	1.409s	coverage: 80.0% of statements
=== RUN   TestAdmission
--- PASS: TestAdmission (0.00s)
=== RUN   TestPodSecurityContextAdmission
--- PASS: TestPodSecurityContextAdmission (0.00s)
=== RUN   TestHandles
--- PASS: TestHandles (0.00s)
PASS
coverage: 86.7% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/securitycontext/scdeny	1.031s	coverage: 86.7% of statements
=== RUN   TestIgnoresNonCreate
--- PASS: TestIgnoresNonCreate (0.00s)
=== RUN   TestIgnoresUpdateOfInitializedPod
--- PASS: TestIgnoresUpdateOfInitializedPod (0.00s)
=== RUN   TestIgnoresNonPodResource
--- PASS: TestIgnoresNonPodResource (0.00s)
=== RUN   TestIgnoresNilObject
--- PASS: TestIgnoresNilObject (0.00s)
=== RUN   TestIgnoresNonPodObject
--- PASS: TestIgnoresNonPodObject (0.00s)
=== RUN   TestIgnoresMirrorPod
--- PASS: TestIgnoresMirrorPod (0.00s)
=== RUN   TestRejectsMirrorPodWithServiceAccount
--- PASS: TestRejectsMirrorPodWithServiceAccount (0.00s)
=== RUN   TestRejectsMirrorPodWithSecretVolumes
--- PASS: TestRejectsMirrorPodWithSecretVolumes (0.00s)
=== RUN   TestAssignsDefaultServiceAccountAndToleratesMissingAPIToken
--- PASS: TestAssignsDefaultServiceAccountAndToleratesMissingAPIToken (0.00s)
=== RUN   TestAssignsDefaultServiceAccountAndRejectsMissingAPIToken
--- PASS: TestAssignsDefaultServiceAccountAndRejectsMissingAPIToken (0.00s)
=== RUN   TestFetchesUncachedServiceAccount
--- PASS: TestFetchesUncachedServiceAccount (0.00s)
=== RUN   TestDeniesInvalidServiceAccount
--- PASS: TestDeniesInvalidServiceAccount (1.11s)
=== RUN   TestAutomountsAPIToken
--- PASS: TestAutomountsAPIToken (0.00s)
=== RUN   TestRespectsExistingMount
--- PASS: TestRespectsExistingMount (0.00s)
=== RUN   TestAllowsReferencedSecret
--- PASS: TestAllowsReferencedSecret (0.00s)
=== RUN   TestRejectsUnreferencedSecretVolumes
--- PASS: TestRejectsUnreferencedSecretVolumes (0.00s)
=== RUN   TestAllowUnreferencedSecretVolumesForPermissiveSAs
--- PASS: TestAllowUnreferencedSecretVolumesForPermissiveSAs (0.00s)
=== RUN   TestAllowsReferencedImagePullSecrets
--- PASS: TestAllowsReferencedImagePullSecrets (0.00s)
=== RUN   TestRejectsUnreferencedImagePullSecrets
--- PASS: TestRejectsUnreferencedImagePullSecrets (0.00s)
=== RUN   TestDoNotAddImagePullSecrets
--- PASS: TestDoNotAddImagePullSecrets (0.00s)
=== RUN   TestAddImagePullSecrets
--- PASS: TestAddImagePullSecrets (0.00s)
=== RUN   TestMultipleReferencedSecrets
--- PASS: TestMultipleReferencedSecrets (0.00s)
=== RUN   TestGetServiceAccountTokens
--- PASS: TestGetServiceAccountTokens (0.00s)
PASS
coverage: 84.5% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/serviceaccount	2.293s	coverage: 84.5% of statements
=== RUN   TestAdmission
--- PASS: TestAdmission (0.00s)
PASS
coverage: 76.2% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/storage/storageclass/setdefault	1.141s	coverage: 76.2% of statements
=== RUN   TestAdmit
--- PASS: TestAdmit (0.00s)
PASS
coverage: 67.4% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/admission/storage/storageobjectinuseprotection	1.126s	coverage: 67.4% of statements
=== RUN   TestTokenAuthenticator
--- PASS: TestTokenAuthenticator (0.00s)
=== RUN   TestGetGroups
--- PASS: TestGetGroups (0.00s)
PASS
coverage: 84.6% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/auth/authenticator/token/bootstrap	1.037s	coverage: 84.6% of statements
=== RUN   TestAuthorizer
=== RUN   TestAuthorizer/allowed_configmap
=== RUN   TestAuthorizer/allowed_secret_via_pod
=== RUN   TestAuthorizer/allowed_shared_secret_via_pod
=== RUN   TestAuthorizer/allowed_shared_secret_via_pvc
=== RUN   TestAuthorizer/allowed_pvc
=== RUN   TestAuthorizer/allowed_pv
=== RUN   TestAuthorizer/disallowed_configmap
=== RUN   TestAuthorizer/disallowed_secret_via_pod
=== RUN   TestAuthorizer/disallowed_shared_secret_via_pvc
=== RUN   TestAuthorizer/disallowed_pvc
=== RUN   TestAuthorizer/disallowed_pv
=== RUN   TestAuthorizer/disallowed_attachment_-_no_relationship
=== RUN   TestAuthorizer/disallowed_attachment_-_feature_disabled
=== RUN   TestAuthorizer/allowed_attachment_-_feature_enabled
=== RUN   TestAuthorizer/allowed_svcacct_token_create_-_feature_enabled
=== RUN   TestAuthorizer/disallowed_svcacct_token_create_-_serviceaccount_not_attached_to_node
=== RUN   TestAuthorizer/disallowed_svcacct_token_create_-_feature_disabled
=== RUN   TestAuthorizer/disallowed_svcacct_token_create_-_no_subresource
=== RUN   TestAuthorizer/disallowed_svcacct_token_create_-_non_create
--- PASS: TestAuthorizer (0.01s)
    --- PASS: TestAuthorizer/allowed_configmap (0.00s)
    --- PASS: TestAuthorizer/allowed_secret_via_pod (0.00s)
    --- PASS: TestAuthorizer/allowed_shared_secret_via_pod (0.00s)
    --- PASS: TestAuthorizer/allowed_shared_secret_via_pvc (0.00s)
    --- PASS: TestAuthorizer/allowed_pvc (0.00s)
    --- PASS: TestAuthorizer/allowed_pv (0.00s)
    --- PASS: TestAuthorizer/disallowed_configmap (0.00s)
    --- PASS: TestAuthorizer/disallowed_secret_via_pod (0.00s)
    --- PASS: TestAuthorizer/disallowed_shared_secret_via_pvc (0.00s)
    --- PASS: TestAuthorizer/disallowed_pvc (0.00s)
    --- PASS: TestAuthorizer/disallowed_pv (0.00s)
    --- PASS: TestAuthorizer/disallowed_attachment_-_no_relationship (0.00s)
    --- PASS: TestAuthorizer/disallowed_attachment_-_feature_disabled (0.00s)
    --- PASS: TestAuthorizer/allowed_attachment_-_feature_enabled (0.00s)
    --- PASS: TestAuthorizer/allowed_svcacct_token_create_-_feature_enabled (0.00s)
    --- PASS: TestAuthorizer/disallowed_svcacct_token_create_-_serviceaccount_not_attached_to_node (0.00s)
    --- PASS: TestAuthorizer/disallowed_svcacct_token_create_-_feature_disabled (0.00s)
    --- PASS: TestAuthorizer/disallowed_svcacct_token_create_-_no_subresource (0.00s)
    --- PASS: TestAuthorizer/disallowed_svcacct_token_create_-_non_create (0.00s)
=== RUN   TestAuthorizerSharedResources
--- PASS: TestAuthorizerSharedResources (0.00s)
PASS
coverage: 58.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/auth/authorizer/node	1.105s	coverage: 58.0% of statements
=== RUN   TestAuthorizer
--- PASS: TestAuthorizer (0.00s)
=== RUN   TestRuleMatches
--- PASS: TestRuleMatches (0.00s)
=== RUN   TestSubjectLocator
--- PASS: TestSubjectLocator (0.00s)
PASS
coverage: 48.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac	1.067s	coverage: 48.0% of statements
=== RUN   TestNoStarsForControllers
--- PASS: TestNoStarsForControllers (0.01s)
=== RUN   TestControllerRoleLabel
--- PASS: TestControllerRoleLabel (0.01s)
=== RUN   TestCovers
--- PASS: TestCovers (0.01s)
=== RUN   TestAdminEditRelationship
--- PASS: TestAdminEditRelationship (0.02s)
=== RUN   TestEditViewRelationship
--- PASS: TestEditViewRelationship (0.01s)
=== RUN   TestBootstrapNamespaceRoles
--- PASS: TestBootstrapNamespaceRoles (0.02s)
=== RUN   TestBootstrapNamespaceRoleBindings
--- PASS: TestBootstrapNamespaceRoleBindings (0.01s)
=== RUN   TestBootstrapClusterRoles
--- PASS: TestBootstrapClusterRoles (0.09s)
=== RUN   TestBootstrapClusterRoleBindings
--- PASS: TestBootstrapClusterRoleBindings (0.02s)
=== RUN   TestBootstrapControllerRoles
--- PASS: TestBootstrapControllerRoles (0.08s)
=== RUN   TestBootstrapControllerRoleBindings
--- PASS: TestBootstrapControllerRoleBindings (0.04s)
=== RUN   TestClusterRoleLabel
--- PASS: TestClusterRoleLabel (0.00s)
PASS
coverage: 89.2% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/plugin/pkg/auth/authorizer/rbac/bootstrappolicy	1.362s	coverage: 89.2% of statements
=== RUN   TestMapReference
--- PASS: TestMapReference (0.00s)
=== RUN   TestMapping
--- PASS: TestMapping (0.00s)
=== RUN   TestMappingDual
--- PASS: TestMappingDual (0.00s)
PASS
coverage: 100.0% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/third_party/forked/golang/expansion	1.032s	coverage: 100.0% of statements
=== RUN   TestEqualities
--- PASS: TestEqualities (0.00s)
=== RUN   TestDerivates
--- PASS: TestDerivates (0.00s)
PASS
coverage: 46.2% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/third_party/forked/golang/reflect	1.013s	coverage: 46.2% of statements
=== RUN   TestAcyclicEdgeOvercounting
--- PASS: TestAcyclicEdgeOvercounting (0.00s)
=== RUN   TestAcyclicIssue123DirectedGraph
--- PASS: TestAcyclicIssue123DirectedGraph (0.00s)
=== RUN   TestEdgeHolder
--- PASS: TestEdgeHolder (0.00s)
=== RUN   TestAssertMutableNotDirected
--- PASS: TestAssertMutableNotDirected (0.00s)
=== RUN   TestMaxID
--- PASS: TestMaxID (0.00s)
=== RUN   TestIssue123UndirectedGraph
--- PASS: TestIssue123UndirectedGraph (0.00s)
PASS
coverage: 45.6% of statements
ok  	github.com/openshift/origin/vendor/k8s.io/kubernetes/third_party/forked/gonum/graph/simple	1.011s	coverage: 45.6% of statements
[INFO] [20:57:51+0000] No compiled `junitreport` binary was found. Attempting to build one using:
[INFO] [20:57:51+0000]   $ hack/build-go.sh tools/junitreport
++ Building go targets for linux/amd64: tools/junitreport
[INFO] [20:57:58+0000] hack/build-go.sh exited with code 0 after 00h 00m 07s
[INFO] [20:57:58+0000] jUnit XML report placed at _output/scripts/test-go/artifacts/gotest_report_YUvGK.xml
Of 8914 tests executed in 2080.980s, 8895 succeeded, 0 failed, and 19 were skipped.

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/cloudstack", test case "TestNewCSCloud" was skipped:
cloudstack_test.go:86: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/cloudstack", test case "TestLoadBalancer" was skipped:
cloudstack_test.go:98: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/openstack", test case "TestRoutes" was skipped:
openstack_routes_test.go:35: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/openstack", test case "TestNewOpenStack" was skipped:
openstack_test.go:465: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/openstack", test case "TestLoadBalancer" was skipped:
openstack_test.go:477: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/openstack", test case "TestVolumes" was skipped:
openstack_test.go:541: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/photon", test case "TestNewPCCloud" was skipped:
photon_test.go:110: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/photon", test case "TestInstances" was skipped:
photon_test.go:122: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/photon", test case "TestVolumes" was skipped:
photon_test.go:177: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/vsphere", test case "TestNewVSphere" was skipped:
vsphere_test.go:103: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/vsphere", test case "TestVSphereLogin" was skipped:
vsphere_test.go:115: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/vsphere", test case "TestInstances" was skipped:
vsphere_test.go:159: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/cloudprovider/providers/vsphere", test case "TestVolumes" was skipped:
vsphere_test.go:218: No config found in environment

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/controller/daemon", test case "TestSimpleDaemonSetScheduleDaemonSetPodsLaunchesPods" was skipped:
daemon_controller_test.go:456: disabled for 1.10

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/kubectl/cmd/resource", test case "TestGetUnknownSchemaObject" was skipped:
get_test.go:199: This test is completely broken.  The first thing it does is add the object to the scheme!

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/security/apparmor", test case "TestGetAppArmorFS" was skipped:
validate_test.go:33: 

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/security/apparmor", test case "TestValidateHost" was skipped:
validate_test.go:44: 

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/util/dbus", test case "TestRealDBus" was skipped:
dbus_test.go:47: D-Bus is not running: dial unix /var/run/dbus/system_bus_socket: connect: no such file or directory

In suite "github.com/openshift/origin/vendor/k8s.io/kubernetes/pkg/volume/flocker", test case "TestNewUnmounter" was skipped:
flocker_test.go:291: broken
[INFO] [20:57:59+0000] hack/test-go.sh exited with code 0 after 00h 29m 38s
+ set +o xtrace
########## FINISHED STAGE: SUCCESS: RUN UNIT TESTS [00h 30m 44s] ##########
[PostBuildScript] - Executing post build scripts.
[workspace] $ /bin/bash /tmp/jenkins7942794374810348624.sh
########## STARTING STAGE: DOWNLOAD ARTIFACTS FROM THE REMOTE HOST ##########
+ [[ -s /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate ]]
+ source /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate
++ export VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ export PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ unset PYTHON_HOME
++ export OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
++ OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
+ trap 'exit 0' EXIT
++ pwd
+ ARTIFACT_DIR=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/gathered
+ rm -rf /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/gathered
+ mkdir -p /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/gathered
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel sudo stat /data/src/github.com/openshift/origin/_output/scripts
  File: ‘/data/src/github.com/openshift/origin/_output/scripts’
  Size: 34        	Blocks: 0          IO Block: 4096   directory
Device: ca02h/51714d	Inode: 58864669    Links: 4
Access: (2755/drwxr-sr-x)  Uid: ( 1001/  origin)   Gid: ( 1003/origin-git)
Context: unconfined_u:object_r:container_file_t:s0
Access: 1970-01-01 00:00:00.000000000 +0000
Modify: 2018-06-01 20:28:22.000000000 +0000
Change: 2018-06-01 20:57:59.408077491 +0000
 Birth: -
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel sudo chmod -R o+rX /data/src/github.com/openshift/origin/_output/scripts
+ scp -r -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel:/data/src/github.com/openshift/origin/_output/scripts /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/gathered
+ tree /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/gathered
/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/gathered
└── scripts
    ├── shell
    │   ├── artifacts
    │   ├── logs
    │   │   ├── 7137f3b65888612d4da052d2894a68758e659c664ba1f25399ecc309e887c136.json
    │   │   └── scripts.log
    │   └── openshift.local.home
    └── test-go
        ├── artifacts
        │   ├── gotest_report_YUvGK
        │   └── gotest_report_YUvGK.xml
        ├── logs
        │   ├── raw_test_output.log
        │   ├── scripts.log
        │   └── test-go-err.log
        └── openshift.local.home

9 directories, 7 files
+ exit 0
[workspace] $ /bin/bash /tmp/jenkins5729914627961032482.sh
########## STARTING STAGE: GENERATE ARTIFACTS FROM THE REMOTE HOST ##########
+ [[ -s /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate ]]
+ source /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate
++ export VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ export PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ unset PYTHON_HOME
++ export OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
++ OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
+ trap 'exit 0' EXIT
++ pwd
+ ARTIFACT_DIR=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/generated
+ rm -rf /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/generated
+ mkdir /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/generated
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'sudo docker version && sudo docker info && sudo docker images && sudo docker ps -a 2>&1'
  WARNING: You're not using the default seccomp profile
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'sudo cat /etc/sysconfig/docker /etc/sysconfig/docker-network /etc/sysconfig/docker-storage /etc/sysconfig/docker-storage-setup /etc/systemd/system/docker.service 2>&1'
+ true
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'sudo find /var/lib/docker/containers -name *.log | sudo xargs tail -vn +1 2>&1'
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'oc get --raw /metrics --server=https://$( uname --nodename ):10250 --config=/etc/origin/master/admin.kubeconfig 2>&1'
+ true
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'sudo ausearch -m AVC -m SELINUX_ERR -m USER_AVC 2>&1'
+ true
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'oc get --raw /metrics --config=/etc/origin/master/admin.kubeconfig 2>&1'
+ true
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'sudo df -T -h && sudo pvs && sudo vgs && sudo lvs && sudo findmnt --all 2>&1'
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'sudo yum list installed 2>&1'
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'sudo journalctl --dmesg --no-pager --all --lines=all 2>&1'
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel 'sudo journalctl _PID=1 --no-pager --all --lines=all 2>&1'
+ tree /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/generated
/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/generated
├── avc_denials.log
├── containers.log
├── dmesg.log
├── docker.config
├── docker.info
├── filesystem.info
├── installed_packages.log
├── master-metrics.log
├── node-metrics.log
└── pid1.journal

0 directories, 10 files
+ exit 0
[workspace] $ /bin/bash /tmp/jenkins8880867201079915568.sh
########## STARTING STAGE: FETCH SYSTEMD JOURNALS FROM THE REMOTE HOST ##########
+ [[ -s /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate ]]
+ source /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate
++ export VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ export PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ unset PYTHON_HOME
++ export OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
++ OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
+ trap 'exit 0' EXIT
++ pwd
+ ARTIFACT_DIR=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/journals
+ rm -rf /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/journals
+ mkdir /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/journals
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel sudo journalctl --unit docker.service --no-pager --all --lines=all
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel sudo journalctl --unit dnsmasq.service --no-pager --all --lines=all
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config openshiftdevel sudo journalctl --unit systemd-journald.service --no-pager --all --lines=all
+ tree /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/journals
/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/artifacts/journals
├── dnsmasq.service
├── docker.service
└── systemd-journald.service

0 directories, 3 files
+ exit 0
[workspace] $ /bin/bash /tmp/jenkins4942556820443558311.sh
########## STARTING STAGE: ASSEMBLE GCS OUTPUT ##########
+ [[ -s /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate ]]
+ source /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate
++ export VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ export PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ unset PYTHON_HOME
++ export OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
++ OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
+ trap 'exit 0' EXIT
+ mkdir -p gcs/artifacts gcs/artifacts/generated gcs/artifacts/journals gcs/artifacts/gathered
++ python -c 'import json; import urllib; print json.load(urllib.urlopen('\''https://ci.openshift.redhat.com/jenkins/job/test_branch_origin_unit/444/api/json'\''))['\''result'\'']'
+ result=SUCCESS
+ cat
++ date +%s
+ cat /var/lib/jenkins/jobs/test_branch_origin_unit/builds/444/log
+ cp artifacts/generated/avc_denials.log artifacts/generated/containers.log artifacts/generated/dmesg.log artifacts/generated/docker.config artifacts/generated/docker.info artifacts/generated/filesystem.info artifacts/generated/installed_packages.log artifacts/generated/master-metrics.log artifacts/generated/node-metrics.log artifacts/generated/pid1.journal gcs/artifacts/generated/
+ cp artifacts/journals/dnsmasq.service artifacts/journals/docker.service artifacts/journals/systemd-journald.service gcs/artifacts/journals/
+ cp -r artifacts/gathered/scripts gcs/artifacts/
++ pwd
+ scp -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config -r /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/gcs openshiftdevel:/data
+ scp -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config /var/lib/jenkins/.config/gcloud/gcs-publisher-credentials.json openshiftdevel:/data/credentials.json
+ exit 0
[workspace] $ /bin/bash /tmp/jenkins8491452657362059944.sh
########## STARTING STAGE: PUSH THE ARTIFACTS AND METADATA ##########
+ [[ -s /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate ]]
+ source /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate
++ export VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ export PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ unset PYTHON_HOME
++ export OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
++ OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
++ mktemp
+ script=/tmp/tmp.OEJ9b6nMZW
+ cat
+ chmod +x /tmp/tmp.OEJ9b6nMZW
+ scp -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config /tmp/tmp.OEJ9b6nMZW openshiftdevel:/tmp/tmp.OEJ9b6nMZW
+ ssh -F /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/.ssh_config -t openshiftdevel 'bash -l -c "timeout 300 /tmp/tmp.OEJ9b6nMZW"'
+ cd /home/origin
+ trap 'exit 0' EXIT
+ [[ -n {"type":"postsubmit","job":"test_branch_origin_unit","buildid":"9d3c9e13-65d9-11e8-92c9-0a58ac100eda","refs":{"org":"openshift","repo":"origin","base_ref":"master","base_sha":"9d817e248b59b61b6448a02e3393b97e48be49c5"}} ]]
++ jq --compact-output .buildid
+ [[ "9d3c9e13-65d9-11e8-92c9-0a58ac100eda" =~ ^"[0-9]+"$ ]]
+ echo 'Using BUILD_NUMBER'
Using BUILD_NUMBER
++ jq --compact-output '.buildid |= "444"'
+ JOB_SPEC='{"type":"postsubmit","job":"test_branch_origin_unit","buildid":"444","refs":{"org":"openshift","repo":"origin","base_ref":"master","base_sha":"9d817e248b59b61b6448a02e3393b97e48be49c5"}}'
+ docker run -e 'JOB_SPEC={"type":"postsubmit","job":"test_branch_origin_unit","buildid":"444","refs":{"org":"openshift","repo":"origin","base_ref":"master","base_sha":"9d817e248b59b61b6448a02e3393b97e48be49c5"}}' -v /data:/data:z registry.svc.ci.openshift.org/ci/gcsupload:latest --dry-run=false --gcs-path=gs://origin-ci-test --gcs-credentials-file=/data/credentials.json --path-strategy=single --default-org=openshift --default-repo=origin /data/gcs/artifacts /data/gcs/build-log.txt /data/gcs/finished.json
Unable to find image 'registry.svc.ci.openshift.org/ci/gcsupload:latest' locally
Trying to pull repository registry.svc.ci.openshift.org/ci/gcsupload ... 
latest: Pulling from registry.svc.ci.openshift.org/ci/gcsupload
1160f4abea84: Already exists
be60dbe7622d: Already exists
cafcba51f636: Pulling fs layer
cafcba51f636: Verifying Checksum
cafcba51f636: Download complete
cafcba51f636: Pull complete
Digest: sha256:04c70f24b5e0e0f937f03bc8b686a8c922abb4b24de196a64f9fc16845a1e67e
Status: Downloaded newer image for registry.svc.ci.openshift.org/ci/gcsupload:latest
{"component":"gcsupload","level":"info","msg":"Gathering artifacts from artifact directory: /data/gcs/artifacts","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/avc_denials.log in artifact directory. Uploading as artifacts/generated/avc_denials.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/containers.log in artifact directory. Uploading as artifacts/generated/containers.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/dmesg.log in artifact directory. Uploading as artifacts/generated/dmesg.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/docker.config in artifact directory. Uploading as artifacts/generated/docker.config\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/docker.info in artifact directory. Uploading as artifacts/generated/docker.info\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/filesystem.info in artifact directory. Uploading as artifacts/generated/filesystem.info\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/installed_packages.log in artifact directory. Uploading as artifacts/generated/installed_packages.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/master-metrics.log in artifact directory. Uploading as artifacts/generated/master-metrics.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/node-metrics.log in artifact directory. Uploading as artifacts/generated/node-metrics.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/generated/pid1.journal in artifact directory. Uploading as artifacts/generated/pid1.journal\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/journals/dnsmasq.service in artifact directory. Uploading as artifacts/journals/dnsmasq.service\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/journals/docker.service in artifact directory. Uploading as artifacts/journals/docker.service\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/journals/systemd-journald.service in artifact directory. Uploading as artifacts/journals/systemd-journald.service\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/scripts/shell/logs/7137f3b65888612d4da052d2894a68758e659c664ba1f25399ecc309e887c136.json in artifact directory. Uploading as artifacts/scripts/shell/logs/7137f3b65888612d4da052d2894a68758e659c664ba1f25399ecc309e887c136.json\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/scripts/shell/logs/scripts.log in artifact directory. Uploading as artifacts/scripts/shell/logs/scripts.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/scripts/test-go/artifacts/gotest_report_YUvGK in artifact directory. Uploading as artifacts/scripts/test-go/artifacts/gotest_report_YUvGK\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/scripts/test-go/artifacts/gotest_report_YUvGK.xml in artifact directory. Uploading as artifacts/scripts/test-go/artifacts/gotest_report_YUvGK.xml\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/scripts/test-go/logs/raw_test_output.log in artifact directory. Uploading as artifacts/scripts/test-go/logs/raw_test_output.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/scripts/test-go/logs/scripts.log in artifact directory. Uploading as artifacts/scripts/test-go/logs/scripts.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","level":"info","msg":"Found /data/gcs/artifacts/scripts/test-go/logs/test-go-err.log in artifact directory. Uploading as artifacts/scripts/test-go/logs/test-go-err.log\n","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/avc_denials.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/dmesg.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/docker.info","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/installed_packages.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/master-metrics.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/journals/dnsmasq.service","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/journals/docker.service","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/shell/logs/7137f3b65888612d4da052d2894a68758e659c664ba1f25399ecc309e887c136.json","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/logs/scripts.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/build-log.txt","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/latest-build.txt","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/pid1.journal","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/shell/logs/scripts.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/artifacts/gotest_report_YUvGK.xml","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/logs/test-go-err.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/containers.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/filesystem.info","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/journals/systemd-journald.service","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/artifacts/gotest_report_YUvGK","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/logs/raw_test_output.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/finished.json","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/docker.config","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/node-metrics.log","level":"info","msg":"Queued for upload","time":"2018-06-01T20:58:20Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/dmesg.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/shell/logs/7137f3b65888612d4da052d2894a68758e659c664ba1f25399ecc309e887c136.json","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/docker.config","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/shell/logs/scripts.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/latest-build.txt","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/installed_packages.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/journals/docker.service","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/pid1.journal","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/journals/systemd-journald.service","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/docker.info","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/master-metrics.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/avc_denials.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/artifacts/gotest_report_YUvGK","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/node-metrics.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/logs/test-go-err.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/finished.json","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/filesystem.info","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/logs/scripts.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/journals/dnsmasq.service","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/artifacts/gotest_report_YUvGK.xml","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/generated/containers.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/artifacts/scripts/test-go/logs/raw_test_output.log","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","dest":"logs/test_branch_origin_unit/444/build-log.txt","level":"info","msg":"Finished upload","time":"2018-06-01T20:58:21Z"}
{"component":"gcsupload","level":"info","msg":"Finished upload to GCS","time":"2018-06-01T20:58:21Z"}
+ exit 0
+ set +o xtrace
########## FINISHED STAGE: SUCCESS: PUSH THE ARTIFACTS AND METADATA [00h 00m 05s] ##########
[workspace] $ /bin/bash /tmp/jenkins2301316514091934698.sh
########## STARTING STAGE: DEPROVISION CLOUD RESOURCES ##########
+ [[ -s /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate ]]
+ source /var/lib/jenkins/jobs/test_branch_origin_unit/workspace/activate
++ export VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ VIRTUAL_ENV=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71
++ export PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ PATH=/var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/bin:/sbin:/usr/sbin:/bin:/usr/bin
++ unset PYTHON_HOME
++ export OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
++ OCT_CONFIG_HOME=/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config
+ oct deprovision

PLAYBOOK: main.yml *************************************************************
4 plays in /var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/lib/python2.7/site-packages/oct/ansible/oct/playbooks/deprovision/main.yml

PLAY [ensure we have the parameters necessary to deprovision virtual hosts] ****

TASK [ensure all required variables are set] ***********************************
task path: /var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/lib/python2.7/site-packages/oct/ansible/oct/playbooks/deprovision/main.yml:9
skipping: [localhost] => (item=origin_ci_inventory_dir)  => {
    "changed": false, 
    "generated_timestamp": "2018-06-01 16:58:22.732137", 
    "item": "origin_ci_inventory_dir", 
    "skip_reason": "Conditional check failed", 
    "skipped": true
}
skipping: [localhost] => (item=origin_ci_aws_region)  => {
    "changed": false, 
    "generated_timestamp": "2018-06-01 16:58:22.735468", 
    "item": "origin_ci_aws_region", 
    "skip_reason": "Conditional check failed", 
    "skipped": true
}

PLAY [deprovision virtual hosts in EC2] ****************************************

TASK [Gathering Facts] *********************************************************
ok: [localhost]

TASK [deprovision a virtual EC2 host] ******************************************
task path: /var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/lib/python2.7/site-packages/oct/ansible/oct/playbooks/deprovision/main.yml:28
included: /var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/lib/python2.7/site-packages/oct/ansible/oct/playbooks/deprovision/roles/aws-down/tasks/main.yml for localhost

TASK [update the SSH configuration to remove AWS EC2 specifics] ****************
task path: /var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/lib/python2.7/site-packages/oct/ansible/oct/playbooks/deprovision/roles/aws-down/tasks/main.yml:2
ok: [localhost] => {
    "changed": false, 
    "generated_timestamp": "2018-06-01 16:58:23.533833", 
    "msg": ""
}

TASK [rename EC2 instance for termination reaper] ******************************
task path: /var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/lib/python2.7/site-packages/oct/ansible/oct/playbooks/deprovision/roles/aws-down/tasks/main.yml:8
changed: [localhost] => {
    "changed": true, 
    "generated_timestamp": "2018-06-01 16:58:24.124544", 
    "msg": "Tags {'Name': 'oct-terminate'} created for resource i-0e2ccff2bd076085f."
}

TASK [tear down the EC2 instance] **********************************************
task path: /var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/lib/python2.7/site-packages/oct/ansible/oct/playbooks/deprovision/roles/aws-down/tasks/main.yml:15
changed: [localhost] => {
    "changed": true, 
    "generated_timestamp": "2018-06-01 16:58:25.023556", 
    "instance_ids": [
        "i-0e2ccff2bd076085f"
    ], 
    "instances": [
        {
            "ami_launch_index": "0", 
            "architecture": "x86_64", 
            "block_device_mapping": {
                "/dev/sda1": {
                    "delete_on_termination": true, 
                    "status": "attached", 
                    "volume_id": "vol-08298f3942c362328"
                }, 
                "/dev/sdb": {
                    "delete_on_termination": true, 
                    "status": "attached", 
                    "volume_id": "vol-00e9ce7b1d1cbc05f"
                }
            }, 
            "dns_name": "ec2-18-207-192-254.compute-1.amazonaws.com", 
            "ebs_optimized": false, 
            "groups": {
                "sg-7e73221a": "default"
            }, 
            "hypervisor": "xen", 
            "id": "i-0e2ccff2bd076085f", 
            "image_id": "ami-0f07d2d9a03af96ec", 
            "instance_type": "m4.xlarge", 
            "kernel": null, 
            "key_name": "libra", 
            "launch_time": "2018-06-01T20:23:52.000Z", 
            "placement": "us-east-1d", 
            "private_dns_name": "ip-172-18-10-182.ec2.internal", 
            "private_ip": "172.18.10.182", 
            "public_dns_name": "ec2-18-207-192-254.compute-1.amazonaws.com", 
            "public_ip": "18.207.192.254", 
            "ramdisk": null, 
            "region": "us-east-1", 
            "root_device_name": "/dev/sda1", 
            "root_device_type": "ebs", 
            "state": "running", 
            "state_code": 16, 
            "tags": {
                "Name": "oct-terminate", 
                "openshift_etcd": "", 
                "openshift_master": "", 
                "openshift_node": ""
            }, 
            "tenancy": "default", 
            "virtualization_type": "hvm"
        }
    ], 
    "tagged_instances": []
}

TASK [remove the serialized host variables] ************************************
task path: /var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/lib/python2.7/site-packages/oct/ansible/oct/playbooks/deprovision/roles/aws-down/tasks/main.yml:22
changed: [localhost] => {
    "changed": true, 
    "generated_timestamp": "2018-06-01 16:58:25.268571", 
    "path": "/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory/host_vars/172.18.10.182.yml", 
    "state": "absent"
}

PLAY [deprovision virtual hosts locally manged by Vagrant] *********************

TASK [Gathering Facts] *********************************************************
ok: [localhost]

PLAY [clean up local configuration for deprovisioned instances] ****************

TASK [remove inventory configuration directory] ********************************
task path: /var/lib/jenkins/origin-ci-tool/2b98d1bb5582ad6f81107cf6fd70d2c88e6d0a71/lib/python2.7/site-packages/oct/ansible/oct/playbooks/deprovision/main.yml:61
changed: [localhost] => {
    "changed": true, 
    "generated_timestamp": "2018-06-01 16:58:25.717815", 
    "path": "/var/lib/jenkins/jobs/test_branch_origin_unit/workspace/.config/origin-ci-tool/inventory", 
    "state": "absent"
}

PLAY RECAP *********************************************************************
localhost                  : ok=8    changed=4    unreachable=0    failed=0   

+ set +o xtrace
########## FINISHED STAGE: SUCCESS: DEPROVISION CLOUD RESOURCES [00h 00m 04s] ##########
Archiving artifacts
[WS-CLEANUP] Deleting project workspace...[WS-CLEANUP] done
Finished: SUCCESS