Advertisement
Guest User

Untitled

a guest
Jul 7th, 2015
227
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.14 KB | None | 0 0
  1. [vagrant@openshiftdev origin]$ grep admission /tmp/openshift-e2e/logs/openshift.log
  2. I0610 18:07:40.207854 22513 admission.go:89] getting security context constraints for pod router-1-deploy (generate: ) in namespace default with user info &{system:serviceaccount:openshift-infra:deployment-controller 9141d850-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  3. I0610 18:07:40.208091 22513 admission.go:229] getting security context constraints for pod router-1-deploy with service account info &{system:serviceaccount:default:deployer [system:serviceaccounts system:serviceaccounts:default]}
  4. I0610 18:07:40.209448 22513 admission.go:372] validating pod router-1-deploy (generate: ) against providers restricted,privileged
  5. I0610 18:07:40.209626 22513 admission.go:121] pod router-1-deploy (generate: ) validated against provider restricted
  6. I0610 18:07:41.009541 22513 admission.go:89] getting security context constraints for pod docker-registry-1-deploy (generate: ) in namespace default with user info &{system:serviceaccount:openshift-infra:deployment-controller 9141d850-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  7. I0610 18:07:41.009566 22513 admission.go:229] getting security context constraints for pod docker-registry-1-deploy with service account info &{system:serviceaccount:default:deployer [system:serviceaccounts system:serviceaccounts:default]}
  8. I0610 18:07:41.009593 22513 admission.go:372] validating pod docker-registry-1-deploy (generate: ) against providers restricted,privileged
  9. I0610 18:07:41.009601 22513 admission.go:121] pod docker-registry-1-deploy (generate: ) validated against provider restricted
  10. I0610 18:07:41.507455 22513 admission.go:89] getting security context constraints for pod (generate: router-1-) in namespace default with user info &{system:serviceaccount:openshift-infra:replication-controller 91423710-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  11. I0610 18:07:41.507551 22513 admission.go:229] getting security context constraints for pod with service account info &{system:serviceaccount:default:default [system:serviceaccounts system:serviceaccounts:default]}
  12. I0610 18:07:41.507571 22513 admission.go:372] validating pod (generate: router-1-) against providers restricted,privileged
  13. I0610 18:07:41.507582 22513 admission.go:121] pod (generate: router-1-) validated against provider restricted
  14. I0610 18:07:42.704023 22513 admission.go:89] getting security context constraints for pod (generate: docker-registry-1-) in namespace default with user info &{system:serviceaccount:openshift-infra:replication-controller 91423710-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  15. I0610 18:07:42.704115 22513 admission.go:229] getting security context constraints for pod with service account info &{system:serviceaccount:default:default [system:serviceaccounts system:serviceaccounts:default]}
  16. I0610 18:07:42.704133 22513 admission.go:372] validating pod (generate: docker-registry-1-) against providers restricted,privileged
  17. I0610 18:07:42.704153 22513 admission.go:121] pod (generate: docker-registry-1-) validated against provider privileged
  18. I0610 18:07:55.621868 22513 admission.go:89] getting security context constraints for pod database-1-deploy (generate: ) in namespace test with user info &{system:serviceaccount:openshift-infra:deployment-controller 9141d850-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  19. I0610 18:07:55.621948 22513 admission.go:229] getting security context constraints for pod database-1-deploy with service account info &{system:serviceaccount:test:deployer [system:serviceaccounts system:serviceaccounts:test]}
  20. I0610 18:07:55.621976 22513 admission.go:372] validating pod database-1-deploy (generate: ) against providers restricted,privileged
  21. I0610 18:07:55.621985 22513 admission.go:121] pod database-1-deploy (generate: ) validated against provider restricted
  22. I0610 18:07:56.785774 22513 admission.go:89] getting security context constraints for pod database-1-prehook (generate: ) in namespace test with user info &{system:serviceaccount:test:deployer 934a4e5d-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:test system:authenticated]}
  23. I0610 18:07:56.785800 22513 admission.go:229] getting security context constraints for pod database-1-prehook with service account info &{system:serviceaccount:test:default [system:serviceaccounts system:serviceaccounts:test]}
  24. I0610 18:07:56.785814 22513 admission.go:372] validating pod database-1-prehook (generate: ) against providers restricted
  25. I0610 18:07:56.785828 22513 admission.go:121] pod database-1-prehook (generate: ) validated against provider restricted
  26. I0610 18:07:57.515309 22513 admission.go:89] getting security context constraints for pod ruby-sample-build-1-build (generate: ) in namespace test with user info &{system:serviceaccount:openshift-infra:build-controller 91416a7f-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  27. I0610 18:07:57.515389 22513 admission.go:229] getting security context constraints for pod ruby-sample-build-1-build with service account info &{system:serviceaccount:test:builder [system:serviceaccounts system:serviceaccounts:test]}
  28. I0610 18:07:57.515406 22513 admission.go:372] validating pod ruby-sample-build-1-build (generate: ) against providers restricted,privileged
  29. I0610 18:07:57.515420 22513 admission.go:121] pod ruby-sample-build-1-build (generate: ) validated against provider privileged
  30. I0610 18:07:59.997919 22513 admission.go:89] getting security context constraints for pod (generate: database-1-) in namespace test with user info &{system:serviceaccount:openshift-infra:replication-controller 91423710-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  31. I0610 18:07:59.997988 22513 admission.go:229] getting security context constraints for pod with service account info &{system:serviceaccount:test:default [system:serviceaccounts system:serviceaccounts:test]}
  32. I0610 18:07:59.998003 22513 admission.go:372] validating pod (generate: database-1-) against providers restricted,privileged
  33. I0610 18:07:59.998013 22513 admission.go:121] pod (generate: database-1-) validated against provider restricted
  34. I0610 18:08:00.095618 22513 admission.go:89] getting security context constraints for pod database-1-posthook (generate: ) in namespace test with user info &{system:serviceaccount:test:deployer 934a4e5d-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:test system:authenticated]}
  35. I0610 18:08:00.095707 22513 admission.go:229] getting security context constraints for pod database-1-posthook with service account info &{system:serviceaccount:test:default [system:serviceaccounts system:serviceaccounts:test]}
  36. I0610 18:08:00.095729 22513 admission.go:372] validating pod database-1-posthook (generate: ) against providers restricted
  37. I0610 18:08:00.095738 22513 admission.go:121] pod database-1-posthook (generate: ) validated against provider restricted
  38. I0610 18:09:39.296646 22513 admission.go:89] getting security context constraints for pod frontend-1-deploy (generate: ) in namespace test with user info &{system:serviceaccount:openshift-infra:deployment-controller 9141d850-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  39. I0610 18:09:39.296719 22513 admission.go:229] getting security context constraints for pod frontend-1-deploy with service account info &{system:serviceaccount:test:deployer [system:serviceaccounts system:serviceaccounts:test]}
  40. I0610 18:09:39.296735 22513 admission.go:372] validating pod frontend-1-deploy (generate: ) against providers restricted,privileged
  41. I0610 18:09:39.296740 22513 admission.go:121] pod frontend-1-deploy (generate: ) validated against provider restricted
  42. I0610 18:09:41.053387 22513 admission.go:89] getting security context constraints for pod frontend-1-prehook (generate: ) in namespace test with user info &{system:serviceaccount:test:deployer 934a4e5d-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:test system:authenticated]}
  43. I0610 18:09:41.053412 22513 admission.go:229] getting security context constraints for pod frontend-1-prehook with service account info &{system:serviceaccount:test:default [system:serviceaccounts system:serviceaccounts:test]}
  44. I0610 18:09:41.053428 22513 admission.go:372] validating pod frontend-1-prehook (generate: ) against providers restricted
  45. I0610 18:09:41.053437 22513 admission.go:121] pod frontend-1-prehook (generate: ) validated against provider restricted
  46. I0610 18:09:51.369738 22513 admission.go:89] getting security context constraints for pod frontend-1-posthook (generate: ) in namespace test with user info &{system:serviceaccount:test:deployer 934a4e5d-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:test system:authenticated]}
  47. I0610 18:09:51.369879 22513 admission.go:229] getting security context constraints for pod frontend-1-posthook with service account info &{system:serviceaccount:test:default [system:serviceaccounts system:serviceaccounts:test]}
  48. I0610 18:09:51.369899 22513 admission.go:372] validating pod frontend-1-posthook (generate: ) against providers restricted
  49. I0610 18:09:51.369911 22513 admission.go:121] pod frontend-1-posthook (generate: ) validated against provider restricted
  50. I0610 18:09:51.410169 22513 admission.go:89] getting security context constraints for pod (generate: frontend-1-) in namespace test with user info &{system:serviceaccount:openshift-infra:replication-controller 91423710-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  51. I0610 18:09:51.410231 22513 admission.go:229] getting security context constraints for pod with service account info &{system:serviceaccount:test:default [system:serviceaccounts system:serviceaccounts:test]}
  52. I0610 18:09:51.410246 22513 admission.go:372] validating pod (generate: frontend-1-) against providers restricted,privileged
  53. I0610 18:09:51.410257 22513 admission.go:121] pod (generate: frontend-1-) validated against provider restricted
  54. I0610 18:09:51.442394 22513 admission.go:89] getting security context constraints for pod (generate: frontend-1-) in namespace test with user info &{system:serviceaccount:openshift-infra:replication-controller 91423710-0f9b-11e5-b5b5-080027c5bfa9 [system:serviceaccounts system:serviceaccounts:openshift-infra system:authenticated]}
  55. I0610 18:09:51.442677 22513 admission.go:229] getting security context constraints for pod with service account info &{system:serviceaccount:test:default [system:serviceaccounts system:serviceaccounts:test]}
  56. I0610 18:09:51.442708 22513 admission.go:372] validating pod (generate: frontend-1-) against providers restricted,privileged
  57. I0610 18:09:51.442714 22513 admission.go:121] pod (generate: frontend-1-) validated against provider restricted
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement