Now using project "default" on server "https://api.ci-op-p57r8b2k-3c8f3.cspilp.interop.ccitredhat.com:6443". Fetching istioctl from https://github.com/istio/istio/releases/download/1.26.2/istioctl-1.26.2-linux-amd64.tar.gz istioctl extracted to /go/src/github.com/openshift-service-mesh/sail-operator/bin GINKGO_FLAGS="-v --keep-going --label-filter=smoke&&!ambient" /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/integ-suite-ocp.sh + echo 'Running integration tests' Running integration tests + '[' -z /tmp/secret/kubeconfig ']' + KUBECONFIG=/tmp/secret/kubeconfig + ./tests/e2e/common-operator-integ-suite.sh --ocp Running on OCP Skipping build Skipping deploy Setting Istio manifest file: chart/samples/istio-sample.yaml Validating OpenShift cluster operators are stable... All cluster operators are stable. go: downloading github.com/onsi/ginkgo/v2 v2.24.0 go: downloading golang.org/x/tools v0.36.0 go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 go: downloading go.uber.org/automaxprocs v1.6.0 go: downloading github.com/Masterminds/semver/v3 v3.4.0 go: downloading github.com/google/pprof v0.0.0-20250607225305-033d6d78b36a go: downloading github.com/Masterminds/semver v1.5.0 2025/12/04 03:56:39 maxprocs: Leaving GOMAXPROCS=16: CPU quota undefined go: downloading k8s.io/api v0.34.1 go: downloading k8s.io/apimachinery v0.34.1 go: downloading github.com/onsi/gomega v1.38.0 go: downloading sigs.k8s.io/controller-runtime v0.22.3 go: downloading github.com/go-logr/logr v1.4.3 go: downloading gomodules.xyz/jsonpatch/v2 v2.5.0 go: downloading github.com/openshift-service-mesh/istio v0.0.0-20251023084048-33232c62c1ef go: downloading golang.org/x/sys v0.35.0 go: downloading k8s.io/apiextensions-apiserver v0.34.1 go: downloading k8s.io/client-go v0.34.1 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 go: downloading github.com/evanphx/json-patch v5.9.11+incompatible go: downloading github.com/k8snetworkplumbingwg/network-attachment-definition-client v1.4.0 go: downloading istio.io/client-go v1.27.3 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/randfill v1.0.0 go: downloading k8s.io/klog/v2 v2.130.1 go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 go: downloading golang.org/x/net v0.43.0 go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading istio.io/api v1.27.2-0.20251010085937-bc3692c751f3 go: downloading go.yaml.in/yaml/v2 v2.4.2 go: downloading github.com/json-iterator/go v1.1.12 go: downloading sigs.k8s.io/yaml v1.6.0 go: downloading go.yaml.in/yaml/v3 v3.0.4 go: downloading github.com/go-openapi/swag v0.23.1 go: downloading github.com/go-openapi/jsonreference v0.21.0 go: downloading github.com/google/gnostic-models v0.7.0 go: downloading golang.org/x/text v0.28.0 go: downloading github.com/prometheus/client_golang v1.23.0 go: downloading github.com/fxamacker/cbor/v2 v2.9.0 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/spf13/pflag v1.0.7 go: downloading golang.org/x/term v0.34.0 go: downloading google.golang.org/protobuf v1.36.7 go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading golang.org/x/time v0.12.0 go: downloading github.com/google/btree v1.1.3 go: downloading golang.org/x/sync v0.16.0 go: downloading github.com/go-openapi/jsonpointer v0.21.1 go: downloading github.com/google/uuid v1.6.0 go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading github.com/mailru/easyjson v0.9.0 go: downloading golang.org/x/oauth2 v0.30.0 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee go: downloading github.com/x448/float16 v0.8.4 go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading github.com/prometheus/common v0.65.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/procfs v0.17.0 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250811230008-5f3141c8851a go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 go: downloading github.com/emicklei/go-restful/v3 v3.12.2 go: downloading github.com/pkg/errors v0.9.1 go: downloading gopkg.in/natefinch/lumberjack.v2 v2.2.1 go: downloading go.uber.org/zap v1.27.0 go: downloading github.com/spf13/cobra v1.9.1 go: downloading google.golang.org/grpc v1.74.2 go: downloading go.uber.org/multierr v1.11.0 2025-12-04T03:57:09.413097Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Ambient Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient ============================================================================================================= Random Seed: 1764820599 Will run 0 of 45 specs SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.006 seconds] ------------------------------ Ran 0 of 45 Specs in 0.001 seconds SUCCESS! -- 0 Passed | 0 Failed | 0 Pending | 45 Skipped PASS 2025-12-04T03:57:11.807147Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Cert Manager Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager ======================================================================================================================= Random Seed: 1764820599 Will run 18 of 18 specs ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed should have subscription created successfully [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:89 • [1.915 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed verifies all cert-manager pods are Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:95 * All cert-manager pods are ready • [35.676 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 * Cert Manager subscription patched [FAILED] in [BeforeAll] - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 12/04/25 03:57:49.874 The test run has failures and the debug information is as follows: =====Operator Deployment YAML=====: apiVersion: apps/v1 kind: Deployment metadata: annotations: deployment.kubernetes.io/revision: "1" creationTimestamp: "2025-12-04T03:51:34Z" generation: 1 labels: app.kubernetes.io/component: sail-operator app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/instance: servicemesh-operator3 app.kubernetes.io/managed-by: helm app.kubernetes.io/name: deployment app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 olm.deployment-spec-hash: bW5YNb3HAQYs6sG4PSn6VBMbnCNkxGRKpTUGqW olm.managed: "true" olm.owner: servicemeshoperator3.v3.2.0 olm.owner.kind: ClusterServiceVersion olm.owner.namespace: openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators: "" name: servicemesh-operator3 namespace: openshift-operators ownerReferences: - apiVersion: operators.coreos.com/v1alpha1 blockOwnerDeletion: false controller: false kind: ClusterServiceVersion name: servicemeshoperator3.v3.2.0 uid: d8bf81ad-e5eb-4668-af71-b7e18f9ebf84 resourceVersion: "33188" uid: f1aea02e-83a5-4f97-9dc7-ec7cc4c5bd51 spec: progressDeadlineSeconds: 600 replicas: 1 revisionHistoryLimit: 1 selector: matchLabels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 strategy: rollingUpdate: maxSurge: 25% maxUnavailable: 25% type: RollingUpdate template: metadata: annotations: alm-examples: |- [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1alpha1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:ae57d962a3b88aff90c350c56960acb298d9115ef5e46a63e0b23781d17fc9ec createdAt: "2025-11-04T10:19:00Z" description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift Service Mesh is based on the open source Istio project. features.operators.openshift.io/cnf: "false" features.operators.openshift.io/cni: "true" features.operators.openshift.io/csi: "false" features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "false" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d5940362b3f70 images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:a1bc85beb723b48706836fdcd321bca74efd3e14aba15ad64e457d96dd9b16e5 images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:70c6e21596fd28b07eafc82487df85aaa709bc2a99113928a18855a92c15c6ed images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:3799624b1a0a6e6edb820fb599ad97048827995a9f452c6913953249207b41cd images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:1306526a12590e284b1170cfccdf91388520360e2d7afab0d7f57111c4f28662 images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:c3c9ccdbdcc8fc02a6a2201c511896ef5faf70488bd9530689960446e1c7d073 images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe729500902d0b images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f31fa2ba4 images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d0782970573 images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:0985a1e593010084bc8ca9cd2e04e893ce5fb855de0d09e988b721a7bef0cf93 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:f118bf81f44443fbdab23b689c97e9801eba8799c7af85228f914d8cd8afe6c0 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:d89bfca262be92558d86f07dd87928727b0998f7b4858a5c5005e0eae930f3bb images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:40be785b9abecd641f3121855a066c0ea01aba66e1350f33d175f2351c54e371 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:89359674e103f3c770010379fa46e716432cfd417f0d4e7dc81547c9dce6a3c6 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: "" operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"EnvoyFilter","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ProxyConfig","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"Istio","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioCNI","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevision","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevisionTag","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1alpha1"}},{"type":"olm.package","value":{"packageName":"servicemeshoperator3","version":"3.2.0"}}]}' operators.openshift.io/valid-subscription: '["OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: '["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io","proxyconfigs.networking.istio.io","serviceentries.networking.istio.io","sidecars.networking.istio.io","virtualservices.networking.istio.io","workloadentries.networking.istio.io","workloadgroups.networking.istio.io","authorizationpolicies.security.istio.io","peerauthentications.security.istio.io","requestauthentications.security.istio.io","telemetries.telemetry.istio.io"]' operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. labels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/arch operator: In values: - amd64 - arm64 - ppc64le - s390x - key: kubernetes.io/os operator: In values: - linux containers: - args: - --health-probe-bind-address=:8081 - --metrics-bind-address=:8443 - --zap-log-level=info command: - /usr/local/bin/sail-operator env: - name: OPERATOR_CONDITION_NAME value: servicemeshoperator3.v3.2.0 image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:ae57d962a3b88aff90c350c56960acb298d9115ef5e46a63e0b23781d17fc9ec imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: sail-operator readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 1Gi requests: cpu: 10m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/sail-operator name: operator-config readOnly: true dnsPolicy: ClusterFirst restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true serviceAccount: servicemesh-operator3 serviceAccountName: servicemesh-operator3 terminationGracePeriodSeconds: 10 volumes: - downwardAPI: defaultMode: 420 items: - fieldRef: apiVersion: v1 fieldPath: metadata.annotations path: config.properties name: operator-config status: availableReplicas: 1 conditions: - lastTransitionTime: "2025-12-04T03:51:50Z" lastUpdateTime: "2025-12-04T03:51:50Z" message: Deployment has minimum availability. reason: MinimumReplicasAvailable status: "True" type: Available - lastTransitionTime: "2025-12-04T03:51:34Z" lastUpdateTime: "2025-12-04T03:51:50Z" message: ReplicaSet "servicemesh-operator3-d59cf89b" has successfully progressed. reason: NewReplicaSetAvailable status: "True" type: Progressing observedGeneration: 1 readyReplicas: 1 replicas: 1 updatedReplicas: 1 =====Operator logs=====: =====Events in openshift-operators=====: LAST SEEN TYPE REASON OBJECT MESSAGE 6m1s Warning AppliedWithWarnings installplan/install-c5wnb 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.0" (CustomResourceDefinition "virtualservices.networking.istio.io"): unrecognized format "binary" 5m24s Normal Scheduled pod/kiali-operator-6dfb9d4d8d-blb59 Successfully assigned openshift-operators/kiali-operator-6dfb9d4d8d-blb59 to ip-10-0-80-179.us-east-2.compute.internal 5m24s Normal AddedInterface pod/kiali-operator-6dfb9d4d8d-blb59 Add eth0 [10.128.2.19/23] from ovn-kubernetes 5m24s Normal Pulling pod/kiali-operator-6dfb9d4d8d-blb59 Pulling image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:9b35cc9f78a9d46bff7b33ce4a6fbc0ff8653aa9b530dec1c8939adbd5d49900" 5m16s Normal Pulled pod/kiali-operator-6dfb9d4d8d-blb59 Successfully pulled image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:9b35cc9f78a9d46bff7b33ce4a6fbc0ff8653aa9b530dec1c8939adbd5d49900" in 8.125s (8.125s including waiting). Image size: 751125479 bytes. 5m16s Normal Created pod/kiali-operator-6dfb9d4d8d-blb59 Created container: operator 5m16s Normal Started pod/kiali-operator-6dfb9d4d8d-blb59 Started container operator 5m25s Normal SuccessfulCreate replicaset/kiali-operator-6dfb9d4d8d Created pod: kiali-operator-6dfb9d4d8d-blb59 5m25s Normal ScalingReplicaSet deployment/kiali-operator Scaled up replica set kiali-operator-6dfb9d4d8d from 0 to 1 5m25s Normal RequirementsUnknown clusterserviceversion/kiali-operator.v2.17.1 requirements not yet checked 5m25s Normal RequirementsNotMet clusterserviceversion/kiali-operator.v2.17.1 one or more requirements couldn't be found 5m25s Normal AllRequirementsMet clusterserviceversion/kiali-operator.v2.17.1 all requirements found, attempting install 5m25s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.1 waiting for install components to report healthy 5m25s Normal InstallWaiting clusterserviceversion/kiali-operator.v2.17.1 installing: waiting for deployment kiali-operator to become ready: deployment "kiali-operator" not available: Deployment does not have minimum availability. 4m44s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.1 install strategy completed with no errors 6m12s Normal LeaderElection lease/sail-operator-lock servicemesh-operator3-d59cf89b-k6rvd_21995c28-2d17-496d-bbf8-021e1acd6d45 became leader 6m15s Normal Scheduled pod/servicemesh-operator3-d59cf89b-k6rvd Successfully assigned openshift-operators/servicemesh-operator3-d59cf89b-k6rvd to ip-10-0-80-179.us-east-2.compute.internal 6m15s Normal AddedInterface pod/servicemesh-operator3-d59cf89b-k6rvd Add eth0 [10.128.2.18/23] from ovn-kubernetes 6m15s Normal Pulling pod/servicemesh-operator3-d59cf89b-k6rvd Pulling image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:ae57d962a3b88aff90c350c56960acb298d9115ef5e46a63e0b23781d17fc9ec" 6m12s Normal Pulled pod/servicemesh-operator3-d59cf89b-k6rvd Successfully pulled image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:ae57d962a3b88aff90c350c56960acb298d9115ef5e46a63e0b23781d17fc9ec" in 3.015s (3.015s including waiting). Image size: 159828730 bytes. 6m12s Normal Created pod/servicemesh-operator3-d59cf89b-k6rvd Created container: sail-operator 6m12s Normal Started pod/servicemesh-operator3-d59cf89b-k6rvd Started container sail-operator 6m16s Normal SuccessfulCreate replicaset/servicemesh-operator3-d59cf89b Created pod: servicemesh-operator3-d59cf89b-k6rvd 6m16s Normal ScalingReplicaSet deployment/servicemesh-operator3 Scaled up replica set servicemesh-operator3-d59cf89b from 0 to 1 6m20s Normal RequirementsUnknown clusterserviceversion/servicemeshoperator3.v3.2.0 requirements not yet checked 6m17s Normal RequirementsNotMet clusterserviceversion/servicemeshoperator3.v3.2.0 one or more requirements couldn't be found 6m16s Normal AllRequirementsMet clusterserviceversion/servicemeshoperator3.v3.2.0 all requirements found, attempting install 6m16s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.0 waiting for install components to report healthy 6m16s Normal InstallWaiting clusterserviceversion/servicemeshoperator3.v3.2.0 installing: waiting for deployment servicemesh-operator3 to become ready: deployment "servicemesh-operator3" not available: Deployment does not have minimum availability. 6m Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.0 install strategy completed with no errors =====Pods in openshift-operators=====: NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES kiali-operator-6dfb9d4d8d-blb59 1/1 Running 0 5m25s 10.128.2.19 ip-10-0-80-179.us-east-2.compute.internal servicemesh-operator3-d59cf89b-k6rvd 1/1 Running 0 6m16s 10.128.2.18 ip-10-0-80-179.us-east-2.compute.internal =====Operator Deployment describe=====: Name: servicemesh-operator3 Namespace: openshift-operators CreationTimestamp: Thu, 04 Dec 2025 03:51:34 +0000 Labels: app.kubernetes.io/component=sail-operator app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/instance=servicemesh-operator3 app.kubernetes.io/managed-by=helm app.kubernetes.io/name=deployment app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 olm.deployment-spec-hash=bW5YNb3HAQYs6sG4PSn6VBMbnCNkxGRKpTUGqW olm.managed=true olm.owner=servicemeshoperator3.v3.2.0 olm.owner.kind=ClusterServiceVersion olm.owner.namespace=openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators= Annotations: deployment.kubernetes.io/revision: 1 Selector: app.kubernetes.io/created-by=servicemeshoperator3,app.kubernetes.io/part-of=servicemeshoperator3,control-plane=servicemesh-operator3 Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable StrategyType: RollingUpdate MinReadySeconds: 0 RollingUpdateStrategy: 25% max unavailable, 25% max surge Pod Template: Labels: app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 Annotations: alm-examples: [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1alpha1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:ae57d962a3b88aff90c350c56960acb298d9115ef5e46a63e0b23781d17fc9ec createdAt: 2025-11-04T10:19:00Z description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift... features.operators.openshift.io/cnf: false features.operators.openshift.io/cni: true features.operators.openshift.io/csi: false features.operators.openshift.io/disconnected: true features.operators.openshift.io/fips-compliant: true features.operators.openshift.io/proxy-aware: false features.operators.openshift.io/tls-profiles: false features.operators.openshift.io/token-auth-aws: false features.operators.openshift.io/token-auth-azure: false features.operators.openshift.io/token-auth-gcp: false images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d... images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:a1bc85beb723b48706836fdcd321bca74efd3e14aba15ad64e457d96dd9b16e5 images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:70c6e21596fd28b07eafc82487df85aaa709bc2a99113928a18855a92c15c6ed images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:3799624b1a0a6e6edb820fb599ad97048827995a9f452c6913953249207b41cd images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:1306526a12590e284b1170cfccdf91388520360e2d7afab0d7f57111c4f28662 images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:c3c9ccdbdcc8fc02a6a2201c511896ef5faf70488bd953068996... images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe7295... images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f... images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d07... images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:0985a1e593010084bc8ca9cd2e04e893ce5fb855de0d09e988b721a7bef0cf93 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:f118bf81f44443fbdab23b689c97e9801eba8799c7af85228f914d8cd8afe6c0 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:d89bfca262be92558d86f07dd87928727b0998f7b4858a5c5005e0eae930f3bb images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:40be785b9abecd641f3121855a066c0ea01aba66e1350f33d175f2351c54e371 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:89359674e103f3c770010379fa46e716432cfd417f0d4e7dc81547c9dce6a3c6 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: operatorframework.io/properties: {"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","valu... operators.openshift.io/valid-subscription: ["OpenShift Container Platform", "OpenShift Platform Plus"] operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: ["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io... operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. Service Account: servicemesh-operator3 Containers: sail-operator: Image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:ae57d962a3b88aff90c350c56960acb298d9115ef5e46a63e0b23781d17fc9ec Port: Host Port: Command: /usr/local/bin/sail-operator Args: --health-probe-bind-address=:8081 --metrics-bind-address=:8443 --zap-log-level=info Limits: cpu: 500m memory: 1Gi Requests: cpu: 10m memory: 64Mi Liveness: http-get http://:8081/healthz delay=15s timeout=1s period=20s #success=1 #failure=3 Readiness: http-get http://:8081/readyz delay=5s timeout=1s period=10s #success=1 #failure=3 Environment: OPERATOR_CONDITION_NAME: servicemeshoperator3.v3.2.0 Mounts: /etc/sail-operator from operator-config (ro) Volumes: operator-config: Type: DownwardAPI (a volume populated by information about the pod) Items: metadata.annotations -> config.properties Node-Selectors: Tolerations: Conditions: Type Status Reason ---- ------ ------ Available True MinimumReplicasAvailable Progressing True NewReplicaSetAvailable OldReplicaSets: NewReplicaSet: servicemesh-operator3-d59cf89b (1/1 replicas created) Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal ScalingReplicaSet 6m16s deployment-controller Scaled up replica set servicemesh-operator3-d59cf89b from 0 to 1 ========================================================= =====Istio YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istio default -o yaml: Error from server (NotFound): istios.sailoperator.io "default" not found , output: Error from server (NotFound): istios.sailoperator.io "default" not found =====Pods in istio-system=====: =====Istiod logs=====: error executing command: /usr/bin/sh -c oc -n istio-system logs deploy/istiod --since=2m0s: error: error from server (NotFound): deployments.apps "istiod" not found in namespace "istio-system" =====Events in istio-system=====: =====Istioctl Proxy Status=====: failed to get proxy status: error executing command: /usr/bin/sh -c /go/src/github.com/openshift-service-mesh/sail-operator/bin/istioctl proxy-status: Error: no running Istio pods in "istio-system" ========================================================= =====IstioCNI YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istiocni default -o yaml: Error from server (NotFound): istiocnis.sailoperator.io "default" not found , output: Error from server (NotFound): istiocnis.sailoperator.io "default" not found =====Istio CNI DaemonSet YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc -n istio-cni get daemonset istio-cni-node -o yaml: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Events in istio-cni=====: =====Pods in istio-cni=====: =====Istio CNI DaemonSet describe=====: error describing resource: error executing command: /usr/bin/sh -c oc -n istio-cni describe daemonset istio-cni-node: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Istio CNI logs=====: error executing command: /usr/bin/sh -c oc -n istio-cni logs daemonset/istio-cni-node --since=2m0s: error: error from server (NotFound): daemonsets.apps "istio-cni-node" not found in namespace "istio-cni" ========================================================= =====CA certs in istio-system=====: error getting secret: error executing command: /usr/bin/sh -c oc -n istio-system get secret cacerts -o yaml: Error from server (NotFound): secrets "cacerts" not found , output Error from server (NotFound): secrets "cacerts" not found ========================================================= =====Namespace sleep (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sleep -o yaml: Error from server (NotFound): namespaces "sleep" not found , output: Error from server (NotFound): namespaces "sleep" not found =====Namespace httpbin (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace httpbin -o yaml: Error from server (NotFound): namespaces "httpbin" not found , output: Error from server (NotFound): namespaces "httpbin" not found =====Namespace sample (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sample -o yaml: Error from server (NotFound): namespaces "sample" not found , output: Error from server (NotFound): namespaces "sample" not found ========================================================= STEP: Cleaning up the cert-manager Namespace @ 12/04/25 03:57:53.87 STEP: Cleaning up the cert-manager-operator Namespace @ 12/04/25 03:57:53.889 STEP: Cleaning up the istio-cni Namespace @ 12/04/25 03:57:53.908 STEP: Cleaning up the istio-csr Namespace @ 12/04/25 03:57:53.924 STEP: Cleaning up the istio-system Namespace @ 12/04/25 03:57:53.951 STEP: Cleaning up the cert-manager-cainjector ClusterRole @ 12/04/25 03:57:53.972 STEP: Cleaning up the cert-manager-cluster-view ClusterRole @ 12/04/25 03:57:53.993 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRole @ 12/04/25 03:57:54.014 STEP: Cleaning up the cert-manager-controller-certificates ClusterRole @ 12/04/25 03:57:54.035 STEP: Cleaning up the cert-manager-controller-challenges ClusterRole @ 12/04/25 03:57:54.056 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRole @ 12/04/25 03:57:54.077 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRole @ 12/04/25 03:57:54.101 STEP: Cleaning up the cert-manager-controller-issuers ClusterRole @ 12/04/25 03:57:54.122 STEP: Cleaning up the cert-manager-controller-orders ClusterRole @ 12/04/25 03:57:54.143 STEP: Cleaning up the cert-manager-edit ClusterRole @ 12/04/25 03:57:54.166 STEP: Cleaning up the cert-manager-view ClusterRole @ 12/04/25 03:57:54.184 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRole @ 12/04/25 03:57:54.205 STEP: Cleaning up the cert-manager-cainjector ClusterRoleBinding @ 12/04/25 03:57:54.394 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRoleBinding @ 12/04/25 03:57:54.414 STEP: Cleaning up the cert-manager-controller-certificates ClusterRoleBinding @ 12/04/25 03:57:54.436 STEP: Cleaning up the cert-manager-controller-challenges ClusterRoleBinding @ 12/04/25 03:57:54.474 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRoleBinding @ 12/04/25 03:57:54.496 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRoleBinding @ 12/04/25 03:57:54.528 STEP: Cleaning up the cert-manager-controller-issuers ClusterRoleBinding @ 12/04/25 03:57:54.544 STEP: Cleaning up the cert-manager-controller-orders ClusterRoleBinding @ 12/04/25 03:57:54.569 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRoleBinding @ 12/04/25 03:57:54.584 STEP: Waiting for resources to be deleted @ 12/04/25 03:57:54.605 [FAILED] in [AfterAll] - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/util/cleaner/cleaner.go:281 @ 12/04/25 03:59:13.895 • [FAILED] [84.485 seconds] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] [BeforeAll] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:105 [It] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 [FAILED] Issuer creation failed Expected success, but got an error: <*fmt.wrapError | 0xc001c68c00>: error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority { msg: "error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", err: <*errors.errorString | 0xc000adfae0>{ s: "error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", }, } In [BeforeAll] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 12/04/25 03:57:49.874 There were additional failures detected. To view them in detail run ginkgo -vv ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when custom resource for the IstioCSR is created [It] has IstioCSR pods running [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 @ 12/04/25 03:59:13.895 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] updates the status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 @ 12/04/25 03:59:13.895 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] doesn't continuously reconcile the IstioCNI CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 @ 12/04/25 03:59:13.895 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] updates the Istio CR status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 @ 12/04/25 03:59:13.895 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] deploys istiod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] doesn't continuously reconcile the Istio CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] waits for sample pods to be ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] can access the httpbin service from the sleep pod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is deleted [It] removes everything from the namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is deleted [It] removes everything from the CNI namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes subscription from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes operatorgroup from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes rolebinding cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes role cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 @ 12/04/25 03:59:13.896 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCSR is deleted [It] removes cert-manager-istio-csr resources from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 @ 12/04/25 03:59:13.896 ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.002 seconds] ------------------------------ Summarizing 1 Failure: [FAIL] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 Ran 3 of 18 Specs in 122.077 seconds FAIL! -- 2 Passed | 1 Failed | 0 Pending | 15 Skipped --- FAIL: TestCertManager (122.08s) FAIL 2025-12-04T03:59:13.911001Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Control Plane Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane ======================================================================================================================== Random Seed: 1764820599 Will run 47 of 59 specs SSSSSSSSSSSS ------------------------------ Control Plane Installation defaulting IstioCNI no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:50 * IstioCNI created • [0.278 seconds] ------------------------------ Control Plane Installation defaulting IstioCNI empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:51 * IstioCNI created • [0.170 seconds] ------------------------------ Control Plane Installation defaulting Istio no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:73 * Istio created • [0.174 seconds] ------------------------------ Control Plane Installation defaulting Istio empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:74 * Istio created • [0.209 seconds] ------------------------------ Control Plane Installation defaulting Istio empty updateStrategy [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:75 * Istio created • [0.177 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:114 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [11.353 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:124 • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:129 * IstioCNI is Reconciled • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:135 * IstioCNI is Ready • [1.033 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:141 * IstioCNI stopped reconciling • [29.633 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:153 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.27.3 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.163 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:159 * Istio CR is Ready • [6.113 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:165 * Istiod is deployed in the namespace and Running • [0.388 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:172 • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:177 * Istio CR stopped reconciling • [29.622 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:195 * sample deployed * sample pods are ready • [14.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:202 * Istio sidecar version matches the expected Istio version • [0.334 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:218 * Istio CR deleted * Namespace is empty • [1.295 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:232 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 12/04/25 04:00:53.277 STEP: Cleaning up the istio-system Namespace @ 12/04/25 04:00:53.296 STEP: Cleaning up the sample Namespace @ 12/04/25 04:00:53.314 STEP: Waiting for resources to be deleted @ 12/04/25 04:00:53.334 * Finished cleaning up resources • [14.764 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:114 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.26.4 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [8.457 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:124 • [0.016 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:129 * IstioCNI is Reconciled • [0.016 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:135 * IstioCNI is Ready • [0.016 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:141 * IstioCNI stopped reconciling • [29.930 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:153 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.26.4 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.162 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:159 * Istio CR is Ready • [7.164 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:165 * Istiod is deployed in the namespace and Running • [0.385 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:172 • [0.016 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:177 * Istio CR stopped reconciling • [31.039 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:195 * sample deployed * sample pods are ready • [10.721 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:202 * Istio sidecar version matches the expected Istio version • [0.278 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:218 * Istio CR deleted * Namespace is empty • [1.262 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.4 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:232 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 12/04/25 04:02:38.444 STEP: Cleaning up the istio-system Namespace @ 12/04/25 04:02:38.463 STEP: Cleaning up the sample Namespace @ 12/04/25 04:02:38.485 STEP: Waiting for resources to be deleted @ 12/04/25 04:02:38.507 * Finished cleaning up resources • [30.706 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:114 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.24.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [15.546 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:124 • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:129 * IstioCNI is Reconciled • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:135 * IstioCNI is Ready • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:141 * IstioCNI stopped reconciling • [29.790 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:153 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.24.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.155 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:159 * Istio CR is Ready • [5.102 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:165 * Istiod is deployed in the namespace and Running • [0.371 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:172 • [0.016 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:177 * Istio CR stopped reconciling • [29.689 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:195 * sample deployed * sample pods are ready • [7.632 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:202 * Istio sidecar version matches the expected Istio version • [0.246 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:218 * Istio CR deleted * Namespace is empty • [1.241 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:232 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 12/04/25 04:04:39.937 STEP: Cleaning up the istio-system Namespace @ 12/04/25 04:04:39.955 STEP: Cleaning up the sample Namespace @ 12/04/25 04:04:39.974 STEP: Waiting for resources to be deleted @ 12/04/25 04:04:39.992 * Finished cleaning up resources • [30.656 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.004 seconds] ------------------------------ Ran 47 of 59 Specs in 353.429 seconds SUCCESS! -- 47 Passed | 0 Failed | 0 Pending | 12 Skipped PASS 2025-12-04T04:05:07.372013Z info loading supported istio versions from versions.ossm.yaml PASS 2025-12-04T04:05:07.388796Z info loading supported istio versions from versions.ossm.yaml PASS 2025-12-04T04:05:07.407443Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Multiple Control Planes Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane ======================================================================================================================================= Random Seed: 1764820599 Will run 42 of 42 specs ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.524 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.200 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.258 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.265 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.057 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [6.091 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [1.139 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [1.003 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.093 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [8.129 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [0.024 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.025 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.316 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 12/04/25 04:05:34.369 STEP: Cleaning up the mesh1 IstioRevision @ 12/04/25 04:05:34.398 STEP: Cleaning up the mesh2 IstioRevision @ 12/04/25 04:05:34.415 STEP: Cleaning up the mesh1 Istio @ 12/04/25 04:05:34.513 STEP: Cleaning up the mesh2 Istio @ 12/04/25 04:05:34.54 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 12/04/25 04:05:34.583 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 12/04/25 04:05:34.602 STEP: Waiting for resources to be deleted @ 12/04/25 04:05:34.815 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 12/04/25 04:05:36.131 STEP: Cleaning up the app2a Namespace @ 12/04/25 04:05:36.146 STEP: Cleaning up the app2b Namespace @ 12/04/25 04:05:36.163 STEP: Cleaning up the istio-cni Namespace @ 12/04/25 04:05:36.178 STEP: Cleaning up the istio-system1 Namespace @ 12/04/25 04:05:36.196 STEP: Cleaning up the istio-system2 Namespace @ 12/04/25 04:05:36.211 STEP: Waiting for resources to be deleted @ 12/04/25 04:05:36.228 * Finished cleaning up resources • [16.597 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.394 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.181 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.252 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.251 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.055 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [4.069 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [1.054 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [1.042 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.039 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [3.063 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [4.076 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [2.049 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.331 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.4 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 12/04/25 04:06:15.796 STEP: Cleaning up the mesh1 IstioRevision @ 12/04/25 04:06:15.828 STEP: Cleaning up the mesh2 IstioRevision @ 12/04/25 04:06:15.851 STEP: Cleaning up the mesh1 Istio @ 12/04/25 04:06:15.894 STEP: Cleaning up the mesh2 Istio @ 12/04/25 04:06:15.926 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 12/04/25 04:06:16.011 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 12/04/25 04:06:16.035 STEP: Waiting for resources to be deleted @ 12/04/25 04:06:16.227 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 12/04/25 04:06:17.681 STEP: Cleaning up the app2a Namespace @ 12/04/25 04:06:17.697 STEP: Cleaning up the app2b Namespace @ 12/04/25 04:06:17.713 STEP: Cleaning up the istio-cni Namespace @ 12/04/25 04:06:17.729 STEP: Cleaning up the istio-system1 Namespace @ 12/04/25 04:06:17.746 STEP: Cleaning up the istio-system2 Namespace @ 12/04/25 04:06:17.767 STEP: Waiting for resources to be deleted @ 12/04/25 04:06:17.784 * Finished cleaning up resources • [32.294 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.430 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [5.210 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.258 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.267 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.054 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [3.063 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [1.061 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [1.144 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.069 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [3.081 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [2.054 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [2.048 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.339 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 12/04/25 04:07:12.206 STEP: Cleaning up the mesh1 IstioRevision @ 12/04/25 04:07:12.235 STEP: Cleaning up the mesh2 IstioRevision @ 12/04/25 04:07:12.253 STEP: Cleaning up the mesh1 Istio @ 12/04/25 04:07:12.367 STEP: Cleaning up the mesh2 Istio @ 12/04/25 04:07:12.395 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 12/04/25 04:07:12.445 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 12/04/25 04:07:12.468 STEP: Waiting for resources to be deleted @ 12/04/25 04:07:12.694 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 12/04/25 04:07:14.138 STEP: Cleaning up the app2a Namespace @ 12/04/25 04:07:14.154 STEP: Cleaning up the app2b Namespace @ 12/04/25 04:07:14.171 STEP: Cleaning up the istio-cni Namespace @ 12/04/25 04:07:14.186 STEP: Cleaning up the istio-system1 Namespace @ 12/04/25 04:07:14.202 STEP: Cleaning up the istio-system2 Namespace @ 12/04/25 04:07:14.216 STEP: Waiting for resources to be deleted @ 12/04/25 04:07:14.234 * Finished cleaning up resources • [31.780 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.003 seconds] ------------------------------ Ran 42 of 42 Specs in 155.730 seconds SUCCESS! -- 42 Passed | 0 Failed | 0 Pending | 0 Skipped PASS ************ Running Setup ************ Initializing k8s client Running Suite: Operator Installation Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator ============================================================================================================================ Random Seed: 1764820599 Will run 5 of 5 specs ------------------------------ Operator installation deploys all the CRDs [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:69 * Istio CRDs are present • [2.462 seconds] ------------------------------ Operator installation updates the CRDs status to Established [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:76 * CRDs are Established • [1.217 seconds] ------------------------------ Operator installation istio crd is present [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:84 * Istio CRD is present • [0.227 seconds] ------------------------------ Operator installation starts successfully [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:91 • [0.014 seconds] ------------------------------ Operator installation serves metrics securely [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:96 STEP: creating a ClusterRoleBinding for the service account to allow access to metrics @ 12/04/25 04:07:47.102 STEP: validating that the metrics service is available @ 12/04/25 04:07:47.237 STEP: getting the service account token @ 12/04/25 04:07:47.377 STEP: waiting for the metrics endpoint to be ready @ 12/04/25 04:07:47.481 STEP: verifying that the controller manager is serving the metrics server @ 12/04/25 04:07:47.611 STEP: creating the curl-metrics namespace @ 12/04/25 04:07:47.825 STEP: creating the curl-metrics pod to access the metrics endpoint @ 12/04/25 04:07:47.959 STEP: waiting for the curl-metrics pod to complete. @ 12/04/25 04:07:48.097 STEP: getting the metrics by checking curl-metrics logs @ 12/04/25 04:07:53.662 STEP: getting the curl-metrics logs @ 12/04/25 04:07:53.662 STEP: Cleaning up the curl-metrics Namespace @ 12/04/25 04:07:54.619 STEP: Cleaning up the metrics-reader-rolebinding ClusterRoleBinding @ 12/04/25 04:07:54.637 STEP: Waiting for resources to be deleted @ 12/04/25 04:07:54.653 * Finished cleaning up resources • [13.746 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.001 seconds] ------------------------------ Ran 5 of 5 Specs in 17.667 seconds SUCCESS! -- 5 Passed | 0 Failed | 0 Pending | 0 Skipped PASS Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Ginkgo ran 7 suites in 11m21.223682259s There were failures detected in the following suites: cert-manager ./tests/e2e/cert-manager Test Suite Failed exit status 1 JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml make: *** [Makefile.core.mk:223: test.e2e.ocp] Error 1 Patching Tests Result File: /logs/artifacts/junit-sail-e2e.xml Checking if yq exists yq version: yq (https://github.com/mikefarah/yq/) version v4.45.1 Mapping Test Suite Name To: ServiceMesh-lp-interop