Now using project "default" on server "https://api.ci-op-bfw51yzw-3c8f3.cspilp.interop.ccitredhat.com:6443". Fetching istioctl from https://github.com/istio/istio/releases/download/1.26.2/istioctl-1.26.2-linux-amd64.tar.gz istioctl extracted to /go/src/github.com/openshift-service-mesh/sail-operator/bin GINKGO_FLAGS="-v --keep-going --label-filter=smoke&&!ambient" /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/integ-suite-ocp.sh + echo 'Running integration tests' Running integration tests + '[' -z /tmp/secret/kubeconfig ']' + KUBECONFIG=/tmp/secret/kubeconfig + ./tests/e2e/common-operator-integ-suite.sh --ocp Running on OCP Skipping build Skipping deploy Setting Istio manifest file: chart/samples/istio-sample.yaml Validating OpenShift cluster operators are stable... All cluster operators are stable. go: downloading github.com/onsi/ginkgo/v2 v2.24.0 go: downloading golang.org/x/tools v0.36.0 go: downloading go.uber.org/automaxprocs v1.6.0 go: downloading github.com/Masterminds/semver/v3 v3.4.0 go: downloading github.com/google/pprof v0.0.0-20250607225305-033d6d78b36a go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 go: downloading github.com/Masterminds/semver v1.5.0 2025/12/18 04:06:09 maxprocs: Leaving GOMAXPROCS=16: CPU quota undefined go: downloading k8s.io/api v0.34.1 go: downloading k8s.io/apimachinery v0.34.1 go: downloading github.com/onsi/gomega v1.38.0 go: downloading sigs.k8s.io/controller-runtime v0.22.3 go: downloading k8s.io/apiextensions-apiserver v0.34.1 go: downloading k8s.io/client-go v0.34.1 go: downloading gomodules.xyz/jsonpatch/v2 v2.5.0 go: downloading github.com/openshift-service-mesh/istio v0.0.0-20251029174156-37b7f6000f70 go: downloading github.com/go-logr/logr v1.4.3 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/k8snetworkplumbingwg/network-attachment-definition-client v1.4.0 go: downloading istio.io/client-go v1.27.3 go: downloading golang.org/x/sys v0.35.0 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 go: downloading sigs.k8s.io/randfill v1.0.0 go: downloading k8s.io/klog/v2 v2.130.1 go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading github.com/evanphx/json-patch v5.9.11+incompatible go: downloading golang.org/x/net v0.43.0 go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading github.com/json-iterator/go v1.1.12 go: downloading go.yaml.in/yaml/v2 v2.4.2 go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b go: downloading istio.io/api v1.27.2-0.20251010085937-bc3692c751f3 go: downloading github.com/fxamacker/cbor/v2 v2.9.0 go: downloading sigs.k8s.io/yaml v1.6.0 go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/spf13/pflag v1.0.7 go: downloading golang.org/x/term v0.34.0 go: downloading github.com/prometheus/client_golang v1.23.0 go: downloading github.com/google/gnostic-models v0.7.0 go: downloading google.golang.org/protobuf v1.36.7 go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading golang.org/x/time v0.12.0 go: downloading github.com/google/btree v1.1.3 go: downloading golang.org/x/sync v0.16.0 go: downloading golang.org/x/oauth2 v0.30.0 go: downloading github.com/google/uuid v1.6.0 go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading go.yaml.in/yaml/v3 v3.0.4 go: downloading github.com/go-openapi/jsonreference v0.21.0 go: downloading github.com/go-openapi/swag v0.23.1 go: downloading github.com/x448/float16 v0.8.4 go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading golang.org/x/text v0.28.0 go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 go: downloading github.com/go-openapi/jsonpointer v0.21.1 go: downloading github.com/emicklei/go-restful/v3 v3.12.2 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading github.com/prometheus/common v0.65.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/procfs v0.17.0 go: downloading github.com/mailru/easyjson v0.9.0 go: downloading github.com/pkg/errors v0.9.1 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250811230008-5f3141c8851a go: downloading github.com/josharian/intern v1.0.0 go: downloading gopkg.in/natefinch/lumberjack.v2 v2.2.1 go: downloading go.uber.org/zap v1.27.0 go: downloading google.golang.org/grpc v1.74.2 go: downloading github.com/spf13/cobra v1.9.1 go: downloading go.uber.org/multierr v1.11.0 2025-12-18T04:06:35.577225Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Ambient Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient ============================================================================================================= Random Seed: 1766030769 Will run 0 of 45 specs SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.007 seconds] ------------------------------ Ran 0 of 45 Specs in 0.001 seconds SUCCESS! -- 0 Passed | 0 Failed | 0 Pending | 45 Skipped PASS 2025-12-18T04:06:37.530614Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Cert Manager Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager ======================================================================================================================= Random Seed: 1766030769 Will run 18 of 18 specs ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed should have subscription created successfully [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:89 • [1.792 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed verifies all cert-manager pods are Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:95 * All cert-manager pods are ready • [35.840 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 * Cert Manager subscription patched [FAILED] in [BeforeAll] - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 12/18/25 04:07:15.577 The test run has failures and the debug information is as follows: =====Operator Deployment YAML=====: apiVersion: apps/v1 kind: Deployment metadata: annotations: deployment.kubernetes.io/revision: "1" creationTimestamp: "2025-12-18T04:01:03Z" generation: 1 labels: app.kubernetes.io/component: sail-operator app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/instance: servicemesh-operator3 app.kubernetes.io/managed-by: helm app.kubernetes.io/name: deployment app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 olm.deployment-spec-hash: 4AmHwsuIcHpeCGTVeXn5qf4iKSNfuhMambb10V olm.managed: "true" olm.owner: servicemeshoperator3.v3.2.1 olm.owner.kind: ClusterServiceVersion olm.owner.namespace: openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators: "" name: servicemesh-operator3 namespace: openshift-operators ownerReferences: - apiVersion: operators.coreos.com/v1alpha1 blockOwnerDeletion: false controller: false kind: ClusterServiceVersion name: servicemeshoperator3.v3.2.1 uid: ef7ad6ae-df22-4c05-b5fb-17554c7dc1f8 resourceVersion: "33408" uid: c837f7e2-9cf8-49c2-aace-5bf649047837 spec: progressDeadlineSeconds: 600 replicas: 1 revisionHistoryLimit: 1 selector: matchLabels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 strategy: rollingUpdate: maxSurge: 25% maxUnavailable: 25% type: RollingUpdate template: metadata: annotations: alm-examples: |- [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 createdAt: "2025-11-26T08:45:22Z" description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift Service Mesh is based on the open source Istio project. features.operators.openshift.io/cnf: "false" features.operators.openshift.io/cni: "true" features.operators.openshift.io/csi: "false" features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "false" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d5940362b3f70 images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54508ddeb570a45b5576d4e128fc6f4114e3bb0ed8cf600f2bcbf80d8b4f6b8a images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:c018e5c2fe81d6b6577cbf32a9aa3f909c69c24ed411e4fa3fa7b4a891ce017e images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:892c857d7ea35e60e13a277f5ab1268a4068c316353403a2846f116235d52a7b images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:836c53299b170a1ef0bc8ce958da2abe14a48b8d84f9298e7c6b3d940fa8a1cc images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:18897281e5ab5198506c4dd5cc0f5a96245794e6b33f63a2a4a3195bf23fbf60 images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe729500902d0b images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f31fa2ba4 images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d0782970573 images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecceae29730 images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: "" operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"EnvoyFilter","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ProxyConfig","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"Istio","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioCNI","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevision","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevisionTag","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1alpha1"}},{"type":"olm.package","value":{"packageName":"servicemeshoperator3","version":"3.2.1"}}]}' operators.openshift.io/valid-subscription: '["OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: '["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io","proxyconfigs.networking.istio.io","serviceentries.networking.istio.io","sidecars.networking.istio.io","virtualservices.networking.istio.io","workloadentries.networking.istio.io","workloadgroups.networking.istio.io","authorizationpolicies.security.istio.io","peerauthentications.security.istio.io","requestauthentications.security.istio.io","telemetries.telemetry.istio.io"]' operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. labels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/arch operator: In values: - amd64 - arm64 - ppc64le - s390x - key: kubernetes.io/os operator: In values: - linux containers: - args: - --health-probe-bind-address=:8081 - --metrics-bind-address=:8443 - --zap-log-level=info command: - /usr/local/bin/sail-operator env: - name: OPERATOR_CONDITION_NAME value: servicemeshoperator3.v3.2.1 image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: sail-operator readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 1Gi requests: cpu: 10m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/sail-operator name: operator-config readOnly: true dnsPolicy: ClusterFirst restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true serviceAccount: servicemesh-operator3 serviceAccountName: servicemesh-operator3 terminationGracePeriodSeconds: 10 volumes: - downwardAPI: defaultMode: 420 items: - fieldRef: apiVersion: v1 fieldPath: metadata.annotations path: config.properties name: operator-config status: availableReplicas: 1 conditions: - lastTransitionTime: "2025-12-18T04:01:18Z" lastUpdateTime: "2025-12-18T04:01:18Z" message: Deployment has minimum availability. reason: MinimumReplicasAvailable status: "True" type: Available - lastTransitionTime: "2025-12-18T04:01:03Z" lastUpdateTime: "2025-12-18T04:01:18Z" message: ReplicaSet "servicemesh-operator3-6fd8c97988" has successfully progressed. reason: NewReplicaSetAvailable status: "True" type: Progressing observedGeneration: 1 readyReplicas: 1 replicas: 1 updatedReplicas: 1 =====Operator logs=====: =====Events in openshift-operators=====: LAST SEEN TYPE REASON OBJECT MESSAGE 5m59s Warning AppliedWithWarnings installplan/install-7bgts 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.1" (CustomResourceDefinition "virtualservices.networking.istio.io"): unrecognized format "binary" 5m54s Warning AppliedWithWarnings installplan/install-7bgts 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.1" (CustomResourceDefinition "ztunnels.sailoperator.io"): sailoperator.io/v1alpha1 ZTunnel is deprecated; use sailoperator.io/v1 ZTunnel 5m26s Normal Scheduled pod/kiali-operator-5867bbd9bf-hpx46 Successfully assigned openshift-operators/kiali-operator-5867bbd9bf-hpx46 to ip-10-0-66-0.us-east-2.compute.internal 5m27s Normal AddedInterface pod/kiali-operator-5867bbd9bf-hpx46 Add eth0 [10.129.2.13/23] from ovn-kubernetes 5m27s Normal Pulling pod/kiali-operator-5867bbd9bf-hpx46 Pulling image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:ee89b53ebdd6b92eccd6c4a238a43d57d245ab14e8402a86e5ecd53046d90485" 5m18s Normal Pulled pod/kiali-operator-5867bbd9bf-hpx46 Successfully pulled image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:ee89b53ebdd6b92eccd6c4a238a43d57d245ab14e8402a86e5ecd53046d90485" in 8.318s (8.318s including waiting). Image size: 751082511 bytes. 5m18s Normal Created pod/kiali-operator-5867bbd9bf-hpx46 Created container: operator 5m18s Normal Started pod/kiali-operator-5867bbd9bf-hpx46 Started container operator 5m27s Normal SuccessfulCreate replicaset/kiali-operator-5867bbd9bf Created pod: kiali-operator-5867bbd9bf-hpx46 5m27s Normal ScalingReplicaSet deployment/kiali-operator Scaled up replica set kiali-operator-5867bbd9bf from 0 to 1 5m28s Normal RequirementsUnknown clusterserviceversion/kiali-operator.v2.17.2 requirements not yet checked 5m28s Normal RequirementsNotMet clusterserviceversion/kiali-operator.v2.17.2 one or more requirements couldn't be found 5m27s Normal AllRequirementsMet clusterserviceversion/kiali-operator.v2.17.2 all requirements found, attempting install 5m27s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.2 waiting for install components to report healthy 5m27s Normal InstallWaiting clusterserviceversion/kiali-operator.v2.17.2 installing: waiting for deployment kiali-operator to become ready: deployment "kiali-operator" not available: Deployment does not have minimum availability. 4m47s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.2 install strategy completed with no errors 6m9s Normal LeaderElection lease/sail-operator-lock servicemesh-operator3-6fd8c97988-bwrbt_6dce0cf2-d7f3-4795-8057-762623dcfd8a became leader 6m12s Normal Scheduled pod/servicemesh-operator3-6fd8c97988-bwrbt Successfully assigned openshift-operators/servicemesh-operator3-6fd8c97988-bwrbt to ip-10-0-66-0.us-east-2.compute.internal 6m13s Normal AddedInterface pod/servicemesh-operator3-6fd8c97988-bwrbt Add eth0 [10.129.2.11/23] from ovn-kubernetes 6m12s Normal Pulling pod/servicemesh-operator3-6fd8c97988-bwrbt Pulling image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365" 6m9s Normal Pulled pod/servicemesh-operator3-6fd8c97988-bwrbt Successfully pulled image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365" in 3.03s (3.03s including waiting). Image size: 161863556 bytes. 6m9s Normal Created pod/servicemesh-operator3-6fd8c97988-bwrbt Created container: sail-operator 6m9s Normal Started pod/servicemesh-operator3-6fd8c97988-bwrbt Started container sail-operator 6m13s Normal SuccessfulCreate replicaset/servicemesh-operator3-6fd8c97988 Created pod: servicemesh-operator3-6fd8c97988-bwrbt 6m13s Normal ScalingReplicaSet deployment/servicemesh-operator3 Scaled up replica set servicemesh-operator3-6fd8c97988 from 0 to 1 6m17s Normal RequirementsUnknown clusterserviceversion/servicemeshoperator3.v3.2.1 requirements not yet checked 6m14s Normal RequirementsNotMet clusterserviceversion/servicemeshoperator3.v3.2.1 one or more requirements couldn't be found 6m13s Normal AllRequirementsMet clusterserviceversion/servicemeshoperator3.v3.2.1 all requirements found, attempting install 6m13s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.1 waiting for install components to report healthy 6m13s Normal InstallWaiting clusterserviceversion/servicemeshoperator3.v3.2.1 installing: waiting for deployment servicemesh-operator3 to become ready: deployment "servicemesh-operator3" not available: Deployment does not have minimum availability. 5m57s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.1 install strategy completed with no errors =====Pods in openshift-operators=====: NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES kiali-operator-5867bbd9bf-hpx46 1/1 Running 0 5m27s 10.129.2.13 ip-10-0-66-0.us-east-2.compute.internal servicemesh-operator3-6fd8c97988-bwrbt 1/1 Running 0 6m13s 10.129.2.11 ip-10-0-66-0.us-east-2.compute.internal =====Operator Deployment describe=====: Name: servicemesh-operator3 Namespace: openshift-operators CreationTimestamp: Thu, 18 Dec 2025 04:01:03 +0000 Labels: app.kubernetes.io/component=sail-operator app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/instance=servicemesh-operator3 app.kubernetes.io/managed-by=helm app.kubernetes.io/name=deployment app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 olm.deployment-spec-hash=4AmHwsuIcHpeCGTVeXn5qf4iKSNfuhMambb10V olm.managed=true olm.owner=servicemeshoperator3.v3.2.1 olm.owner.kind=ClusterServiceVersion olm.owner.namespace=openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators= Annotations: deployment.kubernetes.io/revision: 1 Selector: app.kubernetes.io/created-by=servicemeshoperator3,app.kubernetes.io/part-of=servicemeshoperator3,control-plane=servicemesh-operator3 Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable StrategyType: RollingUpdate MinReadySeconds: 0 RollingUpdateStrategy: 25% max unavailable, 25% max surge Pod Template: Labels: app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 Annotations: alm-examples: [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 createdAt: 2025-11-26T08:45:22Z description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift... features.operators.openshift.io/cnf: false features.operators.openshift.io/cni: true features.operators.openshift.io/csi: false features.operators.openshift.io/disconnected: true features.operators.openshift.io/fips-compliant: true features.operators.openshift.io/proxy-aware: false features.operators.openshift.io/tls-profiles: false features.operators.openshift.io/token-auth-aws: false features.operators.openshift.io/token-auth-azure: false features.operators.openshift.io/token-auth-gcp: false images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d... images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54508ddeb570a45b5576d4e128fc6f4114e3bb0ed8cf600f2bcbf80d8b4f6b8a images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:c018e5c2fe81d6b6577cbf32a9aa3f909c69c24ed411e4fa3fa7b4a891ce017e images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:892c857d7ea35e60e13a277f5ab1268a4068c316353403a2846f116235d52a7b images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:836c53299b170a1ef0bc8ce958da2abe14a48b8d84f9298e7c6b3d940fa8a1cc images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:18897281e5ab5198506c4dd5cc0f5a96245794e6b33f63a2a4a3... images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe7295... images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f... images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d07... images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecc... images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: operatorframework.io/properties: {"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","valu... operators.openshift.io/valid-subscription: ["OpenShift Container Platform", "OpenShift Platform Plus"] operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: ["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io... operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. Service Account: servicemesh-operator3 Containers: sail-operator: Image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 Port: Host Port: Command: /usr/local/bin/sail-operator Args: --health-probe-bind-address=:8081 --metrics-bind-address=:8443 --zap-log-level=info Limits: cpu: 500m memory: 1Gi Requests: cpu: 10m memory: 64Mi Liveness: http-get http://:8081/healthz delay=15s timeout=1s period=20s #success=1 #failure=3 Readiness: http-get http://:8081/readyz delay=5s timeout=1s period=10s #success=1 #failure=3 Environment: OPERATOR_CONDITION_NAME: servicemeshoperator3.v3.2.1 Mounts: /etc/sail-operator from operator-config (ro) Volumes: operator-config: Type: DownwardAPI (a volume populated by information about the pod) Items: metadata.annotations -> config.properties Node-Selectors: Tolerations: Conditions: Type Status Reason ---- ------ ------ Available True MinimumReplicasAvailable Progressing True NewReplicaSetAvailable OldReplicaSets: NewReplicaSet: servicemesh-operator3-6fd8c97988 (1/1 replicas created) Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal ScalingReplicaSet 6m13s deployment-controller Scaled up replica set servicemesh-operator3-6fd8c97988 from 0 to 1 ========================================================= =====Istio YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istio default -o yaml: Error from server (NotFound): istios.sailoperator.io "default" not found , output: Error from server (NotFound): istios.sailoperator.io "default" not found =====Pods in istio-system=====: =====Istiod logs=====: error executing command: /usr/bin/sh -c oc -n istio-system logs deploy/istiod --since=2m0s: error: error from server (NotFound): deployments.apps "istiod" not found in namespace "istio-system" =====Events in istio-system=====: =====Istioctl Proxy Status=====: failed to get proxy status: error executing command: /usr/bin/sh -c /go/src/github.com/openshift-service-mesh/sail-operator/bin/istioctl proxy-status: Error: no running Istio pods in "istio-system" ========================================================= =====IstioCNI YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istiocni default -o yaml: Error from server (NotFound): istiocnis.sailoperator.io "default" not found , output: Error from server (NotFound): istiocnis.sailoperator.io "default" not found =====Istio CNI DaemonSet YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc -n istio-cni get daemonset istio-cni-node -o yaml: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Events in istio-cni=====: =====Pods in istio-cni=====: =====Istio CNI DaemonSet describe=====: error describing resource: error executing command: /usr/bin/sh -c oc -n istio-cni describe daemonset istio-cni-node: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Istio CNI logs=====: error executing command: /usr/bin/sh -c oc -n istio-cni logs daemonset/istio-cni-node --since=2m0s: error: error from server (NotFound): daemonsets.apps "istio-cni-node" not found in namespace "istio-cni" ========================================================= =====CA certs in istio-system=====: error getting secret: error executing command: /usr/bin/sh -c oc -n istio-system get secret cacerts -o yaml: Error from server (NotFound): secrets "cacerts" not found , output Error from server (NotFound): secrets "cacerts" not found ========================================================= =====Namespace sleep (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sleep -o yaml: Error from server (NotFound): namespaces "sleep" not found , output: Error from server (NotFound): namespaces "sleep" not found =====Namespace httpbin (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace httpbin -o yaml: Error from server (NotFound): namespaces "httpbin" not found , output: Error from server (NotFound): namespaces "httpbin" not found =====Namespace sample (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sample -o yaml: Error from server (NotFound): namespaces "sample" not found , output: Error from server (NotFound): namespaces "sample" not found ========================================================= STEP: Cleaning up the cert-manager Namespace @ 12/18/25 04:07:19.306 STEP: Cleaning up the cert-manager-operator Namespace @ 12/18/25 04:07:19.324 STEP: Cleaning up the istio-cni Namespace @ 12/18/25 04:07:19.341 STEP: Cleaning up the istio-csr Namespace @ 12/18/25 04:07:19.36 STEP: Cleaning up the istio-system Namespace @ 12/18/25 04:07:19.378 STEP: Cleaning up the cert-manager-cainjector ClusterRole @ 12/18/25 04:07:19.397 STEP: Cleaning up the cert-manager-cluster-view ClusterRole @ 12/18/25 04:07:19.417 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRole @ 12/18/25 04:07:19.437 STEP: Cleaning up the cert-manager-controller-certificates ClusterRole @ 12/18/25 04:07:19.465 STEP: Cleaning up the cert-manager-controller-certificatesigningrequests ClusterRole @ 12/18/25 04:07:19.494 STEP: Cleaning up the cert-manager-controller-challenges ClusterRole @ 12/18/25 04:07:19.517 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRole @ 12/18/25 04:07:19.538 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRole @ 12/18/25 04:07:19.567 STEP: Cleaning up the cert-manager-controller-issuers ClusterRole @ 12/18/25 04:07:19.59 STEP: Cleaning up the cert-manager-controller-orders ClusterRole @ 12/18/25 04:07:19.614 STEP: Cleaning up the cert-manager-edit ClusterRole @ 12/18/25 04:07:19.646 STEP: Cleaning up the cert-manager-view ClusterRole @ 12/18/25 04:07:19.674 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRole @ 12/18/25 04:07:19.846 STEP: Cleaning up the cert-manager-cainjector ClusterRoleBinding @ 12/18/25 04:07:20.015 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRoleBinding @ 12/18/25 04:07:20.047 STEP: Cleaning up the cert-manager-controller-certificates ClusterRoleBinding @ 12/18/25 04:07:20.074 STEP: Cleaning up the cert-manager-controller-certificatesigningrequests ClusterRoleBinding @ 12/18/25 04:07:20.101 STEP: Cleaning up the cert-manager-controller-challenges ClusterRoleBinding @ 12/18/25 04:07:20.129 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRoleBinding @ 12/18/25 04:07:20.152 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRoleBinding @ 12/18/25 04:07:20.176 STEP: Cleaning up the cert-manager-controller-issuers ClusterRoleBinding @ 12/18/25 04:07:20.193 STEP: Cleaning up the cert-manager-controller-orders ClusterRoleBinding @ 12/18/25 04:07:20.225 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRoleBinding @ 12/18/25 04:07:20.254 STEP: Waiting for resources to be deleted @ 12/18/25 04:07:20.28 * Finished cleaning up resources • [FAILED] [18.474 seconds] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] [BeforeAll] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:105 [It] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 [FAILED] Issuer creation failed Expected success, but got an error: <*fmt.wrapError | 0xc001c60900>: error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority { msg: "error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", err: <*errors.errorString | 0xc000cb2810>{ s: "error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", }, } In [BeforeAll] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 12/18/25 04:07:15.577 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when custom resource for the IstioCSR is created [It] has IstioCSR pods running [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 @ 12/18/25 04:07:33.65 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] updates the status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 @ 12/18/25 04:07:33.65 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] doesn't continuously reconcile the IstioCNI CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 @ 12/18/25 04:07:33.65 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] updates the Istio CR status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 @ 12/18/25 04:07:33.65 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] deploys istiod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 @ 12/18/25 04:07:33.65 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] doesn't continuously reconcile the Istio CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 @ 12/18/25 04:07:33.65 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] waits for sample pods to be ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 @ 12/18/25 04:07:33.65 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] can access the httpbin service from the sleep pod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 @ 12/18/25 04:07:33.65 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is deleted [It] removes everything from the namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 @ 12/18/25 04:07:33.65 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is deleted [It] removes everything from the CNI namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 @ 12/18/25 04:07:33.651 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes subscription from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 @ 12/18/25 04:07:33.651 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes operatorgroup from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 @ 12/18/25 04:07:33.651 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes rolebinding cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 @ 12/18/25 04:07:33.651 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes role cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 @ 12/18/25 04:07:33.651 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCSR is deleted [It] removes cert-manager-istio-csr resources from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 @ 12/18/25 04:07:33.651 ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.002 seconds] ------------------------------ Summarizing 1 Failure: [FAIL] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 Ran 3 of 18 Specs in 56.108 seconds FAIL! -- 2 Passed | 1 Failed | 0 Pending | 15 Skipped --- FAIL: TestCertManager (56.11s) FAIL 2025-12-18T04:07:33.664252Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Control Plane Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane ======================================================================================================================== Random Seed: 1766030769 Will run 47 of 59 specs ------------------------------ Control Plane Installation defaulting IstioCNI no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:51 * IstioCNI created • [0.236 seconds] ------------------------------ Control Plane Installation defaulting IstioCNI empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:52 * IstioCNI created • [0.161 seconds] ------------------------------ Control Plane Installation defaulting Istio no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:74 * Istio created • [0.157 seconds] ------------------------------ Control Plane Installation defaulting Istio empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:75 * Istio created • [0.151 seconds] ------------------------------ Control Plane Installation defaulting Istio empty updateStrategy [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:76 * Istio created • [0.160 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [11.163 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.013 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.438 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.27.3 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.143 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [7.106 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.328 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.011 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [30.448 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [13.772 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.276 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.240 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 12/18/25 04:09:13.634 STEP: Cleaning up the istio-system Namespace @ 12/18/25 04:09:13.65 STEP: Cleaning up the sample Namespace @ 12/18/25 04:09:13.665 STEP: Waiting for resources to be deleted @ 12/18/25 04:09:13.68 * Finished cleaning up resources • [13.739 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.26.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [8.213 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.357 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.26.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.146 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [8.113 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.331 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.014 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [30.380 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [7.549 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.286 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.228 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 12/18/25 04:10:56.167 STEP: Cleaning up the istio-system Namespace @ 12/18/25 04:10:56.182 STEP: Cleaning up the sample Namespace @ 12/18/25 04:10:56.198 STEP: Waiting for resources to be deleted @ 12/18/25 04:10:56.213 * Finished cleaning up resources • [29.879 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.24.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [8.266 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.810 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.24.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.153 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [5.076 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.362 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [30.781 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [7.592 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.265 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.247 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 12/18/25 04:12:53.713 STEP: Cleaning up the istio-system Namespace @ 12/18/25 04:12:53.728 STEP: Cleaning up the sample Namespace @ 12/18/25 04:12:53.743 STEP: Waiting for resources to be deleted @ 12/18/25 04:12:53.76 * Finished cleaning up resources • [30.743 seconds] ------------------------------ SSSSSSSSSSSS ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.005 seconds] ------------------------------ Ran 47 of 59 Specs in 347.449 seconds SUCCESS! -- 47 Passed | 0 Failed | 0 Pending | 12 Skipped PASS 2025-12-18T04:13:21.146648Z info loading supported istio versions from versions.ossm.yaml PASS 2025-12-18T04:13:21.166770Z info loading supported istio versions from versions.ossm.yaml PASS 2025-12-18T04:13:21.187657Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Multiple Control Planes Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane ======================================================================================================================================= Random Seed: 1766030769 Will run 42 of 42 specs ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.520 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.184 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.266 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.253 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.058 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [4.072 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [1.189 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [1.051 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.028 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [8.129 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [0.025 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [1.037 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.326 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 12/18/25 04:13:47.161 STEP: Cleaning up the mesh1 IstioRevision @ 12/18/25 04:13:47.19 STEP: Cleaning up the mesh2 IstioRevision @ 12/18/25 04:13:47.208 STEP: Cleaning up the mesh1 Istio @ 12/18/25 04:13:47.271 STEP: Cleaning up the mesh2 Istio @ 12/18/25 04:13:47.312 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 12/18/25 04:13:47.347 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 12/18/25 04:13:47.389 STEP: Waiting for resources to be deleted @ 12/18/25 04:13:47.566 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 12/18/25 04:13:48.909 STEP: Cleaning up the app2a Namespace @ 12/18/25 04:13:48.929 STEP: Cleaning up the app2b Namespace @ 12/18/25 04:13:48.946 STEP: Cleaning up the istio-cni Namespace @ 12/18/25 04:13:48.961 STEP: Cleaning up the istio-system1 Namespace @ 12/18/25 04:13:48.977 STEP: Cleaning up the istio-system2 Namespace @ 12/18/25 04:13:48.992 STEP: Waiting for resources to be deleted @ 12/18/25 04:13:49.008 * Finished cleaning up resources • [17.184 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.441 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.185 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.268 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.262 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.056 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [5.078 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [0.969 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [1.050 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.025 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [3.062 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [4.080 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.025 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.309 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 12/18/25 04:14:28.152 STEP: Cleaning up the mesh1 IstioRevision @ 12/18/25 04:14:28.18 STEP: Cleaning up the mesh2 IstioRevision @ 12/18/25 04:14:28.197 STEP: Cleaning up the mesh1 Istio @ 12/18/25 04:14:28.25 STEP: Cleaning up the mesh2 Istio @ 12/18/25 04:14:28.304 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 12/18/25 04:14:28.346 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 12/18/25 04:14:28.368 STEP: Waiting for resources to be deleted @ 12/18/25 04:14:28.532 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 12/18/25 04:14:29.875 STEP: Cleaning up the app2a Namespace @ 12/18/25 04:14:29.889 STEP: Cleaning up the app2b Namespace @ 12/18/25 04:14:29.905 STEP: Cleaning up the istio-cni Namespace @ 12/18/25 04:14:29.92 STEP: Cleaning up the istio-system1 Namespace @ 12/18/25 04:14:29.936 STEP: Cleaning up the istio-system2 Namespace @ 12/18/25 04:14:29.951 STEP: Waiting for resources to be deleted @ 12/18/25 04:14:29.967 * Finished cleaning up resources • [31.756 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.489 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.202 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.269 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.288 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.054 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [4.072 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [1.005 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [0.986 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.111 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [3.065 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [3.063 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.023 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.315 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 12/18/25 04:15:21.859 STEP: Cleaning up the mesh1 IstioRevision @ 12/18/25 04:15:21.888 STEP: Cleaning up the mesh2 IstioRevision @ 12/18/25 04:15:21.906 STEP: Cleaning up the mesh1 Istio @ 12/18/25 04:15:21.983 STEP: Cleaning up the mesh2 Istio @ 12/18/25 04:15:22.016 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 12/18/25 04:15:22.097 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 12/18/25 04:15:22.116 STEP: Waiting for resources to be deleted @ 12/18/25 04:15:22.294 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 12/18/25 04:15:23.543 STEP: Cleaning up the app2a Namespace @ 12/18/25 04:15:23.559 STEP: Cleaning up the app2b Namespace @ 12/18/25 04:15:23.576 STEP: Cleaning up the istio-cni Namespace @ 12/18/25 04:15:23.591 STEP: Cleaning up the istio-system1 Namespace @ 12/18/25 04:15:23.607 STEP: Cleaning up the istio-system2 Namespace @ 12/18/25 04:15:23.623 STEP: Waiting for resources to be deleted @ 12/18/25 04:15:23.638 * Finished cleaning up resources • [32.123 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.003 seconds] ------------------------------ Ran 42 of 42 Specs in 151.956 seconds SUCCESS! -- 42 Passed | 0 Failed | 0 Pending | 0 Skipped PASS ************ Running Setup ************ Initializing k8s client Running Suite: Operator Installation Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator ============================================================================================================================ Random Seed: 1766030769 Will run 5 of 5 specs ------------------------------ Operator installation deploys all the CRDs [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:69 * Istio CRDs are present • [1.265 seconds] ------------------------------ Operator installation updates the CRDs status to Established [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:76 * CRDs are Established • [1.216 seconds] ------------------------------ Operator installation istio crd is present [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:84 * Istio CRD is present • [0.230 seconds] ------------------------------ Operator installation starts successfully [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:91 • [0.013 seconds] ------------------------------ Operator installation serves metrics securely [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:96 STEP: creating a ClusterRoleBinding for the service account to allow access to metrics @ 12/18/25 04:15:55.911 STEP: validating that the metrics service is available @ 12/18/25 04:15:56.048 STEP: getting the service account token @ 12/18/25 04:15:56.136 STEP: waiting for the metrics endpoint to be ready @ 12/18/25 04:15:56.223 STEP: verifying that the controller manager is serving the metrics server @ 12/18/25 04:15:56.353 STEP: creating the curl-metrics namespace @ 12/18/25 04:15:56.552 STEP: creating the curl-metrics pod to access the metrics endpoint @ 12/18/25 04:15:56.675 STEP: waiting for the curl-metrics pod to complete. @ 12/18/25 04:15:56.811 STEP: getting the metrics by checking curl-metrics logs @ 12/18/25 04:16:02.405 STEP: getting the curl-metrics logs @ 12/18/25 04:16:02.405 STEP: Cleaning up the curl-metrics Namespace @ 12/18/25 04:16:03.384 STEP: Cleaning up the metrics-reader-rolebinding ClusterRoleBinding @ 12/18/25 04:16:03.4 STEP: Waiting for resources to be deleted @ 12/18/25 04:16:03.416 * Finished cleaning up resources • [13.898 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.001 seconds] ------------------------------ Ran 5 of 5 Specs in 16.622 seconds SUCCESS! -- 5 Passed | 0 Failed | 0 Pending | 0 Skipped PASS Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Ginkgo ran 7 suites in 10m0.683530316s There were failures detected in the following suites: cert-manager ./tests/e2e/cert-manager Test Suite Failed exit status 1 JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml make: *** [Makefile.core.mk:223: test.e2e.ocp] Error 1 Patching Tests Result File: /logs/artifacts/junit-sail-e2e.xml Checking if yq exists yq version: yq (https://github.com/mikefarah/yq/) version v4.45.4 Mapping Test Suite Name To: ServiceMesh-lp-interop