Now using project "default" on server "https://api.ci-op-x9nk3inb-3c8f3.cspilp.interop.ccitredhat.com:6443". Fetching istioctl from https://github.com/istio/istio/releases/download/1.26.2/istioctl-1.26.2-linux-amd64.tar.gz istioctl extracted to /go/src/github.com/openshift-service-mesh/sail-operator/bin GINKGO_FLAGS="-v --keep-going --label-filter=smoke&&!ambient" /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/integ-suite-ocp.sh + echo 'Running integration tests' Running integration tests + '[' -z /tmp/secret/kubeconfig ']' + KUBECONFIG=/tmp/secret/kubeconfig + ./tests/e2e/common-operator-integ-suite.sh --ocp Running on OCP Skipping build Skipping deploy Setting Istio manifest file: chart/samples/istio-sample.yaml Validating OpenShift cluster operators are stable... All cluster operators are stable. go: downloading github.com/onsi/ginkgo/v2 v2.24.0 go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 go: downloading go.uber.org/automaxprocs v1.6.0 go: downloading github.com/Masterminds/semver/v3 v3.4.0 go: downloading golang.org/x/tools v0.36.0 go: downloading github.com/Masterminds/semver v1.5.0 go: downloading github.com/google/pprof v0.0.0-20250607225305-033d6d78b36a 2026/01/04 03:54:47 maxprocs: Leaving GOMAXPROCS=16: CPU quota undefined go: downloading k8s.io/api v0.34.1 go: downloading k8s.io/apimachinery v0.34.1 go: downloading github.com/onsi/gomega v1.38.0 go: downloading sigs.k8s.io/controller-runtime v0.22.3 go: downloading github.com/go-logr/logr v1.4.3 go: downloading github.com/openshift-service-mesh/istio v0.0.0-20251029174156-37b7f6000f70 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading k8s.io/apiextensions-apiserver v0.34.1 go: downloading k8s.io/client-go v0.34.1 go: downloading gomodules.xyz/jsonpatch/v2 v2.5.0 go: downloading golang.org/x/sys v0.35.0 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 go: downloading github.com/evanphx/json-patch v5.9.11+incompatible go: downloading github.com/k8snetworkplumbingwg/network-attachment-definition-client v1.4.0 go: downloading istio.io/client-go v1.27.3 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/randfill v1.0.0 go: downloading k8s.io/klog/v2 v2.130.1 go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 go: downloading golang.org/x/net v0.43.0 go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading sigs.k8s.io/yaml v1.6.0 go: downloading istio.io/api v1.27.2-0.20251010085937-bc3692c751f3 go: downloading github.com/json-iterator/go v1.1.12 go: downloading go.yaml.in/yaml/v2 v2.4.2 go: downloading github.com/fxamacker/cbor/v2 v2.9.0 go: downloading github.com/google/gnostic-models v0.7.0 go: downloading go.yaml.in/yaml/v3 v3.0.4 go: downloading github.com/go-openapi/jsonreference v0.21.0 go: downloading github.com/go-openapi/swag v0.23.1 go: downloading golang.org/x/text v0.28.0 go: downloading github.com/prometheus/client_golang v1.23.0 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading github.com/spf13/pflag v1.0.7 go: downloading golang.org/x/term v0.34.0 go: downloading google.golang.org/protobuf v1.36.7 go: downloading golang.org/x/time v0.12.0 go: downloading github.com/google/btree v1.1.3 go: downloading golang.org/x/sync v0.16.0 go: downloading github.com/go-openapi/jsonpointer v0.21.1 go: downloading github.com/mailru/easyjson v0.9.0 go: downloading github.com/google/uuid v1.6.0 go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading golang.org/x/oauth2 v0.30.0 go: downloading github.com/x448/float16 v0.8.4 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading github.com/prometheus/common v0.65.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/procfs v0.17.0 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250811230008-5f3141c8851a go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 go: downloading github.com/emicklei/go-restful/v3 v3.12.2 go: downloading github.com/pkg/errors v0.9.1 go: downloading gopkg.in/natefinch/lumberjack.v2 v2.2.1 go: downloading github.com/spf13/cobra v1.9.1 go: downloading google.golang.org/grpc v1.74.2 go: downloading go.uber.org/zap v1.27.0 go: downloading go.uber.org/multierr v1.11.0 2026-01-04T03:55:17.280679Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Ambient Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient ============================================================================================================= Random Seed: 1767498887 Will run 0 of 45 specs SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.004 seconds] ------------------------------ Ran 0 of 45 Specs in 0.001 seconds SUCCESS! -- 0 Passed | 0 Failed | 0 Pending | 45 Skipped PASS 2026-01-04T03:55:19.253399Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Cert Manager Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager ======================================================================================================================= Random Seed: 1767498887 Will run 18 of 18 specs ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed should have subscription created successfully [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:89 • [1.372 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed verifies all cert-manager pods are Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:95 * All cert-manager pods are ready • [39.450 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 * Cert Manager subscription patched [FAILED] in [BeforeAll] - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 01/04/26 03:56:00.376 The test run has failures and the debug information is as follows: =====Operator Deployment YAML=====: apiVersion: apps/v1 kind: Deployment metadata: annotations: deployment.kubernetes.io/revision: "1" creationTimestamp: "2026-01-04T03:49:30Z" generation: 1 labels: app.kubernetes.io/component: sail-operator app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/instance: servicemesh-operator3 app.kubernetes.io/managed-by: helm app.kubernetes.io/name: deployment app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 olm.deployment-spec-hash: 4AmHwsuIcHpeCGTVeXn5qf4iKSNfuhMambb10V olm.managed: "true" olm.owner: servicemeshoperator3.v3.2.1 olm.owner.kind: ClusterServiceVersion olm.owner.namespace: openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators: "" name: servicemesh-operator3 namespace: openshift-operators ownerReferences: - apiVersion: operators.coreos.com/v1alpha1 blockOwnerDeletion: false controller: false kind: ClusterServiceVersion name: servicemeshoperator3.v3.2.1 uid: 79fd14f8-bb53-4f0b-9fa0-c6c7d4b8ef52 resourceVersion: "33247" uid: f43ccf51-bc28-4088-bd13-3952d02f0037 spec: progressDeadlineSeconds: 600 replicas: 1 revisionHistoryLimit: 1 selector: matchLabels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 strategy: rollingUpdate: maxSurge: 25% maxUnavailable: 25% type: RollingUpdate template: metadata: annotations: alm-examples: |- [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 createdAt: "2025-11-26T08:45:22Z" description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift Service Mesh is based on the open source Istio project. features.operators.openshift.io/cnf: "false" features.operators.openshift.io/cni: "true" features.operators.openshift.io/csi: "false" features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "false" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d5940362b3f70 images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54508ddeb570a45b5576d4e128fc6f4114e3bb0ed8cf600f2bcbf80d8b4f6b8a images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:c018e5c2fe81d6b6577cbf32a9aa3f909c69c24ed411e4fa3fa7b4a891ce017e images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:892c857d7ea35e60e13a277f5ab1268a4068c316353403a2846f116235d52a7b images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:836c53299b170a1ef0bc8ce958da2abe14a48b8d84f9298e7c6b3d940fa8a1cc images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:18897281e5ab5198506c4dd5cc0f5a96245794e6b33f63a2a4a3195bf23fbf60 images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe729500902d0b images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f31fa2ba4 images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d0782970573 images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecceae29730 images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: "" operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"EnvoyFilter","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ProxyConfig","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"Istio","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioCNI","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevision","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevisionTag","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1alpha1"}},{"type":"olm.package","value":{"packageName":"servicemeshoperator3","version":"3.2.1"}}]}' operators.openshift.io/valid-subscription: '["OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: '["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io","proxyconfigs.networking.istio.io","serviceentries.networking.istio.io","sidecars.networking.istio.io","virtualservices.networking.istio.io","workloadentries.networking.istio.io","workloadgroups.networking.istio.io","authorizationpolicies.security.istio.io","peerauthentications.security.istio.io","requestauthentications.security.istio.io","telemetries.telemetry.istio.io"]' operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. labels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/arch operator: In values: - amd64 - arm64 - ppc64le - s390x - key: kubernetes.io/os operator: In values: - linux containers: - args: - --health-probe-bind-address=:8081 - --metrics-bind-address=:8443 - --zap-log-level=info command: - /usr/local/bin/sail-operator env: - name: OPERATOR_CONDITION_NAME value: servicemeshoperator3.v3.2.1 image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: sail-operator readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 1Gi requests: cpu: 10m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/sail-operator name: operator-config readOnly: true dnsPolicy: ClusterFirst restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true serviceAccount: servicemesh-operator3 serviceAccountName: servicemesh-operator3 terminationGracePeriodSeconds: 10 volumes: - downwardAPI: defaultMode: 420 items: - fieldRef: apiVersion: v1 fieldPath: metadata.annotations path: config.properties name: operator-config status: availableReplicas: 1 conditions: - lastTransitionTime: "2026-01-04T03:49:48Z" lastUpdateTime: "2026-01-04T03:49:48Z" message: Deployment has minimum availability. reason: MinimumReplicasAvailable status: "True" type: Available - lastTransitionTime: "2026-01-04T03:49:30Z" lastUpdateTime: "2026-01-04T03:49:48Z" message: ReplicaSet "servicemesh-operator3-6fd8c97988" has successfully progressed. reason: NewReplicaSetAvailable status: "True" type: Progressing observedGeneration: 1 readyReplicas: 1 replicas: 1 updatedReplicas: 1 =====Operator logs=====: 2026-01-04T03:55:37Z INFO controller-runtime.cache Warning: sailoperator.io/v1alpha1 ZTunnel is deprecated; use sailoperator.io/v1 ZTunnel =====Events in openshift-operators=====: LAST SEEN TYPE REASON OBJECT MESSAGE 6m13s Warning AppliedWithWarnings installplan/install-rkbkq 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.1" (CustomResourceDefinition "virtualservices.networking.istio.io"): unrecognized format "binary" 6m8s Warning AppliedWithWarnings installplan/install-rkbkq 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.1" (CustomResourceDefinition "ztunnels.sailoperator.io"): sailoperator.io/v1alpha1 ZTunnel is deprecated; use sailoperator.io/v1 ZTunnel 5m36s Normal Scheduled pod/kiali-operator-5867bbd9bf-kn8mx Successfully assigned openshift-operators/kiali-operator-5867bbd9bf-kn8mx to ip-10-0-122-121.us-east-2.compute.internal 5m36s Normal AddedInterface pod/kiali-operator-5867bbd9bf-kn8mx Add eth0 [10.131.0.28/23] from ovn-kubernetes 5m36s Normal Pulling pod/kiali-operator-5867bbd9bf-kn8mx Pulling image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:ee89b53ebdd6b92eccd6c4a238a43d57d245ab14e8402a86e5ecd53046d90485" 5m29s Normal Pulled pod/kiali-operator-5867bbd9bf-kn8mx Successfully pulled image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:ee89b53ebdd6b92eccd6c4a238a43d57d245ab14e8402a86e5ecd53046d90485" in 7.036s (7.036s including waiting). Image size: 751082511 bytes. 5m29s Normal Created pod/kiali-operator-5867bbd9bf-kn8mx Created container: operator 5m29s Normal Started pod/kiali-operator-5867bbd9bf-kn8mx Started container operator 5m36s Normal SuccessfulCreate replicaset/kiali-operator-5867bbd9bf Created pod: kiali-operator-5867bbd9bf-kn8mx 5m36s Normal ScalingReplicaSet deployment/kiali-operator Scaled up replica set kiali-operator-5867bbd9bf from 0 to 1 5m37s Normal RequirementsUnknown clusterserviceversion/kiali-operator.v2.17.2 requirements not yet checked 5m37s Normal AllRequirementsMet clusterserviceversion/kiali-operator.v2.17.2 all requirements found, attempting install 5m36s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.2 waiting for install components to report healthy 5m36s Normal InstallWaiting clusterserviceversion/kiali-operator.v2.17.2 installing: waiting for deployment kiali-operator to become ready: deployment "kiali-operator" not available: Deployment does not have minimum availability. 4m56s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.2 install strategy completed with no errors 6m25s Normal LeaderElection lease/sail-operator-lock servicemesh-operator3-6fd8c97988-28p8w_85fc9c0b-f057-41ee-96ff-eebf501319f9 became leader 6m29s Normal Scheduled pod/servicemesh-operator3-6fd8c97988-28p8w Successfully assigned openshift-operators/servicemesh-operator3-6fd8c97988-28p8w to ip-10-0-122-121.us-east-2.compute.internal 6m29s Normal AddedInterface pod/servicemesh-operator3-6fd8c97988-28p8w Add eth0 [10.131.0.26/23] from ovn-kubernetes 6m29s Normal Pulling pod/servicemesh-operator3-6fd8c97988-28p8w Pulling image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365" 6m25s Normal Pulled pod/servicemesh-operator3-6fd8c97988-28p8w Successfully pulled image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365" in 3.915s (3.915s including waiting). Image size: 161863556 bytes. 6m25s Normal Created pod/servicemesh-operator3-6fd8c97988-28p8w Created container: sail-operator 6m25s Normal Started pod/servicemesh-operator3-6fd8c97988-28p8w Started container sail-operator 6m30s Normal SuccessfulCreate replicaset/servicemesh-operator3-6fd8c97988 Created pod: servicemesh-operator3-6fd8c97988-28p8w 6m32s Warning ClusterIPNotAllocated service/servicemesh-operator3-metrics-service Cluster IP [IPv4]: 172.30.86.201 is not allocated; repairing 6m30s Normal ScalingReplicaSet deployment/servicemesh-operator3 Scaled up replica set servicemesh-operator3-6fd8c97988 from 0 to 1 6m35s Normal RequirementsUnknown clusterserviceversion/servicemeshoperator3.v3.2.1 requirements not yet checked 6m34s Normal RequirementsNotMet clusterserviceversion/servicemeshoperator3.v3.2.1 one or more requirements couldn't be found 6m30s Normal AllRequirementsMet clusterserviceversion/servicemeshoperator3.v3.2.1 all requirements found, attempting install 6m30s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.1 waiting for install components to report healthy 6m30s Normal InstallWaiting clusterserviceversion/servicemeshoperator3.v3.2.1 installing: waiting for deployment servicemesh-operator3 to become ready: deployment "servicemesh-operator3" not available: Deployment does not have minimum availability. 6m12s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.1 install strategy completed with no errors =====Pods in openshift-operators=====: NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES kiali-operator-5867bbd9bf-kn8mx 1/1 Running 0 5m36s 10.131.0.28 ip-10-0-122-121.us-east-2.compute.internal servicemesh-operator3-6fd8c97988-28p8w 1/1 Running 0 6m30s 10.131.0.26 ip-10-0-122-121.us-east-2.compute.internal =====Operator Deployment describe=====: Name: servicemesh-operator3 Namespace: openshift-operators CreationTimestamp: Sun, 04 Jan 2026 03:49:30 +0000 Labels: app.kubernetes.io/component=sail-operator app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/instance=servicemesh-operator3 app.kubernetes.io/managed-by=helm app.kubernetes.io/name=deployment app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 olm.deployment-spec-hash=4AmHwsuIcHpeCGTVeXn5qf4iKSNfuhMambb10V olm.managed=true olm.owner=servicemeshoperator3.v3.2.1 olm.owner.kind=ClusterServiceVersion olm.owner.namespace=openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators= Annotations: deployment.kubernetes.io/revision: 1 Selector: app.kubernetes.io/created-by=servicemeshoperator3,app.kubernetes.io/part-of=servicemeshoperator3,control-plane=servicemesh-operator3 Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable StrategyType: RollingUpdate MinReadySeconds: 0 RollingUpdateStrategy: 25% max unavailable, 25% max surge Pod Template: Labels: app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 Annotations: alm-examples: [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 createdAt: 2025-11-26T08:45:22Z description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift... features.operators.openshift.io/cnf: false features.operators.openshift.io/cni: true features.operators.openshift.io/csi: false features.operators.openshift.io/disconnected: true features.operators.openshift.io/fips-compliant: true features.operators.openshift.io/proxy-aware: false features.operators.openshift.io/tls-profiles: false features.operators.openshift.io/token-auth-aws: false features.operators.openshift.io/token-auth-azure: false features.operators.openshift.io/token-auth-gcp: false images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d... images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54508ddeb570a45b5576d4e128fc6f4114e3bb0ed8cf600f2bcbf80d8b4f6b8a images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:c018e5c2fe81d6b6577cbf32a9aa3f909c69c24ed411e4fa3fa7b4a891ce017e images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:892c857d7ea35e60e13a277f5ab1268a4068c316353403a2846f116235d52a7b images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:836c53299b170a1ef0bc8ce958da2abe14a48b8d84f9298e7c6b3d940fa8a1cc images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:18897281e5ab5198506c4dd5cc0f5a96245794e6b33f63a2a4a3... images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe7295... images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f... images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d07... images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecc... images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: operatorframework.io/properties: {"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","valu... operators.openshift.io/valid-subscription: ["OpenShift Container Platform", "OpenShift Platform Plus"] operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: ["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io... operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. Service Account: servicemesh-operator3 Containers: sail-operator: Image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 Port: Host Port: Command: /usr/local/bin/sail-operator Args: --health-probe-bind-address=:8081 --metrics-bind-address=:8443 --zap-log-level=info Limits: cpu: 500m memory: 1Gi Requests: cpu: 10m memory: 64Mi Liveness: http-get http://:8081/healthz delay=15s timeout=1s period=20s #success=1 #failure=3 Readiness: http-get http://:8081/readyz delay=5s timeout=1s period=10s #success=1 #failure=3 Environment: OPERATOR_CONDITION_NAME: servicemeshoperator3.v3.2.1 Mounts: /etc/sail-operator from operator-config (ro) Volumes: operator-config: Type: DownwardAPI (a volume populated by information about the pod) Items: metadata.annotations -> config.properties Node-Selectors: Tolerations: Conditions: Type Status Reason ---- ------ ------ Available True MinimumReplicasAvailable Progressing True NewReplicaSetAvailable OldReplicaSets: NewReplicaSet: servicemesh-operator3-6fd8c97988 (1/1 replicas created) Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal ScalingReplicaSet 6m30s deployment-controller Scaled up replica set servicemesh-operator3-6fd8c97988 from 0 to 1 ========================================================= =====Istio YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istio default -o yaml: Error from server (NotFound): istios.sailoperator.io "default" not found , output: Error from server (NotFound): istios.sailoperator.io "default" not found =====Pods in istio-system=====: =====Istiod logs=====: error executing command: /usr/bin/sh -c oc -n istio-system logs deploy/istiod --since=2m0s: error: error from server (NotFound): deployments.apps "istiod" not found in namespace "istio-system" =====Events in istio-system=====: =====Istioctl Proxy Status=====: failed to get proxy status: error executing command: /usr/bin/sh -c /go/src/github.com/openshift-service-mesh/sail-operator/bin/istioctl proxy-status: Error: no running Istio pods in "istio-system" ========================================================= =====IstioCNI YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istiocni default -o yaml: Error from server (NotFound): istiocnis.sailoperator.io "default" not found , output: Error from server (NotFound): istiocnis.sailoperator.io "default" not found =====Istio CNI DaemonSet YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc -n istio-cni get daemonset istio-cni-node -o yaml: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Events in istio-cni=====: =====Pods in istio-cni=====: =====Istio CNI DaemonSet describe=====: error describing resource: error executing command: /usr/bin/sh -c oc -n istio-cni describe daemonset istio-cni-node: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Istio CNI logs=====: error executing command: /usr/bin/sh -c oc -n istio-cni logs daemonset/istio-cni-node --since=2m0s: error: error from server (NotFound): daemonsets.apps "istio-cni-node" not found in namespace "istio-cni" ========================================================= =====CA certs in istio-system=====: error getting secret: error executing command: /usr/bin/sh -c oc -n istio-system get secret cacerts -o yaml: Error from server (NotFound): secrets "cacerts" not found , output Error from server (NotFound): secrets "cacerts" not found ========================================================= =====Namespace sleep (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sleep -o yaml: Error from server (NotFound): namespaces "sleep" not found , output: Error from server (NotFound): namespaces "sleep" not found =====Namespace httpbin (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace httpbin -o yaml: Error from server (NotFound): namespaces "httpbin" not found , output: Error from server (NotFound): namespaces "httpbin" not found =====Namespace sample (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sample -o yaml: Error from server (NotFound): namespaces "sample" not found , output: Error from server (NotFound): namespaces "sample" not found ========================================================= STEP: Cleaning up the cert-manager Namespace @ 01/04/26 03:56:03.165 STEP: Cleaning up the cert-manager-operator Namespace @ 01/04/26 03:56:03.173 STEP: Cleaning up the istio-cni Namespace @ 01/04/26 03:56:03.183 STEP: Cleaning up the istio-csr Namespace @ 01/04/26 03:56:03.192 STEP: Cleaning up the istio-system Namespace @ 01/04/26 03:56:03.201 STEP: Cleaning up the cert-manager-cainjector ClusterRole @ 01/04/26 03:56:03.22 STEP: Cleaning up the cert-manager-cluster-view ClusterRole @ 01/04/26 03:56:03.236 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRole @ 01/04/26 03:56:03.262 STEP: Cleaning up the cert-manager-controller-certificates ClusterRole @ 01/04/26 03:56:03.273 STEP: Cleaning up the cert-manager-controller-certificatesigningrequests ClusterRole @ 01/04/26 03:56:03.289 STEP: Cleaning up the cert-manager-controller-challenges ClusterRole @ 01/04/26 03:56:03.301 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRole @ 01/04/26 03:56:03.321 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRole @ 01/04/26 03:56:03.332 STEP: Cleaning up the cert-manager-controller-issuers ClusterRole @ 01/04/26 03:56:03.348 STEP: Cleaning up the cert-manager-controller-orders ClusterRole @ 01/04/26 03:56:03.368 STEP: Cleaning up the cert-manager-edit ClusterRole @ 01/04/26 03:56:03.387 STEP: Cleaning up the cert-manager-view ClusterRole @ 01/04/26 03:56:03.45 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRole @ 01/04/26 03:56:03.651 STEP: Cleaning up the cert-manager-cainjector ClusterRoleBinding @ 01/04/26 03:56:03.836 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRoleBinding @ 01/04/26 03:56:03.858 STEP: Cleaning up the cert-manager-controller-certificates ClusterRoleBinding @ 01/04/26 03:56:03.887 STEP: Cleaning up the cert-manager-controller-certificatesigningrequests ClusterRoleBinding @ 01/04/26 03:56:03.921 STEP: Cleaning up the cert-manager-controller-challenges ClusterRoleBinding @ 01/04/26 03:56:03.941 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRoleBinding @ 01/04/26 03:56:03.956 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRoleBinding @ 01/04/26 03:56:03.977 STEP: Cleaning up the cert-manager-controller-issuers ClusterRoleBinding @ 01/04/26 03:56:03.997 STEP: Cleaning up the cert-manager-controller-orders ClusterRoleBinding @ 01/04/26 03:56:04.03 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRoleBinding @ 01/04/26 03:56:04.04 STEP: Waiting for resources to be deleted @ 01/04/26 03:56:04.054 [FAILED] in [AfterAll] - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/util/cleaner/cleaner.go:281 @ 01/04/26 03:57:25.776 • [FAILED] [85.684 seconds] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] [BeforeAll] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:105 [It] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 [FAILED] Issuer creation failed Expected success, but got an error: <*fmt.wrapError | 0xc0026788e0>: error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority { msg: "error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", err: <*errors.errorString | 0xc001986250>{ s: "error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", }, } In [BeforeAll] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 01/04/26 03:56:00.376 There were additional failures detected. To view them in detail run ginkgo -vv ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when custom resource for the IstioCSR is created [It] has IstioCSR pods running [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] updates the status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] doesn't continuously reconcile the IstioCNI CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] updates the Istio CR status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] deploys istiod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] doesn't continuously reconcile the Istio CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] waits for sample pods to be ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] can access the httpbin service from the sleep pod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is deleted [It] removes everything from the namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is deleted [It] removes everything from the CNI namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes subscription from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes operatorgroup from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes rolebinding cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes role cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 @ 01/04/26 03:57:25.776 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCSR is deleted [It] removes cert-manager-istio-csr resources from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 @ 01/04/26 03:57:25.776 ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.002 seconds] ------------------------------ Summarizing 1 Failure: [FAIL] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 Ran 3 of 18 Specs in 126.507 seconds FAIL! -- 2 Passed | 1 Failed | 0 Pending | 15 Skipped --- FAIL: TestCertManager (126.51s) FAIL 2026-01-04T03:57:25.790556Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Control Plane Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane ======================================================================================================================== Random Seed: 1767498887 Will run 47 of 59 specs SSSSSSSSSSSS ------------------------------ Control Plane Installation defaulting IstioCNI no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:51 * IstioCNI created • [1.130 seconds] ------------------------------ Control Plane Installation defaulting IstioCNI empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:52 * IstioCNI created • [1.122 seconds] ------------------------------ Control Plane Installation defaulting Istio no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:74 * Istio created • [0.115 seconds] ------------------------------ Control Plane Installation defaulting Istio empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:75 * Istio created • [0.111 seconds] ------------------------------ Control Plane Installation defaulting Istio empty updateStrategy [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:76 * Istio created • [0.110 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [11.110 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.003 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.216 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.27.3 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.103 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [7.038 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.218 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [32.222 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [14.483 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.116 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [1.137 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 01/04/26 03:59:09 STEP: Cleaning up the istio-system Namespace @ 01/04/26 03:59:09.008 STEP: Cleaning up the sample Namespace @ 01/04/26 03:59:09.017 STEP: Waiting for resources to be deleted @ 01/04/26 03:59:09.024 * Finished cleaning up resources • [14.953 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.26.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [10.930 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.089 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.26.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.096 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [8.048 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.223 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [32.264 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [7.370 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.117 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.130 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 01/04/26 04:00:56.128 STEP: Cleaning up the istio-system Namespace @ 01/04/26 04:00:56.136 STEP: Cleaning up the sample Namespace @ 01/04/26 04:00:56.147 STEP: Waiting for resources to be deleted @ 01/04/26 04:00:56.156 * Finished cleaning up resources • [30.847 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.24.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [8.927 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.003 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.090 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.24.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.105 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [6.038 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.226 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.004 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [31.727 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [7.424 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.166 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [1.155 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 01/04/26 04:02:53.935 STEP: Cleaning up the istio-system Namespace @ 01/04/26 04:02:53.942 STEP: Cleaning up the sample Namespace @ 01/04/26 04:02:53.951 STEP: Waiting for resources to be deleted @ 01/04/26 04:02:53.959 * Finished cleaning up resources • [30.932 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.006 seconds] ------------------------------ Ran 47 of 59 Specs in 356.138 seconds SUCCESS! -- 47 Passed | 0 Failed | 0 Pending | 12 Skipped PASS 2026-01-04T04:03:21.960423Z info loading supported istio versions from versions.ossm.yaml PASS 2026-01-04T04:03:21.977384Z info loading supported istio versions from versions.ossm.yaml PASS 2026-01-04T04:03:21.996541Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Multiple Control Planes Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane ======================================================================================================================================= Random Seed: 1767498887 Will run 42 of 42 specs ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.052 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [4.135 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.230 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.202 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [4.027 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [3.019 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [0.965 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [0.707 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [0.924 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [10.058 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [0.007 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.007 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.196 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 01/04/26 04:03:48.201 STEP: Cleaning up the mesh1 IstioRevision @ 01/04/26 04:03:48.215 STEP: Cleaning up the mesh2 IstioRevision @ 01/04/26 04:03:48.224 STEP: Cleaning up the mesh1 Istio @ 01/04/26 04:03:48.245 STEP: Cleaning up the mesh2 Istio @ 01/04/26 04:03:48.255 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 01/04/26 04:03:48.267 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 01/04/26 04:03:48.274 STEP: Waiting for resources to be deleted @ 01/04/26 04:03:48.321 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 01/04/26 04:03:50.268 STEP: Cleaning up the app2a Namespace @ 01/04/26 04:03:50.276 STEP: Cleaning up the app2b Namespace @ 01/04/26 04:03:50.289 STEP: Cleaning up the istio-cni Namespace @ 01/04/26 04:03:50.296 STEP: Cleaning up the istio-system1 Namespace @ 01/04/26 04:03:50.304 STEP: Cleaning up the istio-system2 Namespace @ 01/04/26 04:03:50.314 STEP: Waiting for resources to be deleted @ 01/04/26 04:03:50.321 * Finished cleaning up resources • [17.332 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.280 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.116 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.175 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.177 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [4.025 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [4.026 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [0.883 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [0.796 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [0.765 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [3.020 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [4.024 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.007 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.179 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 01/04/26 04:04:27.981 STEP: Cleaning up the mesh1 IstioRevision @ 01/04/26 04:04:27.995 STEP: Cleaning up the mesh2 IstioRevision @ 01/04/26 04:04:28.005 STEP: Cleaning up the mesh1 Istio @ 01/04/26 04:04:28.023 STEP: Cleaning up the mesh2 Istio @ 01/04/26 04:04:28.031 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 01/04/26 04:04:28.043 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 01/04/26 04:04:28.05 STEP: Waiting for resources to be deleted @ 01/04/26 04:04:28.092 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 01/04/26 04:04:30.073 STEP: Cleaning up the app2a Namespace @ 01/04/26 04:04:30.087 STEP: Cleaning up the app2b Namespace @ 01/04/26 04:04:30.096 STEP: Cleaning up the istio-cni Namespace @ 01/04/26 04:04:30.104 STEP: Cleaning up the istio-system1 Namespace @ 01/04/26 04:04:30.113 STEP: Cleaning up the istio-system2 Namespace @ 01/04/26 04:04:30.123 STEP: Waiting for resources to be deleted @ 01/04/26 04:04:30.131 * Finished cleaning up resources • [32.932 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.022 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.162 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.202 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.217 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [4.046 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [2.017 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [0.684 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [0.796 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.118 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [3.037 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [3.020 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.006 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.185 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 01/04/26 04:05:20.448 STEP: Cleaning up the mesh1 IstioRevision @ 01/04/26 04:05:20.471 STEP: Cleaning up the mesh2 IstioRevision @ 01/04/26 04:05:20.485 STEP: Cleaning up the mesh1 Istio @ 01/04/26 04:05:20.512 STEP: Cleaning up the mesh2 Istio @ 01/04/26 04:05:20.519 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 01/04/26 04:05:20.531 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 01/04/26 04:05:20.538 STEP: Waiting for resources to be deleted @ 01/04/26 04:05:20.582 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 01/04/26 04:05:22.905 STEP: Cleaning up the app2a Namespace @ 01/04/26 04:05:22.912 STEP: Cleaning up the app2b Namespace @ 01/04/26 04:05:22.92 STEP: Cleaning up the istio-cni Namespace @ 01/04/26 04:05:22.928 STEP: Cleaning up the istio-system1 Namespace @ 01/04/26 04:05:22.939 STEP: Cleaning up the istio-system2 Namespace @ 01/04/26 04:05:22.948 STEP: Waiting for resources to be deleted @ 01/04/26 04:05:22.957 * Finished cleaning up resources • [32.917 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.003 seconds] ------------------------------ Ran 42 of 42 Specs in 150.700 seconds SUCCESS! -- 42 Passed | 0 Failed | 0 Pending | 0 Skipped PASS ************ Running Setup ************ Initializing k8s client Running Suite: Operator Installation Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator ============================================================================================================================ Random Seed: 1767498887 Will run 5 of 5 specs ------------------------------ Operator installation deploys all the CRDs [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:69 * Istio CRDs are present • [1.002 seconds] ------------------------------ Operator installation updates the CRDs status to Established [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:76 * CRDs are Established • [1.208 seconds] ------------------------------ Operator installation istio crd is present [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:84 * Istio CRD is present • [0.229 seconds] ------------------------------ Operator installation starts successfully [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:91 • [0.005 seconds] ------------------------------ Operator installation serves metrics securely [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:96 STEP: creating a ClusterRoleBinding for the service account to allow access to metrics @ 01/04/26 04:05:55.185 STEP: validating that the metrics service is available @ 01/04/26 04:05:55.273 STEP: getting the service account token @ 01/04/26 04:05:55.331 STEP: waiting for the metrics endpoint to be ready @ 01/04/26 04:05:55.386 STEP: verifying that the controller manager is serving the metrics server @ 01/04/26 04:05:55.476 STEP: creating the curl-metrics namespace @ 01/04/26 04:05:55.598 STEP: creating the curl-metrics pod to access the metrics endpoint @ 01/04/26 04:05:55.686 STEP: waiting for the curl-metrics pod to complete. @ 01/04/26 04:05:55.776 STEP: getting the metrics by checking curl-metrics logs @ 01/04/26 04:06:01.146 STEP: getting the curl-metrics logs @ 01/04/26 04:06:01.146 STEP: Cleaning up the curl-metrics Namespace @ 01/04/26 04:06:01.865 STEP: Cleaning up the metrics-reader-rolebinding ClusterRoleBinding @ 01/04/26 04:06:01.874 STEP: Waiting for resources to be deleted @ 01/04/26 04:06:01.882 * Finished cleaning up resources • [13.694 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.001 seconds] ------------------------------ Ran 5 of 5 Specs in 16.139 seconds SUCCESS! -- 5 Passed | 0 Failed | 0 Pending | 0 Skipped PASS Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Ginkgo ran 7 suites in 11m21.477986004s There were failures detected in the following suites: cert-manager ./tests/e2e/cert-manager Test Suite Failed exit status 1 JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml make: *** [Makefile.core.mk:223: test.e2e.ocp] Error 1 Patching Tests Result File: /logs/artifacts/junit-sail-e2e.xml Checking if yq exists yq version: yq (https://github.com/mikefarah/yq/) version v4.45.4 Mapping Test Suite Name To: ServiceMesh-lp-interop