Now using project "default" on server "https://api.ci-op-pw1l63mj-3c8f3.cspilp.interop.ccitredhat.com:6443". Fetching istioctl from https://github.com/istio/istio/releases/download/1.26.2/istioctl-1.26.2-linux-amd64.tar.gz istioctl extracted to /go/src/github.com/openshift-service-mesh/sail-operator/bin GINKGO_FLAGS="-v --keep-going --label-filter=smoke&&!ambient" /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/integ-suite-ocp.sh + echo 'Running integration tests' Running integration tests + '[' -z /tmp/secret/kubeconfig ']' + KUBECONFIG=/tmp/secret/kubeconfig + ./tests/e2e/common-operator-integ-suite.sh --ocp Running on OCP Skipping build Skipping deploy Setting Istio manifest file: chart/samples/istio-sample.yaml Validating OpenShift cluster operators are stable... All cluster operators are stable. go: downloading github.com/onsi/ginkgo/v2 v2.24.0 go: downloading go.uber.org/automaxprocs v1.6.0 go: downloading golang.org/x/tools v0.36.0 go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 go: downloading github.com/google/pprof v0.0.0-20250607225305-033d6d78b36a go: downloading github.com/Masterminds/semver/v3 v3.4.0 go: downloading github.com/Masterminds/semver v1.5.0 2026/01/14 15:57:49 maxprocs: Leaving GOMAXPROCS=16: CPU quota undefined go: downloading k8s.io/api v0.34.1 go: downloading github.com/onsi/gomega v1.38.0 go: downloading k8s.io/apimachinery v0.34.1 go: downloading sigs.k8s.io/controller-runtime v0.22.3 go: downloading github.com/go-logr/logr v1.4.3 go: downloading k8s.io/apiextensions-apiserver v0.34.1 go: downloading k8s.io/client-go v0.34.1 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading github.com/openshift-service-mesh/istio v0.0.0-20251029174156-37b7f6000f70 go: downloading gomodules.xyz/jsonpatch/v2 v2.5.0 go: downloading golang.org/x/sys v0.35.0 go: downloading github.com/k8snetworkplumbingwg/network-attachment-definition-client v1.4.0 go: downloading istio.io/client-go v1.27.3 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading github.com/evanphx/json-patch v5.9.11+incompatible go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/randfill v1.0.0 go: downloading k8s.io/klog/v2 v2.130.1 go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 go: downloading golang.org/x/net v0.43.0 go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b go: downloading istio.io/api v1.27.2-0.20251010085937-bc3692c751f3 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading github.com/json-iterator/go v1.1.12 go: downloading go.yaml.in/yaml/v2 v2.4.2 go: downloading sigs.k8s.io/yaml v1.6.0 go: downloading golang.org/x/text v0.28.0 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/spf13/pflag v1.0.7 go: downloading golang.org/x/term v0.34.0 go: downloading github.com/prometheus/client_golang v1.23.0 go: downloading github.com/fxamacker/cbor/v2 v2.9.0 go: downloading github.com/google/gnostic-models v0.7.0 go: downloading google.golang.org/protobuf v1.36.7 go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading golang.org/x/time v0.12.0 go: downloading github.com/google/btree v1.1.3 go: downloading golang.org/x/sync v0.16.0 go: downloading golang.org/x/oauth2 v0.30.0 go: downloading github.com/google/uuid v1.6.0 go: downloading go.yaml.in/yaml/v3 v3.0.4 go: downloading github.com/go-openapi/jsonreference v0.21.0 go: downloading github.com/go-openapi/swag v0.23.1 go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading github.com/x448/float16 v0.8.4 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading github.com/prometheus/common v0.65.0 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/procfs v0.17.0 go: downloading github.com/go-openapi/jsonpointer v0.21.1 go: downloading github.com/mailru/easyjson v0.9.0 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250811230008-5f3141c8851a go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 go: downloading github.com/emicklei/go-restful/v3 v3.12.2 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/pkg/errors v0.9.1 go: downloading gopkg.in/natefinch/lumberjack.v2 v2.2.1 go: downloading github.com/spf13/cobra v1.9.1 go: downloading google.golang.org/grpc v1.74.2 go: downloading go.uber.org/zap v1.27.0 go: downloading go.uber.org/multierr v1.11.0 2026-01-14T15:58:18.062547Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Ambient Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient ============================================================================================================= Random Seed: 1768406269 Will run 0 of 45 specs SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.006 seconds] ------------------------------ Ran 0 of 45 Specs in 0.004 seconds SUCCESS! -- 0 Passed | 0 Failed | 0 Pending | 45 Skipped PASS 2026-01-14T15:58:20.185851Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Cert Manager Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager ======================================================================================================================= Random Seed: 1768406269 Will run 18 of 18 specs ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed should have subscription created successfully [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:89 • [1.840 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed verifies all cert-manager pods are Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:95 * All cert-manager pods are ready • [37.840 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 * Cert Manager subscription patched [FAILED] in [BeforeAll] - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 01/14/26 15:59:00.375 The test run has failures and the debug information is as follows: =====Operator Deployment YAML=====: apiVersion: apps/v1 kind: Deployment metadata: annotations: deployment.kubernetes.io/revision: "1" creationTimestamp: "2026-01-14T15:52:07Z" generation: 1 labels: app.kubernetes.io/component: sail-operator app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/instance: servicemesh-operator3 app.kubernetes.io/managed-by: helm app.kubernetes.io/name: deployment app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 olm.deployment-spec-hash: 4AmHwsuIcHpeCGTVeXn5qf4iKSNfuhMambb10V olm.managed: "true" olm.owner: servicemeshoperator3.v3.2.1 olm.owner.kind: ClusterServiceVersion olm.owner.namespace: openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators: "" name: servicemesh-operator3 namespace: openshift-operators ownerReferences: - apiVersion: operators.coreos.com/v1alpha1 blockOwnerDeletion: false controller: false kind: ClusterServiceVersion name: servicemeshoperator3.v3.2.1 uid: 462cca5e-b14f-4aa6-ad8c-702211196acc resourceVersion: "34005" uid: 480ba1cd-4a0c-490c-b788-5835893f92c7 spec: progressDeadlineSeconds: 600 replicas: 1 revisionHistoryLimit: 1 selector: matchLabels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 strategy: rollingUpdate: maxSurge: 25% maxUnavailable: 25% type: RollingUpdate template: metadata: annotations: alm-examples: |- [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 createdAt: "2025-11-26T08:45:22Z" description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift Service Mesh is based on the open source Istio project. features.operators.openshift.io/cnf: "false" features.operators.openshift.io/cni: "true" features.operators.openshift.io/csi: "false" features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "false" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d5940362b3f70 images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54508ddeb570a45b5576d4e128fc6f4114e3bb0ed8cf600f2bcbf80d8b4f6b8a images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:c018e5c2fe81d6b6577cbf32a9aa3f909c69c24ed411e4fa3fa7b4a891ce017e images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:892c857d7ea35e60e13a277f5ab1268a4068c316353403a2846f116235d52a7b images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:836c53299b170a1ef0bc8ce958da2abe14a48b8d84f9298e7c6b3d940fa8a1cc images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:18897281e5ab5198506c4dd5cc0f5a96245794e6b33f63a2a4a3195bf23fbf60 images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe729500902d0b images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f31fa2ba4 images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d0782970573 images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecceae29730 images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: "" operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"EnvoyFilter","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ProxyConfig","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"Istio","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioCNI","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevision","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevisionTag","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1alpha1"}},{"type":"olm.package","value":{"packageName":"servicemeshoperator3","version":"3.2.1"}}]}' operators.openshift.io/valid-subscription: '["OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: '["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io","proxyconfigs.networking.istio.io","serviceentries.networking.istio.io","sidecars.networking.istio.io","virtualservices.networking.istio.io","workloadentries.networking.istio.io","workloadgroups.networking.istio.io","authorizationpolicies.security.istio.io","peerauthentications.security.istio.io","requestauthentications.security.istio.io","telemetries.telemetry.istio.io"]' operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. labels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/arch operator: In values: - amd64 - arm64 - ppc64le - s390x - key: kubernetes.io/os operator: In values: - linux containers: - args: - --health-probe-bind-address=:8081 - --metrics-bind-address=:8443 - --zap-log-level=info command: - /usr/local/bin/sail-operator env: - name: OPERATOR_CONDITION_NAME value: servicemeshoperator3.v3.2.1 image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: sail-operator readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 1Gi requests: cpu: 10m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/sail-operator name: operator-config readOnly: true dnsPolicy: ClusterFirst restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true serviceAccount: servicemesh-operator3 serviceAccountName: servicemesh-operator3 terminationGracePeriodSeconds: 10 volumes: - downwardAPI: defaultMode: 420 items: - fieldRef: apiVersion: v1 fieldPath: metadata.annotations path: config.properties name: operator-config status: availableReplicas: 1 conditions: - lastTransitionTime: "2026-01-14T15:52:24Z" lastUpdateTime: "2026-01-14T15:52:24Z" message: Deployment has minimum availability. reason: MinimumReplicasAvailable status: "True" type: Available - lastTransitionTime: "2026-01-14T15:52:07Z" lastUpdateTime: "2026-01-14T15:52:24Z" message: ReplicaSet "servicemesh-operator3-6fd8c97988" has successfully progressed. reason: NewReplicaSetAvailable status: "True" type: Progressing observedGeneration: 1 readyReplicas: 1 replicas: 1 updatedReplicas: 1 =====Operator logs=====: =====Events in openshift-operators=====: LAST SEEN TYPE REASON OBJECT MESSAGE 6m39s Warning AppliedWithWarnings installplan/install-glp6r 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.1" (CustomResourceDefinition "virtualservices.networking.istio.io"): unrecognized format "binary" 6m35s Warning AppliedWithWarnings installplan/install-glp6r 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.1" (CustomResourceDefinition "ztunnels.sailoperator.io"): sailoperator.io/v1alpha1 ZTunnel is deprecated; use sailoperator.io/v1 ZTunnel 6m12s Normal Scheduled pod/kiali-operator-5867bbd9bf-94jpn Successfully assigned openshift-operators/kiali-operator-5867bbd9bf-94jpn to ip-10-0-60-120.us-east-2.compute.internal 6m11s Normal AddedInterface pod/kiali-operator-5867bbd9bf-94jpn Add eth0 [10.128.2.14/23] from ovn-kubernetes 6m11s Normal Pulling pod/kiali-operator-5867bbd9bf-94jpn Pulling image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:ee89b53ebdd6b92eccd6c4a238a43d57d245ab14e8402a86e5ecd53046d90485" 6m3s Normal Pulled pod/kiali-operator-5867bbd9bf-94jpn Successfully pulled image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:ee89b53ebdd6b92eccd6c4a238a43d57d245ab14e8402a86e5ecd53046d90485" in 7.805s (7.805s including waiting). Image size: 751082511 bytes. 6m3s Normal Created pod/kiali-operator-5867bbd9bf-94jpn Created container: operator 6m3s Normal Started pod/kiali-operator-5867bbd9bf-94jpn Started container operator 6m12s Normal SuccessfulCreate replicaset/kiali-operator-5867bbd9bf Created pod: kiali-operator-5867bbd9bf-94jpn 6m12s Normal ScalingReplicaSet deployment/kiali-operator Scaled up replica set kiali-operator-5867bbd9bf from 0 to 1 6m12s Normal RequirementsUnknown clusterserviceversion/kiali-operator.v2.17.2 requirements not yet checked 6m12s Normal AllRequirementsMet clusterserviceversion/kiali-operator.v2.17.2 all requirements found, attempting install 6m12s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.2 waiting for install components to report healthy 6m12s Normal InstallWaiting clusterserviceversion/kiali-operator.v2.17.2 installing: waiting for deployment kiali-operator to become ready: deployment "kiali-operator" not available: Deployment does not have minimum availability. 5m31s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.2 install strategy completed with no errors 6m49s Normal LeaderElection lease/sail-operator-lock servicemesh-operator3-6fd8c97988-59k9k_d79b89f2-a32e-4974-a516-8a244a18f62c became leader 6m53s Normal Scheduled pod/servicemesh-operator3-6fd8c97988-59k9k Successfully assigned openshift-operators/servicemesh-operator3-6fd8c97988-59k9k to ip-10-0-60-120.us-east-2.compute.internal 6m53s Normal AddedInterface pod/servicemesh-operator3-6fd8c97988-59k9k Add eth0 [10.128.2.12/23] from ovn-kubernetes 6m53s Normal Pulling pod/servicemesh-operator3-6fd8c97988-59k9k Pulling image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365" 6m49s Normal Pulled pod/servicemesh-operator3-6fd8c97988-59k9k Successfully pulled image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365" in 3.363s (3.363s including waiting). Image size: 161863556 bytes. 6m49s Normal Created pod/servicemesh-operator3-6fd8c97988-59k9k Created container: sail-operator 6m49s Normal Started pod/servicemesh-operator3-6fd8c97988-59k9k Started container sail-operator 6m53s Normal SuccessfulCreate replicaset/servicemesh-operator3-6fd8c97988 Created pod: servicemesh-operator3-6fd8c97988-59k9k 6m53s Normal ScalingReplicaSet deployment/servicemesh-operator3 Scaled up replica set servicemesh-operator3-6fd8c97988 from 0 to 1 6m57s Normal RequirementsUnknown clusterserviceversion/servicemeshoperator3.v3.2.1 requirements not yet checked 6m54s Normal RequirementsNotMet clusterserviceversion/servicemeshoperator3.v3.2.1 one or more requirements couldn't be found 6m53s Normal AllRequirementsMet clusterserviceversion/servicemeshoperator3.v3.2.1 all requirements found, attempting install 6m53s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.1 waiting for install components to report healthy 6m53s Normal InstallWaiting clusterserviceversion/servicemeshoperator3.v3.2.1 installing: waiting for deployment servicemesh-operator3 to become ready: deployment "servicemesh-operator3" not available: Deployment does not have minimum availability. 6m36s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.1 install strategy completed with no errors =====Pods in openshift-operators=====: NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES kiali-operator-5867bbd9bf-94jpn 1/1 Running 0 6m13s 10.128.2.14 ip-10-0-60-120.us-east-2.compute.internal servicemesh-operator3-6fd8c97988-59k9k 1/1 Running 0 6m54s 10.128.2.12 ip-10-0-60-120.us-east-2.compute.internal =====Operator Deployment describe=====: Name: servicemesh-operator3 Namespace: openshift-operators CreationTimestamp: Wed, 14 Jan 2026 15:52:07 +0000 Labels: app.kubernetes.io/component=sail-operator app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/instance=servicemesh-operator3 app.kubernetes.io/managed-by=helm app.kubernetes.io/name=deployment app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 olm.deployment-spec-hash=4AmHwsuIcHpeCGTVeXn5qf4iKSNfuhMambb10V olm.managed=true olm.owner=servicemeshoperator3.v3.2.1 olm.owner.kind=ClusterServiceVersion olm.owner.namespace=openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators= Annotations: deployment.kubernetes.io/revision: 1 Selector: app.kubernetes.io/created-by=servicemeshoperator3,app.kubernetes.io/part-of=servicemeshoperator3,control-plane=servicemesh-operator3 Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable StrategyType: RollingUpdate MinReadySeconds: 0 RollingUpdateStrategy: 25% max unavailable, 25% max surge Pod Template: Labels: app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 Annotations: alm-examples: [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 createdAt: 2025-11-26T08:45:22Z description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift... features.operators.openshift.io/cnf: false features.operators.openshift.io/cni: true features.operators.openshift.io/csi: false features.operators.openshift.io/disconnected: true features.operators.openshift.io/fips-compliant: true features.operators.openshift.io/proxy-aware: false features.operators.openshift.io/tls-profiles: false features.operators.openshift.io/token-auth-aws: false features.operators.openshift.io/token-auth-azure: false features.operators.openshift.io/token-auth-gcp: false images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d... images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54508ddeb570a45b5576d4e128fc6f4114e3bb0ed8cf600f2bcbf80d8b4f6b8a images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:c018e5c2fe81d6b6577cbf32a9aa3f909c69c24ed411e4fa3fa7b4a891ce017e images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:892c857d7ea35e60e13a277f5ab1268a4068c316353403a2846f116235d52a7b images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:836c53299b170a1ef0bc8ce958da2abe14a48b8d84f9298e7c6b3d940fa8a1cc images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:18897281e5ab5198506c4dd5cc0f5a96245794e6b33f63a2a4a3... images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe7295... images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f... images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d07... images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecc... images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: operatorframework.io/properties: {"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","valu... operators.openshift.io/valid-subscription: ["OpenShift Container Platform", "OpenShift Platform Plus"] operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: ["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io... operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. Service Account: servicemesh-operator3 Containers: sail-operator: Image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 Port: Host Port: Command: /usr/local/bin/sail-operator Args: --health-probe-bind-address=:8081 --metrics-bind-address=:8443 --zap-log-level=info Limits: cpu: 500m memory: 1Gi Requests: cpu: 10m memory: 64Mi Liveness: http-get http://:8081/healthz delay=15s timeout=1s period=20s #success=1 #failure=3 Readiness: http-get http://:8081/readyz delay=5s timeout=1s period=10s #success=1 #failure=3 Environment: OPERATOR_CONDITION_NAME: servicemeshoperator3.v3.2.1 Mounts: /etc/sail-operator from operator-config (ro) Volumes: operator-config: Type: DownwardAPI (a volume populated by information about the pod) Items: metadata.annotations -> config.properties Node-Selectors: Tolerations: Conditions: Type Status Reason ---- ------ ------ Available True MinimumReplicasAvailable Progressing True NewReplicaSetAvailable OldReplicaSets: NewReplicaSet: servicemesh-operator3-6fd8c97988 (1/1 replicas created) Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal ScalingReplicaSet 6m54s deployment-controller Scaled up replica set servicemesh-operator3-6fd8c97988 from 0 to 1 ========================================================= =====Istio YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istio default -o yaml: Error from server (NotFound): istios.sailoperator.io "default" not found , output: Error from server (NotFound): istios.sailoperator.io "default" not found =====Pods in istio-system=====: =====Istiod logs=====: error executing command: /usr/bin/sh -c oc -n istio-system logs deploy/istiod --since=2m0s: error: error from server (NotFound): deployments.apps "istiod" not found in namespace "istio-system" =====Events in istio-system=====: =====Istioctl Proxy Status=====: failed to get proxy status: error executing command: /usr/bin/sh -c /go/src/github.com/openshift-service-mesh/sail-operator/bin/istioctl proxy-status: Error: no running Istio pods in "istio-system" ========================================================= =====IstioCNI YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istiocni default -o yaml: Error from server (NotFound): istiocnis.sailoperator.io "default" not found , output: Error from server (NotFound): istiocnis.sailoperator.io "default" not found =====Istio CNI DaemonSet YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc -n istio-cni get daemonset istio-cni-node -o yaml: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Events in istio-cni=====: =====Pods in istio-cni=====: =====Istio CNI DaemonSet describe=====: error describing resource: error executing command: /usr/bin/sh -c oc -n istio-cni describe daemonset istio-cni-node: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Istio CNI logs=====: error executing command: /usr/bin/sh -c oc -n istio-cni logs daemonset/istio-cni-node --since=2m0s: error: error from server (NotFound): daemonsets.apps "istio-cni-node" not found in namespace "istio-cni" ========================================================= =====CA certs in istio-system=====: error getting secret: error executing command: /usr/bin/sh -c oc -n istio-system get secret cacerts -o yaml: Error from server (NotFound): secrets "cacerts" not found , output Error from server (NotFound): secrets "cacerts" not found ========================================================= =====Namespace sleep (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sleep -o yaml: Error from server (NotFound): namespaces "sleep" not found , output: Error from server (NotFound): namespaces "sleep" not found =====Namespace httpbin (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace httpbin -o yaml: Error from server (NotFound): namespaces "httpbin" not found , output: Error from server (NotFound): namespaces "httpbin" not found =====Namespace sample (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sample -o yaml: Error from server (NotFound): namespaces "sample" not found , output: Error from server (NotFound): namespaces "sample" not found ========================================================= STEP: Cleaning up the cert-manager Namespace @ 01/14/26 15:59:05.109 STEP: Cleaning up the cert-manager-operator Namespace @ 01/14/26 15:59:05.124 STEP: Cleaning up the istio-cni Namespace @ 01/14/26 15:59:05.139 STEP: Cleaning up the istio-csr Namespace @ 01/14/26 15:59:05.154 STEP: Cleaning up the istio-system Namespace @ 01/14/26 15:59:05.169 STEP: Cleaning up the cert-manager-cainjector ClusterRole @ 01/14/26 15:59:05.186 STEP: Cleaning up the cert-manager-cluster-view ClusterRole @ 01/14/26 15:59:05.202 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRole @ 01/14/26 15:59:05.221 STEP: Cleaning up the cert-manager-controller-certificates ClusterRole @ 01/14/26 15:59:05.249 STEP: Cleaning up the cert-manager-controller-certificatesigningrequests ClusterRole @ 01/14/26 15:59:05.267 STEP: Cleaning up the cert-manager-controller-challenges ClusterRole @ 01/14/26 15:59:05.287 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRole @ 01/14/26 15:59:05.311 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRole @ 01/14/26 15:59:05.329 STEP: Cleaning up the cert-manager-controller-issuers ClusterRole @ 01/14/26 15:59:05.353 STEP: Cleaning up the cert-manager-controller-orders ClusterRole @ 01/14/26 15:59:05.374 STEP: Cleaning up the cert-manager-edit ClusterRole @ 01/14/26 15:59:05.389 STEP: Cleaning up the cert-manager-view ClusterRole @ 01/14/26 15:59:05.404 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRole @ 01/14/26 15:59:05.602 STEP: Cleaning up the cert-manager-cainjector ClusterRoleBinding @ 01/14/26 15:59:05.805 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRoleBinding @ 01/14/26 15:59:05.821 STEP: Cleaning up the cert-manager-controller-certificates ClusterRoleBinding @ 01/14/26 15:59:05.836 STEP: Cleaning up the cert-manager-controller-certificatesigningrequests ClusterRoleBinding @ 01/14/26 15:59:05.854 STEP: Cleaning up the cert-manager-controller-challenges ClusterRoleBinding @ 01/14/26 15:59:05.869 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRoleBinding @ 01/14/26 15:59:05.883 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRoleBinding @ 01/14/26 15:59:05.9 STEP: Cleaning up the cert-manager-controller-issuers ClusterRoleBinding @ 01/14/26 15:59:05.913 STEP: Cleaning up the cert-manager-controller-orders ClusterRoleBinding @ 01/14/26 15:59:05.927 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRoleBinding @ 01/14/26 15:59:05.942 STEP: Waiting for resources to be deleted @ 01/14/26 15:59:05.956 * Finished cleaning up resources • [FAILED] [25.965 seconds] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] [BeforeAll] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:105 [It] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 [FAILED] Issuer creation failed Expected success, but got an error: <*fmt.wrapError | 0xc0022b58e0>: error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority { msg: "error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", err: <*errors.errorString | 0xc000ca6c70>{ s: "error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", }, } In [BeforeAll] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 01/14/26 15:59:00.375 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when custom resource for the IstioCSR is created [It] has IstioCSR pods running [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] updates the status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] doesn't continuously reconcile the IstioCNI CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] updates the Istio CR status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] deploys istiod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] doesn't continuously reconcile the Istio CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] waits for sample pods to be ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] can access the httpbin service from the sleep pod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is deleted [It] removes everything from the namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is deleted [It] removes everything from the CNI namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 @ 01/14/26 15:59:25.848 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes subscription from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 @ 01/14/26 15:59:25.849 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes operatorgroup from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 @ 01/14/26 15:59:25.849 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes rolebinding cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 @ 01/14/26 15:59:25.849 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes role cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 @ 01/14/26 15:59:25.849 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCSR is deleted [It] removes cert-manager-istio-csr resources from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 @ 01/14/26 15:59:25.849 ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.002 seconds] ------------------------------ Summarizing 1 Failure: [FAIL] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 Ran 3 of 18 Specs in 65.647 seconds FAIL! -- 2 Passed | 1 Failed | 0 Pending | 15 Skipped --- FAIL: TestCertManager (65.65s) FAIL 2026-01-14T15:59:25.862512Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Control Plane Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane ======================================================================================================================== Random Seed: 1768406269 Will run 47 of 59 specs SSSSSSSSSSSS ------------------------------ Control Plane Installation defaulting IstioCNI no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:51 * IstioCNI created • [1.242 seconds] ------------------------------ Control Plane Installation defaulting IstioCNI empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:52 * IstioCNI created • [0.159 seconds] ------------------------------ Control Plane Installation defaulting Istio no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:74 * Istio created • [0.169 seconds] ------------------------------ Control Plane Installation defaulting Istio empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:75 * Istio created • [0.160 seconds] ------------------------------ Control Plane Installation defaulting Istio empty updateStrategy [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:76 * Istio created • [0.151 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [8.213 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.013 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.013 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.520 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.27.3 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.144 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [6.098 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.384 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [30.569 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [13.725 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.235 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.231 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 01/14/26 16:01:04.184 STEP: Cleaning up the istio-system Namespace @ 01/14/26 16:01:04.2 STEP: Cleaning up the sample Namespace @ 01/14/26 16:01:04.216 STEP: Waiting for resources to be deleted @ 01/14/26 16:01:04.232 * Finished cleaning up resources • [14.669 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.26.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [9.203 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.013 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [29.428 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.26.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.148 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [9.137 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.357 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.017 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [30.550 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [8.595 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.243 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.248 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 01/14/26 16:02:48.779 STEP: Cleaning up the istio-system Namespace @ 01/14/26 16:02:48.794 STEP: Cleaning up the sample Namespace @ 01/14/26 16:02:48.809 STEP: Waiting for resources to be deleted @ 01/14/26 16:02:48.824 * Finished cleaning up resources • [29.633 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.24.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [8.210 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.012 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.013 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.318 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.24.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.145 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [5.080 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.329 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.013 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [30.369 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [7.623 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.225 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.233 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 01/14/26 16:04:44.919 STEP: Cleaning up the istio-system Namespace @ 01/14/26 16:04:44.935 STEP: Cleaning up the sample Namespace @ 01/14/26 16:04:44.953 STEP: Waiting for resources to be deleted @ 01/14/26 16:04:44.969 * Finished cleaning up resources • [30.556 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.003 seconds] ------------------------------ Ran 47 of 59 Specs in 346.459 seconds SUCCESS! -- 47 Passed | 0 Failed | 0 Pending | 12 Skipped PASS 2026-01-14T16:05:12.354390Z info loading supported istio versions from versions.ossm.yaml PASS 2026-01-14T16:05:12.370884Z info loading supported istio versions from versions.ossm.yaml PASS 2026-01-14T16:05:12.389134Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Multiple Control Planes Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane ======================================================================================================================================= Random Seed: 1768406269 Will run 42 of 42 specs ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.430 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.175 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.243 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.252 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.056 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [5.080 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [1.117 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [0.983 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [0.959 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [9.146 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [2.051 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.023 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.324 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 01/14/26 16:05:41.016 STEP: Cleaning up the mesh1 IstioRevision @ 01/14/26 16:05:41.044 STEP: Cleaning up the mesh2 IstioRevision @ 01/14/26 16:05:41.06 STEP: Cleaning up the mesh1 Istio @ 01/14/26 16:05:41.1 STEP: Cleaning up the mesh2 Istio @ 01/14/26 16:05:41.121 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 01/14/26 16:05:41.177 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 01/14/26 16:05:41.223 STEP: Waiting for resources to be deleted @ 01/14/26 16:05:41.421 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 01/14/26 16:05:42.784 STEP: Cleaning up the app2a Namespace @ 01/14/26 16:05:42.812 STEP: Cleaning up the app2b Namespace @ 01/14/26 16:05:42.829 STEP: Cleaning up the istio-cni Namespace @ 01/14/26 16:05:42.843 STEP: Cleaning up the istio-system1 Namespace @ 01/14/26 16:05:42.859 STEP: Cleaning up the istio-system2 Namespace @ 01/14/26 16:05:42.874 STEP: Waiting for resources to be deleted @ 01/14/26 16:05:42.889 * Finished cleaning up resources • [16.754 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.457 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [4.214 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.248 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.251 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.056 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [5.076 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [0.992 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [1.002 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.040 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [2.048 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [5.087 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.024 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.308 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 01/14/26 16:06:22.575 STEP: Cleaning up the mesh1 IstioRevision @ 01/14/26 16:06:22.603 STEP: Cleaning up the mesh2 IstioRevision @ 01/14/26 16:06:22.62 STEP: Cleaning up the mesh1 Istio @ 01/14/26 16:06:22.66 STEP: Cleaning up the mesh2 Istio @ 01/14/26 16:06:22.675 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 01/14/26 16:06:22.703 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 01/14/26 16:06:22.738 STEP: Waiting for resources to be deleted @ 01/14/26 16:06:22.938 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 01/14/26 16:06:24.383 STEP: Cleaning up the app2a Namespace @ 01/14/26 16:06:24.399 STEP: Cleaning up the app2b Namespace @ 01/14/26 16:06:24.414 STEP: Cleaning up the istio-cni Namespace @ 01/14/26 16:06:24.429 STEP: Cleaning up the istio-system1 Namespace @ 01/14/26 16:06:24.444 STEP: Cleaning up the istio-system2 Namespace @ 01/14/26 16:06:24.458 STEP: Waiting for resources to be deleted @ 01/14/26 16:06:24.477 * Finished cleaning up resources • [31.998 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.518 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [4.211 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.261 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.287 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.076 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [4.086 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [0.968 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [0.945 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [0.964 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [3.083 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [3.086 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.031 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.308 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 01/14/26 16:07:17.446 STEP: Cleaning up the mesh1 IstioRevision @ 01/14/26 16:07:17.482 STEP: Cleaning up the mesh2 IstioRevision @ 01/14/26 16:07:17.502 STEP: Cleaning up the mesh1 Istio @ 01/14/26 16:07:17.606 STEP: Cleaning up the mesh2 Istio @ 01/14/26 16:07:17.628 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 01/14/26 16:07:17.695 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 01/14/26 16:07:17.726 STEP: Waiting for resources to be deleted @ 01/14/26 16:07:18.003 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 01/14/26 16:07:19.281 STEP: Cleaning up the app2a Namespace @ 01/14/26 16:07:19.301 STEP: Cleaning up the app2b Namespace @ 01/14/26 16:07:19.321 STEP: Cleaning up the istio-cni Namespace @ 01/14/26 16:07:19.341 STEP: Cleaning up the istio-system1 Namespace @ 01/14/26 16:07:19.364 STEP: Cleaning up the istio-system2 Namespace @ 01/14/26 16:07:19.383 STEP: Waiting for resources to be deleted @ 01/14/26 16:07:19.403 * Finished cleaning up resources • [28.473 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.003 seconds] ------------------------------ Ran 42 of 42 Specs in 152.696 seconds SUCCESS! -- 42 Passed | 0 Failed | 0 Pending | 0 Skipped PASS ************ Running Setup ************ Initializing k8s client Running Suite: Operator Installation Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator ============================================================================================================================ Random Seed: 1768406269 Will run 5 of 5 specs ------------------------------ Operator installation deploys all the CRDs [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:69 * Istio CRDs are present • [1.274 seconds] ------------------------------ Operator installation updates the CRDs status to Established [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:76 * CRDs are Established • [1.218 seconds] ------------------------------ Operator installation istio crd is present [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:84 * Istio CRD is present • [0.227 seconds] ------------------------------ Operator installation starts successfully [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:91 • [0.017 seconds] ------------------------------ Operator installation serves metrics securely [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:96 STEP: creating a ClusterRoleBinding for the service account to allow access to metrics @ 01/14/26 16:07:47.863 STEP: validating that the metrics service is available @ 01/14/26 16:07:47.989 STEP: getting the service account token @ 01/14/26 16:07:48.082 STEP: waiting for the metrics endpoint to be ready @ 01/14/26 16:07:48.174 STEP: verifying that the controller manager is serving the metrics server @ 01/14/26 16:07:48.295 STEP: creating the curl-metrics namespace @ 01/14/26 16:07:48.495 STEP: creating the curl-metrics pod to access the metrics endpoint @ 01/14/26 16:07:48.61 STEP: waiting for the curl-metrics pod to complete. @ 01/14/26 16:07:48.737 STEP: getting the metrics by checking curl-metrics logs @ 01/14/26 16:07:54.26 STEP: getting the curl-metrics logs @ 01/14/26 16:07:54.26 STEP: Cleaning up the curl-metrics Namespace @ 01/14/26 16:07:55.223 STEP: Cleaning up the metrics-reader-rolebinding ClusterRoleBinding @ 01/14/26 16:07:55.244 STEP: Waiting for resources to be deleted @ 01/14/26 16:07:55.263 * Finished cleaning up resources • [13.792 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.001 seconds] ------------------------------ Ran 5 of 5 Specs in 16.529 seconds SUCCESS! -- 5 Passed | 0 Failed | 0 Pending | 0 Skipped PASS Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Ginkgo ran 7 suites in 10m11.769182546s There were failures detected in the following suites: cert-manager ./tests/e2e/cert-manager Test Suite Failed exit status 1 JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml make: *** [Makefile.core.mk:223: test.e2e.ocp] Error 1 Patching Tests Result File: /logs/artifacts/junit-sail-e2e.xml Checking if yq exists yq version: yq (https://github.com/mikefarah/yq/) version v4.45.4 Mapping Test Suite Name To: ServiceMesh-lp-interop