Now using project "default" on server "https://api.ci-op-3hxf0bc8-3c8f3.cspilp.interop.ccitredhat.com:6443". Fetching istioctl from https://github.com/istio/istio/releases/download/1.26.2/istioctl-1.26.2-linux-amd64.tar.gz istioctl extracted to /go/src/github.com/openshift-service-mesh/sail-operator/bin GINKGO_FLAGS="-v --keep-going --label-filter=smoke&&!ambient" /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/integ-suite-ocp.sh + echo 'Running integration tests' Running integration tests + '[' -z /tmp/secret/kubeconfig ']' + KUBECONFIG=/tmp/secret/kubeconfig + ./tests/e2e/common-operator-integ-suite.sh --ocp Running on OCP Skipping build Skipping deploy Setting Istio manifest file: chart/samples/istio-sample.yaml Validating OpenShift cluster operators are stable... All cluster operators are stable. go: downloading github.com/onsi/ginkgo/v2 v2.24.0 go: downloading go.uber.org/automaxprocs v1.6.0 go: downloading golang.org/x/tools v0.36.0 go: downloading github.com/go-task/slim-sprig/v3 v3.0.0 go: downloading github.com/Masterminds/semver/v3 v3.4.0 go: downloading github.com/google/pprof v0.0.0-20250607225305-033d6d78b36a go: downloading github.com/Masterminds/semver v1.5.0 2026/01/21 04:16:35 maxprocs: Leaving GOMAXPROCS=16: CPU quota undefined go: downloading k8s.io/api v0.34.1 go: downloading k8s.io/apimachinery v0.34.1 go: downloading sigs.k8s.io/controller-runtime v0.22.3 go: downloading github.com/onsi/gomega v1.38.0 go: downloading github.com/go-logr/logr v1.4.3 go: downloading k8s.io/apiextensions-apiserver v0.34.1 go: downloading gomodules.xyz/jsonpatch/v2 v2.5.0 go: downloading github.com/openshift-service-mesh/istio v0.0.0-20251029174156-37b7f6000f70 go: downloading k8s.io/client-go v0.34.1 go: downloading gopkg.in/yaml.v3 v3.0.1 go: downloading golang.org/x/sys v0.35.0 go: downloading github.com/k8snetworkplumbingwg/network-attachment-definition-client v1.4.0 go: downloading istio.io/client-go v1.27.3 go: downloading github.com/google/go-cmp v0.7.0 go: downloading github.com/evanphx/json-patch/v5 v5.9.11 go: downloading github.com/evanphx/json-patch v5.9.11+incompatible go: downloading k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 go: downloading github.com/gogo/protobuf v1.3.2 go: downloading sigs.k8s.io/randfill v1.0.0 go: downloading k8s.io/klog/v2 v2.130.1 go: downloading sigs.k8s.io/structured-merge-diff/v6 v6.3.0 go: downloading golang.org/x/net v0.43.0 go: downloading sigs.k8s.io/json v0.0.0-20241014173422-cfa47c3a1cc8 go: downloading k8s.io/kube-openapi v0.0.0-20250710124328-f3f2b991d03b go: downloading istio.io/api v1.27.2-0.20251010085937-bc3692c751f3 go: downloading gopkg.in/inf.v0 v0.9.1 go: downloading go.yaml.in/yaml/v2 v2.4.2 go: downloading sigs.k8s.io/yaml v1.6.0 go: downloading github.com/json-iterator/go v1.1.12 go: downloading golang.org/x/text v0.28.0 go: downloading github.com/google/gnostic-models v0.7.0 go: downloading go.yaml.in/yaml/v3 v3.0.4 go: downloading github.com/go-openapi/jsonreference v0.21.0 go: downloading github.com/go-openapi/swag v0.23.1 go: downloading github.com/munnerz/goautoneg v0.0.0-20191010083416-a7dc8b61c822 go: downloading github.com/spf13/pflag v1.0.7 go: downloading golang.org/x/term v0.34.0 go: downloading github.com/prometheus/client_golang v1.23.0 go: downloading github.com/fxamacker/cbor/v2 v2.9.0 go: downloading google.golang.org/protobuf v1.36.7 go: downloading github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc go: downloading golang.org/x/time v0.12.0 go: downloading github.com/google/btree v1.1.3 go: downloading golang.org/x/sync v0.16.0 go: downloading golang.org/x/oauth2 v0.30.0 go: downloading github.com/go-openapi/jsonpointer v0.21.1 go: downloading github.com/google/uuid v1.6.0 go: downloading github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd go: downloading github.com/modern-go/reflect2 v1.0.3-0.20250322232337-35a7c28c31ee go: downloading github.com/fsnotify/fsnotify v1.9.0 go: downloading github.com/mailru/easyjson v0.9.0 go: downloading github.com/pmezard/go-difflib v1.0.1-0.20181226105442-5d4384ee4fb2 go: downloading github.com/x448/float16 v0.8.4 go: downloading github.com/prometheus/common v0.65.0 go: downloading github.com/prometheus/client_model v0.6.2 go: downloading github.com/beorn7/perks v1.0.1 go: downloading github.com/cespare/xxhash/v2 v2.3.0 go: downloading github.com/prometheus/procfs v0.17.0 go: downloading github.com/josharian/intern v1.0.0 go: downloading github.com/golang/protobuf v1.5.4 go: downloading google.golang.org/genproto/googleapis/api v0.0.0-20250811230008-5f3141c8851a go: downloading gopkg.in/evanphx/json-patch.v4 v4.12.0 go: downloading github.com/emicklei/go-restful/v3 v3.12.2 go: downloading github.com/pkg/errors v0.9.1 go: downloading gopkg.in/natefinch/lumberjack.v2 v2.2.1 go: downloading github.com/spf13/cobra v1.9.1 go: downloading go.uber.org/zap v1.27.0 go: downloading google.golang.org/grpc v1.74.2 go: downloading go.uber.org/multierr v1.11.0 2026-01-21T04:17:08.631522Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Ambient Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/ambient ============================================================================================================= Random Seed: 1768968995 Will run 0 of 45 specs SSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSSS ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.003 seconds] ------------------------------ Ran 0 of 45 Specs in 0.001 seconds SUCCESS! -- 0 Passed | 0 Failed | 0 Pending | 45 Skipped PASS 2026-01-21T04:17:11.464146Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Cert Manager Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager ======================================================================================================================= Random Seed: 1768968995 Will run 18 of 18 specs ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed should have subscription created successfully [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:89 • [5.938 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when the Cert Manager Operator is deployed verifies all cert-manager pods are Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:95 * All cert-manager pods are ready • [35.823 seconds] ------------------------------ Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 * Cert Manager subscription patched [FAILED] in [BeforeAll] - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 01/21/26 04:17:53.734 The test run has failures and the debug information is as follows: =====Operator Deployment YAML=====: apiVersion: apps/v1 kind: Deployment metadata: annotations: deployment.kubernetes.io/revision: "1" creationTimestamp: "2026-01-21T04:10:47Z" generation: 1 labels: app.kubernetes.io/component: sail-operator app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/instance: servicemesh-operator3 app.kubernetes.io/managed-by: helm app.kubernetes.io/name: deployment app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 olm.deployment-spec-hash: 4AmHwsuIcHpeCGTVeXn5qf4iKSNfuhMambb10V olm.managed: "true" olm.owner: servicemeshoperator3.v3.2.1 olm.owner.kind: ClusterServiceVersion olm.owner.namespace: openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators: "" name: servicemesh-operator3 namespace: openshift-operators ownerReferences: - apiVersion: operators.coreos.com/v1alpha1 blockOwnerDeletion: false controller: false kind: ClusterServiceVersion name: servicemeshoperator3.v3.2.1 uid: 54ca62c6-ed75-4c3d-a44a-1af95a2ae5fe resourceVersion: "34091" uid: 903106d6-247c-4a37-bab2-a95b1a6a539e spec: progressDeadlineSeconds: 600 replicas: 1 revisionHistoryLimit: 1 selector: matchLabels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 strategy: rollingUpdate: maxSurge: 25% maxUnavailable: 25% type: RollingUpdate template: metadata: annotations: alm-examples: |- [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 createdAt: "2025-11-26T08:45:22Z" description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift Service Mesh is based on the open source Istio project. features.operators.openshift.io/cnf: "false" features.operators.openshift.io/cni: "true" features.operators.openshift.io/csi: "false" features.operators.openshift.io/disconnected: "true" features.operators.openshift.io/fips-compliant: "true" features.operators.openshift.io/proxy-aware: "false" features.operators.openshift.io/tls-profiles: "false" features.operators.openshift.io/token-auth-aws: "false" features.operators.openshift.io/token-auth-azure: "false" features.operators.openshift.io/token-auth-gcp: "false" images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d5940362b3f70 images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54508ddeb570a45b5576d4e128fc6f4114e3bb0ed8cf600f2bcbf80d8b4f6b8a images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:c018e5c2fe81d6b6577cbf32a9aa3f909c69c24ed411e4fa3fa7b4a891ce017e images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:892c857d7ea35e60e13a277f5ab1268a4068c316353403a2846f116235d52a7b images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:836c53299b170a1ef0bc8ce958da2abe14a48b8d84f9298e7c6b3d940fa8a1cc images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:18897281e5ab5198506c4dd5cc0f5a96245794e6b33f63a2a4a3195bf23fbf60 images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe729500902d0b images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f31fa2ba4 images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d0782970573 images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecceae29730 images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: "" operatorframework.io/properties: '{"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"DestinationRule","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"EnvoyFilter","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Gateway","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ProxyConfig","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"ServiceEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"Sidecar","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"VirtualService","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadEntry","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1alpha3"}},{"type":"olm.gvk","value":{"group":"networking.istio.io","kind":"WorkloadGroup","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"Istio","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioCNI","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevision","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"IstioRevisionTag","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1"}},{"type":"olm.gvk","value":{"group":"sailoperator.io","kind":"ZTunnel","version":"v1alpha1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"AuthorizationPolicy","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"PeerAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1"}},{"type":"olm.gvk","value":{"group":"security.istio.io","kind":"RequestAuthentication","version":"v1beta1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1"}},{"type":"olm.gvk","value":{"group":"telemetry.istio.io","kind":"Telemetry","version":"v1alpha1"}},{"type":"olm.package","value":{"packageName":"servicemeshoperator3","version":"3.2.1"}}]}' operators.openshift.io/valid-subscription: '["OpenShift Container Platform", "OpenShift Platform Plus"]' operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: '["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io","proxyconfigs.networking.istio.io","serviceentries.networking.istio.io","sidecars.networking.istio.io","virtualservices.networking.istio.io","workloadentries.networking.istio.io","workloadgroups.networking.istio.io","authorizationpolicies.security.istio.io","peerauthentications.security.istio.io","requestauthentications.security.istio.io","telemetries.telemetry.istio.io"]' operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. labels: app.kubernetes.io/created-by: servicemeshoperator3 app.kubernetes.io/part-of: servicemeshoperator3 control-plane: servicemesh-operator3 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchExpressions: - key: kubernetes.io/arch operator: In values: - amd64 - arm64 - ppc64le - s390x - key: kubernetes.io/os operator: In values: - linux containers: - args: - --health-probe-bind-address=:8081 - --metrics-bind-address=:8443 - --zap-log-level=info command: - /usr/local/bin/sail-operator env: - name: OPERATOR_CONDITION_NAME value: servicemeshoperator3.v3.2.1 image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: /healthz port: 8081 scheme: HTTP initialDelaySeconds: 15 periodSeconds: 20 successThreshold: 1 timeoutSeconds: 1 name: sail-operator readinessProbe: failureThreshold: 3 httpGet: path: /readyz port: 8081 scheme: HTTP initialDelaySeconds: 5 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: limits: cpu: 500m memory: 1Gi requests: cpu: 10m memory: 64Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /etc/sail-operator name: operator-config readOnly: true dnsPolicy: ClusterFirst restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true serviceAccount: servicemesh-operator3 serviceAccountName: servicemesh-operator3 terminationGracePeriodSeconds: 10 volumes: - downwardAPI: defaultMode: 420 items: - fieldRef: apiVersion: v1 fieldPath: metadata.annotations path: config.properties name: operator-config status: availableReplicas: 1 conditions: - lastTransitionTime: "2026-01-21T04:11:04Z" lastUpdateTime: "2026-01-21T04:11:04Z" message: Deployment has minimum availability. reason: MinimumReplicasAvailable status: "True" type: Available - lastTransitionTime: "2026-01-21T04:10:48Z" lastUpdateTime: "2026-01-21T04:11:04Z" message: ReplicaSet "servicemesh-operator3-6fd8c97988" has successfully progressed. reason: NewReplicaSetAvailable status: "True" type: Progressing observedGeneration: 1 readyReplicas: 1 replicas: 1 updatedReplicas: 1 =====Operator logs=====: =====Events in openshift-operators=====: LAST SEEN TYPE REASON OBJECT MESSAGE 6m52s Warning AppliedWithWarnings installplan/install-5kbsl 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.1" (CustomResourceDefinition "virtualservices.networking.istio.io"): unrecognized format "binary" 6m48s Warning AppliedWithWarnings installplan/install-5kbsl 1 warning(s) generated during installation of operator "servicemeshoperator3.v3.2.1" (CustomResourceDefinition "ztunnels.sailoperator.io"): sailoperator.io/v1alpha1 ZTunnel is deprecated; use sailoperator.io/v1 ZTunnel 6m3s Normal Scheduled pod/kiali-operator-5867bbd9bf-cx8mq Successfully assigned openshift-operators/kiali-operator-5867bbd9bf-cx8mq to ip-10-0-5-243.us-east-2.compute.internal 6m3s Normal AddedInterface pod/kiali-operator-5867bbd9bf-cx8mq Add eth0 [10.131.0.21/23] from ovn-kubernetes 6m3s Normal Pulling pod/kiali-operator-5867bbd9bf-cx8mq Pulling image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:ee89b53ebdd6b92eccd6c4a238a43d57d245ab14e8402a86e5ecd53046d90485" 5m54s Normal Pulled pod/kiali-operator-5867bbd9bf-cx8mq Successfully pulled image "registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:ee89b53ebdd6b92eccd6c4a238a43d57d245ab14e8402a86e5ecd53046d90485" in 8.501s (8.501s including waiting). Image size: 751082511 bytes. 5m54s Normal Created pod/kiali-operator-5867bbd9bf-cx8mq Created container: operator 5m54s Normal Started pod/kiali-operator-5867bbd9bf-cx8mq Started container operator 6m3s Normal SuccessfulCreate replicaset/kiali-operator-5867bbd9bf Created pod: kiali-operator-5867bbd9bf-cx8mq 6m3s Normal ScalingReplicaSet deployment/kiali-operator Scaled up replica set kiali-operator-5867bbd9bf from 0 to 1 6m4s Normal RequirementsUnknown clusterserviceversion/kiali-operator.v2.17.2 requirements not yet checked 6m3s Normal AllRequirementsMet clusterserviceversion/kiali-operator.v2.17.2 all requirements found, attempting install 6m3s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.2 waiting for install components to report healthy 6m3s Normal InstallWaiting clusterserviceversion/kiali-operator.v2.17.2 installing: waiting for deployment kiali-operator to become ready: waiting for spec update of deployment "kiali-operator" to be observed... 6m3s Normal InstallWaiting clusterserviceversion/kiali-operator.v2.17.2 installing: waiting for deployment kiali-operator to become ready: deployment "kiali-operator" not available: Deployment does not have minimum availability. 5m23s Normal InstallSucceeded clusterserviceversion/kiali-operator.v2.17.2 install strategy completed with no errors 7m1s Normal LeaderElection lease/sail-operator-lock servicemesh-operator3-6fd8c97988-bbksq_3ef97279-269e-445e-aa2b-416991aae7ec became leader 7m6s Normal Scheduled pod/servicemesh-operator3-6fd8c97988-bbksq Successfully assigned openshift-operators/servicemesh-operator3-6fd8c97988-bbksq to ip-10-0-5-243.us-east-2.compute.internal 7m6s Normal AddedInterface pod/servicemesh-operator3-6fd8c97988-bbksq Add eth0 [10.131.0.19/23] from ovn-kubernetes 7m6s Normal Pulling pod/servicemesh-operator3-6fd8c97988-bbksq Pulling image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365" 7m1s Normal Pulled pod/servicemesh-operator3-6fd8c97988-bbksq Successfully pulled image "registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365" in 4.469s (4.469s including waiting). Image size: 161863556 bytes. 7m1s Normal Created pod/servicemesh-operator3-6fd8c97988-bbksq Created container: sail-operator 7m1s Normal Started pod/servicemesh-operator3-6fd8c97988-bbksq Started container sail-operator 7m6s Normal SuccessfulCreate replicaset/servicemesh-operator3-6fd8c97988 Created pod: servicemesh-operator3-6fd8c97988-bbksq 7m6s Normal ScalingReplicaSet deployment/servicemesh-operator3 Scaled up replica set servicemesh-operator3-6fd8c97988 from 0 to 1 7m11s Normal RequirementsUnknown clusterserviceversion/servicemeshoperator3.v3.2.1 requirements not yet checked 7m10s Normal RequirementsNotMet clusterserviceversion/servicemeshoperator3.v3.2.1 one or more requirements couldn't be found 7m7s Normal AllRequirementsMet clusterserviceversion/servicemeshoperator3.v3.2.1 all requirements found, attempting install 7m7s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.1 waiting for install components to report healthy 7m6s Normal InstallWaiting clusterserviceversion/servicemeshoperator3.v3.2.1 installing: waiting for deployment servicemesh-operator3 to become ready: deployment "servicemesh-operator3" not available: Deployment does not have minimum availability. 6m50s Normal InstallSucceeded clusterserviceversion/servicemeshoperator3.v3.2.1 install strategy completed with no errors =====Pods in openshift-operators=====: NAME READY STATUS RESTARTS AGE IP NODE NOMINATED NODE READINESS GATES kiali-operator-5867bbd9bf-cx8mq 1/1 Running 0 6m3s 10.131.0.21 ip-10-0-5-243.us-east-2.compute.internal servicemesh-operator3-6fd8c97988-bbksq 1/1 Running 0 7m6s 10.131.0.19 ip-10-0-5-243.us-east-2.compute.internal =====Operator Deployment describe=====: Name: servicemesh-operator3 Namespace: openshift-operators CreationTimestamp: Wed, 21 Jan 2026 04:10:47 +0000 Labels: app.kubernetes.io/component=sail-operator app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/instance=servicemesh-operator3 app.kubernetes.io/managed-by=helm app.kubernetes.io/name=deployment app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 olm.deployment-spec-hash=4AmHwsuIcHpeCGTVeXn5qf4iKSNfuhMambb10V olm.managed=true olm.owner=servicemeshoperator3.v3.2.1 olm.owner.kind=ClusterServiceVersion olm.owner.namespace=openshift-operators operators.coreos.com/servicemeshoperator3.openshift-operators= Annotations: deployment.kubernetes.io/revision: 1 Selector: app.kubernetes.io/created-by=servicemeshoperator3,app.kubernetes.io/part-of=servicemeshoperator3,control-plane=servicemesh-operator3 Replicas: 1 desired | 1 updated | 1 total | 1 available | 0 unavailable StrategyType: RollingUpdate MinReadySeconds: 0 RollingUpdateStrategy: 25% max unavailable, 25% max surge Pod Template: Labels: app.kubernetes.io/created-by=servicemeshoperator3 app.kubernetes.io/part-of=servicemeshoperator3 control-plane=servicemesh-operator3 Annotations: alm-examples: [ { "apiVersion": "sailoperator.io/v1", "kind": "Istio", "metadata": { "name": "default" }, "spec": { "namespace": "istio-system", "updateStrategy": { "inactiveRevisionDeletionGracePeriodSeconds": 30, "type": "InPlace" }, "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "IstioCNI", "metadata": { "name": "default" }, "spec": { "namespace": "istio-cni", "version": "v1.27.3" } }, { "apiVersion": "sailoperator.io/v1", "kind": "ZTunnel", "metadata": { "name": "default" }, "spec": { "namespace": "ztunnel", "version": "v1.27.3" } } ] capabilities: Seamless Upgrades categories: OpenShift Optional, Integration & Delivery, Networking, Security containerImage: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 createdAt: 2025-11-26T08:45:22Z description: The OpenShift Service Mesh Operator enables you to install, configure, and manage an instance of Red Hat OpenShift Service Mesh. OpenShift... features.operators.openshift.io/cnf: false features.operators.openshift.io/cni: true features.operators.openshift.io/csi: false features.operators.openshift.io/disconnected: true features.operators.openshift.io/fips-compliant: true features.operators.openshift.io/proxy-aware: false features.operators.openshift.io/tls-profiles: false features.operators.openshift.io/token-auth-aws: false features.operators.openshift.io/token-auth-azure: false features.operators.openshift.io/token-auth-gcp: false images.v1_24_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2b60b0f33affda8b5b2cc30a4b09b2198b053fb1a914d386d35fcf03c09234e6 images.v1_24_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:a020acb4a74040df03077924e10465454092f6c34a902b391fba55563c08f826 images.v1_24_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:d6693c31d6137c4219812cf69097d04654b296e0ab059dc48596a09b9cd124b1 images.v1_24_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:f592b91a6f28559abdf6546ff6c3ae70a44d8f811592746e9eb02cdb2e5dec9d images.v1_24_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:17db00a219de14e5901b5a5eca64d3c6684ca74c1dba3ae3b03787c655fe9c80 images.v1_24_4.ztunnel: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:36557fa4817c3d0bac499dc65a4a9d6673500681641943d2f8cec5bfec4355be images.v1_24_5.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54cada48e5c9824f255f82daa2ef5bea236919e521d3ea49885f2883ced2b7bc images.v1_24_5.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:87b967785d7cc222f9df9cb49f0373a9819bf67910ce523dc3b8345849e881dd images.v1_24_5.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7fa655f5efb1175ff1e1c138371fc1233e5d4313c5feb07194428d0d1fdd33a3 images.v1_24_5.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:7ea9b82e192402566e69063a4787351be9f1ef50719bfd1a8f5d... images.v1_24_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:54508ddeb570a45b5576d4e128fc6f4114e3bb0ed8cf600f2bcbf80d8b4f6b8a images.v1_24_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:c018e5c2fe81d6b6577cbf32a9aa3f909c69c24ed411e4fa3fa7b4a891ce017e images.v1_24_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:892c857d7ea35e60e13a277f5ab1268a4068c316353403a2846f116235d52a7b images.v1_24_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:836c53299b170a1ef0bc8ce958da2abe14a48b8d84f9298e7c6b3d940fa8a1cc images.v1_24_6.ztunnel: registry.redhat.io/openshift-service-mesh-dev-preview-beta/istio-ztunnel-rhel9@sha256:18897281e5ab5198506c4dd5cc0f5a96245794e6b33f63a2a4a3... images.v1_26_2.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:14c5a52faf20267baa43d9a72ee6416f56fbc41dd640adc2aba3c4043802a0e9 images.v1_26_2.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:028e10651db0d1ddb769a27c9483c6d41be6ac597f253afd9d599f395d9c82d8 images.v1_26_2.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:366266f10e658c4cea86bddf6ee847e1908ea4dd780cb5f7fb0e466bac8995f1 images.v1_26_2.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:d518f3d1539f45e1253c5c9fa22062802804601d4998cd50344e476a3cc388fe images.v1_26_2.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:ecc6a22a471f4f4b836648f3a72ea7f57a4ea960ebcbc7dbe3fe7295... images.v1_26_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:2ea112ab90b8540f11e9949d77c3e7e3b3ef57ac3bf23f6cf1e883a88430e1f9 images.v1_26_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:33feac0c9c888b375e207e86b3f9a1a289126ca46b64632a7f693e2191cfbbfd images.v1_26_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:2ca96716812d339775d3dfd396c863834dd3810720e98bfcf87bc67c5fbd29b5 images.v1_26_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:26747627ae22bbdffcf9de58077454fc0c890cda83659d7834b15dea2b5aaaf2 images.v1_26_3.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f7ab868455b5e887e2d89b7078678531290365f9166cae99ce56119f... images.v1_26_4.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:9536c5850961488b3e01e29140d9ace0cbaa1f4bd1c1860cb49d10bf0514a5bf images.v1_26_4.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:02b82941a92c537233c4f60d9223da2e637b045189b8700dd7030bd9c1c352d5 images.v1_26_4.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:cadc30c15a54d89de1992624a3641c7d5951dd292b668d026ab9d5e2f3878a77 images.v1_26_4.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:b45ecae5a9240b40403c4e39c6a81ab66c8c7e8de194dc3e21b1336ff3a0fa38 images.v1_26_4.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:950e9a2e8fef8740b4909957c2cced52d45abd66324fb056097f2d07... images.v1_26_6.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:be16b9a7e2693bf294c99d96ba4cf36e98629ebff2ce6f2ce946fd9ae1e9f2dc images.v1_26_6.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:91229b8d6e932178ddddf0b4878114b65c0451755919996239d1fe6285b644e8 images.v1_26_6.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:8a21e30593e51f2fd2e51d9ab1d0ed2fc43eaa9b98173d7fb74f799d6b2f163d images.v1_26_6.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:47100186c27934adeda3002bb04cac28980ca8854eee7d6e4f4b3f85562e9a8e images.v1_26_6.ztunnel: registry.redhat.io/openshift-service-mesh-tech-preview/istio-ztunnel-rhel9@sha256:f39e2c28ef36fce9f808f3946cc4e4126047e142ad84cb18c222cecc... images.v1_27_3.cni: registry.redhat.io/openshift-service-mesh/istio-cni-rhel9@sha256:ddadd677161ad8c1077dd156821d6b4e32742ccbb210e9c14696fa66a58c0867 images.v1_27_3.istiod: registry.redhat.io/openshift-service-mesh/istio-pilot-rhel9@sha256:0850242436e88f7d82f0f2126de064c7e0f09844f31d8ff0f53dc8d3908075d9 images.v1_27_3.must-gather: registry.redhat.io/openshift-service-mesh/istio-must-gather-rhel9@sha256:742bc084c26769ff57cb3aa47b7a35c2b94684c3f67a9388da07a0490a942e5c images.v1_27_3.proxy: registry.redhat.io/openshift-service-mesh/istio-proxyv2-rhel9@sha256:7d15cebf9b62f3f235c0eab5158ac8ff2fda86a1d193490dc94c301402c99da8 images.v1_27_3.ztunnel: registry.redhat.io/openshift-service-mesh/istio-ztunnel-rhel9@sha256:b2b3216a05f6136ed9ddb71d72d493030c6d6b431682dddffa692c760b6c9ba1 kubectl.kubernetes.io/default-container: sail-operator olm.operatorGroup: global-operators olm.operatorNamespace: openshift-operators olm.targetNamespaces: operatorframework.io/properties: {"properties":[{"type":"olm.gvk","value":{"group":"extensions.istio.io","kind":"WasmPlugin","version":"v1alpha1"}},{"type":"olm.gvk","valu... operators.openshift.io/valid-subscription: ["OpenShift Container Platform", "OpenShift Platform Plus"] operators.operatorframework.io/builder: operator-sdk-v1.41.1 operators.operatorframework.io/internal-objects: ["wasmplugins.extensions.istio.io","destinationrules.networking.istio.io","envoyfilters.networking.istio.io","gateways.networking.istio.io... operators.operatorframework.io/project_layout: go.kubebuilder.io/v4 repository: https://github.com/istio-ecosystem/sail-operator support: Red Hat, Inc. Service Account: servicemesh-operator3 Containers: sail-operator: Image: registry.redhat.io/openshift-service-mesh/istio-rhel9-operator@sha256:656511cdb0683ff7e3336d4f41a672b4063b665e9e6e34d5370640103fd49365 Port: Host Port: Command: /usr/local/bin/sail-operator Args: --health-probe-bind-address=:8081 --metrics-bind-address=:8443 --zap-log-level=info Limits: cpu: 500m memory: 1Gi Requests: cpu: 10m memory: 64Mi Liveness: http-get http://:8081/healthz delay=15s timeout=1s period=20s #success=1 #failure=3 Readiness: http-get http://:8081/readyz delay=5s timeout=1s period=10s #success=1 #failure=3 Environment: OPERATOR_CONDITION_NAME: servicemeshoperator3.v3.2.1 Mounts: /etc/sail-operator from operator-config (ro) Volumes: operator-config: Type: DownwardAPI (a volume populated by information about the pod) Items: metadata.annotations -> config.properties Node-Selectors: Tolerations: Conditions: Type Status Reason ---- ------ ------ Available True MinimumReplicasAvailable Progressing True NewReplicaSetAvailable OldReplicaSets: NewReplicaSet: servicemesh-operator3-6fd8c97988 (1/1 replicas created) Events: Type Reason Age From Message ---- ------ ---- ---- ------- Normal ScalingReplicaSet 7m6s deployment-controller Scaled up replica set servicemesh-operator3-6fd8c97988 from 0 to 1 ========================================================= =====Istio YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istio default -o yaml: Error from server (NotFound): istios.sailoperator.io "default" not found , output: Error from server (NotFound): istios.sailoperator.io "default" not found =====Pods in istio-system=====: =====Istiod logs=====: error executing command: /usr/bin/sh -c oc -n istio-system logs deploy/istiod --since=2m0s: error: error from server (NotFound): deployments.apps "istiod" not found in namespace "istio-system" =====Events in istio-system=====: =====Istioctl Proxy Status=====: failed to get proxy status: error executing command: /usr/bin/sh -c /go/src/github.com/openshift-service-mesh/sail-operator/bin/istioctl proxy-status: Error: no running Istio pods in "istio-system" ========================================================= =====IstioCNI YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc get istiocni default -o yaml: Error from server (NotFound): istiocnis.sailoperator.io "default" not found , output: Error from server (NotFound): istiocnis.sailoperator.io "default" not found =====Istio CNI DaemonSet YAML=====: error getting yaml: error executing command: /usr/bin/sh -c oc -n istio-cni get daemonset istio-cni-node -o yaml: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Events in istio-cni=====: =====Pods in istio-cni=====: =====Istio CNI DaemonSet describe=====: error describing resource: error executing command: /usr/bin/sh -c oc -n istio-cni describe daemonset istio-cni-node: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found , output: Error from server (NotFound): daemonsets.apps "istio-cni-node" not found =====Istio CNI logs=====: error executing command: /usr/bin/sh -c oc -n istio-cni logs daemonset/istio-cni-node --since=2m0s: error: error from server (NotFound): daemonsets.apps "istio-cni-node" not found in namespace "istio-cni" ========================================================= =====CA certs in istio-system=====: error getting secret: error executing command: /usr/bin/sh -c oc -n istio-system get secret cacerts -o yaml: Error from server (NotFound): secrets "cacerts" not found , output Error from server (NotFound): secrets "cacerts" not found ========================================================= =====Namespace sleep (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sleep -o yaml: Error from server (NotFound): namespaces "sleep" not found , output: Error from server (NotFound): namespaces "sleep" not found =====Namespace httpbin (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace httpbin -o yaml: Error from server (NotFound): namespaces "httpbin" not found , output: Error from server (NotFound): namespaces "httpbin" not found =====Namespace sample (not found)=====: error getting yaml: error executing command: /usr/bin/sh -c oc get namespace sample -o yaml: Error from server (NotFound): namespaces "sample" not found , output: Error from server (NotFound): namespaces "sample" not found ========================================================= STEP: Cleaning up the cert-manager Namespace @ 01/21/26 04:17:58.059 STEP: Cleaning up the cert-manager-operator Namespace @ 01/21/26 04:17:58.079 STEP: Cleaning up the istio-cni Namespace @ 01/21/26 04:17:58.097 STEP: Cleaning up the istio-csr Namespace @ 01/21/26 04:17:58.114 STEP: Cleaning up the istio-system Namespace @ 01/21/26 04:17:58.133 STEP: Cleaning up the cert-manager-cainjector ClusterRole @ 01/21/26 04:17:58.15 STEP: Cleaning up the cert-manager-cluster-view ClusterRole @ 01/21/26 04:17:58.168 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRole @ 01/21/26 04:17:58.188 STEP: Cleaning up the cert-manager-controller-certificates ClusterRole @ 01/21/26 04:17:58.207 STEP: Cleaning up the cert-manager-controller-certificatesigningrequests ClusterRole @ 01/21/26 04:17:58.226 STEP: Cleaning up the cert-manager-controller-challenges ClusterRole @ 01/21/26 04:17:58.253 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRole @ 01/21/26 04:17:58.272 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRole @ 01/21/26 04:17:58.3 STEP: Cleaning up the cert-manager-controller-issuers ClusterRole @ 01/21/26 04:17:58.316 STEP: Cleaning up the cert-manager-controller-orders ClusterRole @ 01/21/26 04:17:58.339 STEP: Cleaning up the cert-manager-edit ClusterRole @ 01/21/26 04:17:58.356 STEP: Cleaning up the cert-manager-view ClusterRole @ 01/21/26 04:17:58.375 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRole @ 01/21/26 04:17:58.571 STEP: Cleaning up the cert-manager-cainjector ClusterRoleBinding @ 01/21/26 04:17:58.768 STEP: Cleaning up the cert-manager-controller-approve:cert-manager-io ClusterRoleBinding @ 01/21/26 04:17:58.788 STEP: Cleaning up the cert-manager-controller-certificates ClusterRoleBinding @ 01/21/26 04:17:58.807 STEP: Cleaning up the cert-manager-controller-certificatesigningrequests ClusterRoleBinding @ 01/21/26 04:17:58.826 STEP: Cleaning up the cert-manager-controller-challenges ClusterRoleBinding @ 01/21/26 04:17:58.843 STEP: Cleaning up the cert-manager-controller-clusterissuers ClusterRoleBinding @ 01/21/26 04:17:58.861 STEP: Cleaning up the cert-manager-controller-ingress-shim ClusterRoleBinding @ 01/21/26 04:17:58.877 STEP: Cleaning up the cert-manager-controller-issuers ClusterRoleBinding @ 01/21/26 04:17:58.893 STEP: Cleaning up the cert-manager-controller-orders ClusterRoleBinding @ 01/21/26 04:17:58.909 STEP: Cleaning up the cert-manager-webhook:subjectaccessreviews ClusterRoleBinding @ 01/21/26 04:17:58.926 STEP: Waiting for resources to be deleted @ 01/21/26 04:17:58.947 [FAILED] in [AfterAll] - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/util/cleaner/cleaner.go:281 @ 01/21/26 04:19:18.089 • [FAILED] [84.845 seconds] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] [BeforeAll] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:105 [It] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:159 [FAILED] Issuer creation failed Expected success, but got an error: <*fmt.wrapError | 0xc002189e40>: error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority Error from server (InternalError): Internal error occurred: failed calling webhook "webhook.cert-manager.io": failed to call webhook: Post "https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s": tls: failed to verify certificate: x509: certificate signed by unknown authority { msg: "error applying yaml: error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", err: <*errors.errorString | 0xc002183f40>{ s: "error executing command: /usr/bin/sh -c oc -n istio-system apply --server-side -f -: Error from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\nError from server (InternalError): Internal error occurred: failed calling webhook \"webhook.cert-manager.io\": failed to call webhook: Post \"https://cert-manager-webhook.cert-manager.svc:443/validate?timeout=30s\": tls: failed to verify certificate: x509: certificate signed by unknown authority\n", }, } In [BeforeAll] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 @ 01/21/26 04:17:53.734 There were additional failures detected. To view them in detail run ginkgo -vv ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when custom resource for the IstioCSR is created [It] has IstioCSR pods running [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:190 @ 01/21/26 04:19:18.09 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] updates the status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:215 @ 01/21/26 04:19:18.091 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is created [It] doesn't continuously reconcile the IstioCNI CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:221 @ 01/21/26 04:19:18.091 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] updates the Istio CR status to Ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:253 @ 01/21/26 04:19:18.091 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] deploys istiod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:259 @ 01/21/26 04:19:18.091 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is created [It] doesn't continuously reconcile the Istio CR [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:266 @ 01/21/26 04:19:18.092 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] waits for sample pods to be ready [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:283 @ 01/21/26 04:19:18.092 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when sample apps are deployed in the cluster [It] can access the httpbin service from the sleep pod [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:289 @ 01/21/26 04:19:18.092 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the Istio CR is deleted [It] removes everything from the namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:306 @ 01/21/26 04:19:18.093 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCNI CR is deleted [It] removes everything from the CNI namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:320 @ 01/21/26 04:19:18.093 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes subscription from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:342 @ 01/21/26 04:19:18.094 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager-operator resources are deleted [It] removes operatorgroup from the cert-manager-operator namespace [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:350 @ 01/21/26 04:19:18.095 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes rolebinding cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:372 @ 01/21/26 04:19:18.095 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the cert-manager resources are deleted [It] removes role cert-manager-tokenrequest from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:380 @ 01/21/26 04:19:18.096 ------------------------------ S [SKIPPED] [0.000 seconds] Cert-manager Installation Istio version: v1.27.3 when the IstioCSR is deleted [It] removes cert-manager-istio-csr resources from the cluster [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 [SKIPPED] Spec skipped because an earlier spec in an ordered container failed In [It] at: /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:424 @ 01/21/26 04:19:18.096 ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.003 seconds] ------------------------------ Summarizing 1 Failure: [FAIL] Cert-manager Installation Istio version: v1.27.3 when root CA issuer for the IstioCSR agent is created [BeforeAll] creates certificate Issuer [smoke, cert-manager, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/cert-manager/cert_manager_test.go:156 Ran 3 of 18 Specs in 126.614 seconds FAIL! -- 2 Passed | 1 Failed | 0 Pending | 15 Skipped --- FAIL: TestCertManager (126.62s) FAIL 2026-01-21T04:19:18.136472Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Control Plane Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane ======================================================================================================================== Random Seed: 1768968995 Will run 47 of 59 specs SSSSSSSSSSSS ------------------------------ Control Plane Installation defaulting IstioCNI no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:51 * IstioCNI created • [0.479 seconds] ------------------------------ Control Plane Installation defaulting IstioCNI empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:52 * IstioCNI created • [0.349 seconds] ------------------------------ Control Plane Installation defaulting Istio no spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:74 * Istio created • [0.334 seconds] ------------------------------ Control Plane Installation defaulting Istio empty spec [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:75 * Istio created • [0.298 seconds] ------------------------------ Control Plane Installation defaulting Istio empty updateStrategy [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:76 * Istio created • [0.331 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [19.031 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [29.919 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.27.3 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.240 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [6.117 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.592 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.016 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [31.645 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [12.716 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.276 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [2.254 seconds] ------------------------------ Control Plane Installation given Istio version v1.27.3 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 01/21/26 04:21:06.14 STEP: Cleaning up the istio-system Namespace @ 01/21/26 04:21:06.158 STEP: Cleaning up the sample Namespace @ 01/21/26 04:21:06.176 STEP: Waiting for resources to be deleted @ 01/21/26 04:21:06.193 * Finished cleaning up resources • [13.711 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.26.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [13.409 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [29.959 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.26.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.168 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [6.116 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.418 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.014 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [30.666 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [6.642 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.257 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [1.251 seconds] ------------------------------ Control Plane Installation given Istio version v1.26.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 01/21/26 04:22:50.833 STEP: Cleaning up the istio-system Namespace @ 01/21/26 04:22:50.851 STEP: Cleaning up the sample Namespace @ 01/21/26 04:22:50.872 STEP: Waiting for resources to be deleted @ 01/21/26 04:22:50.889 * Finished cleaning up resources • [30.748 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created deploys the CNI DaemonSet [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:115 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.24.6 namespace: istio-cni * IstioCNI created * CNI DaemonSet is deployed in the namespace and Running • [9.313 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:125 • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:130 * IstioCNI is Reconciled • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created updates the status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:136 * IstioCNI is Ready • [0.014 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is created doesn't continuously reconcile the IstioCNI CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:142 * IstioCNI stopped reconciling • [30.168 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Reconciled [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:154 Istio YAML: apiVersion: sailoperator.io/v1 kind: Istio metadata: name: default spec: version: v1.24.6 namespace: istio-system * Istio CR created * Istio CR is Reconciled • [1.167 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created updates the Istio CR status to Ready [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:160 * Istio CR is Ready • [5.093 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created deploys istiod [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:166 * Istiod is deployed in the namespace and Running • [0.385 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created uses the correct image [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:173 • [0.015 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is created doesn't continuously reconcile the Istio CR [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:178 * Istio CR stopped reconciling • [32.594 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed updates the pods status to Running [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:196 * sample deployed * sample pods are ready • [8.686 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when sample pod is deployed has sidecars with the correct istio version [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:203 * Istio sidecar version matches the expected Istio version • [0.267 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the Istio CR is deleted removes everything from the namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:219 * Istio CR deleted * Namespace is empty • [1.246 seconds] ------------------------------ Control Plane Installation given Istio version v1.24.6 when the IstioCNI CR is deleted removes everything from the CNI namespace [smoke, control-plane, slow] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/controlplane/control_plane_test.go:233 * IstioCNI deleted * CNI namespace is empty STEP: Cleaning up the istio-cni Namespace @ 01/21/26 04:24:49.477 STEP: Cleaning up the istio-system Namespace @ 01/21/26 04:24:49.496 STEP: Cleaning up the sample Namespace @ 01/21/26 04:24:49.518 STEP: Waiting for resources to be deleted @ 01/21/26 04:24:49.54 * Finished cleaning up resources • [29.664 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.004 seconds] ------------------------------ Ran 47 of 59 Specs in 358.698 seconds SUCCESS! -- 47 Passed | 0 Failed | 0 Pending | 12 Skipped PASS 2026-01-21T04:25:16.912737Z info loading supported istio versions from versions.ossm.yaml PASS 2026-01-21T04:25:16.932181Z info loading supported istio versions from versions.ossm.yaml PASS 2026-01-21T04:25:16.951639Z info loading supported istio versions from versions.ossm.yaml ************ Running Setup ************ Initializing k8s client Running Suite: Multiple Control Planes Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane ======================================================================================================================================= Random Seed: 1768968995 Will run 42 of 42 specs ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.509 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.202 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.293 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.296 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.054 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [4.063 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [1.122 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [1.132 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.154 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [8.133 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [0.024 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.024 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.338 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.27.3 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 01/21/26 04:25:42.173 STEP: Cleaning up the mesh1 IstioRevision @ 01/21/26 04:25:42.202 STEP: Cleaning up the mesh2 IstioRevision @ 01/21/26 04:25:42.22 STEP: Cleaning up the mesh1 Istio @ 01/21/26 04:25:42.282 STEP: Cleaning up the mesh2 Istio @ 01/21/26 04:25:42.306 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 01/21/26 04:25:42.342 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 01/21/26 04:25:42.361 STEP: Waiting for resources to be deleted @ 01/21/26 04:25:42.542 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 01/21/26 04:25:43.98 STEP: Cleaning up the app2a Namespace @ 01/21/26 04:25:43.997 STEP: Cleaning up the app2b Namespace @ 01/21/26 04:25:44.016 STEP: Cleaning up the istio-cni Namespace @ 01/21/26 04:25:44.032 STEP: Cleaning up the istio-system1 Namespace @ 01/21/26 04:25:44.052 STEP: Cleaning up the istio-system2 Namespace @ 01/21/26 04:25:44.067 STEP: Waiting for resources to be deleted @ 01/21/26 04:25:44.082 * Finished cleaning up resources • [16.684 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.494 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [5.263 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.287 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.293 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [3.053 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [4.064 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [1.129 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [1.082 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.073 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [3.064 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [5.098 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.024 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.347 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.26.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 01/21/26 04:26:25.228 STEP: Cleaning up the mesh1 IstioRevision @ 01/21/26 04:26:25.255 STEP: Cleaning up the mesh2 IstioRevision @ 01/21/26 04:26:25.274 STEP: Cleaning up the mesh1 Istio @ 01/21/26 04:26:25.316 STEP: Cleaning up the mesh2 Istio @ 01/21/26 04:26:25.349 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 01/21/26 04:26:25.393 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 01/21/26 04:26:25.409 STEP: Waiting for resources to be deleted @ 01/21/26 04:26:25.585 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 01/21/26 04:26:26.934 STEP: Cleaning up the app2a Namespace @ 01/21/26 04:26:26.949 STEP: Cleaning up the app2b Namespace @ 01/21/26 04:26:26.964 STEP: Cleaning up the istio-cni Namespace @ 01/21/26 04:26:26.979 STEP: Cleaning up the istio-system1 Namespace @ 01/21/26 04:26:26.995 STEP: Cleaning up the istio-system2 Namespace @ 01/21/26 04:26:27.011 STEP: Waiting for resources to be deleted @ 01/21/26 04:26:27.029 * Finished cleaning up resources • [31.684 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Sets up namespaces [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:52 • [1.579 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs IstioCNI [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:61 IstioCNI YAML: apiVersion: sailoperator.io/v1 kind: IstioCNI metadata: name: default spec: version: v1.27.3 namespace: istio-cni * IstioCNI created * IstioCNI is Ready • [3.202 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:70 • [0.303 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Installs Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:71 • [0.296 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:100 * Istio mesh1 ready • [4.084 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for Istios Mesh 2 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:101 * Istio mesh2 ready • [2.043 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:113 * Applications in namespace app1 deployed • [1.142 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:114 * Applications in namespace app2a deployed • [1.149 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Deploys applications App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:115 * Applications in namespace app2b deployed • [1.138 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:132 * Applications in namespace app1 ready • [3.072 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2a [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:133 * Applications in namespace app2a ready • [2.057 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Installation Waits for apps to be ready App 2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:134 * Applications in namespace app2b ready • [0.028 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a cannot connect to app1 [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:145 * As expected, app2a in mesh2 is not allowed to communicate with app1 in mesh1 • [0.364 seconds] ------------------------------ Multi control plane deployment model for supported versions Istio version 1.24.6 Verification Verifies app2a can connect to app2b [smoke, multicontrol-plane] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicontrolplane/multi_control_plane_test.go:153 * As expected, app2a in mesh2 can communicate with app2b in the same mesh STEP: Cleaning up the default IstioCNI @ 01/21/26 04:27:17.36 STEP: Cleaning up the mesh1 IstioRevision @ 01/21/26 04:27:17.391 STEP: Cleaning up the mesh2 IstioRevision @ 01/21/26 04:27:17.41 STEP: Cleaning up the mesh1 Istio @ 01/21/26 04:27:17.479 STEP: Cleaning up the mesh2 Istio @ 01/21/26 04:27:17.503 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system1 @ 01/21/26 04:27:17.542 STEP: Cleaning up the default PeerAuthentication on namespace=istio-system2 @ 01/21/26 04:27:17.559 STEP: Waiting for resources to be deleted @ 01/21/26 04:27:17.743 * Finished cleaning up resources STEP: Cleaning up the app1 Namespace @ 01/21/26 04:27:19.203 STEP: Cleaning up the app2a Namespace @ 01/21/26 04:27:19.22 STEP: Cleaning up the app2b Namespace @ 01/21/26 04:27:19.237 STEP: Cleaning up the istio-cni Namespace @ 01/21/26 04:27:19.254 STEP: Cleaning up the istio-system1 Namespace @ 01/21/26 04:27:19.276 STEP: Cleaning up the istio-system2 Namespace @ 01/21/26 04:27:19.293 STEP: Waiting for resources to be deleted @ 01/21/26 04:27:19.311 * Finished cleaning up resources • [32.209 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.003 seconds] ------------------------------ Ran 42 of 42 Specs in 151.652 seconds SUCCESS! -- 42 Passed | 0 Failed | 0 Pending | 0 Skipped PASS ************ Running Setup ************ Initializing k8s client Running Suite: Operator Installation Test Suite - /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator ============================================================================================================================ Random Seed: 1768968995 Will run 5 of 5 specs ------------------------------ Operator installation deploys all the CRDs [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:69 * Istio CRDs are present • [1.363 seconds] ------------------------------ Operator installation updates the CRDs status to Established [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:76 * CRDs are Established • [1.218 seconds] ------------------------------ Operator installation istio crd is present [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:84 * Istio CRD is present • [0.228 seconds] ------------------------------ Operator installation starts successfully [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:91 • [0.016 seconds] ------------------------------ Operator installation serves metrics securely [smoke, operator] /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/operator/operator_install_test.go:96 STEP: creating a ClusterRoleBinding for the service account to allow access to metrics @ 01/21/26 04:27:51.472 STEP: validating that the metrics service is available @ 01/21/26 04:27:51.632 STEP: getting the service account token @ 01/21/26 04:27:51.797 STEP: waiting for the metrics endpoint to be ready @ 01/21/26 04:27:51.904 STEP: verifying that the controller manager is serving the metrics server @ 01/21/26 04:27:52.055 STEP: creating the curl-metrics namespace @ 01/21/26 04:27:52.278 STEP: creating the curl-metrics pod to access the metrics endpoint @ 01/21/26 04:27:52.423 STEP: waiting for the curl-metrics pod to complete. @ 01/21/26 04:27:52.583 STEP: getting the metrics by checking curl-metrics logs @ 01/21/26 04:27:58.244 STEP: getting the curl-metrics logs @ 01/21/26 04:27:58.244 STEP: Cleaning up the curl-metrics Namespace @ 01/21/26 04:27:59.292 STEP: Cleaning up the metrics-reader-rolebinding ClusterRoleBinding @ 01/21/26 04:27:59.311 STEP: Waiting for resources to be deleted @ 01/21/26 04:27:59.33 * Finished cleaning up resources • [14.451 seconds] ------------------------------ [ReportAfterSuite] Autogenerated ReportAfterSuite for --junit-report autogenerated by Ginkgo [ReportAfterSuite] PASSED [0.001 seconds] ------------------------------ Ran 5 of 5 Specs in 17.277 seconds SUCCESS! -- 5 Passed | 0 Failed | 0 Pending | 0 Skipped PASS Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/dualstack/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Could not open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: open /go/src/github.com/openshift-service-mesh/sail-operator/tests/e2e/multicluster/go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml: no such file or directory Ginkgo ran 7 suites in 11m30.703370094s There were failures detected in the following suites: cert-manager ./tests/e2e/cert-manager Test Suite Failed exit status 1 JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml JUnit report: /go/src/github.com/openshift-service-mesh/sail-operator/test_artifacts/report.xml make: *** [Makefile.core.mk:223: test.e2e.ocp] Error 1 Patching Tests Result File: /logs/artifacts/junit-sail-e2e.xml Checking if yq exists yq version: yq (https://github.com/mikefarah/yq/) version v4.45.4 Mapping Test Suite Name To: ServiceMesh-lp-interop