ci-config: add tls-scan as informing release controller job for 4.22#79629
ci-config: add tls-scan as informing release controller job for 4.22#79629redhat-chai-bot wants to merge 2 commits into
Conversation
Add a dedicated TLS scanner verification job for 4.22 nightlies: - ci-operator config: new 'tls-scan' test using the existing tls-scanner-run step ref on a FIPS-enabled AWS cluster (ipi-aws). Add tls-scanner-tool base image dependency. - release controller: add 'tls-scan' as an informing (optional: true) verification job in the 4.22 nightly release config. The job uses the reusable tls-scanner-run step from the step registry with no code duplication. It is configured as informing so it does not gate payload acceptance. When ready to make it blocking, remove the optional flag from the release controller config.
|
@redhat-chai-bot: GitHub didn't allow me to request PR reviews from the following users: openshift/tls-scanner-maintainers. Note that only openshift members and repo collaborators can review this PR, and authors cannot review their own PRs. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
No actionable comments were generated in the recent review. 🎉 ℹ️ Recent review info⚙️ Run configurationConfiguration used: Repository YAML (base), Central YAML (inherited) Review profile: CHILL Plan: Enterprise Run ID: 📒 Files selected for processing (1)
💤 Files with no reviewable changes (1)
WalkthroughAdds a TLS scanner base image, a yearly ChangesTLS Scanner Integration
Possibly related PRs
Suggested labels
Suggested reviewers
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes 🚥 Pre-merge checks | ✅ 12✅ Passed checks (12 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
Hi @redhat-chai-bot. Thanks for your PR. I'm waiting for a openshift member to verify that this patch is reasonable to test. If it is, they should reply with Tip We noticed you've done this a few times! Consider joining the org to skip this step and gain Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: redhat-chai-bot The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
Running on a non-FIPS cluster lets the TLS scanner see the full cipher/protocol surface rather than the FIPS-restricted subset.
|
[REHEARSALNOTIFIER]
A total of 282 jobs have been affected by this change. The above listing is non-exhaustive and limited to 25 jobs. A full list of affected jobs can be found here Interacting with pj-rehearseComment: Once you are satisfied with the results of the rehearsals, comment: |
Summary
Add a dedicated TLS scanner verification job for 4.22 nightly payloads, configured as an informing (non-blocking) release controller job. Uses the existing
tls-scanner-runstep ref from the step registry — no code duplication.Supersedes #79625 and #79624 (both closed).
Changes
openshift-release-main__nightly-4.22.yamltls-scanner-toolbase image (tls-scanner/tls-scanner:tls-scanner-tool)tls-scanperiodic test usingtls-scanner-runstep ref on a FIPS-enabled AWS cluster (ipi-awsworkflow)release-ocp-4.22.jsontls-scanto the release controller verify config as informing ("optional": true)Design
fips-payload-scan/fips-scanpattern: separate job, own cluster, release controller triggered"optional": truefrom the release controller configContext
Requested in Slack thread.
/cc @openshift/tls-scanner-maintainers
Summary by CodeRabbit
This PR adds a dedicated, informing TLS scanner verification job for OpenShift 4.22 nightly payloads and the supporting CI image metadata. It affects the OpenShift CI operator config for the 4.22 nightly pipeline and the release-controller verification configuration used by release promotion.
Practical impact:
Configuration changes:
CI operator config (ci-operator/config/openshift/release/openshift-release-main__nightly-4.22.yaml)
Release controller config (core-services/release-controller/_releases/release-ocp-4.22.json)
Notes:
#79625and#79624and is currently configured as informing only.