Skip to content

config/v1: TLSSecurityProfile: align with Mozilla v5.7 guidelines for Go by removing unsupported go ciphers#2697

Merged
openshift-merge-bot[bot] merged 2 commits intoopenshift:masterfrom
damdo:config-tlssecurityprofile-remove-go-incompatible-ciphers
Feb 12, 2026
Merged

config/v1: TLSSecurityProfile: align with Mozilla v5.7 guidelines for Go by removing unsupported go ciphers#2697
openshift-merge-bot[bot] merged 2 commits intoopenshift:masterfrom
damdo:config-tlssecurityprofile-remove-go-incompatible-ciphers

Conversation

@damdo
Copy link
Member

@damdo damdo commented Feb 6, 2026

Following up from the dicussion in:
https://redhat-internal.slack.com/archives/C098FU5MRAB/p1770309657097269

We are aligning with the Mozilla v5.7 security guidelines for Go.

The profiles are now based on version 5.7 of the Mozilla Server Side TLS
configuration guidelines. The cipher lists consist the configuration's
"ciphersuites" followed by the Go-specific "ciphers" from the guidelines.
See: https://ssl-config.mozilla.org/guidelines/5.7.json

This effectively removes the DHE and CBC mode ciphers groups as they are not supported due to Go's crypto/tls limitations.
golang/go#7758
golang/go#26652

--

openshift/library-go counterpart: openshift/library-go#2119

@openshift-ci-robot
Copy link

Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.

For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.

This repository is configured in: LGTM mode

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 6, 2026

Hello @damdo! Some important instructions when contributing to openshift/api:
API design plays an important part in the user experience of OpenShift and as such API PRs are subject to a high level of scrutiny to ensure they follow our best practices. If you haven't already done so, please review the OpenShift API Conventions and ensure that your proposed changes are compliant. Following these conventions will help expedite the api review process for your PR.

@openshift-ci openshift-ci bot added the size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. label Feb 6, 2026
@coderabbitai
Copy link

coderabbitai bot commented Feb 6, 2026

Note

Reviews paused

It looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the reviews.auto_review.auto_pause_after_reviewed_commits setting.

Use the following commands to manage reviews:

  • @coderabbitai resume to resume automatic reviews.
  • @coderabbitai review to trigger a single review.

Use the checkboxes below for quick actions:

  • ▶️ Resume reviews
  • 🔍 Trigger review
📝 Walkthrough

Walkthrough

This pull request updates TLS security profile documentation and example cipher lists in Go source (config/v1 types and generated swagger) and multiple CRD YAMLs. It updates the Mozilla TLS guideline reference from v5.0 to v5.7, clarifies that profile cipher lists are the configuration's "ciphersuites" followed by Go-specific "ciphers", documents that TLS 1.3 cipher suites are not configurable and are always enabled, and removes several DHE- and certain AES/SHA384-related cipher entries from Old and Intermediate profile examples. No exported/public type or function signatures were changed.

🚥 Pre-merge checks | ✅ 3
✅ Passed checks (3 passed)
Check name Status Explanation
Title check ✅ Passed The title clearly summarizes the main change: aligning TLSSecurityProfile with Mozilla v5.7 guidelines and removing unsupported Go ciphers, which is the primary focus across all modified files.
Description check ✅ Passed The description is directly related to the changeset, explaining the alignment with Mozilla v5.7 guidelines, the composition of cipher lists from ciphersuites and Go-specific ciphers, and the removal of DHE and CBC ciphers due to Go's limitations.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing touches
  • 📝 Generate docstrings
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment

No actionable comments were generated in the recent review. 🎉

Warning

There were issues while running some tools. Please review the errors and either fix the tool's configuration or disable the tool if it's a critical failure.

🔧 golangci-lint (2.5.0)

Error: build linters: unable to load custom analyzer "kubeapilinter": tools/_output/bin/kube-api-linter.so, plugin: not implemented
The command is terminated due to an error: build linters: unable to load custom analyzer "kubeapilinter": tools/_output/bin/kube-api-linter.so, plugin: not implemented


Comment @coderabbitai help to get the list of available commands and usage tips.

@qodo-code-review
Copy link

Review Summary by Qodo

Remove Go-unsupported DHE and CBC ciphers from TLS security profiles

✨ Enhancement

Grey Divider

Walkthroughs

Description
• Remove unsupported DHE and CBC ciphers from TLS profiles
• Add explanatory comments referencing Go crypto/tls limitations
• Update documentation with rationale for removed ciphers
• Synchronize changes across all generated CRD manifests
Diagram
flowchart LR
  A["TLS Security Profiles"] -->|Remove DHE ciphers| B["Go crypto/tls Issue #7758"]
  A -->|Remove CBC ciphers| C["Go crypto/tls Issue #26652"]
  B --> D["Updated Old Profile"]
  C --> D
  B --> E["Updated Intermediate Profile"]
  C --> E
  D --> F["Generated Manifests Updated"]
  E --> F
Loading

Grey Divider

File Changes

1. config/v1/types_tlssecurityprofile.go ✨ Enhancement +34/-18

Remove unsupported ciphers and add documentation

config/v1/types_tlssecurityprofile.go


2. config/v1/zz_generated.swagger_doc_generated.go 📝 Documentation +2/-2

Update swagger documentation for TLS profiles

config/v1/zz_generated.swagger_doc_generated.go


3. openapi/generated_openapi/zz_generated.openapi.go 📝 Documentation +2/-2

Update OpenAPI schema descriptions

openapi/generated_openapi/zz_generated.openapi.go


View more (18)
4. config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-CustomNoUpgrade.crd.yaml ⚙️ Configuration changes +17/-8

Update CRD manifest with cipher changes

config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-CustomNoUpgrade.crd.yaml


5. config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-Default.crd.yaml ⚙️ Configuration changes +17/-8

Update CRD manifest with cipher changes

config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-Default.crd.yaml


6. config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-DevPreviewNoUpgrade.crd.yaml ⚙️ Configuration changes +17/-8

Update CRD manifest with cipher changes

config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-DevPreviewNoUpgrade.crd.yaml


7. config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-OKD.crd.yaml ⚙️ Configuration changes +17/-8

Update CRD manifest with cipher changes

config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-OKD.crd.yaml


8. config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-TechPreviewNoUpgrade.crd.yaml ⚙️ Configuration changes +17/-8

Update CRD manifest with cipher changes

config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-TechPreviewNoUpgrade.crd.yaml


9. config/v1/zz_generated.featuregated-crd-manifests/apiservers.config.openshift.io/AAA_ungated.yaml ⚙️ Configuration changes +17/-8

Update featuregated CRD manifest

config/v1/zz_generated.featuregated-crd-manifests/apiservers.config.openshift.io/AAA_ungated.yaml


10. config/v1/zz_generated.featuregated-crd-manifests/apiservers.config.openshift.io/KMSEncryption.yaml ⚙️ Configuration changes +17/-8

Update featuregated CRD manifest

config/v1/zz_generated.featuregated-crd-manifests/apiservers.config.openshift.io/KMSEncryption.yaml


11. config/v1/zz_generated.featuregated-crd-manifests/apiservers.config.openshift.io/KMSEncryptionProvider.yaml ⚙️ Configuration changes +17/-8

Update featuregated CRD manifest

config/v1/zz_generated.featuregated-crd-manifests/apiservers.config.openshift.io/KMSEncryptionProvider.yaml


12. machineconfiguration/v1/zz_generated.crd-manifests/0000_80_machine-config_01_kubeletconfigs.crd.yaml ⚙️ Configuration changes +17/-8

Update kubelet CRD manifest with cipher changes

machineconfiguration/v1/zz_generated.crd-manifests/0000_80_machine-config_01_kubeletconfigs.crd.yaml


13. machineconfiguration/v1/zz_generated.featuregated-crd-manifests/kubeletconfigs.machineconfiguration.openshift.io/AAA_ungated.yaml ⚙️ Configuration changes +17/-8

Update featuregated kubelet CRD manifest

machineconfiguration/v1/zz_generated.featuregated-crd-manifests/kubeletconfigs.machineconfiguration.openshift.io/AAA_ungated.yaml


14. operator/v1/zz_generated.crd-manifests/0000_50_ingress_00_ingresscontrollers.crd.yaml ⚙️ Configuration changes +17/-8

Update ingress controller CRD manifest

operator/v1/zz_generated.crd-manifests/0000_50_ingress_00_ingresscontrollers.crd.yaml


15. operator/v1/zz_generated.featuregated-crd-manifests/ingresscontrollers.operator.openshift.io/AAA_ungated.yaml ⚙️ Configuration changes +17/-8

Update featuregated ingress controller CRD

operator/v1/zz_generated.featuregated-crd-manifests/ingresscontrollers.operator.openshift.io/AAA_ungated.yaml


16. payload-manifests/crds/0000_10_config-operator_01_apiservers-CustomNoUpgrade.crd.yaml ⚙️ Configuration changes +17/-8

Update payload CRD manifest

payload-manifests/crds/0000_10_config-operator_01_apiservers-CustomNoUpgrade.crd.yaml


17. payload-manifests/crds/0000_10_config-operator_01_apiservers-Default.crd.yaml ⚙️ Configuration changes +17/-8

Update payload CRD manifest

payload-manifests/crds/0000_10_config-operator_01_apiservers-Default.crd.yaml


18. payload-manifests/crds/0000_10_config-operator_01_apiservers-DevPreviewNoUpgrade.crd.yaml ⚙️ Configuration changes +17/-8

Update payload CRD manifest

payload-manifests/crds/0000_10_config-operator_01_apiservers-DevPreviewNoUpgrade.crd.yaml


19. payload-manifests/crds/0000_10_config-operator_01_apiservers-OKD.crd.yaml ⚙️ Configuration changes +17/-8

Update payload CRD manifest

payload-manifests/crds/0000_10_config-operator_01_apiservers-OKD.crd.yaml


20. payload-manifests/crds/0000_10_config-operator_01_apiservers-TechPreviewNoUpgrade.crd.yaml ⚙️ Configuration changes +17/-8

Update payload CRD manifest

payload-manifests/crds/0000_10_config-operator_01_apiservers-TechPreviewNoUpgrade.crd.yaml


21. payload-manifests/crds/0000_80_machine-config_01_kubeletconfigs.crd.yaml ⚙️ Configuration changes +17/-8

Update payload kubelet CRD manifest

payload-manifests/crds/0000_80_machine-config_01_kubeletconfigs.crd.yaml


Grey Divider

Qodo Logo

@qodo-code-review
Copy link

qodo-code-review bot commented Feb 6, 2026

Code Review by Qodo

🐞 Bugs (2) 📘 Rule violations (1) 📎 Requirement gaps (0)

Grey Divider


Action required

1. Old field missing optional docs 📘 Rule violation ✓ Correctness
Description
• The Old *OldTLSProfile field has +optional and +nullable markers, but its comment only lists
cipher details and does not explain what happens when the field is omitted or explicitly set to
null. • This makes the API behavior unclear to consumers and violates the requirement that field
comments document the meaning/behavior of kubebuilder optionality markers.
Code

config/v1/types_tlssecurityprofile.go[R66-68]

// +optional
// +nullable
Old *OldTLSProfile `json:"old,omitempty"`
Evidence
PR Compliance ID 11 requires field comments to document the behavior implied by
validation/optionality markers. In TLSSecurityProfile, the Old field includes
+optional/+nullable, but the adjacent comment block does not describe omitted/default/null
behavior.

AGENTS.md
config/v1/types_tlssecurityprofile.go[22-68]

Agent prompt
The issue below was found during a code review. Follow the provided context and guidance below and implement a solution

## Issue description
`TLSSecurityProfile` fields (e.g., `Old`) include kubebuilder optionality markers (`+optional`, `+nullable`) but their comments do not document what omitted or null values mean.
## Issue Context
PR Compliance ID 11 requires that any field with optionality/validation markers has comments explaining those markers’ meaning and behavior so the API is self-documenting.
## Fix Focus Areas
- config/v1/types_tlssecurityprofile.go[6-128]

ⓘ Copy this prompt and use it to remediate the issue with your preferred AI generation tools


2. Invalid YAML doc snippets 🐞 Bug ✓ Correctness
Description
• Multiple CRD/OpenAPI descriptions contain YAML configuration examples that now include // ...
lines; // is not valid YAML comment syntax. • Users/operators copying these examples into real
YAML manifests will hit YAML parse errors (or end up with unintended config). • Because these are
generated artifacts, the issue propagates widely (config, operator, machineconfiguration, payload
manifests, OpenAPI).
Code

config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-Default.crd.yaml[R295-299]

+                          // Ciphers not in this profile even though listed
+                          // in the Mozilla Server Side TLS configuration guidelines:
+                          // Go's crypto/tls does not support DHE ciphers (see https://github.com/golang/go/issues/7758)
                       - DHE-RSA-AES128-GCM-SHA256
                       - DHE-RSA-AES256-GCM-SHA384
Evidence
The CRD schema uses description: |- with a YAML example block. The PR adds // lines inside that
example block; if a user copies the example as-is into a YAML file, // will not be treated as a
comment and will break parsing. The same // lines are also embedded into the generated OpenAPI
description strings, so this is not isolated to a single manifest.

config/v1/zz_generated.crd-manifests/0000_10_config-operator_01_apiservers-Default.crd.yaml[273-300]
openapi/generated_openapi/zz_generated.openapi.go[20931-20938]

Agent prompt
The issue below was found during a code review. Follow the provided context and guidance below and implement a solution

## Issue description
CRD/OpenAPI `description` fields embed YAML examples that now contain `//` lines. These are not valid YAML comments, so users copying the example into manifests will get YAML parse errors.
### Issue Context
The problematic text is generated from Go doc comments in `config/v1/types_tlssecurityprofile.go` and then propagated to CRD manifests and OpenAPI/Swagger output.
### Fix Focus Areas
- config/v1/types_tlssecurityprofile.go[22-98]

ⓘ Copy this prompt and use it to remediate the issue with your preferred AI generation tools



Remediation recommended

✅ 3. Misleading CBC support note 🐞 Bug ✓ Correctness
Description
• The new documentation says “Go's crypto/tls does not support CBC mode ciphers”, but the same
profile documentation still lists CBC ciphers (e.g., AES128-SHA, AES256-SHA, DES-CBC3-SHA) as
part of the profile. • This internal contradiction makes it unclear whether CBC ciphers are
supported/used, and may mislead operators reading the API docs. • The note should be narrowed to the
specific excluded cipher suites (or reworded to avoid the blanket “CBC mode” statement).
Code

config/v1/types_tlssecurityprofile.go[R61-64]

+	//     // Go's crypto/tls does not support CBC mode ciphers (see https://github.com/golang/go/issues/26652)
+	//     - ECDHE-ECDSA-AES256-SHA384
+	//     - ECDHE-RSA-AES256-SHA384
+	//     - AES256-SHA256
Evidence
In the old profile example, CBC ciphers are listed as included. Immediately afterward, a newly added
note claims CBC mode ciphers are not supported, which is misleading in the context of that same
example.

config/v1/types_tlssecurityprofile.go[46-64]

Agent prompt
The issue below was found during a code review. Follow the provided context and guidance below and implement a solution

## Issue description
The docs claim “Go's crypto/tls does not support CBC mode ciphers”, while the same profile example includes CBC ciphers (e.g., AES256-SHA, DES-CBC3-SHA). This is misleading.
### Issue Context
This text appears in Go doc comments and is propagated into CRD/OpenAPI descriptions.
### Fix Focus Areas
- config/v1/types_tlssecurityprofile.go[46-64]

ⓘ Copy this prompt and use it to remediate the issue with your preferred AI generation tools


Grey Divider

ⓘ The new review experience is currently in Beta. Learn more

Grey Divider

Qodo Logo

Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Fix all issues with AI agents
In `@config/v1/types_tlssecurityprofile.go`:
- Around line 53-64: Update the overstated comment that reads "Go's crypto/tls
does not support CBC mode ciphers" to specifically say that Go's crypto/tls
lacks support for the CBC SHA-256/384 suites (e.g., AES256-SHA256,
ECDHE-*-AES256-SHA384) so it only excludes those CBC SHA-256/384 ciphers rather
than all CBC-mode ciphers; apply this same clarified wording to both comment
occurrences in the TLS profile comment block (the blocks listing the excluded
CBC SHA-256/384 suites alongside the DHE exclusions) so the comment matches the
actual excluded cipher list.

@JoelSpeed
Copy link
Contributor

/approve
/assign @joelanford

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 6, 2026
@joelanford
Copy link
Member

/lgtm

Thanks @damdo !

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Feb 6, 2026
@openshift-ci-robot
Copy link

Tests from second stage were triggered manually. Pipeline can be controlled only manually, until HEAD changes. Use command to trigger second stage.

@damdo
Copy link
Member Author

damdo commented Feb 7, 2026

/pipeline required

@openshift-ci-robot
Copy link

Scheduling tests matching the pipeline_run_if_changed or not excluded by pipeline_skip_if_only_changed parameters:
/test e2e-aws-ovn
/test e2e-aws-ovn-hypershift
/test e2e-aws-ovn-hypershift-conformance
/test e2e-aws-ovn-techpreview
/test e2e-aws-serial-1of2
/test e2e-aws-serial-2of2
/test e2e-aws-serial-techpreview-1of2
/test e2e-aws-serial-techpreview-2of2
/test e2e-azure
/test e2e-gcp
/test e2e-upgrade
/test e2e-upgrade-out-of-change
/test minor-e2e-upgrade-minor

@damdo
Copy link
Member Author

damdo commented Feb 7, 2026

/test e2e-azure

@qodo-code-review
Copy link

qodo-code-review bot commented Feb 7, 2026

PR-Agent: could not fine a component named e2e-azure in a supported language in this PR.

@sanchezl
Copy link
Contributor

/hold for review

@openshift-ci openshift-ci bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Feb 10, 2026
Copy link
Contributor

@sanchezl sanchezl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Your end result is the Mozilla SSL 5.7 profile (the "go" specific version). Please delete all the commented out suites.

@sanchezl
Copy link
Contributor

/hold cancel

removing the hold as my change requests are all Godoc. I can follow up with a another PR if this one is merged without the updates.

@openshift-ci openshift-ci bot removed do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. lgtm Indicates that a PR is ready to be merged. labels Feb 10, 2026
Copy link

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 2

Caution

Some comments are outside the diff and can’t be posted inline due to platform limitations.

⚠️ Outside diff range comments (1)
config/v1/types_tlssecurityprofile.go (1)

174-188: ⚠️ Potential issue | 🟠 Major

Duplicate documentation: old ciphers field comment not removed.

Lines 174-179 contain the old documentation (with DES-CBC3-SHA example) while lines 180-188 contain the new documentation (with ECDHE-RSA-AES128-GCM-SHA256 example). The old block should be removed.

🐛 Proposed fix
-// ciphers is used to specify the cipher algorithms that are negotiated
-// during the TLS handshake.  Operators may remove entries their operands
-// do not support.  For example, to use DES-CBC3-SHA  (yaml):
-//
-//   ciphers:
-//     - DES-CBC3-SHA
 // ciphers is used to specify the cipher algorithms that are negotiated
 // during the TLS handshake. Operators may remove entries their operands
 // do not support. For example, to use only ECDHE-RSA-AES128-GCM-SHA256 (yaml):
🤖 Fix all issues with AI agents
In `@config/v1/types_tlssecurityprofile.go`:
- Around line 222-229: The top-of-file comment in types_tlssecurityprofile.go
incorrectly references "version 5.0" and contains an incomplete fragment
("prepended for"); remove the outdated 5.0 lines and the incomplete phrase and
replace the block with a single clear sentence stating that the profiles are
based on "version 5.7 of the Mozilla Server Side TLS configuration guidelines"
(see https://ssl-config.mozilla.org/guidelines/5.7.json) and keep the following
sentence about Ciphers slices being the configuration's "ciphersuites" followed
by the Go-specific "ciphers" from the guidelines so consumers of
TLSecurityProfile and the Ciphers slice comment are unambiguous.
- Around line 10-15: Remove the stale/contradictory lines referencing "version
5.0" and the incomplete phrase and replace the comment block so it consistently
documents that the profiles are based on Mozilla Server Side TLS guidelines
version 5.7 (include the https://ssl-config.mozilla.org/guidelines/5.7.json
link) and note that the cipher lists are the configuration's "ciphersuites"
followed by the Go-specific "ciphers"; update the comment near the
TLSSecurityProfile type in config/v1/types_tlssecurityprofile.go accordingly so
only the 5.7 reference and the complete explanation remain.

@damdo damdo changed the title config/v1: TLSSecurityProfile: Remove go's unsupported ciphers config/v1: TLSSecurityProfile: align with Mozilla v5.7 guidelines for Go by removing unsupported go ciphers Feb 11, 2026
@openshift-ci-robot
Copy link

Tests from second stage were triggered manually. Pipeline can be controlled only manually, until HEAD changes. Use command to trigger second stage.

@gangwgr
Copy link

gangwgr commented Feb 11, 2026

/verified by ci runs

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Feb 11, 2026
@openshift-ci-robot
Copy link

@gangwgr: This PR has been marked as verified by ci runs.

Details

In response to this:

/verified by ci runs

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@damdo
Copy link
Member Author

damdo commented Feb 11, 2026

/test e2e-aws-ovn-hypershift

@qodo-code-review
Copy link

qodo-code-review bot commented Feb 11, 2026

PR-Agent: could not fine a component named e2e-aws-ovn-hypershift in a supported language in this PR.

Following up from the dicussion in https://redhat-internal.slack.com/archives/C098FU5MRAB/p1770309657097269
We are removing DHE and CBC mode ciphers groups as they are not supported due to Go's crypto/tls limitations. Added notes and context for removed ciphers.
Context:
golang/go#7758
golang/go#26652
@damdo damdo force-pushed the config-tlssecurityprofile-remove-go-incompatible-ciphers branch from de3d7a6 to 164ef8e Compare February 11, 2026 21:12
@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Feb 11, 2026
@damdo
Copy link
Member Author

damdo commented Feb 11, 2026

/pipeline required

@openshift-ci-robot
Copy link

Scheduling tests matching the pipeline_run_if_changed or not excluded by pipeline_skip_if_only_changed parameters:
/test e2e-aws-ovn
/test e2e-aws-ovn-hypershift
/test e2e-aws-ovn-hypershift-conformance
/test e2e-aws-ovn-techpreview
/test e2e-aws-serial-1of2
/test e2e-aws-serial-2of2
/test e2e-aws-serial-techpreview-1of2
/test e2e-aws-serial-techpreview-2of2
/test e2e-azure
/test e2e-gcp
/test e2e-upgrade
/test e2e-upgrade-out-of-change
/test minor-e2e-upgrade-minor

@sanchezl
Copy link
Contributor

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Feb 11, 2026
@openshift-ci-robot
Copy link

Tests from second stage were triggered manually. Pipeline can be controlled only manually, until HEAD changes. Use command to trigger second stage.

@damdo
Copy link
Member Author

damdo commented Feb 11, 2026

/retest

@joelanford
Copy link
Member

/lgtm

@joelanford
Copy link
Member

/retest

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 12, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: joelanford, JoelSpeed, sanchezl

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@damdo
Copy link
Member Author

damdo commented Feb 12, 2026

/retest

1 similar comment
@damdo
Copy link
Member Author

damdo commented Feb 12, 2026

/retest

@damdo
Copy link
Member Author

damdo commented Feb 12, 2026

@damdo
Copy link
Member Author

damdo commented Feb 12, 2026

/test e2e-azure

@qodo-code-review
Copy link

qodo-code-review bot commented Feb 12, 2026

PR-Agent: could not fine a component named e2e-azure in a supported language in this PR.

@damdo
Copy link
Member Author

damdo commented Feb 12, 2026

/retest

@damdo
Copy link
Member Author

damdo commented Feb 12, 2026

openshift/ci-tools#4943 has merged

/retest

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 12, 2026

@damdo: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit a74f276 into openshift:master Feb 12, 2026
28 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged. size/XL Denotes a PR that changes 500-999 lines, ignoring generated files. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants