Skip to content

[OSSM-8688] Ignore catatonit for kiali operator#242

Merged
openshift-merge-bot[bot] merged 1 commit intoopenshift:mainfrom
mkralik3:kiali
Feb 18, 2025
Merged

[OSSM-8688] Ignore catatonit for kiali operator#242
openshift-merge-bot[bot] merged 1 commit intoopenshift:mainfrom
mkralik3:kiali

Conversation

@mkralik3
Copy link
Contributor

Fips scanner reports

Images with failures: ===================== image: registry.redhat.io/openshift-service-mesh/kiali-rhel9-operator@sha256:25a12f12294834a58f26792989432ca246cde43eb055ccda74c8a5c8af119ebe build: openshift-istio-kiali-operator-container-2.4.1-1 check-payload failures: * /usr/libexec/catatonit/catatonit: executable is not dynamically linked

for our kiali operator image.

We use ose-ansible-rhel9-operator:v4.17.0-202412170235 as a base image for which it was resolved by #223 .

I have added kiali operator to ignore list as well.

@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 22, 2025
@openshift-ci openshift-ci bot requested review from kolyshkin and rhmdnd January 22, 2025 16:06
@openshift-merge-robot openshift-merge-robot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 22, 2025
config.toml Outdated
error = "ErrGoMissingTag"
dirs = ["/assets/downloads/cli"]

[[payload.openshift-istio-kiali-operator-container.ignore]]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this container image and binary present in all versions of OpenShift?

If not, we may want to consider adding it to the version specific configs in https://github.com/openshift/check-payload/tree/main/dist/releases - which is the approach used in https://github.com/openshift/check-payload/pull/223/files.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@rhmdnd I don't know, I can update the PR to use the same as in #223 since we have that issue only due to the fact that we are using ansible-operator image as a base image for kiali operator.
(probably other teams that use the same base image see the same output as well and will need to add their image into the ignore list)

cc: @jmazzitelli

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@rhmdnd updated

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this container image and binary present in all versions of OpenShift?

It should be. There are no versions of OpenShift where Kiali Operator is not supported.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ok - I appreciate the clarification. Thanks for breaking it out into the versioned configs.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why didn't we include this config for OCP 4.14 and OCP 4.15? AFAIK these OCP versions are to be supported by the Kiali operator.

@mkralik3
Copy link
Contributor Author

/test images

1 similar comment
@rhmdnd
Copy link
Contributor

rhmdnd commented Feb 18, 2025

/test images


[[payload.openshift-istio-kiali-operator-container.ignore]]
error = "ErrNotDynLinked"
files = ["/usr/libexec/catatonit/catatonit"]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Note for other reviews and historical reference. The catatonic binary is built statically, hence the exception here.

Copy link
Contributor

@rhmdnd rhmdnd left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Feb 18, 2025
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 18, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: mkralik3, rhmdnd

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Feb 18, 2025
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 18, 2025

@mkralik3: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot bot merged commit 7d0719c into openshift:main Feb 18, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. lgtm Indicates that a PR is ready to be merged.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants