Skip to content

OCPBUGS-77243: test: skip private registry test#2621

Open
haircommander wants to merge 1 commit intoopenshift:masterfrom
haircommander:skip-private
Open

OCPBUGS-77243: test: skip private registry test#2621
haircommander wants to merge 1 commit intoopenshift:masterfrom
haircommander:skip-private

Conversation

@haircommander
Copy link
Copy Markdown
Member

@haircommander haircommander commented Mar 9, 2026

as it requires CRI-O be setup to allow insecure registries

What type of PR is this?

What this PR does / why we need it:

Which issue(s) this PR is related to:

Special notes for your reviewer:

Does this PR introduce a user-facing change?


Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


Summary by CodeRabbit

  • Chores
    • Updated test exclusions for container runtime conformance tests: replaced a generic exclusion with a more specific, tagged variant (references OCPBUGS-77243).

@openshift-ci-robot openshift-ci-robot added backports/unvalidated-commits Indicates that not all commits come to merged upstream PRs. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. labels Mar 9, 2026
@openshift-ci-robot
Copy link
Copy Markdown

@haircommander: This pull request references Jira Issue OCPBUGS-77243, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.22.0) matches configured target version for branch (4.22.0)
  • bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @lyman9966

The bug has been updated to refer to the pull request using the external bug tracker.

Details

In response to this:

as it requires CRI-O be setup to allow insecure registries

What type of PR is this?

What this PR does / why we need it:

Which issue(s) this PR is related to:

Special notes for your reviewer:

Does this PR introduce a user-facing change?


Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link
Copy Markdown

@haircommander: the contents of this pull request could not be automatically validated.

The following commits could not be validated and must be approved by a top-level approver:

Comment /validate-backports to re-evaluate validity of the upstream PRs, for example when they are merged upstream.

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented Mar 9, 2026

No actionable comments were generated in the recent review. 🎉

ℹ️ Recent review info
⚙️ Run configuration

Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml

Review profile: CHILL

Plan: Pro

Run ID: 13f0b881-c1b1-40b3-9fa7-527a1ffed74a

📥 Commits

Reviewing files that changed from the base of the PR and between 1afc027 and 7ef18c2.

📒 Files selected for processing (1)
  • openshift-hack/cmd/k8s-tests-ext/disabled_tests.go
🚧 Files skipped from review as they are similar to previous changes (1)
  • openshift-hack/cmd/k8s-tests-ext/disabled_tests.go

Walkthrough

Replaces an existing disabled test entry with a more specific, tagged variant for the Container Runtime private registry pull test in SpecialConfig, referencing OCPBUGS-77243; no functional logic or signatures changed. (Lines changed: +4 / -6)

Changes

Cohort / File(s) Summary
Disabled Tests Configuration
openshift-hack/cmd/k8s-tests-ext/disabled_tests.go
Removed a generic disabled test string for the Container Runtime private-registry pull case and added a more specific, tagged entry: "[sig-node] Container Runtime blackbox test when running a container with a new image [Serial] should be able to pull from private registry with secret [NodeConformance]" (comment references OCPBUGS-77243).

Estimated code review effort

🎯 1 (Trivial) | ⏱️ ~3 minutes

🚥 Pre-merge checks | ✅ 5
✅ Passed checks (5 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title 'OCPBUGS-77243: test: skip private registry test' clearly and specifically summarizes the main change: skipping a private registry test and references the related Jira issue, which aligns with the changeset that updates disabled_tests.go to skip this specific test.
Docstring Coverage ✅ Passed Docstring coverage is 100.00% which is sufficient. The required threshold is 80.00%.
Stable And Deterministic Test Names ✅ Passed The added test name contains only static descriptive strings and tags with no dynamic elements, timestamps, generated identifiers, or variable content.
Test Structure And Quality ✅ Passed The modified file is a configuration utility for managing disabled tests, not a Ginkgo test file, and therefore the test structure quality requirements do not apply.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment

Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci-robot
Copy link
Copy Markdown

@haircommander: This pull request references Jira Issue OCPBUGS-77243, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.22.0) matches configured target version for branch (4.22.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @lyman9966

Details

In response to this:

as it requires CRI-O be setup to allow insecure registries

What type of PR is this?

What this PR does / why we need it:

Which issue(s) this PR is related to:

Special notes for your reviewer:

Does this PR introduce a user-facing change?


Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


Summary by CodeRabbit

  • Chores
  • Updated test exclusions for container runtime conformance tests.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Caution

Some comments are outside the diff and can’t be posted inline due to platform limitations.

⚠️ Outside diff range comments (1)
openshift-hack/cmd/k8s-tests-ext/disabled_tests.go (1)

180-181: ⚠️ Potential issue | 🟡 Minor

Duplicate entry — test already added to SpecialConfig (line 67).

This test string is identical to the one added at line 67 in the "SpecialConfig" section. Since filterOutDisabledSpecs collects all disabled tests into a single set regardless of category, this duplication is functionally redundant.

More importantly, there's a category mismatch:

  • SpecialConfig: For tests requiring special configuration not supported OOTB (permanent)
  • RebaseInProgress: For tests temporarily disabled during rebase (temporary)

The PR description indicates this requires CRI-O to be configured for insecure registries, which sounds like a permanent configuration requirement, not a temporary rebase issue. Consider removing this entry from "RebaseInProgress" and keeping only the entry in "SpecialConfig" to avoid confusion about when this test should be re-enabled.

Suggested fix
 		// tests that need to be temporarily disabled while the rebase is in progress.
 		"RebaseInProgress": {
 			// https://issues.redhat.com/browse/OCPBUGS-61515
 			"[sig-scheduling] SchedulerPreemption [Serial] validates various priority Pods preempt expectedly with the async preemption [Feature:SchedulerAsyncPreemption] [FeatureGate:SchedulerAsyncPreemption] [Beta]",

 			// https://issues.redhat.com/browse/OCPBUGS-61378
 			"[sig-network] Conntrack should be able to cleanup conntrack entries when UDP service target port changes for a NodePort service",
-
-			// https://issues.redhat.com/browse/OCPBUGS-77243
-			"[sig-node] Container Runtime blackbox test when running a container with a new image [Serial] should be able to pull from private registry with secret [NodeConformance]",
 		},
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@openshift-hack/cmd/k8s-tests-ext/disabled_tests.go` around lines 180 - 181,
Remove the duplicate test entry from the RebaseInProgress list: the string
"[sig-node] Container Runtime blackbox test when running a container with a new
image [Serial] should be able to pull from private registry with secret
[NodeConformance]" is already present in SpecialConfig (see SpecialConfig
section) and should not be listed under RebaseInProgress; update the
RebaseInProgress slice/variable in disabled_tests.go to delete that string so
filterOutDisabledSpecs only sees it once and the categorization (SpecialConfig
vs RebaseInProgress) correctly reflects the permanent special-configuration
requirement.
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Outside diff comments:
In `@openshift-hack/cmd/k8s-tests-ext/disabled_tests.go`:
- Around line 180-181: Remove the duplicate test entry from the RebaseInProgress
list: the string "[sig-node] Container Runtime blackbox test when running a
container with a new image [Serial] should be able to pull from private registry
with secret [NodeConformance]" is already present in SpecialConfig (see
SpecialConfig section) and should not be listed under RebaseInProgress; update
the RebaseInProgress slice/variable in disabled_tests.go to delete that string
so filterOutDisabledSpecs only sees it once and the categorization
(SpecialConfig vs RebaseInProgress) correctly reflects the permanent
special-configuration requirement.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml

Review profile: CHILL

Plan: Pro

Run ID: cfddc314-fdc2-4739-acdd-c46b087b74d3

📥 Commits

Reviewing files that changed from the base of the PR and between ac14da2 and 1afc027.

📒 Files selected for processing (1)
  • openshift-hack/cmd/k8s-tests-ext/disabled_tests.go

as it requires CRI-O be setup to allow insecure registries

Signed-off-by: Peter Hunt <pehunt@redhat.com>
@openshift-ci-robot
Copy link
Copy Markdown

@haircommander: the contents of this pull request could not be automatically validated.

The following commits could not be validated and must be approved by a top-level approver:

Comment /validate-backports to re-evaluate validity of the upstream PRs, for example when they are merged upstream.

@openshift-ci-robot
Copy link
Copy Markdown

@haircommander: This pull request references Jira Issue OCPBUGS-77243, which is valid.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.22.0) matches configured target version for branch (4.22.0)
  • bug is in the state POST, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @lyman9966

Details

In response to this:

as it requires CRI-O be setup to allow insecure registries

What type of PR is this?

What this PR does / why we need it:

Which issue(s) this PR is related to:

Special notes for your reviewer:

Does this PR introduce a user-facing change?


Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:


Summary by CodeRabbit

  • Chores
  • Updated test exclusions for container runtime conformance tests: replaced a generic exclusion with a more specific, tagged variant (references OCPBUGS-77243).

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@jacobsee
Copy link
Copy Markdown
Member

jacobsee commented Mar 9, 2026

/lgtm

@openshift-ci openshift-ci Bot added the lgtm Indicates that a PR is ready to be merged. label Mar 9, 2026
@jacobsee
Copy link
Copy Markdown
Member

/retest-required

@rphillips
Copy link
Copy Markdown

/approved
/verified by @rphillips

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Apr 29, 2026
@openshift-ci-robot
Copy link
Copy Markdown

@rphillips: This PR has been marked as verified by @rphillips.

Details

In response to this:

/approved
/verified by @rphillips

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@rphillips
Copy link
Copy Markdown

/approve

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Apr 29, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: haircommander, jacobsee, rphillips

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci Bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 29, 2026
@rphillips
Copy link
Copy Markdown

/remove-label backports/unvalidated-commits

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented Apr 29, 2026

@rphillips: The label(s) backports/unvalidated-commits cannot be applied or removed, because you are not in one of the allowed teams and are not an allowed user. Must be a member of one of these teams: openshift-staff-engineers

Details

In response to this:

/remove-label backports/unvalidated-commits

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@mrunalp mrunalp removed the backports/unvalidated-commits Indicates that not all commits come to merged upstream PRs. label Apr 29, 2026
@openshift-merge-bot
Copy link
Copy Markdown

/retest-required

Remaining retests: 0 against base HEAD 2447118 and 2 for PR HEAD 7ef18c2 in total

@openshift-merge-bot
Copy link
Copy Markdown

/retest-required

Remaining retests: 0 against base HEAD 5f099cc and 1 for PR HEAD 7ef18c2 in total

@haircommander
Copy link
Copy Markdown
Member Author

/retest

1 similar comment
@haircommander
Copy link
Copy Markdown
Member Author

/retest

@openshift-merge-bot
Copy link
Copy Markdown

/retest-required

Remaining retests: 0 against base HEAD f9b62a6 and 0 for PR HEAD 7ef18c2 in total

@openshift-merge-bot
Copy link
Copy Markdown

/hold

Revision 7ef18c2 was retested 3 times: holding

@openshift-merge-bot
Copy link
Copy Markdown

/retest-required

Remaining retests: 0 against base HEAD f9b62a6 and 2 for PR HEAD 7ef18c2 in total

@openshift-ci
Copy link
Copy Markdown

openshift-ci Bot commented May 9, 2026

@haircommander: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-ovn-runc 7ef18c2 link false /test e2e-aws-ovn-runc
ci/prow/e2e-aws-ovn-hypershift 7ef18c2 link unknown /test e2e-aws-ovn-hypershift

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants