Skip to content

Conversation

@dkhater-redhat
Copy link
Contributor

@dkhater-redhat dkhater-redhat commented Oct 30, 2025

- What I did
Added safety check to only serve layered images during node bootstrap when UpdatedMachineCount > 0, ensuring at least one node has validated the build before serving it to newly scaled nodes. Also prevents serving internal registry images during bootstrap (DNS unavailable).

- How to verify it
- Builds layered image
- Waits for first node to adopt image (UpdatedMachineCount > 0)
- Scales up MachineSet
- Verifies new node gets layered image during bootstrap (1-reboot path)
- Description for the changelog

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Oct 30, 2025
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Oct 30, 2025

@dkhater-redhat: This pull request references MCO-1940 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

In response to this:

- What I did

- How to verify it

- Description for the changelog

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Oct 30, 2025
@dkhater-redhat dkhater-redhat force-pushed the mco-1940-safer-layered-image-serving branch from f2f3c2f to ad43c64 Compare October 30, 2025 21:01
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Oct 30, 2025

@dkhater-redhat: This pull request references MCO-1940 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

In response to this:

- What I did
Added safety check to only serve layered images during node bootstrap when UpdatedMachineCount > 0, ensuring at least one node has validated the build before serving it to newly scaled nodes. Also prevents serving internal registry images during bootstrap (DNS unavailable).

- How to verify it

  • Builds layered image
  • Waits for first node to adopt image (UpdatedMachineCount > 0)
  • Scales up MachineSet
  • Verifies new node gets layered image during bootstrap (1-reboot path)
    - Description for the changelog

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@dkhater-redhat dkhater-redhat force-pushed the mco-1940-safer-layered-image-serving branch from ad43c64 to 722c732 Compare October 30, 2025 21:12
@dkhater-redhat
Copy link
Contributor Author

@pablintino this is the follow up PR for the reboot work. please LMK what you think.

@dkhater-redhat dkhater-redhat force-pushed the mco-1940-safer-layered-image-serving branch from 5bcb821 to ca8c4dd Compare November 10, 2025 21:57
@dkhater-redhat dkhater-redhat force-pushed the mco-1940-safer-layered-image-serving branch 2 times, most recently from 0359b8c to a3889ee Compare November 11, 2025 15:49
@dkhater-redhat dkhater-redhat force-pushed the mco-1940-safer-layered-image-serving branch from a3889ee to f9536e2 Compare November 11, 2025 18:22
Copy link
Member

@isabella-janssen isabella-janssen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm

All previous review comments were addressed, so this should be good to go!

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Nov 12, 2025
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 12, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: dkhater-redhat, isabella-janssen

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:
  • OWNERS [dkhater-redhat,isabella-janssen]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@ptalgulk01
Copy link

Pre-merge verified

Environment Setup
OpenShift Version: 4.21.0-0-2025-11-13-061421-test-ci-ln-w489gi2-latest
Platform: AWS

Testing Scenarios

Tested for both internal and external registry

  • Scale the node when OCL is enabled and MCP is still updating check new node has right OCL image.
  • Scale the node form existing Machineset and check new node has right OCL image
  • Create Duplicate machineset, scale the node and check new node has right OCL image

Note: Internal registry always requires 2 reboots for new node joining

Test Steps:

  • Create Image Registry Secret
$ oc create secret docker-registry layering-push-secret \
--docker-server=quay.io \
--docker-username=<username> \
--docker-password=<password> \
--docker-email="" \
-n openshift-machine-config-operator
secret/layering-push-secret created

$  oc get pods -n openshift-machine-config-operator
layering-push-secret                        kubernetes.io/dockerconfigjson        1      12s
  • Apply the below MOSC
MOSC external template
oc create -f - << EOF
apiVersion: machineconfiguration.openshift.io/v1
kind: MachineOSConfig
metadata:
  name: worker
spec:
  machineConfigPool:
    name: worker
  imageBuilder:
    imageBuilderType: Job
  baseImagePullSecret:
    name: $(oc get secret -n openshift-config pull-secret -o json | jq "del(.metadata.namespace, .metadata.creationTimestamp, .metadata.resourceVersion, .metadata.uid, .metadata.name)" | jq '.metadata.name="pull-copy"' | oc -n openshift-machine-config-operator create -f - &> /dev/null; echo -n "pull-copy")
  renderedImagePushSecret:
    name:  layering-push-secret
  renderedImagePushSpec: "quay.io/mcoqe/layering:ocl"

EOF
machineosconfig.machineconfiguration.openshift.io/worker created

  • Check MOSB is succeeded
$ oc get machineosbuilds
NAME                                      PREPARED   BUILDING   SUCCEEDED   INTERRUPTED   FAILED   AGE
worker-ab4af923d4c7fcbbc4ba9b96e9b99153   False      False      True        False         False    66m
  • When MCP count is > 0 scale the new node
$ oc get mcp 
NAME     CONFIG                                             UPDATED   UPDATING   DEGRADED   MACHINECOUNT   READYMACHINECOUNT   UPDATEDMACHINECOUNT   DEGRADEDMACHINECOUNT   AGE
master   rendered-master-276efa5b5cb35d6ff2e2a87d495bf2fc   True      False      False      3              3                   3                     0                      87m
worker   rendered-worker-6fd45a1e637e9f3af77af474bb8bb138   False     True       False      3              0                   0                     0                      87m
worker   rendered-worker-6fd45a1e637e9f3af77af474bb8bb138   False     True       False      3              1                   1                     0                      90m

$ oc scale --replicas 2  machinesets.machine.openshift.io -n openshift-machine-api dalia-1411a-qxnvp-worker-us-east-2c
machineset.machine.openshift.io/dalia-1411a-qxnvp-worker-us-east-2c scaled
  • Check new node is updated and has the OCL image without reboot
$ oc get machinesets.machine.openshift.io  -n openshift-machine-api
NAME                                  DESIRED   CURRENT   READY   AVAILABLE   AGE
dalia-1411a-qxnvp-worker-us-east-2a   1         1         1       1           107m
dalia-1411a-qxnvp-worker-us-east-2b   1         1         1       1           107m
dalia-1411a-qxnvp-worker-us-east-2c   2         2         2       2           107m

oc debug node/ip-10-0-79-73.us-east-2.compute.internal -- chroot /host rpm-ostree status
Starting pod/ip-10-0-79-73us-east-2computeinternal-debug-s4dpd ...
To use host binaries, run `chroot /host`
State: idle
Deployments:
* ostree-unverified-registry:quay.io/mcoqe/layering@sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                   Digest: sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                  Version: 9.6.20251105-0 (2025-11-14T05:57:48Z)

Removing debug pod ...
  • After the MCP is updated scale the node for existing machineset and check new node has OCL image
$ oc scale --replicas 2  machinesets.machine.openshift.io -n openshift-machine-api dalia-1411a-qxnvp-worker-us-east-2b
machineset.machine.openshift.io/dalia-1411a-qxnvp-worker-us-east-2b scaled

$ oc get machinesets.machine.openshift.io  -n openshift-machine-api
NAME                                  DESIRED   CURRENT   READY   AVAILABLE   AGE
dalia-1411a-qxnvp-worker-us-east-2a   1         1         1       1           122m
dalia-1411a-qxnvp-worker-us-east-2b   2         2         2       2           121m
dalia-1411a-qxnvp-worker-us-east-2c   2         2         2       2           121m

$ oc debug node/ip-10-0-38-95.us-east-2.compute.internal -- chroot /host rpm-ostree status
Starting pod/ip-10-0-38-95us-east-2computeinternal-debug-pxnkc ...
To use host binaries, run `chroot /host`
State: idle
Deployments:
* ostree-unverified-registry:quay.io/mcoqe/layering@sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                   Digest: sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                  Version: 9.6.20251105-0 (2025-11-14T05:57:48Z)

Removing debug pod ...
  • Create the duplicate machineset and check the new node has the right OCL image
$ oc get machinesets.machine.openshift.io  -n openshift-machine-api dalia-1411a-qxnvp-worker-us-east-2c -o yaml > ms.yaml

# Edit the name in in ms.yaml

$ oc apply -f ms.yaml
machineset.machine.openshift.io/dalia-1411a-qxnvp-worker-us-east-2c-ocl created

$ oc get machinesets.machine.openshift.io  -n openshift-machine-api
NAME                                      DESIRED   CURRENT   READY   AVAILABLE   AGE
dalia-1411a-qxnvp-worker-us-east-2a       1         1         1       1           135m
dalia-1411a-qxnvp-worker-us-east-2b       2         2         2       2           135m
dalia-1411a-qxnvp-worker-us-east-2c       2         2         2       2           135m
dalia-1411a-qxnvp-worker-us-east-2c-ocl   2         2         2       2           4m20s

$ oc debug node/ip-10-0-66-77.us-east-2.compute.internal -- chroot /host rpm-ostree status
Starting pod/ip-10-0-66-77us-east-2computeinternal-debug-j94ds ...
To use host binaries, run `chroot /host`
State: idle
Deployments:
* ostree-unverified-registry:quay.io/mcoqe/layering@sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                   Digest: sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                  Version: 9.6.20251105-0 (2025-11-14T05:57:48Z)

Removing debug pod ...

Similarly verified for internal registry.

/label qe-approved
/verified by @ptalgulk01

@openshift-ci openshift-ci bot added the qe-approved Signifies that QE has signed off on this PR label Nov 14, 2025
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Nov 14, 2025

@dkhater-redhat: This pull request references MCO-1940 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

In response to this:

- What I did
Added safety check to only serve layered images during node bootstrap when UpdatedMachineCount > 0, ensuring at least one node has validated the build before serving it to newly scaled nodes. Also prevents serving internal registry images during bootstrap (DNS unavailable).

- How to verify it

  • Builds layered image
  • Waits for first node to adopt image (UpdatedMachineCount > 0)
  • Scales up MachineSet
  • Verifies new node gets layered image during bootstrap (1-reboot path)
    - Description for the changelog

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label Nov 14, 2025
@openshift-ci-robot
Copy link
Contributor

@ptalgulk01: This PR has been marked as verified by @ptalgulk01.

In response to this:

Pre-merge verified

Environment Setup
OpenShift Version: 4.21.0-0-2025-11-13-061421-test-ci-ln-w489gi2-latest
Platform: AWS

Testing Scenarios

Tested for both internal and external registry

  • Scale the node when OCL is enabled and MCP is still updating check new node has right OCL image.
  • Scale the node form existing Machineset and check new node has right OCL image
  • Create Duplicate machineset, scale the node and check new node has right OCL image

Note: Internal registry always requires 2 reboots for new node joining

Test Steps:

  • Create Image Registry Secret
$ oc create secret docker-registry layering-push-secret \
--docker-server=quay.io \
--docker-username=<username> \
--docker-password=<password> \
--docker-email="" \
-n openshift-machine-config-operator
secret/layering-push-secret created

$  oc get pods -n openshift-machine-config-operator
layering-push-secret                        kubernetes.io/dockerconfigjson        1      12s
  • Apply the below MOSC
MOSC external template
oc create -f - << EOF
apiVersion: machineconfiguration.openshift.io/v1
kind: MachineOSConfig
metadata:
 name: worker
spec:
 machineConfigPool:
   name: worker
 imageBuilder:
   imageBuilderType: Job
 baseImagePullSecret:
   name: $(oc get secret -n openshift-config pull-secret -o json | jq "del(.metadata.namespace, .metadata.creationTimestamp, .metadata.resourceVersion, .metadata.uid, .metadata.name)" | jq '.metadata.name="pull-copy"' | oc -n openshift-machine-config-operator create -f - &> /dev/null; echo -n "pull-copy")
 renderedImagePushSecret:
   name:  layering-push-secret
 renderedImagePushSpec: "quay.io/mcoqe/layering:ocl"

EOF
machineosconfig.machineconfiguration.openshift.io/worker created

  • Check MOSB is succeeded
$ oc get machineosbuilds
NAME                                      PREPARED   BUILDING   SUCCEEDED   INTERRUPTED   FAILED   AGE
worker-ab4af923d4c7fcbbc4ba9b96e9b99153   False      False      True        False         False    66m
  • When MCP count is > 0 scale the new node
$ oc get mcp 
NAME     CONFIG                                             UPDATED   UPDATING   DEGRADED   MACHINECOUNT   READYMACHINECOUNT   UPDATEDMACHINECOUNT   DEGRADEDMACHINECOUNT   AGE
master   rendered-master-276efa5b5cb35d6ff2e2a87d495bf2fc   True      False      False      3              3                   3                     0                      87m
worker   rendered-worker-6fd45a1e637e9f3af77af474bb8bb138   False     True       False      3              0                   0                     0                      87m
worker   rendered-worker-6fd45a1e637e9f3af77af474bb8bb138   False     True       False      3              1                   1                     0                      90m

$ oc scale --replicas 2  machinesets.machine.openshift.io -n openshift-machine-api dalia-1411a-qxnvp-worker-us-east-2c
machineset.machine.openshift.io/dalia-1411a-qxnvp-worker-us-east-2c scaled
  • Check new node is updated and has the OCL image without reboot
$ oc get machinesets.machine.openshift.io  -n openshift-machine-api
NAME                                  DESIRED   CURRENT   READY   AVAILABLE   AGE
dalia-1411a-qxnvp-worker-us-east-2a   1         1         1       1           107m
dalia-1411a-qxnvp-worker-us-east-2b   1         1         1       1           107m
dalia-1411a-qxnvp-worker-us-east-2c   2         2         2       2           107m

oc debug node/ip-10-0-79-73.us-east-2.compute.internal -- chroot /host rpm-ostree status
Starting pod/ip-10-0-79-73us-east-2computeinternal-debug-s4dpd ...
To use host binaries, run `chroot /host`
State: idle
Deployments:
* ostree-unverified-registry:quay.io/mcoqe/layering@sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                  Digest: sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                 Version: 9.6.20251105-0 (2025-11-14T05:57:48Z)

Removing debug pod ...
  • After the MCP is updated scale the node for existing machineset and check new node has OCL image
$ oc scale --replicas 2  machinesets.machine.openshift.io -n openshift-machine-api dalia-1411a-qxnvp-worker-us-east-2b
machineset.machine.openshift.io/dalia-1411a-qxnvp-worker-us-east-2b scaled

$ oc get machinesets.machine.openshift.io  -n openshift-machine-api
NAME                                  DESIRED   CURRENT   READY   AVAILABLE   AGE
dalia-1411a-qxnvp-worker-us-east-2a   1         1         1       1           122m
dalia-1411a-qxnvp-worker-us-east-2b   2         2         2       2           121m
dalia-1411a-qxnvp-worker-us-east-2c   2         2         2       2           121m

$ oc debug node/ip-10-0-38-95.us-east-2.compute.internal -- chroot /host rpm-ostree status
Starting pod/ip-10-0-38-95us-east-2computeinternal-debug-pxnkc ...
To use host binaries, run `chroot /host`
State: idle
Deployments:
* ostree-unverified-registry:quay.io/mcoqe/layering@sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                  Digest: sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                 Version: 9.6.20251105-0 (2025-11-14T05:57:48Z)

Removing debug pod ...
  • Create the duplicate machineset and check the new node has the right OCL image
$ oc get machinesets.machine.openshift.io  -n openshift-machine-api dalia-1411a-qxnvp-worker-us-east-2c -o yaml > ms.yaml

# Edit the name in in ms.yaml

$ oc apply -f ms.yaml
machineset.machine.openshift.io/dalia-1411a-qxnvp-worker-us-east-2c-ocl created

$ oc get machinesets.machine.openshift.io  -n openshift-machine-api
NAME                                      DESIRED   CURRENT   READY   AVAILABLE   AGE
dalia-1411a-qxnvp-worker-us-east-2a       1         1         1       1           135m
dalia-1411a-qxnvp-worker-us-east-2b       2         2         2       2           135m
dalia-1411a-qxnvp-worker-us-east-2c       2         2         2       2           135m
dalia-1411a-qxnvp-worker-us-east-2c-ocl   2         2         2       2           4m20s

$ oc debug node/ip-10-0-66-77.us-east-2.compute.internal -- chroot /host rpm-ostree status
Starting pod/ip-10-0-66-77us-east-2computeinternal-debug-j94ds ...
To use host binaries, run `chroot /host`
State: idle
Deployments:
* ostree-unverified-registry:quay.io/mcoqe/layering@sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                  Digest: sha256:da49d058c6b431d20fc7875e1248dea283e85fec725259ef8bd9920f304708ee
                 Version: 9.6.20251105-0 (2025-11-14T05:57:48Z)

Removing debug pod ...

Similarly verified for internal registry.

/label qe-approved
/verified by @ptalgulk01

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link
Contributor

/retest-required

Remaining retests: 0 against base HEAD ca0c19d and 2 for PR HEAD f9536e2 in total

@dkhater-redhat
Copy link
Contributor Author

/test e2e-gcp-op-1of2

@dkhater-redhat
Copy link
Contributor Author

/test e2e-hypershift

@dkhater-redhat
Copy link
Contributor Author

/test e2e-aws-ovn

@dkhater-redhat
Copy link
Contributor Author

/test e2e-hypershift

@dkhater-redhat
Copy link
Contributor Author

/test e2e-hypershift

@openshift-ci-robot
Copy link
Contributor

/retest-required

Remaining retests: 0 against base HEAD 661e30e and 1 for PR HEAD f9536e2 in total

@dkhater-redhat
Copy link
Contributor Author

/override ci/prow/e2e-hypershift

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 17, 2025

@dkhater-redhat: Overrode contexts on behalf of dkhater-redhat: ci/prow/e2e-hypershift

In response to this:

/override ci/prow/e2e-hypershift

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@dkhater-redhat
Copy link
Contributor Author

/retest-required

@dkhater-redhat
Copy link
Contributor Author

/override ci/prow/images
/override ci/prow/okd-scos-images

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 17, 2025

@dkhater-redhat: Overrode contexts on behalf of dkhater-redhat: ci/prow/images, ci/prow/okd-scos-images

In response to this:

/override ci/prow/images
/override ci/prow/okd-scos-images

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 17, 2025

@dkhater-redhat: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/bootstrap-unit f9536e2 link false /test bootstrap-unit

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@dkhater-redhat
Copy link
Contributor Author

/override e2e-aws-ovn-upgrade
/override e2e-aws-ovn

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 18, 2025

@dkhater-redhat: /override requires failed status contexts, check run or a prowjob name to operate on.
The following unknown contexts/checkruns were given:

  • e2e-aws-ovn
  • e2e-aws-ovn-upgrade

Only the following failed contexts/checkruns were expected:

  • ci/prow/bootstrap-unit
  • ci/prow/e2e-aws-ovn
  • ci/prow/e2e-aws-ovn-upgrade
  • ci/prow/e2e-gcp-op-1of2
  • ci/prow/e2e-gcp-op-2of2
  • ci/prow/e2e-gcp-op-single-node
  • ci/prow/e2e-hypershift
  • ci/prow/images
  • ci/prow/okd-scos-e2e-aws-ovn
  • ci/prow/okd-scos-images
  • ci/prow/security
  • ci/prow/unit
  • ci/prow/verify
  • ci/prow/verify-deps
  • pull-ci-openshift-machine-config-operator-main-bootstrap-unit
  • pull-ci-openshift-machine-config-operator-main-e2e-aws-ovn
  • pull-ci-openshift-machine-config-operator-main-e2e-aws-ovn-upgrade
  • pull-ci-openshift-machine-config-operator-main-e2e-gcp-op-1of2
  • pull-ci-openshift-machine-config-operator-main-e2e-gcp-op-2of2
  • pull-ci-openshift-machine-config-operator-main-e2e-gcp-op-single-node
  • pull-ci-openshift-machine-config-operator-main-e2e-hypershift
  • pull-ci-openshift-machine-config-operator-main-images
  • pull-ci-openshift-machine-config-operator-main-okd-scos-e2e-aws-ovn
  • pull-ci-openshift-machine-config-operator-main-okd-scos-images
  • pull-ci-openshift-machine-config-operator-main-security
  • pull-ci-openshift-machine-config-operator-main-unit
  • pull-ci-openshift-machine-config-operator-main-verify
  • pull-ci-openshift-machine-config-operator-main-verify-deps
  • tide

If you are trying to override a checkrun that has a space in it, you must put a double quote on the context.

In response to this:

/override e2e-aws-ovn-upgrade
/override e2e-aws-ovn

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@dkhater-redhat
Copy link
Contributor Author

/override ci/prow/e2e-aws-ovn
/override ci/prow/e2e-aws-ovn-upgrade

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Nov 18, 2025

@dkhater-redhat: Overrode contexts on behalf of dkhater-redhat: ci/prow/e2e-aws-ovn, ci/prow/e2e-aws-ovn-upgrade

In response to this:

/override ci/prow/e2e-aws-ovn
/override ci/prow/e2e-aws-ovn-upgrade

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-merge-bot openshift-merge-bot bot merged commit b3e3c8a into openshift:main Nov 18, 2025
14 of 15 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. qe-approved Signifies that QE has signed off on this PR verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants