Skip to content

Conversation

@rhamini3
Copy link
Contributor

@rhamini3 rhamini3 commented Dec 2, 2025

Commit to add documentation for the pre-release-ossm script so others can get started on it

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Dec 2, 2025
@openshift-ci-robot
Copy link
Contributor

openshift-ci-robot commented Dec 2, 2025

@rhamini3: This pull request references NE-1743 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

Details

In response to this:

Commit to add documentation for the pre-release-ossm script so others can get started on it

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@rhamini3
Copy link
Contributor Author

rhamini3 commented Dec 2, 2025

/assign @alebedev87
/assign @candita

@alebedev87
Copy link
Contributor

@rhamini3 : LGTM, can you please fix up commits to a single one?

@rhamini3 rhamini3 force-pushed the doc-ossm branch 2 times, most recently from 4c0a953 to 5e890bb Compare December 3, 2025 22:51
@alebedev87
Copy link
Contributor

/lgtm
/approve
/hold

For Candace to have a look.

@openshift-ci openshift-ci bot added do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. lgtm Indicates that a PR is ready to be merged. labels Dec 3, 2025
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 3, 2025

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: alebedev87

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 3, 2025
@rhamini3
Copy link
Contributor Author

/test e2e-aws-pre-release-ossm

1 similar comment
@rhamini3
Copy link
Contributor Author

/test e2e-aws-pre-release-ossm

```
$ make test-e2e
```

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this documentation belongs in in the /hack directory. Just the make test-pre-release-ossm command belongs in HACKING.md, with a pointer to the documentation.

Did you and Andrey discuss this?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Did you and Andrey discuss this?

Not really.

I think it's fine to keep it here. hack/ directory is a common place for all the scripts we use. verify, run-local, update targets all use scripts from hack/ directory. HACKING.md already has precedents for targets which use hack/ directory: run-local, buildconfig.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

leaving it in hacking.md then


- Obtain Brew Pull Secret
```shell
$ podman login --authfile=/tmp/authbrew --username="${BREW_USER}" --password="${BREW_PASS}" brew.registry.redhat.io
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Question - what creates the files in /tmp ?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the podman login pulls a secret from the brew and stage registries which are then applied into the clusters pull secret. these files can also be found in the CI vault

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's the login that creates the files. They don't have to be pre-existing.

HACKING.md Outdated
$ podman login --authfile=/tmp/authbrew --username="${BREW_USER}" --password="${BREW_PASS}" brew.registry.redhat.io
```

- Obtain the Konflux Token from the secrets folder in [CI Vault](https://vault.ci.openshift.org/ui/vault/secrets/kv/kv/list/selfservice/nid-ossm-token/).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should you set the KONFLUX_TOKEN environment variable with the contents of that file?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thats right I will also add in the specific file to look at for each variable?

@candita
Copy link
Contributor

candita commented Dec 17, 2025

@rhamini3 this is great information. Please fix a few more nits and move the doc to the /hack directory. Just keep the make command in the HACKING.md file.

@openshift-ci openshift-ci bot removed the lgtm Indicates that a PR is ready to be merged. label Dec 18, 2025
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 18, 2025

New changes are detected. LGTM label has been removed.

@rhamini3
Copy link
Contributor Author

@alebedev87 @candita for one final round


- Connect to Red Hat VPN.

- Create new service accounts for [stage registry](https://access.stage.redhat.com/terms-based-registry/accounts) and [brew registry](https://access.redhat.com/terms-based-registry/accounts).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't have access to access.stage.redhat.com, it gives an error.

I do have access to access.redhat.com,

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@alebedev87 did you test this part? I still cannot open the first link, even on vpn.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think I did but my memory is blurry on this one already, may be I used the token from the CI vault to test the script. I can confirm that I'm having auth troubles accessing access.stage.redhat.com too. I'll have a look why I cannot login to the stage link. Meanwhile, if Ishmam (and maybe other QEs) can login I'm fine with the instructions.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@lihongan @ShudiLi can you please try and check if you can access the stage registry: https://access.stage.redhat.com/terms-based-registry/accounts

Please login to VPN before accessing the link or else you will get a pre-prod lockdown error

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@rhamini3 Yes, I can access it(Yesterday, I used my email address to login, but the passwords I input were always wrong, so I reset it by clicking forget the password)

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 5, 2026

@rhamini3: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-aws-pre-release-ossm 5e890bb link false /test e2e-aws-pre-release-ossm
ci/prow/okd-scos-images 7d49a04 link true /test okd-scos-images

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

```

- Obtain the Konflux Token
1. Access the [CI Vault](https://vault.ci.openshift.org/ui/vault/secrets/kv/kv/list/selfservice/nid-ossm-token/).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All our team member can access this ? or just a few members can access it?
If it is not for all members please provide the contacts so others can reach out to get the token.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When accessed https://vault.ci.openshift.org/ui/vault/secrets/kv/kv/list/selfservice/nid-ossm-token/, Not authorized issue occur

Not authorized
Ember Data Request GET /v1/sys/internal/ui/mounts/kv returned a 403 Payload (application/json) [object Object]

preflight capability check returned 403, please ensure client's policies grant access to path "kv/"

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ShudiLi @lihongan please try again I have updated the permissions

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@rhamini3 Yes, I can access it now. I will continue to review this PR, thanks.

Comment on lines +161 to +163
```shell
$ TOKEN="$(cat konflux.tmp)" AUTHSTAGE="$(cat /tmp/authstage)" AUTHBREW="$(cat /tmp/authbrew)" make test-pre-release-ossm
```
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can run the make test-pre-release-ossm on 4.22.0-0.nightly-2026-01-06-164201, but there are errors

# TOKEN="$(cat /tmp/konflux.tmp)" AUTHSTAGE="$(cat /tmp/authstage)" AUTHBREW="$(cat /tmp/authbrew)" make test-pre-release-ossm
...
--- FAIL: TestGatewayAPI (1528.29s)
    --- PASS: TestGatewayAPI/testGatewayAPIResources (40.58s)
    --- FAIL: TestGatewayAPI/testGatewayAPIObjects (303.37s)
    --- FAIL: TestGatewayAPI/testGatewayAPIManualDeployment (601.74s)
    --- FAIL: TestGatewayAPI/testGatewayAPIIstioInstallation (32.73s)
    --- FAIL: TestGatewayAPI/testGatewayAPIDNS (363.21s)
        --- FAIL: TestGatewayAPI/testGatewayAPIDNS/multipleGatewaysSameListenerHostname (181.25s)
        --- FAIL: TestGatewayAPI/testGatewayAPIDNS/gatewayListenersWithOverlappingHostname (181.34s)
    --- FAIL: TestGatewayAPI/testGatewayAPIDNSListenerUpdate (181.02s)
panic: runtime error: invalid memory address or nil pointer dereference [recovered]
	panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x20 pc=0x1e6775c]
...
FAIL	github.com/openshift/cluster-ingress-operator/test/e2e	1531.731s
FAIL
make[1]: *** [Makefile:62: test-e2e] Error 1
make[1]: Leaving directory '/home/shudi/work/github/cluster-ingress-operator'
make: *** [Makefile:74: test-pre-release-ossm] Error 2

Copy link
Member

@ShudiLi ShudiLi Jan 8, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry, I have a 4.22 GCP cluster and did the make on my PC. I think the make error is expected.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ShudiLi can you confirm that you were able to run the script successfully?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants