Skip to content

CNTRLPLANE-3428: tls fix HyperShift guest-side CO wait and Custom profile handling#31194

Merged
openshift-merge-bot[bot] merged 7 commits into
openshift:mainfrom
gangwgr:tls-fix-hypershift-co
May 21, 2026
Merged

CNTRLPLANE-3428: tls fix HyperShift guest-side CO wait and Custom profile handling#31194
openshift-merge-bot[bot] merged 7 commits into
openshift:mainfrom
gangwgr:tls-fix-hypershift-co

Conversation

@gangwgr
Copy link
Copy Markdown
Contributor

@gangwgr gangwgr commented May 19, 2026

Fixed three HyperShift-specific failures in the TLS observed-config e2e tests:

  1. Unknown TLS profile type: Custom — After a config-change test sets a Custom profile and DeferCleanup doesn't fully restore, subsequent tests crash because getExpectedMinTLSVersionWithType tries to look up "Custom" in configv1.TLSProfiles, which only contains predefined profiles.

  2. ClusterOperator etcd did not reach stable state after 25m0s — waitForGuestOperatorsAfterTLSChange was iterating over all clusterOperatorNames including control-plane COs (etcd, kube-apiserver, etc.) that are managed by the HCP and shouldn't be polled from the guest cluster.

  3. deployments.apps "controller-manager" not found — guestSideDeploymentRolloutTargets() was returning all deployment rollout targets including control-plane ones (controller-manager, apiserver, cluster-version-operator) that don't exist on the guest cluster.

Summary by CodeRabbit

  • Tests
    • Enhanced TLS tests for HyperShift with refined target selection to skip management-cluster–only components
    • More reliable ConfigMap verification during TLS profile switches by polling until changes appear
    • Stricter validation for custom TLS profiles to require and use explicit custom settings
    • Narrowed operator stabilization checks to only relevant guest-side operators after TLS changes

Fix two issues found in HyperShift CI:

1. waitForGuestOperatorsAfterTLSChange was iterating over all
   clusterOperatorNames (including etcd, kube-apiserver, etc.) which
   run on the management cluster. On HyperShift these COs may not
   stabilize on the guest side after a TLS change, causing a 25m
   timeout. Use a new guestSideClusterOperatorNames list that only
   includes guest-side COs (image-registry, openshift-samples).

2. getExpectedMinTLSVersionWithType crashed with "Unknown TLS profile
   type: Custom" because configv1.TLSProfiles only contains predefined
   profiles. If a Custom profile is active (e.g. from a failed cleanup),
   read minTLSVersion directly from the Custom spec instead.
@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.

For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.

This repository is configured in: automatic mode

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 19, 2026

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@openshift-ci openshift-ci Bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 19, 2026
@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented May 19, 2026

Note

Reviews paused

It looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the reviews.auto_review.auto_pause_after_reviewed_commits setting.

Use the following commands to manage reviews:

  • @coderabbitai resume to resume automatic reviews.
  • @coderabbitai review to trigger a single review.

Use the checkboxes below for quick actions:

  • ▶️ Resume reviews
  • 🔍 Trigger review

Walkthrough

Narrow TLS test waits to HyperShift guest-side targets, skip management-cluster-only targets, poll ConfigMaps until inject-TLS and expected TLS appear, and derive Custom TLSProfile min version from Config.Spec.TLSSecurityProfile.Custom.MinTLSVersion.

Changes

TLS Profile Testing Enhancements

Layer / File(s) Summary
Target types and annotated target lists
test/extended/tls/tls_observed_config.go
Replace controlPlane with managementClusterComponent in typed target structs; mark observedConfig, ConfigMap, service, and deployment rollout targets that exist only on the management cluster.
Guest-side filters and operator list
test/extended/tls/tls_observed_config.go
Add guestSideClusterOperatorNames and implement guest-side filter helpers to return only targets where managementClusterComponent is false; adjust deployment rollout target filtering and guest operator wait list.
Test loops skipping management-cluster-only targets
test/extended/tls/tls_observed_config.go
Update read-only and disruptive test loops (observed-config, ConfigMap injection, deployment env vars, wire-level TLS, and restoration tests) to skip targets marked managementClusterComponent: true on HyperShift.
ConfigMap polling and TLSProfile custom handling
test/extended/tls/tls_observed_config.go
verifyConfigMapsForTargets now polls up to 5 minutes for the inject-TLS annotation and expected TLS version substring; getExpectedMinTLSVersionWithType requires .Custom for TLSProfileCustomType and reads minTLSVersion from Custom.MinTLSVersion.

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~20 minutes

Possibly related PRs

  • openshift/origin#31160: Both PRs modify test/extended/tls/tls_observed_config.go to implement HyperShift guest-side filtering by introducing/using guest-side target/operator subsets and updating wait logic.

Suggested reviewers

  • kaleemsiddiqu
🚥 Pre-merge checks | ✅ 10 | ❌ 2

❌ Failed checks (2 warnings)

Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 50.00% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.
Test Structure And Quality ⚠️ Warning 71% of assertions lack meaningful failure messages (35 of 49). Tests follow Ginkgo best practices for structure, cleanup, and timeouts, but violate assertion message requirement. Add failure messages to all o.Expect().NotTo(o.HaveOccurred()) assertions per quality guideline requirement.
✅ Passed checks (10 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title directly addresses the main changes: HyperShift-specific TLS fixes including guest-side ClusterOperator wait logic and Custom profile handling, which align with the core objectives.
Linked Issues check ✅ Passed Check skipped because no linked issues were found for this pull request.
Out of Scope Changes check ✅ Passed Check skipped because no linked issues were found for this pull request.
Stable And Deterministic Test Names ✅ Passed All Ginkgo test names use static, hardcoded values (namespace names and service ports) that never change between runs, making them stable and deterministic per requirements.
Microshift Test Compatibility ✅ Passed All Ginkgo tests in the modified file are protected from running on MicroShift via exutil.IsMicroShiftCluster() check with g.Skip() in BeforeEach blocks in both Describe declarations.
Single Node Openshift (Sno) Test Compatibility ✅ Passed No new test declarations added. Existing tests have no multi-node assumptions and skip MicroShift. All changes are topology-agnostic.
Topology-Aware Scheduling Compatibility ✅ Passed PR modifies only E2E test code (test/extended/tls/tls_observed_config.go) with no deployment manifests, operator code, controllers, or scheduling constraints introduced.
Ote Binary Stdout Contract ✅ Passed The modified file is a Ginkgo test package with no process-level stdout writes, init/main functions, klog usage, or fmt.Print calls outside test blocks.
Ipv6 And Disconnected Network Test Compatibility ✅ Passed No new Ginkgo tests added, only modifications to existing test utilities. Existing code properly tests both IPv4 and IPv6, with no external connectivity dependencies.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Comment @coderabbitai help to get the list of available commands and usage tips.

@gangwgr gangwgr force-pushed the tls-fix-hypershift-co branch from 9797b97 to b1ac6cd Compare May 19, 2026 11:27
@openshift-ci openshift-ci Bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label May 19, 2026
@openshift-ci openshift-ci Bot added the ready-for-human-review Indicates a PR has been reviewed by automated tools and is ready for human review label May 19, 2026
@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 19, 2026

/test pull-ci-openshift-origin-main-tls-observed-config-hypershift

@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 19, 2026

/test pull-ci-openshift-origin-main-tls-observed-config

@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 19, 2026

/test tls-observed-config-hypershift
/test tls-observed-config

On HyperShift, control-plane deployments like controller-manager and
apiserver do not exist on the guest cluster. Add controlPlane field to
deploymentRolloutTarget and filter them out in
guestSideDeploymentRolloutTargets() to prevent 404 errors during
post-TLS-change rollout verification.
@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 19, 2026

/test tls-observed-config-hypershift
/test tls-observed-config

@gangwgr gangwgr marked this pull request as ready for review May 19, 2026 16:13
@openshift-ci openshift-ci Bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 19, 2026
@gangwgr gangwgr changed the title tls: fix HyperShift guest-side CO wait and Custom profile handling CNTRLPLANE-3428: tls fix HyperShift guest-side CO wait and Custom profile handling May 19, 2026
@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label May 19, 2026
@openshift-ci-robot
Copy link
Copy Markdown

openshift-ci-robot commented May 19, 2026

@gangwgr: This pull request references CNTRLPLANE-3428 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "5.0.0" version, but no target version was set.

Details

In response to this:

Fix two issues found in HyperShift CI:

  1. waitForGuestOperatorsAfterTLSChange was iterating over all clusterOperatorNames (including etcd, kube-apiserver, etc.) which run on the management cluster. On HyperShift these COs may not stabilize on the guest side after a TLS change, causing a 25m timeout. Use a new guestSideClusterOperatorNames list that only includes guest-side COs (image-registry, openshift-samples).

  2. getExpectedMinTLSVersionWithType crashed with "Unknown TLS profile type: Custom" because configv1.TLSProfiles only contains predefined profiles. If a Custom profile is active (e.g. from a failed cleanup), read minTLSVersion directly from the Custom spec instead.

Summary by CodeRabbit

  • Bug Fixes
  • Ensure custom TLS profiles correctly determine the minimum TLS version.
  • Restrict post-TLS-change stability checks and rollout waiting to guest-side components in HyperShift scenarios.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

On HyperShift, guest-side operators and deployments stabilize quickly
but ConfigMap TLS annotation injection can lag. Replace the one-shot
check in verifyConfigMapsForTargets with polling (5s interval, 5m
timeout) so the test waits for propagation rather than failing
immediately.
@gangwgr gangwgr force-pushed the tls-fix-hypershift-co branch from e3c5d71 to 0a0131e Compare May 20, 2026 04:31
@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 20, 2026

/test tls-observed-config-hypershift
/test tls-observed-config

@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

Rename the controlPlane field across all target structs to
managementClusterComponent to better convey that the flag indicates
whether a component runs on the management cluster (and should be
skipped when testing from the guest cluster context on HyperShift).
@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 20, 2026

/retest-required

@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 20, 2026

/test tls-observed-config-hypershift
/test tls-observed-config

Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🧹 Nitpick comments (1)
test/extended/tls/tls_observed_config.go (1)

245-246: 💤 Low value

Update skip messages for consistency with field rename.

The skip messages reference "control-plane target" but the field was renamed from controlPlane to managementClusterComponent. For consistency, consider updating the skip messages.

♻️ Suggested message updates
-g.Skip(fmt.Sprintf("Skipping control-plane target %s on HyperShift (runs on management cluster)", target.namespace))
+g.Skip(fmt.Sprintf("Skipping management cluster component %s on HyperShift", target.namespace))

Apply similar changes to lines 257, 268, 279, and the disruptive test skip messages at lines 343, 350, 357, 364.

Also applies to: 256-257, 267-268, 278-279

🤖 Prompt for AI Agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

In `@test/extended/tls/tls_observed_config.go` around lines 245 - 246, The skip
text still says "control-plane target" but the field was renamed to
managementClusterComponent, so update the g.Skip messages invoked where the
condition uses isHyperShiftCluster && target.managementClusterComponent (and any
similar g.Skip calls in the same file that check
target.managementClusterComponent) to say something like "Skipping
management-cluster target %s on HyperShift (runs on management cluster)" and
apply the same wording change to the other occurrences and the disruptive test
skip messages that reference the old "control-plane target" phrasing; ensure you
update all g.Skip calls that mention the target.namespace and refer to
control-plane to use management-cluster instead.
🤖 Prompt for all review comments with AI agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

Inline comments:
In `@test/extended/tls/tls_observed_config.go`:
- Around line 112-117: The ConfigMap target entries in tls_observed_config.go
for the operator namespaces (the literal slice entries with namespace values
"openshift-controller-manager", "openshift-kube-apiserver",
"openshift-apiserver", "openshift-kube-controller-manager", and
"openshift-kube-scheduler") are missing managementClusterComponent: true; update
each of those ConfigMap target structs to include managementClusterComponent:
true so they match the corresponding observedConfigTargets and serviceTargets
pattern (i.e., add managementClusterComponent: true to the entries with
configMapName "openshift-controller-manager-operator-config",
"kube-apiserver-operator-config", "openshift-apiserver-operator-config",
"kube-controller-manager-operator-config", and
"openshift-kube-scheduler-operator-config").

---

Nitpick comments:
In `@test/extended/tls/tls_observed_config.go`:
- Around line 245-246: The skip text still says "control-plane target" but the
field was renamed to managementClusterComponent, so update the g.Skip messages
invoked where the condition uses isHyperShiftCluster &&
target.managementClusterComponent (and any similar g.Skip calls in the same file
that check target.managementClusterComponent) to say something like "Skipping
management-cluster target %s on HyperShift (runs on management cluster)" and
apply the same wording change to the other occurrences and the disruptive test
skip messages that reference the old "control-plane target" phrasing; ensure you
update all g.Skip calls that mention the target.namespace and refer to
control-plane to use management-cluster instead.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: ed931bc3-96a3-470c-8e1a-13ea809bc0d8

📥 Commits

Reviewing files that changed from the base of the PR and between 0a0131e and daa8f97.

📒 Files selected for processing (1)
  • test/extended/tls/tls_observed_config.go

Comment thread test/extended/tls/tls_observed_config.go Outdated
Add managementClusterComponent: true to ConfigMap targets for
controller-manager, kube-apiserver, openshift-apiserver,
kube-controller-manager, and kube-scheduler to match the corresponding
observedConfigTargets and serviceTargets. Also update g.Skip messages
to use "management-cluster component" wording consistently.
@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 20, 2026

/test tls-observed-config-hypershift
/test tls-observed-config

{namespace: "openshift-apiserver", operatorConfigGVR: schema.GroupVersionResource{Group: "operator.openshift.io", Version: "v1", Resource: "openshiftapiservers"}, operatorConfigName: "cluster", managementClusterComponent: true},
{namespace: "openshift-etcd", operatorConfigGVR: schema.GroupVersionResource{Group: "operator.openshift.io", Version: "v1", Resource: "etcds"}, operatorConfigName: "cluster", managementClusterComponent: true},
{namespace: "openshift-kube-controller-manager", operatorConfigGVR: schema.GroupVersionResource{Group: "operator.openshift.io", Version: "v1", Resource: "kubecontrollermanagers"}, operatorConfigName: "cluster", managementClusterComponent: true},
{namespace: "openshift-kube-scheduler", operatorConfigGVR: schema.GroupVersionResource{Group: "operator.openshift.io", Version: "v1", Resource: "kubeschedulers"}, operatorConfigName: "cluster", managementClusterComponent: true},
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Aren't we checking the observed config for the openshift-cluster-samples-operator ?

{namespace: "openshift-etcd", serviceName: "etcd", servicePort: "2379", managementClusterComponent: true},
{namespace: "openshift-kube-controller-manager", serviceName: "kube-controller-manager", servicePort: "443", managementClusterComponent: true},
{namespace: "openshift-kube-scheduler", serviceName: "scheduler", servicePort: "443", managementClusterComponent: true},
{namespace: "openshift-cluster-samples-operator", serviceName: "metrics", servicePort: "60000", deploymentName: "cluster-samples-operator"},
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can't we have these four groups (observedConfigTargets, configMapTargets, serviceTargets and deploymentRolloutTargets) in a single slice of Targets ? What do you think ?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

These were intentionally split from a single monolithic tlsTarget struct in the previous PR as per per review feedback. Each test category uses different fields — a single struct would carry many unused fields per entry, making it unclear which fields are relevant to each test. Happy to discuss further if you'd prefer a different approach.

"image-registry",
"openshift-samples",
}

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why isn't this a function like, for example, guestSideObservedConfigTargets and guestSideConfigMapTargets ?

g.It(fmt.Sprintf("should populate ObservedConfig with TLS settings - %s", target.namespace), func() {
if isHyperShiftCluster && target.controlPlane {
g.Skip(fmt.Sprintf("Skipping control-plane target %s on HyperShift (runs on management cluster)", target.namespace))
if isHyperShiftCluster && target.managementClusterComponent {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just for sanity check: isHyperShiftCluster is true if the scan is happening on a "guest cluster" ? Is that it ?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, exactly. isHyperShiftCluster is set in BeforeEach via exutil.IsHypershift() — it's true when the test is running against a guest cluster of a HyperShift-hosted control plane.

Replace the plain string slice clusterOperatorNames with a typed
clusterOperatorTarget struct carrying managementClusterComponent,
consistent with all other target types. Add
guestSideClusterOperatorTargets() filter function matching the
pattern used by guestSideObservedConfigTargets() et al.

Also add a comment explaining why the samples operator is absent
from observedConfigTargets (it uses samples.operator.openshift.io/v1
Config which has no spec.observedConfig).
@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 20, 2026

/test tls-observed-config-hypershift
/test tls-observed-config

After a TLS profile change on HyperShift, the ConfigMap injection
updates quickly but the backing deployment may not have restarted
its pods yet. Add waitForDeploymentRolloutAfterTLSChange which
captures existing pod UIDs, then polls until old pods are gone and
the deployment is fully ready. This ensures the running pods serve
with the new TLS config before wire-level checks are performed.

Fixes the "TLS 1.2 should be REJECTED but succeeded" failure for
svc/metrics in openshift-cluster-samples-operator.
@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 20, 2026

/test tls-observed-config-hypershift
/test tls-observed-config

@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Scheduling required tests:
/test e2e-aws-csi
/test e2e-aws-ovn-fips
/test e2e-aws-ovn-microshift
/test e2e-aws-ovn-microshift-serial
/test e2e-aws-ovn-serial-1of2
/test e2e-aws-ovn-serial-2of2
/test e2e-gcp-csi
/test e2e-gcp-ovn
/test e2e-gcp-ovn-upgrade
/test e2e-metal-ipi-ovn-ipv6
/test e2e-vsphere-ovn
/test e2e-vsphere-ovn-upi

@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 21, 2026

/retest

@ricardomaraschini
Copy link
Copy Markdown
Contributor

/lgtm

@openshift-ci openshift-ci Bot added the lgtm Indicates that a PR is ready to be merged. label May 21, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 21, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: gangwgr, ricardomaraschini

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 21, 2026

/verified by ci runs

@openshift-ci-robot openshift-ci-robot added the verified Signifies that the PR passed pre-merge verification criteria label May 21, 2026
@openshift-ci-robot
Copy link
Copy Markdown

@gangwgr: This PR has been marked as verified by ci runs.

Details

In response to this:

/verified by ci runs

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@gangwgr
Copy link
Copy Markdown
Contributor Author

gangwgr commented May 21, 2026

/retest-required

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 21, 2026

@gangwgr: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/tls-observed-config 9485c95 link false /test tls-observed-config

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-merge-bot openshift-merge-bot Bot merged commit 4956345 into openshift:main May 21, 2026
22 of 23 checks passed
gangwgr pushed a commit to gangwgr/origin that referenced this pull request May 21, 2026
CNTRLPLANE-3428: tls fix HyperShift guest-side CO wait and Custom profile handling
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. ready-for-human-review Indicates a PR has been reviewed by automated tools and is ready for human review verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants