-
Notifications
You must be signed in to change notification settings - Fork 591
Comments
OCPBUGS-74530: Remove the featuregate related to StoragePerformantSecurityPolicy#2674
OCPBUGS-74530: Remove the featuregate related to StoragePerformantSecurityPolicy #2674gnufied wants to merge 1 commit intoopenshift:master from
Conversation
openshift-ci-robot
commented
Jan 27, 2026
Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.
For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.
This repository is configured in: LGTM mode
openshift-ci-robot
commented
Jan 27, 2026
@gnufied: This pull request references Jira Issue OCPBUGS-74530, which is valid. The bug has been moved to the POST state.
3 validation(s) were run on this bug
- bug is open, matching expected state (open)
- bug target version (4.22.0) matches configured target version for branch (4.22.0)
- bug is in the state ASSIGNED, which is one of the valid states (NEW, ASSIGNED, POST)
No GitHub users were found matching the public email listed for the QA contact in Jira (wduan@redhat.com), skipping review request.
The bug has been updated to refer to the pull request using the external bug tracker.
Details
In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
Hello @gnufied! Some important instructions when contributing to openshift/api:
API design plays an important part in the user experience of OpenShift and as such API PRs are subject to a high level of scrutiny to ensure they follow our best practices. If you haven't already done so, please review the OpenShift API Conventions and ensure that your proposed changes are compliant. Following these conventions will help expedite the api review process for your PR.
📝 WalkthroughWalkthroughThis pull request removes the StoragePerformantSecurityPolicy feature gate from the codebase. The changes include deletion of the feature gate declaration in the Go source code, removal from the feature documentation table, and deletion of the feature gate entry from eight different feature gate manifest files covering various deployment profiles (Hypershift and SelfManagedHA configurations with multiple preview and upgrade options). These changes consistently remove the feature gate from enabled or disabled lists depending on the manifest context. 🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing touches
Comment |
openshift-ci-robot
commented
Jan 27, 2026
|
@gnufied: This pull request references Jira Issue OCPBUGS-74530, which is valid. 3 validation(s) were run on this bug
No GitHub users were found matching the public email listed for the QA contact in Jira (wduan@redhat.com), skipping review request. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
PR Compliance Guide 🔍
Below is a summary of compliance checks for this PR:
No security concerns identified
No security vulnerabilities detected by AI analysis. Human verification advised for critical code.🎫 No ticket provided
- Create ticket/issue
Codebase context is not defined
Follow the guide to enable codebase context checks.
Generic: Comprehensive Audit Trails
Objective: To create a detailed and reliable record of critical system actions for security analysis
and compliance.
Status: Passed
Learn more about managing compliance generic rules or creating your own custom rules
Generic: Meaningful Naming and Self-Documenting Code
Objective: Ensure all identifiers clearly express their purpose and intent, making code
self-documenting
Status: Passed
Learn more about managing compliance generic rules or creating your own custom rules
Generic: Robust Error Handling and Edge Case Management
Objective: Ensure comprehensive error handling that provides meaningful context and graceful
degradation
Status: Passed
Learn more about managing compliance generic rules or creating your own custom rules
Generic: Secure Error Handling
Objective: To prevent the leakage of sensitive system information through error messages while
providing sufficient detail for internal debugging.
Status: Passed
Learn more about managing compliance generic rules or creating your own custom rules
Generic: Secure Logging Practices
Objective: To ensure logs are useful for debugging and auditing without exposing sensitive
information like PII, PHI, or cardholder data.
Status: Passed
Learn more about managing compliance generic rules or creating your own custom rules
Generic: Security-First Input Validation and Data Handling
Objective: Ensure all data inputs are validated, sanitized, and handled securely to prevent
vulnerabilities
Status: Passed
Learn more about managing compliance generic rules or creating your own custom rules
Compliance status legend
🟢 - Fully Compliant🟡 - Partial Compliant
🔴 - Not Compliant
⚪ - Requires Further Human Verification
🏷️ - Compliance label
PR Code Suggestions ✨Explore these optional code suggestions:
|
||||||||
gnufied
commented
Jan 27, 2026
/hold
JoelSpeed
commented
Jan 27, 2026
/lgtm
openshift-ci-robot
commented
Jan 27, 2026
Scheduling tests matching the pipeline_run_if_changed or not excluded by pipeline_skip_if_only_changed parameters:
/test e2e-aws-ovn
/test e2e-aws-ovn-hypershift
/test e2e-aws-ovn-hypershift-conformance
/test e2e-aws-ovn-techpreview
/test e2e-aws-serial-1of2
/test e2e-aws-serial-2of2
/test e2e-aws-serial-techpreview-1of2
/test e2e-aws-serial-techpreview-2of2
/test e2e-azure
/test e2e-gcp
/test e2e-upgrade
/test e2e-upgrade-out-of-change
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: JoelSpeed
The full list of commands accepted by this bot can be found here.
The pull request process is described here
Details
Needs approval from an approver in each of these files:(削除) OWNERS (削除ここまで)[JoelSpeed]
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
|
@gnufied: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
JoelSpeed
commented
Jan 28, 2026
@gnufied Removing this gate has caused test failures specific to this gate, is there somewhere that is expecting this gate to be populated still vs setting this feature on by default always?
JoelSpeed
commented
Jan 28, 2026
/approve cancel
@JoelSpeed I expected these failures and that is why I kept this PR on hold (almost same time as lgtm). We need openshift/kubernetes#2575 PR to merge first and then I will have to fix e2e in https://github.com/openshift/cluster-storage-operator/blob/main/test/e2e/storage_performant_policy.go
Uh oh!
There was an error while loading. Please reload this page.
User description
xref https://issues.redhat.com/browse/OCPBUGS-74530
PR Type
Enhancement
Description
Remove
FeatureGateStoragePerformantSecurityPolicyfeature gate definitionDelete feature gate from all payload manifest configurations
Update feature gates documentation to reflect removal
Fix indentation in
FeatureGateKMSEncryptiondefinitionDiagram Walkthrough
File Walkthrough
1 files
Remove StoragePerformantSecurityPolicy gate definition1 files
Remove StoragePerformantSecurityPolicy from documentation8 files
Remove StoragePerformantSecurityPolicy from manifestRemove StoragePerformantSecurityPolicy from manifestRemove StoragePerformantSecurityPolicy from manifestRemove StoragePerformantSecurityPolicy from manifestRemove StoragePerformantSecurityPolicy from manifestRemove StoragePerformantSecurityPolicy from manifestRemove StoragePerformantSecurityPolicy from manifestRemove StoragePerformantSecurityPolicy from manifest