-
Notifications
You must be signed in to change notification settings - Fork 591
Comments
Conversation
openshift-ci-robot
commented
Feb 3, 2026
@bitoku: This pull request references Jira Issue OCPBUGS-74531, which is valid. The bug has been moved to the POST state.
3 validation(s) were run on this bug
- bug is open, matching expected state (open)
- bug target version (4.22.0) matches configured target version for branch (4.22.0)
- bug is in the state New, which is one of the valid states (NEW, ASSIGNED, POST)
Requesting review from QA contact:
/cc @lyman9966
The bug has been updated to refer to the pull request using the external bug tracker.
Details
In response to this:
Fixes OCPBUGS-74531
In upstream it's been enabled by default since 1.35 (= 4.22).
https://github.com/kubernetes/kubernetes/pull/135195/changes
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
openshift-ci-robot
commented
Feb 3, 2026
Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.
For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.
This repository is configured in: LGTM mode
📝 WalkthroughWalkthroughThis pull request removes the ImageVolume feature from the repository. Changes: deleted the 🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing touches
🧪 Generate unit tests (beta)
Comment |
openshift-ci-robot
commented
Feb 3, 2026
|
@bitoku: This pull request references Jira Issue OCPBUGS-74531, which is valid. 3 validation(s) were run on this bug
Requesting review from QA contact: DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
PR Compliance Guide 🔍
Below is a summary of compliance checks for this PR:
No security concerns identified
No security vulnerabilities detected by AI analysis. Human verification advised for critical code.🎫 No ticket provided
- Create ticket/issue
Codebase context is not defined
Follow the guide to enable codebase context checks.
Generic: Comprehensive Audit Trails
Objective: To create a detailed and reliable record of critical system actions for security analysis
and compliance.
Status:
Diff not provided: The PR diff content is not included (no + lines shown), so it cannot be verified whether
any critical actions were added/changed without appropriate audit logging context (user,
timestamp, action, outcome).
Referred Code
package featuresLearn more about managing compliance generic rules or creating your own custom rules
Generic: Meaningful Naming and Self-Documenting Code
Objective: Ensure all identifiers clearly express their purpose and intent, making code
self-documenting
Status:
Diff not provided: The PR diff content is not included (no + lines shown), so new/changed identifiers cannot
be reviewed for meaningful naming and self-documenting intent.
Referred Code
package featuresLearn more about managing compliance generic rules or creating your own custom rules
Generic: Robust Error Handling and Edge Case Management
Objective: Ensure comprehensive error handling that provides meaningful context and graceful
degradation
Status:
Diff not provided: The PR diff content is not included (no + lines shown), so it cannot be verified whether
new/changed code paths properly handle errors and edge cases with actionable context.
Referred Code
package featuresLearn more about managing compliance generic rules or creating your own custom rules
Generic: Secure Error Handling
Objective: To prevent the leakage of sensitive system information through error messages while
providing sufficient detail for internal debugging.
Status:
Diff not provided: The PR diff content is not included (no + lines shown), so it cannot be verified whether
any user-facing errors were introduced/changed to avoid leaking sensitive internal
details.
Referred Code
package featuresLearn more about managing compliance generic rules or creating your own custom rules
Generic: Secure Logging Practices
Objective: To ensure logs are useful for debugging and auditing without exposing sensitive
information like PII, PHI, or cardholder data.
Status:
Diff not provided: The PR diff content is not included (no + lines shown), so it cannot be verified whether
any new/changed logging is structured and free of sensitive data.
Referred Code
package featuresLearn more about managing compliance generic rules or creating your own custom rules
Generic: Security-First Input Validation and Data Handling
Objective: Ensure all data inputs are validated, sanitized, and handled securely to prevent
vulnerabilities
Status:
Diff not provided: The PR diff content is not included (no + lines shown), so it cannot be verified whether
new/changed code introduces external inputs requiring validation/sanitization or impacts
authentication/authorization-sensitive behavior.
Referred Code
package featuresLearn more about managing compliance generic rules or creating your own custom rules
- Update
Compliance status legend
🟢 - Fully Compliant🟡 - Partial Compliant
🔴 - Not Compliant
⚪ - Requires Further Human Verification
🏷️ - Compliance label
Hello @bitoku! Some important instructions when contributing to openshift/api:
API design plays an important part in the user experience of OpenShift and as such API PRs are subject to a high level of scrutiny to ensure they follow our best practices. If you haven't already done so, please review the OpenShift API Conventions and ensure that your proposed changes are compliant. Following these conventions will help expedite the api review process for your PR.
PR Code Suggestions ✨Explore these optional code suggestions:
|
||||||||
JoelSpeed
commented
Feb 3, 2026
Code generation appears to be out of date here, can you please look at the failure in the verify check and regenerate?
cb2183f to
6de7126
Compare
6de7126 to
17ddae3
Compare
bitoku
commented
Feb 4, 2026
/retest
JoelSpeed
commented
Feb 4, 2026
/lgtm
/pipeline auto
/verified by CI
Assuming E2Es are passing, then that's the complete verification we need
openshift-ci-robot
commented
Feb 4, 2026
Pipeline controller notification
The pipeline-auto label has been added to this PR. Second-stage tests will be triggered automatically when all first-stage tests pass.
openshift-ci-robot
commented
Feb 4, 2026
@JoelSpeed: This PR has been marked as verified by CI.
Details
In response to this:
/lgtm
/pipeline auto
/verified by CIAssuming E2Es are passing, then that's the complete verification we need
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: JoelSpeed
The full list of commands accepted by this bot can be found here.
The pull request process is described here
Details
Needs approval from an approver in each of these files:(削除) OWNERS (削除ここまで)[JoelSpeed]
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment
openshift-ci-robot
commented
Feb 4, 2026
Scheduling tests matching the pipeline_run_if_changed or not excluded by pipeline_skip_if_only_changed parameters:
/test e2e-aws-ovn
/test e2e-aws-ovn-hypershift
/test e2e-aws-ovn-hypershift-conformance
/test e2e-aws-ovn-techpreview
/test e2e-aws-serial-1of2
/test e2e-aws-serial-2of2
/test e2e-aws-serial-techpreview-1of2
/test e2e-aws-serial-techpreview-2of2
/test e2e-azure
/test e2e-gcp
/test e2e-upgrade
/test e2e-upgrade-out-of-change
openshift-ci-robot
commented
Feb 4, 2026
openshift-ci-robot
commented
Feb 4, 2026
openshift-ci-robot
commented
Feb 4, 2026
openshift-ci-robot
commented
Feb 4, 2026
/hold
Revision 17ddae3 was retested 3 times: holding
|
@bitoku: The following tests failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
bitoku
commented
Feb 5, 2026
ah sorry it needs 1.35 rebase.
openshift-merge-robot
commented
Feb 9, 2026
PR needs rebase.
Details
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.
Uh oh!
There was an error while loading. Please reload this page.
User description
Fixes OCPBUGS-74531
In upstream it's been enabled by default since 1.35 (= 4.22).
https://github.com/kubernetes/kubernetes/pull/135195/changes
PR Type
Enhancement
Description
Remove ImageVolume feature gate from codebase
Feature enabled by default in upstream since 1.35
Update feature gate configurations across all profiles
Clean up generated OpenAPI and feature documentation
Diagram Walkthrough
File Walkthrough
2 files
Remove ImageVolume feature gate definitionUpdate OpenAPI spec removing ImageVolume1 files
Remove ImageVolume from feature documentation8 files
Remove ImageVolume from Hypershift DevPreviewRemove ImageVolume from Hypershift TechPreviewRemove ImageVolume from Hypershift OKDRemove ImageVolume from SelfManagedHA DevPreviewRemove ImageVolume from SelfManagedHA OKDRemove ImageVolume from Hypershift DefaultRemove ImageVolume from SelfManagedHA DefaultRemove ImageVolume from SelfManagedHA TechPreview