Skip to content

Minor fixes #652

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: devel
Choose a base branch
from
Open

Minor fixes #652

wants to merge 2 commits into from

Conversation

snir911
Copy link
Contributor

@snir911 snir911 commented May 21, 2025

No description provided.

@openshift-ci openshift-ci bot added the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 21, 2025
Copy link

openshift-ci bot commented May 21, 2025

Skipping CI for Draft Pull Request.
If you want CI signal for your change, please convert it to an actual PR.
You can still manually trigger a test run with /test all

@snir911 snir911 marked this pull request as ready for review May 21, 2025 11:29
@snir911 snir911 requested a review from Copilot May 21, 2025 11:29
@openshift-ci openshift-ci bot removed the do-not-merge/work-in-progress Indicates that a PR should not merge because it is a work in progress. label May 21, 2025
@snir911 snir911 requested review from ajayvic and bpradipt May 21, 2025 11:29
@openshift-ci openshift-ci bot requested review from pmores and wainersm May 21, 2025 11:30
Copy link

@Copilot Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull Request Overview

This PR enhances secret variable checks in various cloud image handler scripts by temporarily disabling shell debug tracing and updates Docker ignore patterns to exclude generated output directories.

  • Suppress set -x tracing around sensitive environment variable validations in libvirt, GCP, Azure, and AWS handlers.
  • Remove initial unconditional debug tracing lines in GCP, Azure, and AWS handlers.
  • Add output/ and bootc/output/ directories to .dockerignore files to prevent generated artifacts from being included in images.

Reviewed Changes

Copilot reviewed 7 out of 7 changed files in this pull request and generated 4 comments.

Show a summary per file
File Description
config/peerpods/podvm/libvirt-podvm-image-handler.sh Wrap secret checks in trace suppression blocks
config/peerpods/podvm/gcp-podvm-image-handler.sh Add trace suppression around GCP_CREDENTIALS check
config/peerpods/podvm/azure-podvm-image-handler.sh Suppress and restore debug tracing around Azure secret checks
config/peerpods/podvm/aws-podvm-image-handler.sh Introduce trace suppression for AWS credential checks
config/peerpods/podvm/bootc/.dockerignore Ignore output/ directory
config/peerpods/podvm/.dockerignore Ignore bootc/output/ directory
.dockerignore Add config/peerpods/podvm/bootc/output/ to root ignore file
Comments suppressed due to low confidence (1)

config/peerpods/podvm/gcp-podvm-image-handler.sh:32

  • [nitpick] Rather than a standalone check, add GCP_CREDENTIALS back into the required_vars array to centralize validation and simplify the loop.
-    "GCP_CREDENTIALS"

@snir911
Copy link
Contributor Author

snir911 commented May 21, 2025

I changed the pr to disable completely the DEBUG option, as suppressing the tracing only when needed can be very easily missed

Copy link
Contributor

@bpradipt bpradipt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

Copy link

openshift-ci bot commented May 21, 2025

@snir911: all tests passed!

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Copy link
Contributor

@littlejawa littlejawa left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/lgtm
Thanks @snir911

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label May 26, 2025
@snir911
Copy link
Contributor Author

snir911 commented May 26, 2025

@littlejawa konflux failures are unrelated?

@littlejawa
Copy link
Contributor

I don't think so.
My understanding is that some additional checks were triggered that reveal issues that did not show up before.
So I don't think it's related to your PR, we will need to address them separately.
/cc @spotlesstofu for confirmation

Copy link

openshift-ci bot commented May 26, 2025

@littlejawa: GitHub didn't allow me to request PR reviews from the following users: for, confirmation.

Note that only openshift members and repo collaborators can review this PR, and authors cannot review their own PRs.

In response to this:

I don't think so.
My understanding is that some additional checks were triggered that reveal issues that did not show up before.
So I don't think it's related to your PR, we will need to address them separately.
/cc @spotlesstofu for confirmation

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@openshift-ci openshift-ci bot requested a review from spotlesstofu May 26, 2025 12:15
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lgtm Indicates that a PR is ready to be merged.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants