Skip to content

TRT-2647: rhcos10 default for 5.0#3498

Open
neisw wants to merge 3 commits intoopenshift:mainfrom
neisw:trt-2647-5.0-rhcos10-default
Open

TRT-2647: rhcos10 default for 5.0#3498
neisw wants to merge 3 commits intoopenshift:mainfrom
neisw:trt-2647-5.0-rhcos10-default

Conversation

@neisw
Copy link
Copy Markdown
Contributor

@neisw neisw commented May 5, 2026

Staging for when the default changes over to rhcos10 for 5.0

Open question, should we remove OS: from the 5.0 main view so they are all picked up by default or explicitly specify rhcos9 and rhcos10?

Summary by CodeRabbit

  • New Features

    • Extended RHCOS 10 compatibility to version 5 and main-branch jobs.
  • Chores

    • Reworked a v5 OS-comparison scenario: swapped comparison direction and changed feature-set selection.
    • Adjusted thresholds and disabled certain regression/metrics toggles for that scenario.
    • Removed an obsolete comparison scenario.
    • Updated tests and defaults to reflect the new OS variant defaults.

@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.

For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.

This repository is configured in: automatic mode

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label May 5, 2026
@openshift-ci-robot
Copy link
Copy Markdown

openshift-ci-robot commented May 5, 2026

@neisw: This pull request references TRT-2647 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "5.0.0" version, but no target version was set.

Details

In response to this:

Staging for when the default changes over to rhcos10 for 5.0

Open question, should we remove OS: from the 5.0 main view so they are all picked up by default or explicitly specify rhcos9 and rhcos10?

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai Bot commented May 5, 2026

No actionable comments were generated in the recent review. 🎉

ℹ️ Recent review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: dc4cb377-f659-4793-8ffe-5b7e1abb6319

📥 Commits

Reviewing files that changed from the base of the PR and between 72e7de3 and 84a1567.

📒 Files selected for processing (4)
  • config/views.yaml
  • pkg/variantregistry/ocp.go
  • pkg/variantregistry/ocp_test.go
  • pkg/variantregistry/snapshot.yaml
🚧 Files skipped from review as they are similar to previous changes (1)
  • pkg/variantregistry/ocp_test.go

Walkthrough

Variant OS default for OpenShift 5.x/main was changed from rhcos9 to rhcos10 in the variant registry fallback; corresponding config/views.yaml scenarios now include or compare rhcos10 (one 5.0 comparison scenario reworked and a 4.22 techpreview comparison removed). Tests updated to expect rhcos10 where applicable.

Changes

Variant OS default & related config/test updates

Layer / File(s) Summary
Variant Registry Logic
pkg/variantregistry/ocp.go
setOS fallback now sets variants[VariantOS] = "rhcos10" when VariantReleaseMajor == "5" or job indicates main/master branch (previously "rhcos9").
Config: Include rhcos10 in scenarios
config/views.yaml (component_readiness: 5.0-main, 5.0-rosa, 5.0-main-mass-failure)
Each scenario's variant_options.include_variants.OS now includes rhcos10 alongside rhcos9.
Config: 5.0 comparison rework
config/views.yaml (5.0 comparison block)
Removed 5.0-techpreview-rhcos9-vs-rhcos10; added 5.0-rhcos10-vs-rhcos9 with include_variants.FeatureSet: default, swapped include_variants.OS/compare_variants.OS direction, adjusted advanced_options thresholds, and disabled include_multi_release_analysis, metrics.enabled, and regression_tracking.enabled.
Config: Scenario removal
config/views.yaml
Removed 4.22-techpreview-rhcos9-vs-rhcos10 from component_readiness.
Tests
pkg/variantregistry/ocp_test.go
TestVariantSyncer expectations updated: multiple job cases now expect VariantOS = "rhcos10" instead of "rhcos9".

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~25 minutes

🚥 Pre-merge checks | ✅ 16 | ❌ 1

❌ Failed checks (1 warning)

Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.
✅ Passed checks (16 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title 'TRT-2647: rhcos10 default for 5.0' clearly and specifically summarizes the main change: setting rhcos10 as the default OS for version 5.0, which is directly reflected in the code changes across config, variant registry, and tests.
Linked Issues check ✅ Passed Check skipped because no linked issues were found for this pull request.
Out of Scope Changes check ✅ Passed Check skipped because no linked issues were found for this pull request.
Go Error Handling ✅ Passed PR changes in ocp.go and ocp_test.go only modify string values (rhcos9→rhcos10) in setOS function. No new error handling violations introduced.
Sql Injection Prevention ✅ Passed No SQL injection vulnerabilities found. The dataset name replacement uses configuration flags, not user input. BigQuery API used safely throughout.
Excessive Css In React Should Use Styles ✅ Passed This PR contains only YAML configuration and Go backend code changes. No React components or CSS styling is present. The custom check for inline CSS in React is not applicable.
Test Coverage For New Features ✅ Passed Pure function (setOS) is covered by existing TestVariantSyncer test with 70 test cases. Test expectations updated for new v5→rhcos10 fallback logic. Refactor already covered by existing tests.
Single Responsibility And Clear Naming ✅ Passed Clear, action-oriented names for setter functions. OCPVariantLoader has 9 fields and 7 methods within limits. Single responsibility maintained throughout.
Stable And Deterministic Test Names ✅ Passed PR does not contain Ginkgo tests. Uses standard Go tests with stable, deterministic test names. Check not applicable.
Test Structure And Quality ✅ Passed Ginkgo test structure check not applicable. Tests are standard Go table-driven tests using testing.T, not Ginkgo. Test modifications appropriately update expected values.
Microshift Test Compatibility ✅ Passed No Ginkgo e2e tests are added in this PR. Changes affect only Sippy tool configuration, variant registry logic, and standard Go unit tests. Check is not applicable.
Single Node Openshift (Sno) Test Compatibility ✅ Passed PR does not add Ginkgo e2e tests. Changes are YAML config and Go unit tests, not e2e tests. Check is inapplicable.
Topology-Aware Scheduling Compatibility ✅ Passed PR modifies Sippy job variant registry and test configuration. No deployment manifests, operator code, controllers, or scheduling constraints are added or modified. Check is not applicable.
Ote Binary Stdout Contract ✅ Passed The OTE Binary Stdout Contract check is not applicable to this PR. Sippy is not an OTE binary; it's a prow job analysis tool. No OTE binaries or process-level stdout writes exist in the changed files.
Ipv6 And Disconnected Network Test Compatibility ✅ Passed No Ginkgo e2e tests are added in this PR. Changes are limited to configuration files and standard Go unit tests for variant registry logic. The custom check is not applicable.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Warning

There were issues while running some tools. Please review the errors and either fix the tool's configuration or disable the tool if it's a critical failure.

🔧 golangci-lint (2.12.1)

Error: can't load config: unsupported version of the configuration: "" See https://golangci-lint.run/docs/product/migration-guide for migration instructions
The command is terminated due to an error: can't load config: unsupported version of the configuration: "" See https://golangci-lint.run/docs/product/migration-guide for migration instructions


Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci openshift-ci Bot requested review from deads2k and sosiouxme May 5, 2026 19:25
@openshift-ci openshift-ci Bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label May 5, 2026
@openshift-merge-bot openshift-merge-bot Bot added the ready-for-human-review Indicates a PR has been reviewed by automated tools and is ready for human review label May 5, 2026
Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧹 Nitpick comments (1)
pkg/variantregistry/ocp_test.go (1)

1139-1161: ⚡ Quick win

Consider adding a no-release -main- sibling case for branch-fallback coverage.

You now validate -master- with no release (rhcos10). Adding a matching -main- no-release case would close the parity gap for isMainBranch.

✅ Suggested test addition
 		{
 			job: "periodic-ci-openshift-master-no-release-version-e2e-aws-ovn",
 			expected: map[string]string{
 				VariantArch:           "amd64",
 				VariantInstaller:      "ipi",
 				VariantPlatform:       "aws",
 				VariantNetwork:        "ovn",
 				VariantNetworkStack:   "ipv4",
 				VariantOwner:          "eng",
 				VariantSuite:          "unknown",
 				VariantTopology:       "ha",
 				VariantUpgrade:        VariantNoValue,
 				VariantAggregation:    VariantNoValue,
 				VariantProcedure:      "none",
 				VariantJobTier:        "candidate",
 				VariantFeatureSet:     VariantDefaultValue,
 				VariantNetworkAccess:  VariantDefaultValue,
 				VariantScheduler:      VariantDefaultValue,
 				VariantSecurityMode:   VariantDefaultValue,
 				VariantCGroupMode:     "v2",
 				VariantLayeredProduct: VariantNoValue,
 				VariantOS:             "rhcos10",
 			},
 		},
+		{
+			job: "periodic-ci-openshift-main-no-release-version-e2e-aws-ovn",
+			expected: map[string]string{
+				VariantArch:           "amd64",
+				VariantInstaller:      "ipi",
+				VariantPlatform:       "aws",
+				VariantNetwork:        "ovn",
+				VariantNetworkStack:   "ipv4",
+				VariantOwner:          "eng",
+				VariantSuite:          "unknown",
+				VariantTopology:       "ha",
+				VariantUpgrade:        VariantNoValue,
+				VariantAggregation:    VariantNoValue,
+				VariantProcedure:      "none",
+				VariantJobTier:        "candidate",
+				VariantFeatureSet:     VariantDefaultValue,
+				VariantNetworkAccess:  VariantDefaultValue,
+				VariantScheduler:      VariantDefaultValue,
+				VariantSecurityMode:   VariantDefaultValue,
+				VariantCGroupMode:     "v2",
+				VariantLayeredProduct: VariantNoValue,
+				VariantOS:             "rhcos10",
+			},
+		},
🤖 Prompt for AI Agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

In `@pkg/variantregistry/ocp_test.go` around lines 1139 - 1161, Add a sibling test
case to the table in ocp_test.go that mirrors the existing
"periodic-ci-openshift-master-no-release-version-e2e-aws-ovn" case but uses
"periodic-ci-openshift-main-no-release-version-e2e-aws-ovn" as the job name to
exercise the isMainBranch path; copy the expected map (VariantArch,
VariantInstaller, VariantPlatform, VariantNetwork, VariantNetworkStack,
VariantOwner, VariantSuite, VariantTopology, VariantUpgrade, VariantAggregation,
VariantProcedure, VariantJobTier, VariantFeatureSet, VariantNetworkAccess,
VariantScheduler, VariantSecurityMode, VariantCGroupMode, VariantLayeredProduct,
VariantOS) from the master case so the assertion logic in the test (table-driven
test around the job field) verifies parity for main-branch fallback.
🤖 Prompt for all review comments with AI agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

Nitpick comments:
In `@pkg/variantregistry/ocp_test.go`:
- Around line 1139-1161: Add a sibling test case to the table in ocp_test.go
that mirrors the existing
"periodic-ci-openshift-master-no-release-version-e2e-aws-ovn" case but uses
"periodic-ci-openshift-main-no-release-version-e2e-aws-ovn" as the job name to
exercise the isMainBranch path; copy the expected map (VariantArch,
VariantInstaller, VariantPlatform, VariantNetwork, VariantNetworkStack,
VariantOwner, VariantSuite, VariantTopology, VariantUpgrade, VariantAggregation,
VariantProcedure, VariantJobTier, VariantFeatureSet, VariantNetworkAccess,
VariantScheduler, VariantSecurityMode, VariantCGroupMode, VariantLayeredProduct,
VariantOS) from the master case so the assertion logic in the test (table-driven
test around the job field) verifies parity for main-branch fallback.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: 683d6765-f56e-45e2-9847-79272263d51c

📥 Commits

Reviewing files that changed from the base of the PR and between 54af8d3 and 72e7de3.

📒 Files selected for processing (2)
  • pkg/variantregistry/ocp_test.go
  • pkg/variantregistry/snapshot.yaml

@neisw
Copy link
Copy Markdown
Contributor Author

neisw commented May 5, 2026

/hold
until we are ready to switch over

@openshift-ci openshift-ci Bot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label May 5, 2026
@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Scheduling required tests:
/test e2e

@petr-muller
Copy link
Copy Markdown
Member

/lgtm

@openshift-ci openshift-ci Bot added the lgtm Indicates that a PR is ready to be merged. label May 5, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 5, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: neisw, petr-muller

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci Bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 7, 2026
@neisw neisw force-pushed the trt-2647-5.0-rhcos10-default branch from 72e7de3 to 84a1567 Compare May 7, 2026 17:06
@openshift-ci openshift-ci Bot removed the lgtm Indicates that a PR is ready to be merged. label May 7, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 7, 2026

New changes are detected. LGTM label has been removed.

@openshift-ci openshift-ci Bot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label May 7, 2026
@openshift-merge-bot
Copy link
Copy Markdown
Contributor

Scheduling required tests:
/test e2e

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 7, 2026

@neisw: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Copy link
Copy Markdown
Contributor

@dgoodwin dgoodwin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Everything else looks good.

Holding until we hear it's flipped sounds good.

Comment thread config/views.yaml
enabled: false
regression_tracking:
enabled: true
enabled: false
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is interesting, looks like it flipped several settings to the "calm things down for a GA branch", is that intentional for the 9 vs 10 5.0 view? I would probably keep regression tracking on as well.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. ready-for-human-review Indicates a PR has been reviewed by automated tools and is ready for human review

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants