Skip to content

OSAC-794: add Slack notification step to step registry#79364

Merged
openshift-merge-bot[bot] merged 1 commit into
openshift:mainfrom
omer-vishlitzky:osac-slack-notify
May 18, 2026
Merged

OSAC-794: add Slack notification step to step registry#79364
openshift-merge-bot[bot] merged 1 commit into
openshift:mainfrom
omer-vishlitzky:osac-slack-notify

Conversation

@omer-vishlitzky
Copy link
Copy Markdown
Contributor

@omer-vishlitzky omer-vishlitzky commented May 16, 2026

Summary

  • Adds osac-project-notify step-registry ref that posts job results to Slack via incoming webhook
  • Not wired into any workflow yet — will be added to periodic jobs in a follow-up

Test plan

  • Webhook tested manually and via rehearsal — Slack message received successfully

Summary

This PR adds a Slack notification step to the OpenShift CI step registry for the OSAC project. It introduces a reusable step, osac-project-notify, which jobs can run to post a completion message and a link to Prow logs to Slack via an incoming webhook.

What changed (practical impact)

  • Adds a new step registry entry under ci-operator/step-registry/osac-project/notify that CI job authors can reference to send Slack notifications from CI jobs run by OpenShift CI.
  • The step is not wired into any jobs yet; it will be added to periodic workflows in a follow-up change.

Files and behavior

  • ci-operator/step-registry/osac-project/notify/osac-project-notify-ref.yaml

    • Declares the osac-project-notify ref (as: osac-project-notify), best_effort, 5m timeout, runs from dev-scripts and executes osac-project-notify-commands.sh.
    • Mounts a Vault credential named osac-slack-webhook from namespace test-credentials at /var/run/vault/osac-slack-webhook.
    • Requests 100m CPU and 200Mi memory.
    • Documentation: "Sends a Slack notification with the job result and a link to the Prow logs."
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-commands.sh

    • Bash script (nounset, pipefail) that reads the webhook URL from /var/run/vault/osac-slack-webhook/url.
    • Builds a Prow logs link using a fixed PROW_URL (https://prow.ci.openshift.org/view/gs/test-platform-results) and JOB_NAME/BUILD_ID.
    • Posts a simple JSON message to the webhook with job name, build ID, and a "View logs" link via curl.
  • ci-operator/step-registry/osac-project/notify/OWNERS and osac-project-notify-ref.metadata.json

    • Both set approvers and reviewers to the osac-cicd team.

Integration & testing

  • The step is currently standalone and not referenced by any jobs; integration into periodic jobs is planned in a follow-up.
  • Webhook behavior was tested manually and via rehearsal; Slack messages were received successfully.

Notes / review items

  • The notification script uses a fixed PROW_URL and constructs the logs URL from JOB_NAME and BUILD_ID; reviewers may want to confirm this URL pattern covers all job types where this step will be used.
  • OWNERS/metadata ensure osac-cicd controls approvals for this path.
  • The PR discussion included an automated warning about a missing Jira target version (expected "5.0.0"); that is unrelated to the functional changes in this patch.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label May 16, 2026
@openshift-ci-robot
Copy link
Copy Markdown
Contributor

openshift-ci-robot commented May 16, 2026

@omer-vishlitzky: This pull request references OSAC-865 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "5.0.0" version, but no target version was set.

Details

In response to this:

Summary

  • Adds osac-project-notify step-registry ref that posts job results to Slack via incoming webhook
  • Not wired into any workflow yet — will be added to periodic jobs in a follow-up

Test plan

  • Webhook tested manually and via rehearsal — Slack message received successfully

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci openshift-ci Bot requested review from akshaynadkarni and eranco74 May 16, 2026 09:10
@openshift-ci openshift-ci Bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label May 16, 2026
@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai Bot commented May 16, 2026

No actionable comments were generated in the recent review. 🎉

ℹ️ Recent review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: f90af478-f2d8-44a6-b1dd-42caebd4cab1

📥 Commits

Reviewing files that changed from the base of the PR and between e1cc7cf and bf27f63.

📒 Files selected for processing (4)
  • ci-operator/step-registry/osac-project/notify/OWNERS
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-commands.sh
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-ref.metadata.json
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-ref.yaml
✅ Files skipped from review due to trivial changes (2)
  • ci-operator/step-registry/osac-project/notify/OWNERS
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-ref.metadata.json
🚧 Files skipped from review as they are similar to previous changes (2)
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-commands.sh
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-ref.yaml

Walkthrough

Adds an OSAC CI Slack notification step: a step registry entry and metadata, a bash command script that reads a Vault-stored webhook and posts job completion info to Slack, and an OWNERS file assigning osac-cicd ownership.

Changes

OSAC Project Slack Notification Step

Layer / File(s) Summary
Step registry definition and metadata
ci-operator/step-registry/osac-project/notify/osac-project-notify-ref.yaml, ci-operator/step-registry/osac-project/notify/osac-project-notify-ref.metadata.json
New step registry entry osac-project-notify (best_effort, 5m timeout) with Vault credential mount and resource requests; metadata JSON sets osac-cicd as approvers and reviewers.
Slack notification implementation
ci-operator/step-registry/osac-project/notify/osac-project-notify-commands.sh
Bash script (strict modes) that reads webhook URL from /var/run/vault/osac-slack-webhook/url, constructs a Prow logs link using JOB_NAME and BUILD_ID, and posts a JSON payload to Slack via curl.
Ownership configuration
ci-operator/step-registry/osac-project/notify/OWNERS
OWNERS file sets approvers and reviewers to osac-cicd for the notify path.
sequenceDiagram
  participant Script as osac-project-notify-commands.sh
  participant Vault as Vault (/var/run/vault/osac-slack-webhook/url)
  participant Prow as Prow (logs)
  participant Slack as Slack Incoming Webhook
  Script->>Vault: read WEBHOOK_URL
  Script->>Prow: build logs URL from JOB_NAME and BUILD_ID
  Script->>Slack: POST JSON (job, build, logs link) to WEBHOOK_URL
Loading

🎯 2 (Simple) | ⏱️ ~10 minutes

🚥 Pre-merge checks | ✅ 12
✅ Passed checks (12 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title 'OSAC-794: add Slack notification step to step registry' directly and clearly summarizes the main change—adding a new Slack notification step to the step registry. It matches the changeset which adds all necessary files for this new step.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.
Linked Issues check ✅ Passed Check skipped because no linked issues were found for this pull request.
Out of Scope Changes check ✅ Passed Check skipped because no linked issues were found for this pull request.
Stable And Deterministic Test Names ✅ Passed Check not applicable. PR adds no Ginkgo tests—only config files and bash script. No test patterns (It, Describe, Context, When) found in added code.
Test Structure And Quality ✅ Passed The custom check for Ginkgo test quality is not applicable. This PR adds CI/CD infrastructure (OWNERS, YAML, JSON, bash script) with no Ginkgo test code.
Microshift Test Compatibility ✅ Passed PR adds CI/CD infrastructure (OWNERS, bash script, JSON metadata, YAML config) for Slack notifications. No Ginkgo e2e tests present. Check is not applicable.
Single Node Openshift (Sno) Test Compatibility ✅ Passed No Ginkgo e2e tests are introduced in this PR. The changes add only CI/CD infrastructure files (OWNERS, bash script, YAML config, and metadata). The SNO compatibility check is not applicable.
Topology-Aware Scheduling Compatibility ✅ Passed This PR adds a CI step registry entry (notification step) without deployment manifests, operator code, or scheduling constraints. Not applicable to topology-aware scheduling check.
Ote Binary Stdout Contract ✅ Passed OTE Binary Stdout Contract check does not apply. PR adds a Slack notification step (bash script, YAML/JSON configs, OWNERS file) - not an OTE binary. No Go test code or stdout violations present.
Ipv6 And Disconnected Network Test Compatibility ✅ Passed This PR adds CI/CD configuration and bash scripts, not Ginkgo e2e tests. The check only applies to new e2e test code and is not applicable here.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-merge-bot openshift-merge-bot Bot added the rehearsals-ack Signifies that rehearsal jobs have been acknowledged label May 16, 2026
Copy link
Copy Markdown
Contributor

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

Inline comments:
In
`@ci-operator/step-registry/osac-project/notify/osac-project-notify-commands.sh`:
- Around line 3-17: The script currently uses set -o nounset and set -o pipefail
but should use set -euo pipefail; replace those options accordingly, and wrap
the sensitive operations that read WEBHOOK_URL and call curl (the WEBHOOK_URL
assignment and the curl invocation) with tracing disabled (use set +x before and
restore previous errexit/tracing state after) to avoid leaking the webhook; also
add curl --fail and check its exit status (or let -e cause exit) so notification
failures are not silent—refer to the WEBHOOK_URL variable assignment and the
curl command to locate the changes.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Central YAML (inherited)

Review profile: CHILL

Plan: Enterprise

Run ID: 2913b073-472d-4ad1-bcd0-4bc8c5ef67c2

📥 Commits

Reviewing files that changed from the base of the PR and between 2c6d49e and e1cc7cf.

📒 Files selected for processing (4)
  • ci-operator/step-registry/osac-project/notify/OWNERS
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-commands.sh
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-ref.metadata.json
  • ci-operator/step-registry/osac-project/notify/osac-project-notify-ref.yaml

Comment on lines +3 to +17
set -o nounset
set -o pipefail

WEBHOOK_URL="$(cat /var/run/vault/osac-slack-webhook/url)"
PROW_URL="https://prow.ci.openshift.org/view/gs/test-platform-results"

if [[ "${JOB_TYPE:-}" == "presubmit" ]]; then
JOB_URL="${PROW_URL}/pr-logs/pull/${REPO_OWNER}_${REPO_NAME}/${PULL_NUMBER}/${JOB_NAME}/${BUILD_ID}"
else
JOB_URL="${PROW_URL}/logs/${JOB_NAME}/${BUILD_ID}"
fi

curl -s -X POST -H 'Content-type: application/json' \
--data "{\"text\":\"Job *${JOB_NAME}* #${BUILD_ID} completed.\n<${JOB_URL}|View logs>\"}" \
"${WEBHOOK_URL}"
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major | ⚡ Quick win

🧩 Analysis chain

🏁 Script executed:

fd -type f -name "*osac-project-notify-commands.sh"

Repository: openshift/release

Length of output: 232


🏁 Script executed:

fd -t f "osac-project-notify-commands.sh"

Repository: openshift/release

Length of output: 139


🏁 Script executed:

cat -n ci-operator/step-registry/osac-project/notify/osac-project-notify-commands.sh

Repository: openshift/release

Length of output: 742


🏁 Script executed:

find . -type f -name "*.md" | xargs grep -l "step-registry" | head -5

Repository: openshift/release

Length of output: 285


🏁 Script executed:

find . -path "*/step-registry/*commands.sh" -type f | head -10 | xargs head -5

Repository: openshift/release

Length of output: 1687


🏁 Script executed:

# Check how many step-registry scripts use set -euo/set -e instead of individual flags
find . -path "*/step-registry/*commands.sh" -type f | wc -l
echo "---"
find . -path "*/step-registry/*commands.sh" -type f -exec grep -l "set -euo\|set -e " {} \; | wc -l
echo "---"
# Check for set +x/set -x patterns around sensitive operations
find . -path "*/step-registry/*commands.sh" -type f -exec grep -l "set +x\|set -x" {} \; | head -10

Repository: openshift/release

Length of output: 22016


🏁 Script executed:

# Check what pattern is standard in step-registry - look at recent examples
rg "set -euo\|set -e " ci-operator/step-registry/ -A1 -B1 | head -50

Repository: openshift/release

Length of output: 43


🏁 Script executed:

# Check the specific file and check what set options are most common in step-registry
rg "^set -" ci-operator/step-registry/ -c | sort | uniq -c | sort -rn | head -20

Repository: openshift/release

Length of output: 2149


🏁 Script executed:

# Let's look at actual set patterns in step-registry files
rg "^set -" ci-operator/step-registry/ --no-heading | head -50

Repository: openshift/release

Length of output: 6491


🏁 Script executed:

# Look at examples of how other scripts handle sensitive data with set +x
rg -A5 "set \+x" ci-operator/step-registry/ | head -60

Repository: openshift/release

Length of output: 6421


🏁 Script executed:

# Check if there are existing examples in step-registry of saving/restoring xtrace state with proper patterns
rg -B3 -A10 "xtrace_was_on|xtrace_state" ci-operator/step-registry/

Repository: openshift/release

Length of output: 43


🏁 Script executed:

# Look for examples of how scripts handle curl and error checking
rg "curl.*-s" ci-operator/step-registry/ | head -20

Repository: openshift/release

Length of output: 4354


Use set -euo pipefail and disable tracing around sensitive operations.

Lines 3-4 should consolidate to set -euo pipefail. Disable tracing with set +x around the webhook URL read and curl call to prevent credential leakage in CI logs. Additionally, add error checking to curl with --fail to prevent silent failures when the notification cannot be delivered.

Suggested changes
-set -o nounset
-set -o pipefail
+set -euo pipefail
 
+set +x
-WEBHOOK_URL="$(cat /var/run/vault/osac-slack-webhook/url)"
+WEBHOOK_URL="$(< /var/run/vault/osac-slack-webhook/url)"
 PROW_URL="https://prow.ci.openshift.org/view/gs/test-platform-results"
+set -x
 
 if [[ "${JOB_TYPE:-}" == "presubmit" ]]; then
     JOB_URL="${PROW_URL}/pr-logs/pull/${REPO_OWNER}_${REPO_NAME}/${PULL_NUMBER}/${JOB_NAME}/${BUILD_ID}"
 else
     JOB_URL="${PROW_URL}/logs/${JOB_NAME}/${BUILD_ID}"
 fi
 
-curl -s -X POST -H 'Content-type: application/json' \
+set +x
+curl --fail -s -X POST -H 'Content-type: application/json' \
     --data "{\"text\":\"Job *${JOB_NAME}* #${BUILD_ID} completed.\n<${JOB_URL}|View logs>\"}" \
     "${WEBHOOK_URL}"
+set -x

Per coding guidelines, step-registry scripts should use set -euo pipefail and protect sensitive operations from being logged.

🤖 Prompt for AI Agents
Verify each finding against current code. Fix only still-valid issues, skip the
rest with a brief reason, keep changes minimal, and validate.

In
`@ci-operator/step-registry/osac-project/notify/osac-project-notify-commands.sh`
around lines 3 - 17, The script currently uses set -o nounset and set -o
pipefail but should use set -euo pipefail; replace those options accordingly,
and wrap the sensitive operations that read WEBHOOK_URL and call curl (the
WEBHOOK_URL assignment and the curl invocation) with tracing disabled (use set
+x before and restore previous errexit/tracing state after) to avoid leaking the
webhook; also add curl --fail and check its exit status (or let -e cause exit)
so notification failures are not silent—refer to the WEBHOOK_URL variable
assignment and the curl command to locate the changes.

omer-vishlitzky added a commit to omer-vishlitzky/release that referenced this pull request May 17, 2026
…tion

Add a nightly periodic job that installs OSAC with ALL component images
overridden to their latest CI-built versions, runs all vmaas tests, and
sends results to Slack with pass/fail status and component versions.

New step-registry components:
- osac-project-installer-all-latest: installs OSAC with fulfillment-service,
  osac-operator, and osac-aap images all swapped to latest
- osac-project-baremetal-test-all: runs make test-vmaas (all tests)
- osac-project-ofcir-baremetal-nightly: dedicated nightly workflow
- osac-project-notify: Slack webhook notification (from PR openshift#79364)

Removes unused dead code:
- osac-project-installer-component: single-image swap, replaced by all-latest
- osac-project-ofcir-baremetal-component: workflow using installer-component
omer-vishlitzky added a commit to omer-vishlitzky/release that referenced this pull request May 17, 2026
…tion

Add a nightly periodic job that installs OSAC with ALL component images
overridden to their latest CI-built versions, runs all vmaas tests, and
sends results to Slack with pass/fail status and component versions.

New step-registry components:
- osac-project-installer-all-latest: installs OSAC with fulfillment-service,
  osac-operator, and osac-aap images all swapped to latest
- osac-project-baremetal-test-all: runs make test-vmaas (all tests)
- osac-project-ofcir-baremetal-nightly: dedicated nightly workflow
- osac-project-notify: Slack webhook notification (from PR openshift#79364)

Removes unused dead code:
- osac-project-installer-component: single-image swap, replaced by all-latest
- osac-project-ofcir-baremetal-component: workflow using installer-component
@omer-vishlitzky omer-vishlitzky changed the title OSAC-865: add Slack notification step to step registry OSAC-794: add Slack notification step to step registry May 17, 2026
@openshift-ci-robot
Copy link
Copy Markdown
Contributor

openshift-ci-robot commented May 17, 2026

@omer-vishlitzky: This pull request references OSAC-794 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "5.0.0" version, but no target version was set.

Details

In response to this:

Summary

  • Adds osac-project-notify step-registry ref that posts job results to Slack via incoming webhook
  • Not wired into any workflow yet — will be added to periodic jobs in a follow-up

Test plan

  • Webhook tested manually and via rehearsal — Slack message received successfully

Summary

This PR adds a new Slack notification capability to OpenShift CI's step registry. The change introduces a new step named osac-project-notify that enables CI jobs to post their completion status to Slack via an incoming webhook.

Changes Made

A complete notification step has been added to the OSAC project's step registry:

Step Configuration (osac-project-notify-ref.yaml): Defines a new CI step that runs as best_effort with a 5-minute timeout. The step executes a bash script to notify Slack, requests 100m CPU and 200Mi memory, and securely retrieves the webhook URL from a Vault-mounted credential (osac-slack-webhook). The step includes documentation explaining it sends the job result and a link to Prow logs.

Notification Logic (osac-project-notify-commands.sh): Implements the Slack notification by reading the webhook URL from Vault, determining the correct Prow logs URL based on the job type (distinguishing between presubmit pull logs and generic job logs), and posting a JSON message containing the job name, build ID, and logs link.

Access Control: Both the OWNERS file and metadata configuration establish osac-cicd as the approvers and reviewers for this new step.

Integration Status

The new step is not yet integrated into any workflows. According to the PR description, integration with periodic jobs will be handled in a follow-up change.

Testing

The webhook has been tested manually and via rehearsal, with successful Slack message delivery confirmed.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@omer-vishlitzky
Copy link
Copy Markdown
Contributor Author

/jira refresh

@openshift-ci-robot
Copy link
Copy Markdown
Contributor

openshift-ci-robot commented May 17, 2026

@omer-vishlitzky: This pull request references OSAC-794 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the task to target the "5.0.0" version, but no target version was set.

Details

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

omer-vishlitzky added a commit to omer-vishlitzky/release that referenced this pull request May 17, 2026
…tion

Add a nightly periodic job that installs OSAC with ALL component images
overridden to their latest CI-built versions, runs all vmaas tests, and
sends results to Slack with pass/fail status and component versions.

New step-registry components:
- osac-project-installer-all-latest: installs OSAC with fulfillment-service,
  osac-operator, and osac-aap images all swapped to latest
- osac-project-baremetal-test-all: runs make test-vmaas (all tests)
- osac-project-ofcir-baremetal-nightly: dedicated nightly workflow
- osac-project-notify: Slack webhook notification (from PR openshift#79364)

Removes unused dead code:
- osac-project-installer-component: single-image swap, replaced by all-latest
- osac-project-ofcir-baremetal-component: workflow using installer-component
WEBHOOK_URL="$(cat /var/run/vault/osac-slack-webhook/url)"
PROW_URL="https://prow.ci.openshift.org/view/gs/test-platform-results"

if [[ "${JOB_TYPE:-}" == "presubmit" ]]; then
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't think we should send messages for presubmits, it will spam the channel

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We don't send messages for presubmits, it will be integrated only for periodics, but I'll remove it

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Don't we want to exit early if the job is not periodic ?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why the user care about build ID ?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what about saying if it failed or succeeded ?

Copy link
Copy Markdown
Contributor

@danmanor danmanor left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Prow has a built in mechanism for doing that, see https://docs.ci.openshift.org/how-tos/notification/

omer-vishlitzky added a commit to omer-vishlitzky/release that referenced this pull request May 18, 2026
…tion

Add a nightly periodic job that installs OSAC with ALL component images
overridden to their latest CI-built versions, runs all vmaas tests, and
sends results to Slack with pass/fail status and component versions.

New step-registry components:
- osac-project-installer-all-latest: installs OSAC with fulfillment-service,
  osac-operator, and osac-aap images all swapped to latest
- osac-project-baremetal-test-all: runs make test-vmaas (all tests)
- osac-project-ofcir-baremetal-nightly: dedicated nightly workflow
- osac-project-notify: Slack webhook notification (from PR openshift#79364)

Removes unused dead code:
- osac-project-installer-component: single-image swap, replaced by all-latest
- osac-project-ofcir-baremetal-component: workflow using installer-component
omer-vishlitzky added a commit to omer-vishlitzky/release that referenced this pull request May 18, 2026
…tion

Add a nightly periodic job that installs OSAC with ALL component images
overridden to their latest CI-built versions, runs all vmaas tests, and
sends results to Slack with pass/fail status and component versions.

New step-registry components:
- osac-project-installer-all-latest: installs OSAC with fulfillment-service,
  osac-operator, and osac-aap images all swapped to latest
- osac-project-baremetal-test-all: runs make test-vmaas (all tests)
- osac-project-ofcir-baremetal-nightly: dedicated nightly workflow
- osac-project-notify: Slack webhook notification (from PR openshift#79364)

Removes unused dead code:
- osac-project-installer-component: single-image swap, replaced by all-latest
- osac-project-ofcir-baremetal-component: workflow using installer-component
Add osac-project-notify step-registry ref that posts job results
to Slack via incoming webhook. Not wired into any workflow yet.
omer-vishlitzky added a commit to omer-vishlitzky/release that referenced this pull request May 18, 2026
…tion

Add a nightly periodic job that installs OSAC with ALL component images
overridden to their latest CI-built versions, runs all vmaas tests, and
sends results to Slack with pass/fail status and component versions.

New step-registry components:
- osac-project-installer-all-latest: installs OSAC with fulfillment-service,
  osac-operator, and osac-aap images all swapped to latest
- osac-project-baremetal-test-all: runs make test-vmaas (all tests)
- osac-project-ofcir-baremetal-nightly: dedicated nightly workflow
- osac-project-notify: Slack webhook notification (from PR openshift#79364)

Removes unused dead code:
- osac-project-installer-component: single-image swap, replaced by all-latest
- osac-project-ofcir-baremetal-component: workflow using installer-component
@openshift-merge-bot
Copy link
Copy Markdown
Contributor

[REHEARSALNOTIFIER]
@omer-vishlitzky: no rehearsable tests are affected by this change

Note: If this PR includes changes to step registry files (ci-operator/step-registry/) and you expected jobs to be found, try rebasing your PR onto the base branch. This helps pj-rehearse accurately detect changes when the base branch has moved forward.

Interacting with pj-rehearse

Comment: /pj-rehearse to run up to 5 rehearsals
Comment: /pj-rehearse skip to opt-out of rehearsals
Comment: /pj-rehearse {test-name}, with each test separated by a space, to run one or more specific rehearsals
Comment: /pj-rehearse more to run up to 10 rehearsals
Comment: /pj-rehearse max to run up to 25 rehearsals
Comment: /pj-rehearse auto-ack to run up to 5 rehearsals, and add the rehearsals-ack label on success
Comment: /pj-rehearse list to get an up-to-date list of affected jobs
Comment: /pj-rehearse abort to abort all active rehearsals
Comment: /pj-rehearse network-access-allowed to allow rehearsals of tests that have the restrict_network_access field set to false. This must be executed by an openshift org member who is not the PR author

Once you are satisfied with the results of the rehearsals, comment: /pj-rehearse ack to unblock merge. When the rehearsals-ack label is present on your PR, merge will no longer be blocked by rehearsals.
If you would like the rehearsals-ack label removed, comment: /pj-rehearse reject to re-block merging.

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 18, 2026

@omer-vishlitzky: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@openshift-ci openshift-ci Bot added the lgtm Indicates that a PR is ready to be merged. label May 18, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented May 18, 2026

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: danmanor, omer-vishlitzky

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

omer-vishlitzky added a commit to omer-vishlitzky/release that referenced this pull request May 18, 2026
…tion

Add a nightly periodic job that installs OSAC with ALL component images
overridden to their latest CI-built versions, runs all vmaas tests, and
sends results to Slack with pass/fail status and component versions.

New step-registry components:
- osac-project-installer-all-latest: installs OSAC with fulfillment-service,
  osac-operator, and osac-aap images all swapped to latest
- osac-project-baremetal-test-all: runs make test-vmaas (all tests)
- osac-project-ofcir-baremetal-nightly: dedicated nightly workflow
- osac-project-notify: Slack webhook notification (from PR openshift#79364)

Removes unused dead code:
- osac-project-installer-component: single-image swap, replaced by all-latest
- osac-project-ofcir-baremetal-component: workflow using installer-component
@openshift-merge-bot openshift-merge-bot Bot merged commit 2bb4a8d into openshift:main May 18, 2026
11 checks passed
omer-vishlitzky added a commit to omer-vishlitzky/release that referenced this pull request May 18, 2026
…tion

Add a nightly periodic job that installs OSAC with ALL component images
overridden to their latest CI-built versions, runs all vmaas tests, and
sends results to Slack with pass/fail status and component versions.

New step-registry components:
- osac-project-installer-all-latest: installs OSAC with fulfillment-service,
  osac-operator, and osac-aap images all swapped to latest
- osac-project-baremetal-test-all: runs make test-vmaas (all tests)
- osac-project-ofcir-baremetal-nightly: dedicated nightly workflow
- osac-project-notify: Slack webhook notification (from PR openshift#79364)

Removes unused dead code:
- osac-project-installer-component: single-image swap, replaced by all-latest
- osac-project-ofcir-baremetal-component: workflow using installer-component
wgahnagl pushed a commit to wgahnagl/release that referenced this pull request May 20, 2026
Add osac-project-notify step-registry ref that posts job results
to Slack via incoming webhook. Not wired into any workflow yet.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. lgtm Indicates that a PR is ready to be merged. rehearsals-ack Signifies that rehearsal jobs have been acknowledged

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants