Skip to content

NO-JIRA: [RHCOS10] Migrate base images from UBI9 to UBI10#453

Open
PillaiManish wants to merge 3 commits intoopenshift:mainfrom
PillaiManish:rhcos10-ubi10-migration
Open

NO-JIRA: [RHCOS10] Migrate base images from UBI9 to UBI10#453
PillaiManish wants to merge 3 commits intoopenshift:mainfrom
PillaiManish:rhcos10-ubi10-migration

Conversation

@PillaiManish
Copy link
Copy Markdown
Member

@PillaiManish PillaiManish commented Mar 26, 2026

Summary

Migrate all container base images from UBI9 to UBI10 for native RHCOS10 compatibility.
Also moves the registry from registry.access.redhat.com to registry.redhat.io.

Image Before After
helm-operator, operator-sdk, scorecard-test, custom-scorecard-tests ubi9/ubi-minimal:9.6 ubi10/ubi-minimal:10.1
scorecard-untar ubi9/ubi:9.5 ubi10/ubi:10.1
go-e2e, scorecard-proxy (CI) ubi9/ubi-minimal:latest ubi10/ubi-minimal:latest

Prerequisite

PR1 (rhcos10-ubi9-compat-test) should pass CI on RHCOS10 nodes before merging this.

Summary by CodeRabbit

Release Notes

  • Documentation

    • Added comprehensive migration guide documenting container base image updates.
  • Chores

    • Updated container base images and image registries across build system.
    • Updated testing infrastructure to use updated container images.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Mar 26, 2026
@openshift-ci-robot
Copy link
Copy Markdown
Contributor

@PillaiManish: This pull request explicitly references no jira issue.

Details

In response to this:

Summary

Migrate all container base images from UBI9 to UBI10 for native RHCOS10 compatibility.
Also moves the registry from registry.access.redhat.com to registry.redhat.io.

Image Before After
helm-operator, operator-sdk, scorecard-test, custom-scorecard-tests ubi9/ubi-minimal:9.6 ubi10/ubi-minimal:10.1
scorecard-untar ubi9/ubi:9.5 ubi10/ubi:10.1
go-e2e, scorecard-proxy (CI) ubi9/ubi-minimal:latest ubi10/ubi-minimal:latest

Prerequisite

PR1 (rhcos10-ubi9-compat-test) should pass CI on RHCOS10 nodes before merging this.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@coderabbitai
Copy link
Copy Markdown

coderabbitai Bot commented Mar 26, 2026

Note

Reviews paused

It looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the reviews.auto_review.auto_pause_after_reviewed_commits setting.

Use the following commands to manage reviews:

  • @coderabbitai resume to resume automatic reviews.
  • @coderabbitai review to trigger a single review.

Use the checkboxes below for quick actions:

  • ▶️ Resume reviews
  • 🔍 Trigger review

No actionable comments were generated in the recent review. 🎉

ℹ️ Recent review info
⚙️ Run configuration

Configuration used: Repository: openshift/coderabbit/.coderabbit.yaml

Review profile: CHILL

Plan: Pro Plus

Run ID: 6ba2e0f6-6647-45c4-906c-c3f4f3177131

📥 Commits

Reviewing files that changed from the base of the PR and between 495e344 and 7bc606b.

📒 Files selected for processing (1)
  • release/helm/Dockerfile
🚧 Files skipped from review as they are similar to previous changes (1)
  • release/helm/Dockerfile

Walkthrough

Update RHCOS10 UBI base images and registry references: add a migration doc and replace UBI9-based images with UBI10 across CI Dockerfiles, image Dockerfiles, the release/helm Dockerfile (builder and runtime), and an e2e test script pod image.

Changes

Cohort / File(s) Summary
Compliance Documentation
.work/compliance/rhcos10/PR2-ubi10-migration.md
Add migration document: instruct switching registries to registry.redhat.io, enumerate UBI9→UBI10 image replacements, list exclusions, and provide a test checklist and links.
CI Dockerfiles
ci/dockerfiles/go-e2e.Dockerfile, ci/dockerfiles/scorecard-proxy.Dockerfile
Final/runtime-stage base image updated from registry.access.redhat.com/ubi9/ubi-minimal:latestregistry.redhat.io/ubi10/ubi-minimal:latest.
CI e2e script
ci/tests/e2e-helm.sh
Temporary curl pod image updated from registry.access.redhat.com/ubi9/ubi-minimal:latestregistry.redhat.io/ubi10/ubi-minimal:latest.
Image Dockerfiles (ubi-minimal)
images/custom-scorecard-tests/Dockerfile, images/helm-operator/Dockerfile, images/operator-sdk/Dockerfile, images/scorecard-test/Dockerfile
Final-stage base images pinned/updated from UBI9 (registry.access.redhat.com/ubi9/ubi-minimal:9.x/9.7/latest) → UBI10 (registry.redhat.io/ubi10/ubi-minimal:10.1 or :latest).
Image Dockerfile (ubi full)
images/scorecard-untar/Dockerfile
Base image updated from registry.access.redhat.com/ubi9/ubi:9.5registry.redhat.io/ubi10/ubi:10.1.
Release Dockerfile
release/helm/Dockerfile
Builder stage switched to registry.redhat.io/ubi10/go-toolset:10.1; runtime base replaced with registry.redhat.io/ubi10:10.1; added USER root before copy/build step.

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~20 minutes

🚥 Pre-merge checks | ✅ 10
✅ Passed checks (10 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title directly and specifically describes the main change: migrating base images from UBI9 to UBI10, which is the core objective reflected across all modified Dockerfiles and documentation.
Docstring Coverage ✅ Passed No functions found in the changed files to evaluate docstring coverage. Skipping docstring coverage check.
Stable And Deterministic Test Names ✅ Passed This PR contains no Ginkgo test files or test name definitions, only Dockerfile and configuration changes.
Test Structure And Quality ✅ Passed This PR contains no Ginkgo test code, only infrastructure changes; the check is not applicable.
Microshift Test Compatibility ✅ Passed Pull request contains no new Ginkgo e2e tests; only infrastructure and container configuration changes.
Single Node Openshift (Sno) Test Compatibility ✅ Passed PR modifies only Dockerfiles and test infrastructure scripts to update base images from UBI9 to UBI10; no new Ginkgo e2e tests are added.
Topology-Aware Scheduling Compatibility ✅ Passed PR contains only Dockerfile base image updates and test script changes; no Kubernetes manifests or scheduling constraints introduced.
Ote Binary Stdout Contract ✅ Passed PR contains only Dockerfile, markdown, and shell script changes—no Go source code modifications, so OTE Binary Stdout Contract check is not applicable.
Ipv6 And Disconnected Network Test Compatibility ✅ Passed This PR does not add any new Ginkgo e2e test definitions. Changes consist entirely of updating Docker base image references from UBI9 to UBI10.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Comment @coderabbitai help to get the list of available commands and usage tips.

@PillaiManish
Copy link
Copy Markdown
Member Author

/test e2e-helm-fips e2e-helm-rhcos10-fips e2e-helm-rhcos10

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Mar 26, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: PillaiManish
Once this PR has been reviewed and has the lgtm label, please assign mytreya-rh for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In @.work/compliance/rhcos10/PR2-ubi10-migration.md:
- Around line 15-17: The fenced code block containing
"registry.access.redhat.com  →  registry.redhat.io" is missing a language hint
(MD040); add a language specifier (e.g., "text") to the opening ``` fence so the
block becomes ```text and resolves the lint error while preserving the arrow
line content.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 04b0691b-92b7-43ff-a8c6-f75b15841505

📥 Commits

Reviewing files that changed from the base of the PR and between 514959f and b84792c.

📒 Files selected for processing (8)
  • .work/compliance/rhcos10/PR2-ubi10-migration.md
  • ci/dockerfiles/go-e2e.Dockerfile
  • ci/dockerfiles/scorecard-proxy.Dockerfile
  • images/custom-scorecard-tests/Dockerfile
  • images/helm-operator/Dockerfile
  • images/operator-sdk/Dockerfile
  • images/scorecard-test/Dockerfile
  • images/scorecard-untar/Dockerfile

Comment on lines +15 to +17
```
registry.access.redhat.com → registry.redhat.io
```
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟡 Minor

Add a language hint to the fenced code block

The fenced block at Line 15 has no language specifier (MD040). Add one (for example, text) to clear lint.

Suggested patch
-```
+```text
 registry.access.redhat.com  →  registry.redhat.io
</details>

<!-- suggestion_start -->

<details>
<summary>📝 Committable suggestion</summary>

> ‼️ **IMPORTANT**
> Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

```suggestion

🧰 Tools
🪛 markdownlint-cli2 (0.22.0)

[warning] 15-15: Fenced code blocks should have a language specified

(MD040, fenced-code-language)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.work/compliance/rhcos10/PR2-ubi10-migration.md around lines 15 - 17, The
fenced code block containing "registry.access.redhat.com  →  registry.redhat.io"
is missing a language hint (MD040); add a language specifier (e.g., "text") to
the opening ``` fence so the block becomes ```text and resolves the lint error
while preserving the arrow line content.

Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In `@ci/tests/e2e-helm.sh`:
- Line 74: The pod override in the kubectl run command places container-only
fields inside spec.securityContext and misspells allowPrivilegeEscalation;
update the JSON passed to --overrides in the test-metrics invocation so that
spec.securityContext only contains pod-level settings (e.g., runAsNonRoot), and
move capabilities and allowPrivilegeEscalation (spelled exactly as
"allowPrivilegeEscalation") into spec.containers[0].securityContext for the
test-metrics pod started by kubectl run --attach --rm --restart=Never
test-metrics --image=... so the temporary metrics pod receives the intended
container-level hardening and does not get rejected by admission controllers.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 111cb3d0-2856-411f-90ac-00c0f6e86f35

📥 Commits

Reviewing files that changed from the base of the PR and between b84792c and 0c25ebd.

📒 Files selected for processing (3)
  • .work/compliance/rhcos10/PR2-ubi10-migration.md
  • ci/tests/e2e-helm.sh
  • release/helm/Dockerfile

Comment thread ci/tests/e2e-helm.sh

# verify that the metrics endpoint exists
if ! timeout 1m bash -c -- "until kubectl run --attach --rm --restart=Never test-metrics --image=registry.access.redhat.com/ubi9/ubi-minimal:latest -n memcached-operator-system --overrides='{\"spec\":{\"securityContext\":{\"runAsNonRoot\": true, \"capabilities\": {\"drop\": [\"ALL\"]}, \"allowPrivelegeEscalation\": false, \"seccompProfile\": {\"type\": \"RuntimeDefault\"}}}}' -- curl -sfkH \"Authorization: Bearer ${token}\" https://memcached-operator-controller-manager-metrics-service:8443/metrics; do sleep 1; done";
if ! timeout 1m bash -c -- "until kubectl run --attach --rm --restart=Never test-metrics --image=registry.redhat.io/ubi10/ubi-minimal:latest -n memcached-operator-system --overrides='{\"spec\":{\"securityContext\":{\"runAsNonRoot\": true, \"capabilities\": {\"drop\": [\"ALL\"]}, \"allowPrivelegeEscalation\": false, \"seccompProfile\": {\"type\": \"RuntimeDefault\"}}}}' -- curl -sfkH \"Authorization: Bearer ${token}\" https://memcached-operator-controller-manager-metrics-service:8443/metrics; do sleep 1; done";
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

🧩 Analysis chain

🌐 Web query:

Kubernetes PodSecurityContext vs Container securityContext fields capabilities allowPrivilegeEscalation

💡 Result:

PodSecurityContext (at spec.securityContext) and Container securityContext (at spec.containers[].securityContext) serve different purposes in Kubernetes, with distinct fields for capabilities and allowPrivilegeEscalation. PodSecurityContext applies pod-wide settings like runAsUser, runAsGroup, fsGroup, supplementalGroups, seLinuxOptions, seccompProfile, appArmorProfile, sysctls, but does NOT include capabilities or allowPrivilegeEscalation fields. These are pod-level defaults for user/group IDs, volume ownership, and shared security profiles, but capabilities and privilege escalation are handled per-container. Container securityContext applies to individual containers (and initContainers/ephemeralContainers) and includes capabilities (add/drop lists for Linux capabilities) and allowPrivilegeEscalation (boolean controlling no_new_privs flag to prevent privilege escalation via setuid etc.). Container settings override pod-level where applicable (e.g., runAsUser). allowPrivilegeEscalation defaults to true if unset. It is forced true if privileged: true or capabilities add CAP_SYS_ADMIN, and cannot be set false when privileged: true (pod rejected). Set to false for security to block escalation. Capabilities allow fine-grained privileges: drop: ["ALL"] then add: ["NET_BIND_SERVICE"] for least privilege. Pod Security Standards (Restricted) require no add capabilities except limited list, and allowPrivilegeEscalation: false. Examples: Pod-level (no capabilities/allowPrivilegeEscalation): spec: securityContext: runAsUser: 1000 fsGroup: 2000 Container-level: spec: containers: - securityContext: capabilities: drop: ["ALL"] add: ["NET_BIND_SERVICE"] allowPrivilegeEscalation: false runAsNonRoot: true

Citations:


Move the container-only security fields out of spec.securityContext.

capabilities and allowPrivilegeEscalation belong on spec.containers[0].securityContext, not the pod-level spec.securityContext. Additionally, allowPrivelegeEscalation is misspelled (should be allowPrivilegeEscalation). As written, the temp metrics pod does not receive the intended hardening, and stricter admission controllers will cause this loop to timeout.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In `@ci/tests/e2e-helm.sh` at line 74, The pod override in the kubectl run command
places container-only fields inside spec.securityContext and misspells
allowPrivilegeEscalation; update the JSON passed to --overrides in the
test-metrics invocation so that spec.securityContext only contains pod-level
settings (e.g., runAsNonRoot), and move capabilities and
allowPrivilegeEscalation (spelled exactly as "allowPrivilegeEscalation") into
spec.containers[0].securityContext for the test-metrics pod started by kubectl
run --attach --rm --restart=Never test-metrics --image=... so the temporary
metrics pod receives the intended container-level hardening and does not get
rejected by admission controllers.

@PillaiManish
Copy link
Copy Markdown
Member Author

/test e2e-helm-fips e2e-helm-rhcos10-fips e2e-helm-rhcos10

Update all container base images from UBI9 to UBI10 to align with the
RHCOS10 host OS. Moves registry from registry.access.redhat.com to
registry.redhat.io.

Changes:
- ubi9/ubi-minimal:9.6 -> ubi10/ubi-minimal:10.1 (4 primary images)
- ubi9/ubi:9.5 -> ubi10/ubi:10.1 (scorecard-untar)
- ubi9/ubi-minimal:latest -> ubi10/ubi-minimal:latest (2 CI dockerfiles)
- release/helm/Dockerfile: replace OCP CI RHEL9 builder and base-rhel9
  runtime with ubi10/go-toolset:10.1 (builder, USER root) and ubi10:10.1
- ci/tests/e2e-helm.sh: update metrics curl pod from ubi9 to ubi10

Made-with: Cursor
@PillaiManish PillaiManish force-pushed the rhcos10-ubi10-migration branch from 0c25ebd to 2752c18 Compare March 26, 2026 19:04
@PillaiManish
Copy link
Copy Markdown
Member Author

/test e2e-helm-fips e2e-helm-rhcos10-fips e2e-helm-rhcos10

Copy link
Copy Markdown

@coderabbitai coderabbitai Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (2)
.work/compliance/rhcos10/PR2-ubi10-migration.md (1)

15-17: ⚠️ Potential issue | 🟡 Minor

Add a language hint to this fenced block (MD040).

Line 15 should use a typed fence (for example, text) to satisfy markdownlint.

Suggested patch
-```
+```text
 registry.access.redhat.com  →  registry.redhat.io
</details>

<details>
<summary>🤖 Prompt for AI Agents</summary>

Verify each finding against the current code and only fix it if needed.

In @.work/compliance/rhcos10/PR2-ubi10-migration.md around lines 15 - 17, The
fenced code block containing "registry.access.redhat.com → registry.redhat.io"
needs a language hint to satisfy markdownlint MD040; update that fenced block
(the triple-backtick block with that arrow text) to use a typed fence such as
text (i.e., change to ```text) so the block is recognized as plain text.


</details>

</blockquote></details>
<details>
<summary>ci/tests/e2e-helm.sh (1)</summary><blockquote>

`74-74`: _⚠️ Potential issue_ | _🟠 Major_

**Fix invalid securityContext fields in `--overrides` JSON.**

Line 74 places `capabilities` and misspelled `allowPrivelegeEscalation` under `spec.securityContext` (pod-level). Those must be container-level (`spec.containers[0].securityContext`) and `allowPrivilegeEscalation` must be spelled exactly. Current hardening is not applied reliably.

<details>
<summary>Suggested patch</summary>

```diff
-    if ! timeout 1m bash -c -- "until kubectl run --attach --rm --restart=Never test-metrics --image=registry.redhat.io/ubi10/ubi-minimal:latest -n memcached-operator-system --overrides='{\"spec\":{\"securityContext\":{\"runAsNonRoot\": true, \"capabilities\": {\"drop\": [\"ALL\"]}, \"allowPrivelegeEscalation\": false, \"seccompProfile\": {\"type\": \"RuntimeDefault\"}}}}' -- curl -sfkH \"Authorization: Bearer ${token}\" https://memcached-operator-controller-manager-metrics-service:8443/metrics; do sleep 1; done";
+    if ! timeout 1m bash -c -- "until kubectl run --attach --rm --restart=Never test-metrics --image=registry.redhat.io/ubi10/ubi-minimal:latest -n memcached-operator-system --overrides='{\"spec\":{\"securityContext\":{\"runAsNonRoot\": true, \"seccompProfile\": {\"type\": \"RuntimeDefault\"}},\"containers\":[{\"name\":\"test-metrics\",\"securityContext\":{\"allowPrivilegeEscalation\": false, \"capabilities\": {\"drop\": [\"ALL\"]}}}]}}' -- curl -sfkH \"Authorization: Bearer ${token}\" https://memcached-operator-controller-manager-metrics-service:8443/metrics; do sleep 1; done";
```
</details>

  

```shell
#!/bin/bash
set -euo pipefail

# Verify the current overrides payload still has the typo and misplaced keys.
rg -n 'allowPrivelegeEscalation|allowPrivilegeEscalation|"capabilities"|"securityContext"' ci/tests/e2e-helm.sh -C2

python - <<'PY'
import json, re, pathlib
text = pathlib.Path("ci/tests/e2e-helm.sh").read_text()
m = re.search(r"--overrides='(\{.*?\})'\s+--\s+curl", text)
if not m:
    print("overrides payload not found")
    raise SystemExit(1)

payload = m.group(1).replace('\\"', '"')
obj = json.loads(payload)
pod_sc = obj.get("spec", {}).get("securityContext", {})
print("pod securityContext keys:", sorted(pod_sc.keys()))
print("contains typo allowPrivelegeEscalation:", "allowPrivelegeEscalation" in pod_sc)
print("container securityContext exists:", bool(obj.get("spec", {}).get("containers")))
PY
```

<details>
<summary>🤖 Prompt for AI Agents</summary>

```
Verify each finding against the current code and only fix it if needed.

In `@ci/tests/e2e-helm.sh` at line 74, The overrides JSON in the kubectl run
command places "capabilities" and the misspelled "allowPrivelegeEscalation"
under pod-level spec.securityContext; move those keys into the first container's
securityContext (spec.containers[0].securityContext) and correct the spelling to
"allowPrivilegeEscalation", keeping existing seccompProfile and runAsNonRoot
fields as appropriate; update the --overrides payload used in the kubectl run
invocation so the container securityContext contains capabilities.drop,
allowPrivilegeEscalation: false, and seccompProfile/type as RuntimeDefault.
```

</details>

</blockquote></details>

</blockquote></details>

<details>
<summary>🤖 Prompt for all review comments with AI agents</summary>

Verify each finding against the current code and only fix it if needed.

Inline comments:
In @.work/compliance/rhcos10/PR2-ubi10-migration.md:

  • Around line 60-64: The fenced code block showing the registry lines (the block
    containing "registry.access.redhat.com/ubi9/ubi-minimal:latest →
    registry.redhat.io/ubi10/ubi-minimal:latest") lacks a language hint and triggers
    MD040; update the opening fence from totext so the block becomes a text
    fenced block, preserving the existing lines and arrows exactly.

Duplicate comments:
In @.work/compliance/rhcos10/PR2-ubi10-migration.md:

  • Around line 15-17: The fenced code block containing
    "registry.access.redhat.com → registry.redhat.io" needs a language hint to
    satisfy markdownlint MD040; update that fenced block (the triple-backtick block
    with that arrow text) to use a typed fence such as text (i.e., change to

In `@ci/tests/e2e-helm.sh`:
- Line 74: The overrides JSON in the kubectl run command places "capabilities"
and the misspelled "allowPrivelegeEscalation" under pod-level
spec.securityContext; move those keys into the first container's securityContext
(spec.containers[0].securityContext) and correct the spelling to
"allowPrivilegeEscalation", keeping existing seccompProfile and runAsNonRoot
fields as appropriate; update the --overrides payload used in the kubectl run
invocation so the container securityContext contains capabilities.drop,
allowPrivilegeEscalation: false, and seccompProfile/type as RuntimeDefault.
🪄 Autofix (Beta)

Fix all unresolved CodeRabbit comments on this PR:

  • Push a commit to this branch (recommended)
  • Create a new PR with the fixes

ℹ️ Review info
⚙️ Run configuration

Configuration used: Organization UI

Review profile: CHILL

Plan: Pro

Run ID: 11060a77-bb88-4ead-b93d-ddaf70be3b2e

📥 Commits

Reviewing files that changed from the base of the PR and between 0c25ebd and 2752c18.

📒 Files selected for processing (10)
  • .work/compliance/rhcos10/PR2-ubi10-migration.md
  • ci/dockerfiles/go-e2e.Dockerfile
  • ci/dockerfiles/scorecard-proxy.Dockerfile
  • ci/tests/e2e-helm.sh
  • images/custom-scorecard-tests/Dockerfile
  • images/helm-operator/Dockerfile
  • images/operator-sdk/Dockerfile
  • images/scorecard-test/Dockerfile
  • images/scorecard-untar/Dockerfile
  • release/helm/Dockerfile
✅ Files skipped from review due to trivial changes (7)
  • ci/dockerfiles/scorecard-proxy.Dockerfile
  • ci/dockerfiles/go-e2e.Dockerfile
  • images/helm-operator/Dockerfile
  • images/scorecard-test/Dockerfile
  • images/custom-scorecard-tests/Dockerfile
  • images/operator-sdk/Dockerfile
  • images/scorecard-untar/Dockerfile

Comment on lines +60 to +64
```
registry.access.redhat.com/ubi9/ubi-minimal:latest
registry.redhat.io/ubi10/ubi-minimal:latest
```
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟡 Minor

Add a language hint to this fenced block (MD040).

Line 60 has the same lint issue; add text to the opening fence.

Suggested patch
-```
+```text
 registry.access.redhat.com/ubi9/ubi-minimal:latest
 →
 registry.redhat.io/ubi10/ubi-minimal:latest
</details>

<!-- suggestion_start -->

<details>
<summary>📝 Committable suggestion</summary>

> ‼️ **IMPORTANT**
> Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

```suggestion

🧰 Tools
🪛 markdownlint-cli2 (0.22.0)

[warning] 60-60: Fenced code blocks should have a language specified

(MD040, fenced-code-language)

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.work/compliance/rhcos10/PR2-ubi10-migration.md around lines 60 - 64, The
fenced code block showing the registry lines (the block containing
"registry.access.redhat.com/ubi9/ubi-minimal:latest →
registry.redhat.io/ubi10/ubi-minimal:latest") lacks a language hint and triggers
MD040; update the opening fence from ``` to ```text so the block becomes a text
fenced block, preserving the existing lines and arrows exactly.

@PillaiManish
Copy link
Copy Markdown
Member Author

/test e2e-helm-fips e2e-helm-rhcos10-fips e2e-helm-rhcos10

@openshift-ci openshift-ci Bot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Mar 28, 2026
@PillaiManish
Copy link
Copy Markdown
Member Author

/test e2e-helm-fips e2e-helm-rhcos10-fips e2e-helm-rhcos10

@openshift-ci openshift-ci Bot removed the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Mar 28, 2026
@PillaiManish
Copy link
Copy Markdown
Member Author

/test e2e-helm-fips e2e-helm-rhcos10-fips e2e-helm-rhcos10

@PillaiManish
Copy link
Copy Markdown
Member Author

/test e2e-helm-fips e2e-helm-rhcos10-fips e2e-helm-rhcos10

@PillaiManish
Copy link
Copy Markdown
Member Author

/retest

@PillaiManish
Copy link
Copy Markdown
Member Author

/test e2e-helm-fips e2e-helm-rhcos10-fips e2e-helm-rhcos10

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci Bot commented Apr 17, 2026

@PillaiManish: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/e2e-helm-rhcos10-fips 7bc606b link false /test e2e-helm-rhcos10-fips
ci/prow/e2e-helm-rhcos10 7bc606b link false /test e2e-helm-rhcos10

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants