-
Notifications
You must be signed in to change notification settings - Fork 2.1k
add openshift-ci-security workflow to OCP storage repos #47618
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add openshift-ci-security workflow to OCP storage repos #47618
Conversation
|
@dobsonj: GitHub didn't allow me to request PR reviews from the following users: openshift/storage. Note that only openshift members and repo collaborators can review this PR, and authors cannot review their own PRs. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
|
/pj-rehearse max |
|
/hold to fix these issues before merging this |
|
I opened PR's to ignore most of the false positives: |
4dfd83a to
227d6a1
Compare
|
/pj-rehearse max |
|
/unhold |
|
/retest |
|
/pj-rehearse pull-ci-openshift-local-storage-operator-master-security |
|
/pj-rehearse pull-ci-openshift-cluster-storage-operator-master-e2e-openstack |
|
@duanwei33, |
227d6a1 to
6bb1cfe
Compare
|
/pj-rehearse max |
|
Just the known issues remain, and those need to be fixed upstream. |
The openshift-ci-security workflow exposed some false-positives in upstream code for gcp-filestore-csi-driver and node-driver-registrar. Set this job to always_run=false until we can get the issue fixed and this job passes consistently.
6bb1cfe to
f556692
Compare
|
[REHEARSALNOTIFIER]
A total of 27 jobs have been affected by this change. The above listing is non-exhaustive and limited to 25 jobs. A full list of affected jobs can be found here Interacting with pj-rehearseComment: Once you are satisfied with the results of the rehearsals, comment: |
|
/test check-gh-automation-tide |
|
/lgtm |
|
/assign @deepsm007 |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dobsonj, mpatlasov, smg247 The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
@dobsonj: all tests passed! Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
|
@dobsonj: Updated the
DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
) * make storage-approvers and storage-reviewers consistent * update storage team members for backport-risk-assessed label * add openshift-ci-security workflow to OCP storage repos * security: always_run=false for gcp-filestore and node-driver-registrar The openshift-ci-security workflow exposed some false-positives in upstream code for gcp-filestore-csi-driver and node-driver-registrar. Set this job to always_run=false until we can get the issue fixed and this job passes consistently.
This adds the snyk security scan as a presubmit job. It should pass (if we successfully ignored all false positives).
Also some cleanup around storage owners.
/cc @openshift/storage