Skip to content

Updating openshift-enterprise-cli-container image to be consistent with ART for 4.22#2238

Closed
openshift-bot wants to merge 1 commit intoopenshift:mainfrom
openshift-bot:art-consistency-openshift-4.22-openshift-enterprise-cli
Closed

Updating openshift-enterprise-cli-container image to be consistent with ART for 4.22#2238
openshift-bot wants to merge 1 commit intoopenshift:mainfrom
openshift-bot:art-consistency-openshift-4.22-openshift-enterprise-cli

Conversation

@openshift-bot
Copy link
Copy Markdown
Contributor

@openshift-bot openshift-bot commented Mar 23, 2026

Updating openshift-enterprise-cli-container image to be consistent with ART for 4.22
TLDR:
Product builds by ART can be configured for different base and builder images than corresponding CI
builds. This automated PR requests a change to CI configuration to align with ART's configuration;
please take steps to merge it quickly or contact ART to coordinate changes.

The configuration in the following ART component metadata is driving this alignment request:
openshift-enterprise-cli.yml.

Detail:

This repository is out of sync with the downstream product builds for this component. The CI
configuration for at least one image differs from ART's expected product configuration. This should
be addressed to ensure that the component's CI testing accurate reflects what customers will
experience.

Most of these PRs are opened as an ART-driven proposal to migrate base image or builder(s) to a
different version, usually prior to GA. The intent is to effect changes in both configurations
simultaneously without breaking either CI or ART builds, so usually ART builds are configured to
consider CI as canonical and attempt to match CI config until the PR merges to align both. ART may
also configure changes in GA releases with CI remaining canonical for a brief grace period to enable
CI to succeed and the alignment PR to merge. In either case, ART configuration will be made
canonical at some point (typically at branch-cut before GA or release dev-cut after GA), so it is
important to align CI configuration as soon as possible.

PRs are also triggered when CI configuration changes without ART coordination, for instance to
change the number of builder images or to use a different golang version. These changes should be
coordinated with ART; whether ART configuration is canonical or not, preferably it would be updated
first to enable the changes to occur simultaneously in both CI and ART at the same time. This also
gives ART a chance to validate the intended changes first. For instance, ART compiles most
components with the Golang version being used by the control plane for a given OpenShift release.
Exceptions to this convention (i.e. you believe your component must be compiled with a Golang
version independent from the control plane) must be granted by the OpenShift staff engineers and
communicated to the ART team.

Roles & Responsibilities:

  • Component owners are responsible for ensuring these alignment PRs merge with passing
    tests OR that necessary metadata changes are reported to the ART team: @release-artists
    in #forum-ocp-art on Slack. If necessary, the changes required by this pull request can be
    introduced with a separate PR opened by the component team. Once the repository is aligned,
    this PR will be closed automatically.
  • In particular, it could be that a job like verify-deps is complaining. In that case, please open
    a new PR with the dependency issues addressed (and base images bumped). ART-9595 for reference.
  • Patch-manager or those with sufficient privileges within this repository may add
    any required labels to ensure the PR merges once tests are passing. In cases where ART config is
    canonical, downstream builds are already being built with these changes, and merging this PR
    only improves the fidelity of our CI. In cases where ART config is not canonical, this provides
    a grace period for the component team to align their CI with ART's configuration before it becomes
    canonical in product builds.

ART has been configured to reconcile your CI build root image (see https://docs.ci.openshift.org/docs/architecture/ci-operator/#build-root-image).
In order for your upstream .ci-operator.yaml configuration to be honored, you must set the following in your openshift/release ci-operator configuration file:

build_root:
  from_repository: true

Change behavior of future PRs:

  • In case you just want to follow the base images that ART suggests, you can configure additional labels to be
    set up automatically. This means that such a PR would merge without human intervention (and awareness!) in the future.
    To do so, open a PR to set the auto_label attribute in the image configuration. Example
  • You can set a commit prefix, like UPSTREAM: <carry>: . An example.

If you have any questions about this pull request, please reach out to @release-artists in the #forum-ocp-art coreos slack channel.

@openshift-bot openshift-bot force-pushed the art-consistency-openshift-4.22-openshift-enterprise-cli branch from b1856ac to a9a2ebc Compare March 23, 2026 14:34
@openshift-bot
Copy link
Copy Markdown
Contributor Author

@openshift-bot openshift-bot added jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. verified Signifies that the PR passed pre-merge verification criteria labels Mar 23, 2026
@coderabbitai
Copy link
Copy Markdown

coderabbitai bot commented Mar 23, 2026

Walkthrough

This pull request updates the Go runtime version from 1.24 to 1.25 across CI/CD configuration files. Two files are modified: the CI operator configuration and a Dockerfile for the CLI image builder stage.

Changes

Cohort / File(s) Summary
Go version upgrade
.ci-operator.yaml, images/cli/Dockerfile.rhel
Updated base image tags from Go 1.24 to Go 1.25 within RHEL 9 and OpenShift 4.22 contexts (e.g., rhel-9-release-golang-1.24rhel-9-release-golang-1.25).

Estimated code review effort

🎯 1 (Trivial) | ⏱️ ~2 minutes

✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Comment @coderabbitai help to get the list of available commands and usage tips.

@openshift-ci openshift-ci bot requested review from atiratree and ingvagabund March 23, 2026 14:35
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci bot commented Mar 23, 2026

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: openshift-bot
Once this PR has been reviewed and has the lgtm label, please assign ingvagabund for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link
Copy Markdown

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.

Inline comments:
In @.ci-operator.yaml:
- Line 4: The CI config was bumped to Go 1.25 (tag in .ci-operator.yaml) but
Dockerfiles still reference go1.24; update the
images/cli-artifacts/Dockerfile.rhel and images/tools/Dockerfile to use the same
Go base (golang-1.25) or pin an exact patched release (e.g., 1.25.x) to match
.ci-operator.yaml, or instead upgrade all three to 1.26 if security policy
requires; also identify and record the exact patch-level you choose (1.25.N or
1.26.N), confirm it addresses the CVEs mentioned, and run CI/build to verify no
regressions.

ℹ️ Review info
⚙️ Run configuration

Configuration used: Repository YAML (base), Organization UI (inherited)

Review profile: CHILL

Plan: Pro

Run ID: 59a5d3df-dbc2-40da-b648-218de9d97b39

📥 Commits

Reviewing files that changed from the base of the PR and between 55b9cad and a9a2ebc.

📒 Files selected for processing (2)
  • .ci-operator.yaml
  • images/cli/Dockerfile.rhel

name: release
namespace: openshift
tag: rhel-9-release-golang-1.24-openshift-4.22
tag: rhel-9-release-golang-1.25-openshift-4.22
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue | 🟠 Major

🧩 Analysis chain

🏁 Script executed:

#!/bin/bash
# Verify Go 1.25 exists and check for security advisories

# Check latest Go versions from official site
echo "=== Checking Go versions ==="
curl -s https://go.dev/dl/?mode=json | jq -r '.[].version' | head -10

# Check for security advisories
echo ""
echo "=== Checking for Go security advisories ==="
gh api graphql -f query='
{
  securityVulnerabilities(first: 5, ecosystem: GOLANG) {
    nodes {
      advisory {
        summary
        severity
        publishedAt
      }
      package {
        name
      }
      vulnerableVersionRange
      firstPatchedVersion {
        identifier
      }
    }
  }
}'

Repository: openshift/oc

Length of output: 308


🌐 Web query:

Go 1.25 security advisories vulnerabilities

💡 Result:

Latest Go 1.25.x security advisories (and the vulnerabilities they fixed), per upstream announcements/release notes:

Action: if you’re on Go 1.25, upgrade to go1.25.8 (or newer major, e.g. Go 1.26.1). [1][7]

References:
[1] https://go.dev/doc/devel/release
[2] https://groups.google.com/g/golang-announce/c/PtW9VW21NPs
[3] https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI
[4] https://groups.google.com/g/golang-announce/c/8FJoBkPddm4
[5] https://seclists.org/oss-sec/2026/q1/68
[6] https://seclists.org/oss-sec/2026/q1/147
[7] https://seclists.org/oss-sec/2026/q1/262
[9] https://osv.dev/vulnerability/GO-2026-4599
[10] https://osv.dev/vulnerability/GO-2026-4600
[11] https://osv.dev/vulnerability/GO-2026-4603
[12] https://osv.dev/vulnerability/GO-2026-4601
[13] https://osv.dev/vulnerability/GO-2026-4602


🏁 Script executed:

# Examine the .ci-operator.yaml context and look for Dockerfile references
cat -n .ci-operator.yaml | head -20

Repository: openshift/oc

Length of output: 189


🏁 Script executed:

# Find Dockerfile to verify consistency mentioned in the review
find . -name "Dockerfile*" -type f | head -10

Repository: openshift/oc

Length of output: 400


🏁 Script executed:

# Check for Go version references in Dockerfile files
for f in ./images/cli-artifacts/Dockerfile.rhel ./images/cli/Dockerfile.rhel ./images/deployer/Dockerfile.rhel ./images/recycler/Dockerfile.rhel ./images/tools/Dockerfile; do
  echo "=== $f ==="
  grep -i "golang\|go version" "$f" 2>/dev/null || echo "No Go version references found"
done

Repository: openshift/oc

Length of output: 678


🏁 Script executed:

# Also check the git history to see if there was a Go 1.24 -> 1.25 change
git log --oneline -10 -- .ci-operator.yaml 2>/dev/null | head -5

Repository: openshift/oc

Length of output: 293


Address inconsistent Go version updates and verify security considerations.

The .ci-operator.yaml change to Go 1.25 is present, but several Dockerfiles remain on Go 1.24:

  • images/cli/Dockerfile.rhel uses golang-1.25 ✓
  • images/cli-artifacts/Dockerfile.rhel uses golang-1.24 ✗
  • images/tools/Dockerfile uses golang-1.24 ✗

Additionally, Go 1.25 has multiple known security advisories across patch versions (1.25.1–1.25.8 contain 27+ CVEs). Verify the specific patch version being used and whether it requires a newer version or 1.26.x for security compliance.

🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.

In @.ci-operator.yaml at line 4, The CI config was bumped to Go 1.25 (tag in
.ci-operator.yaml) but Dockerfiles still reference go1.24; update the
images/cli-artifacts/Dockerfile.rhel and images/tools/Dockerfile to use the same
Go base (golang-1.25) or pin an exact patched release (e.g., 1.25.x) to match
.ci-operator.yaml, or instead upgrade all three to 1.26 if security policy
requires; also identify and record the exact patch-level you choose (1.25.N or
1.26.N), confirm it addresses the CVEs mentioned, and run CI/build to verify no
regressions.

@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci bot commented Mar 23, 2026

@openshift-bot: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/verify a9a2ebc link true /test verify
ci/prow/e2e-aws-ovn a9a2ebc link true /test e2e-aws-ovn

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@ardaguclu
Copy link
Copy Markdown
Member

/close

@openshift-ci openshift-ci bot closed this Mar 24, 2026
@openshift-ci
Copy link
Copy Markdown
Contributor

openshift-ci bot commented Mar 24, 2026

@ardaguclu: Closed this PR.

Details

In response to this:

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. verified Signifies that the PR passed pre-merge verification criteria

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants