Skip to content

Conversation

@xiaojiey
Copy link

@xiaojiey xiaojiey commented Dec 2, 2025

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.22-lp-Interop-compliance: Compares 4.22 vs 4.21
  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

    • Added multiple historical lp-interop-compliance release entries to expand multi-release readiness and analysis.
  • Tests

    • Added COO and Compliance lp-interop test suites and expanded snapshot coverage for compliance variants.
  • Chores

    • Standardized layered-product mappings and snapshot defaults to ensure consistent variant coverage, multi-release analysis, and aligned test options across releases.

@openshift-ci-robot
Copy link

Pipeline controller notification
This repo is configured to use the pipeline controller. Second-stage tests will be triggered either automatically or after lgtm label is added, depending on the repository configuration. The pipeline controller will automatically detect which contexts are required and will utilize /test Prow commands to trigger the second stage.

For optional jobs, comment /test ? to see a list of all defined jobs. To trigger manually all jobs from second stage use /pipeline required command.

This repository is configured in: automatic mode

@openshift-ci openshift-ci bot requested review from deepsm007 and stbenjam December 2, 2025 05:08
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Dec 2, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: xiaojiey
Once this PR has been reviewed and has the lgtm label, please assign deepsm007 for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@coderabbitai
Copy link
Contributor

coderabbitai bot commented Dec 2, 2025

Walkthrough

Adds lp-interop-compliance readiness configuration blocks for multiple historical releases, registers two new test suites (COO-lp-interop, Compliance-lp-interop), maps compliance-related job name substrings to the lp-interop-compliance layered product, and updates snapshot entries to set LayeredProduct: lp-interop-compliance.

Changes

Cohort / File(s) Summary
Readiness configuration blocks
config/views.yaml
Adds multiple component_readiness blocks for 4.22-lp-Interop-compliance4.16-lp-Interop-compliance with base_release, sample_release, variant_options, include_variants, advanced_options, metrics, regression_tracking, prime_cache, and include_multi_release_analysis consistently defined across releases.
Test suite registration
pkg/db/suites.go
Appends COO-lp-interop and Compliance-lp-interop to the testSuites list; existing population logic unchanged.
Layered product routing
pkg/variantregistry/ocp.go
Adds substring→layered-product mappings: -complianceascode-, -compliance-destructive, and -compliancelp-interop-compliance in setLayeredProduct.
Periodic job snapshots
pkg/variantregistry/snapshot.yaml
Replaces LayeredProduct: none with LayeredProduct: lp-interop-compliance across numerous snapshot entries.

Estimated code review effort

🎯 3 (Moderate) | ⏱️ ~25 minutes

🚥 Pre-merge checks | ✅ 6 | ❌ 1
❌ Failed checks (1 warning)
Check name Status Explanation Resolution
Docstring Coverage ⚠️ Warning Docstring coverage is 0.00% which is insufficient. The required threshold is 80.00%. Write docstrings for the functions missing them to satisfy the coverage threshold.
✅ Passed checks (6 passed)
Check name Status Explanation
Description Check ✅ Passed Check skipped - CodeRabbit’s high-level summary is enabled.
Title check ✅ Passed The title clearly and specifically identifies the main change: adding a Component Readiness dashboard for the Compliance Operator, directly supported by all file modifications.
Go Error Handling ✅ Passed The pull request only introduces addition-only changes to configuration data and patterns with no new error handling code or modifications to existing error handling logic.
Sql Injection Prevention ✅ Passed The pull request safely adds test suite names and layered product mappings without introducing SQL injection vulnerabilities using GORM's parameterized queries.
Excessive Css In React Should Use Styles ✅ Passed The custom check for React inline CSS styling is not applicable. This PR only modifies YAML configuration files and Go backend code with no React components or inline CSS styles.
Single Responsibility And Clear Naming ✅ Passed Pull request adheres to Single Responsibility and Clear Naming principles across all modified files with focused, appropriately-sized structures.

✏️ Tip: You can configure your own custom pre-merge checks in the settings.

✨ Finishing touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests
  • Post copyable unit tests in a comment

Comment @coderabbitai help to get the list of available commands and usage tips.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

📜 Review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

Cache: Disabled due to data retention organization setting

Knowledge base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between dfcbb55 and d1bdd22.

📒 Files selected for processing (4)
  • config/views.yaml (1 hunks)
  • pkg/db/suites.go (1 hunks)
  • pkg/variantregistry/ocp.go (1 hunks)
  • pkg/variantregistry/snapshot.yaml (66 hunks)
🔇 Additional comments (5)
pkg/db/suites.go (1)

60-71: New Compliance-lp-interop suite entry looks correct

Adding "Compliance-lp-interop" alongside the other *-lp-interop suites cleanly extends the set of suites we persist into the DB and aligns with the new compliance readiness flow. There are no behavioral concerns with this change itself.

One thing to double-check: ensure the underlying JUnit data (BigQuery testsuite values) for the new compliance jobs actually uses this exact string; any mismatch would mean those results are still filtered out here.

pkg/variantregistry/snapshot.yaml (1)

1173-1728: Verify that the snapshot changes align with the supporting configuration updates.

The changes update 66 CI job entries, changing LayeredProduct: none to LayeredProduct: lp-interop-compliance. While the bulk pattern is consistent, confirm:

  1. Is this the correct change location? Verify whether snapshot.yaml is manually maintained or auto-generated. If auto-generated, ensure the generation process (potentially triggered by changes to config/views.yaml, pkg/variantregistry/ocp.go, or pkg/db/suites.go) is part of this PR workflow.

  2. Job coverage completeness. Ensure all and only the correct compliance-related jobs are being categorized under lp-interop-compliance to prevent missing jobs from the compliance dashboard.

  3. Integration validation. Verify that these snapshot updates, combined with supporting configuration changes, enable the Component Readiness dashboard for Compliance Operator as intended.

config/views.yaml (2)

1507-1507: Note: Lower minimum_failure threshold for new dashboard.

The minimum_failure is set to 2, which is lower than the standard threshold of 3 used in main views (e.g., line 68). This lower threshold means tests will be flagged as problematic with fewer failures, which could be appropriate for a new compliance dashboard to catch issues early, but may also result in more false positives if compliance jobs are less stable.

This appears intentional for initial compliance tracking sensitivity, similar to other specialized views like 4.21-LP-Interop (line 334).


1497-1506: Verify the intentionally limited platform and owner scope.

The compliance view is restricted to:

  • Platform: only aws (line 1505)
  • Owner: only eng (line 1503)

This is notably more restrictive than other views, which typically include multiple platforms (aws, azure, gcp, metal, rosa, vsphere) and owners (eng, service-delivery). Additionally, the view lacks filters for Installer, Network, Topology, and FeatureSet that are standard in other component readiness views.

If this is the initial rollout scope, consider documenting this in the PR description or a comment. Otherwise, verify whether this limited scope is intentional.

pkg/variantregistry/ocp.go (1)

1107-1109: Verify the generic -compliance pattern doesn't over-match unintended jobs.

The -compliance pattern on line 1109 uses substring matching and will categorize any job containing "compliance" (e.g., "pre-compliance-check", "non-compliance-test") under lp-interop-compliance. While the pattern order is correct—more specific patterns (-complianceascode-, -compliance-destructive) are checked first—confirm that no unintended compliance-related jobs are being routed to this product. If broader matching is undesired, consider anchoring the pattern with additional delimiters (e.g., compliance- instead of just compliance).

@openshift-ci-robot
Copy link

Scheduling required tests:
/test e2e

@xiaojiey xiaojiey changed the title Add Component Readiness dashboard for Compliance Operator CMP-3987: Add Component Readiness dashboard for Compliance Operator Dec 2, 2025
@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 2, 2025

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

Details

In response to this:

Add Component Readiness dashboard for Compliance Operator:

  • For upstream test jobs, the job name is like: periodic-ci-ComplianceAsCode-content-master-4.18-e2e-aws-openshift-node-compliance-arm-weekly
  • For downstream test jobs, the job name is like periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance or periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance-destructive:

Summary by CodeRabbit

  • New Features
  • Added compliance-component-readiness analysis pathway with configurable release windows, advanced metrics, and variant options for comprehensive readiness assessment.
  • Introduced new compliance test suite to expand testing capabilities across compliance scenarios.
  • Consolidated compliance-related jobs under unified compliance product classification for streamlined tracking and analysis.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. label Dec 2, 2025
@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 2, 2025

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.21.0" version, but no target version was set.

Details

In response to this:

Add Component Readiness dashboard for Compliance Operator:

  • For upstream test jobs, the job pattern is "-ComplianceAsCode-". The job name is like: periodic-ci-ComplianceAsCode-content-master-4.18-e2e-aws-openshift-node-compliance-arm-weekly
  • For downstream test jobs, the job pattern is "-compliance" or "-compliance-destructive". The job name is like periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance or periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance-destructive:

Summary by CodeRabbit

  • New Features
  • Added compliance-component-readiness analysis pathway with configurable release windows, advanced metrics, and variant options for comprehensive readiness assessment.
  • Introduced new compliance test suite to expand testing capabilities across compliance scenarios.
  • Consolidated compliance-related jobs under unified compliance product classification for streamlined tracking and analysis.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch from d1bdd22 to d8e9a70 Compare December 15, 2025 01:42
@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 15, 2025

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Add Component Readiness dashboard for Compliance Operator:

  • For upstream test jobs, the job pattern is "-ComplianceAsCode-". The job name is like: periodic-ci-ComplianceAsCode-content-master-4.18-e2e-aws-openshift-node-compliance-arm-weekly
  • For downstream test jobs, the job pattern is "-compliance" or "-compliance-destructive". The job name is like periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance or periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance-destructive:

Summary by CodeRabbit

  • New Features

  • Added multiple compliance readiness blocks with individual release windows, variant selections, metrics, and sampling options for separate analyses.

  • Added a new compliance test suite to be created/populated during test population.

  • Chores

  • Consolidated numerous compliance-related jobs under a unified compliance product classification for consistent tracking.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (6)
config/views.yaml (6)

1743-1786: Missing JobTier filter may include unstable jobs.

This compliance view block lacks a JobTier filter in include_variants, which means it will include jobs of all tiers (blocking, informing, standard, candidate, hidden). This is the same concern previously raised in past review comments.

For consistency with main release views (e.g., 4.21-main at lines 39-42) and to ensure only stable jobs are tracked, consider adding:

       include_variants:
         Architecture:
           - amd64
           - arm64
+        JobTier:
+          - blocking
+          - informing
+          - standard
         LayeredProduct:
           - lp-interop-compliance
         Owner:
           - eng
         Platform:
           - azure
           - gcp
           - aws

Note: If downstream QE jobs default to JobTier: hidden (as mentioned in the Owner filter concern), you may need to either include hidden in the filter or opt-in specific compliance QE jobs to a different tier in pkg/variantregistry/ocp.go.


1787-1830: Missing JobTier filter may include unstable jobs.

Same issue as the 4.21 block - this view lacks a JobTier filter and may include unstable candidate or hidden jobs.


1831-1874: Missing JobTier filter may include unstable jobs.

Same issue as the 4.21 and 4.20 blocks - this view lacks a JobTier filter.


1875-1918: Missing JobTier filter may include unstable jobs.

Same issue as other compliance blocks - this view lacks a JobTier filter.


1919-1962: Missing JobTier filter may include unstable jobs.

Same issue as other compliance blocks - this view lacks a JobTier filter.


1963-2006: Missing JobTier filter may include unstable jobs.

Same issue as other compliance blocks - this view lacks a JobTier filter.

📜 Review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

Cache: Disabled due to data retention organization setting

Knowledge base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between d1bdd22 and d8e9a70.

📒 Files selected for processing (3)
  • config/views.yaml (1 hunks)
  • pkg/db/suites.go (1 hunks)
  • pkg/variantregistry/ocp.go (1 hunks)
🔇 Additional comments (1)
pkg/db/suites.go (1)

71-71: LGTM!

The new test suite "Compliance-lp-interop" is correctly added to the testSuites list, following the established pattern for other layered product interop suites.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 15, 2025

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Add Component Readiness dashboard for Compliance Operator:

  • For upstream test jobs, the job pattern is "-ComplianceAsCode-". The job name is like: periodic-ci-ComplianceAsCode-content-master-4.18-e2e-aws-openshift-node-compliance-arm-weekly
  • For downstream test jobs, the job pattern is "-compliance" or "-compliance-destructive". The job name is like periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance or periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance-destructive:

Summary by CodeRabbit

  • New Features

  • Added multiple compliance readiness blocks with distinct release windows, variant selections, metrics, regression tracking, and sampling for separate analyses.

  • Added a new compliance test suite to be created/populated during test population.

  • Chores

  • Consolidated numerous compliance-related jobs under a unified compliance product classification for consistent tracking.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

♻️ Duplicate comments (1)
config/views.yaml (1)

1743-2012: Add JobTier filter to compliance-readiness blocks to exclude unstable job tiers.

All six new lp-interop-compliance blocks (4.21 through 4.16) are missing a JobTier filter in their include_variants sections. Without this filter, the views may include candidate or hidden jobs that are not stable enough for component readiness tracking. This mirrors the concern raised in the previous review.

Apply this diff to add JobTier filtering to each block (example shown for 4.21-lp-interop-compliance; repeat for all six):

       include_variants:
         Architecture:
           - amd64
           - arm64
         LayeredProduct:
           - lp-interop-compliance
+        JobTier:
+          - blocking
+          - informing
+          - standard
         Owner:
           - eng
           - qe
         Platform:
           - azure
           - gcp
           - aws
📜 Review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

Cache: Disabled due to data retention organization setting

Knowledge base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between d8e9a70 and b682638.

📒 Files selected for processing (2)
  • config/views.yaml (1 hunks)
  • pkg/variantregistry/snapshot.yaml (66 hunks)

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch from b682638 to dd3edd0 Compare December 15, 2025 02:17
@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 15, 2025

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Add Component Readiness dashboard for Compliance Operator:

  • For upstream test jobs, the job pattern is "-ComplianceAsCode-". The job name is like: periodic-ci-ComplianceAsCode-content-master-4.18-e2e-aws-openshift-node-compliance-arm-weekly
  • For downstream test jobs, the job pattern is "-compliance" or "-compliance-destructive". The job name is like periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance or periodic-ci-openshift-openshift-tests-private-release-4.12-amd64-nightly-aws-ipi-proxy-fips-f60-compliance-destructive:

Summary by CodeRabbit

  • New Features

  • Added multiple compliance readiness blocks covering several release windows with standardized variant selections, metrics, regression tracking, sampling, and multi-release analyses.

  • Added a new compliance test suite to be created/populated during test population.

  • Chores

  • Consolidated numerous compliance-related jobs under a unified compliance product classification for consistent tracking.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 15, 2025

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 15, 2025

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Added URL validation for artifact and job run links to improve safety when opening external resources.

  • Extended component readiness analysis with new compliance-tracking blocks for multiple release versions.

  • Chores

  • Updated product mapping configuration for compliance-related jobs.

  • Enhanced messaging formatting in analysis prompts.

  • Expanded test suite configuration.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 0

🧹 Nitpick comments (1)
sippy-ng/src/component_readiness/JobArtifactQuery.js (1)

594-601: Align validateURL implementations to avoid subtle divergence

You now have three validateURL implementations: two with try/catch (Lines 594-601, 804-811) and one without (Lines 624-630). To keep behavior consistent and avoid future drift, consider giving the JAQResultTable version the same try/catch semantics (or extracting a shared helper in this file if Snyk still accepts it). This keeps all URL checks robust against malformed input while preserving the http/https protocol restriction.

Also applies to: 624-630, 804-811

📜 Review details

Configuration used: Path: .coderabbit.yaml

Review profile: CHILL

Plan: Pro

Cache: Disabled due to data retention organization setting

Knowledge base: Disabled due to data retention organization setting

📥 Commits

Reviewing files that changed from the base of the PR and between dd3edd0 and d9b5bd5.

📒 Files selected for processing (2)
  • chat/prompts/payload-analysis.yaml (1 hunks)
  • sippy-ng/src/component_readiness/JobArtifactQuery.js (2 hunks)
🧰 Additional context used
🧬 Code graph analysis (1)
sippy-ng/src/component_readiness/JobArtifactQuery.js (1)
sippy-ng/src/helpers.js (1)
  • url (338-338)
🔇 Additional comments (2)
chat/prompts/payload-analysis.yaml (1)

106-112: Revert text formatting change looks good

Switching the high-confidence revert notice to "** REVERT RECOMMENDED **" keeps the instruction explicit while avoiding emoji; no behavioral impact on the workflow.

sippy-ng/src/component_readiness/JobArtifactQuery.js (1)

594-601: URL validation around window.open is correctly tightened

The new validateURL helpers (Lines 594-601 and 804-811) and the guards around window.open (Lines 603-608 and 813-822) safely restrict navigation to http/https URLs and handle parse errors via try/catch. This meaningfully hardens these paths without changing intended behavior.

Also applies to: 603-608, 804-822

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch from d9b5bd5 to 2d2365c Compare December 15, 2025 03:10
@openshift-ci-robot
Copy link

openshift-ci-robot commented Dec 15, 2025

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features
  • Added interoperability compliance testing coverage for releases 4.19, 4.20, and 4.21.
  • Introduced unified compliance job routing and classification to streamline test organization.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@xiaojiey
Copy link
Author

@neisw @deepsm007 Could you please help to review this PR, thanks.

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch from 2d2365c to 7a16b9d Compare January 7, 2026 08:14
@openshift-merge-robot openshift-merge-robot added the needs-rebase Indicates a PR cannot be merged because it has merge conflicts with HEAD. label Jan 7, 2026
@openshift-ci-robot
Copy link

openshift-ci-robot commented Jan 7, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Expanded multi-release readiness coverage with additional interop/compliance-focused blocks and adjusted release time anchors.

  • Broader variant dimensions (architectures, platforms, layered-product variants, owners) for cross-release comparison.

  • Tests

  • Added a dedicated compliance test suite and routed periodic jobs into the unified compliance grouping.

  • Chores

  • Consolidated and expanded configuration blocks while preserving existing test gating and metric controls.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch from a8d66f2 to a84e3cf Compare January 7, 2026 09:35
@openshift-ci-robot
Copy link

openshift-ci-robot commented Jan 7, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Expanded multi-release readiness coverage with additional interop/compliance-focused blocks and adjusted release anchors.

  • Broader variant dimensions (architectures, platforms, layered-product variants, owners) for cross-release comparison.

  • Tests

  • Added a dedicated compliance test suite and routed periodic jobs into the unified compliance grouping.

  • Chores

  • Consolidated and standardized configuration entries and snapshot defaults for compliance-oriented variants.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link

Scheduling required tests:
/test e2e

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch from a84e3cf to e26dbf3 Compare January 15, 2026 04:31
@openshift-ci-robot
Copy link

openshift-ci-robot commented Jan 15, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.22-lp-Interop-compliance: Compares 4.22 vs 4.21
  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Expanded multi-release readiness coverage with additional interop/compliance-focused blocks and adjusted release anchors.

  • Broader variant dimensions (architectures, platforms, layered-product variants, owners) for cross-release comparison.

  • Tests

  • Added a dedicated compliance test suite and routed periodic jobs into the unified compliance grouping.

  • Chores

  • Consolidated and standardized configuration entries and snapshot defaults for compliance-oriented variants.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Jan 15, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.22-lp-Interop-compliance: Compares 4.22 vs 4.21
  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Expanded multi-release readiness coverage with additional interop/compliance releases and aligned release anchors.

  • Broader variant dimensions (architectures, platforms, layered-product variants, owners) for cross-release comparison.

  • Tests

  • Added a dedicated compliance test suite and routed periodic jobs into a unified compliance grouping.

  • Chores

  • Standardized configuration and snapshot defaults for compliance-oriented variants.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch from e26dbf3 to 8b8e36f Compare January 15, 2026 05:04
@openshift-ci-robot
Copy link

openshift-ci-robot commented Jan 15, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.22-lp-Interop-compliance: Compares 4.22 vs 4.21
  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Expanded multi-release readiness coverage with additional lp-interop-compliance historical releases and aligned release anchors.

  • Broader variant dimensions (architectures, platforms, layered-product variants, owners) for cross-release comparison.

  • Tests

  • Added a dedicated compliance test suite and consolidated periodic snapshots under the compliance grouping.

  • Chores

  • Standardized configuration and snapshot defaults for compliance-oriented variants.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch 2 times, most recently from 0387a9f to fd89f14 Compare January 16, 2026 04:32
@openshift-ci-robot
Copy link

openshift-ci-robot commented Jan 16, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.22-lp-Interop-compliance: Compares 4.22 vs 4.21
  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Expanded multi-release readiness coverage with additional lp-interop-compliance historical releases and aligned release anchors.

  • Broader variant dimensions for cross-release comparison (architectures, platforms, layered-product variants, owners).

  • Tests

  • Added a dedicated compliance test suite and consolidated periodic snapshots under the compliance grouping.

  • Chores

  • Standardized configuration and snapshot defaults for compliance-oriented variants.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch 2 times, most recently from 044adc8 to 63d8502 Compare January 16, 2026 05:45
@openshift-ci-robot
Copy link

openshift-ci-robot commented Jan 16, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.22-lp-Interop-compliance: Compares 4.22 vs 4.21
  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Added multiple historical lp-interop-compliance releases for broader readiness and aligned release anchors.

  • Expanded variant dimensions to include additional architectures, platforms, layered-product options, and owners for cross-release comparison.

  • Tests

  • Introduced a dedicated compliance test suite and consolidated periodic snapshots under the compliance grouping.

  • Chores

  • Standardized configuration and snapshot defaults for compliance-oriented variants.

✏️ Tip: You can customize this high-level summary in your review settings.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch from 63d8502 to 0f51b0f Compare February 6, 2026 08:21
@openshift-ci-robot
Copy link

openshift-ci-robot commented Feb 6, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.22-lp-Interop-compliance: Compares 4.22 vs 4.21
  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Added multiple historical lp-interop-compliance release entries to expand multi-release readiness and analysis.

  • Tests

  • Introduced dedicated COO and Compliance lp-interop test suites and consolidated compliance-related snapshots.

  • Chores

  • Standardized layered-product mappings and snapshot defaults to ensure consistent variant coverage across releases.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Feb 6, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.22-lp-Interop-compliance: Compares 4.22 vs 4.21
  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Added multiple historical lp-interop-compliance release entries to expand multi-release readiness and analysis.

  • Tests

  • Introduced COO and Compliance lp-interop test suites and consolidated compliance-related snapshots for broader coverage.

  • Chores

  • Standardized layered-product mappings and snapshot defaults to ensure consistent variant coverage and multi-release analysis across releases.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

Copy link
Contributor

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Fix all issues with AI agents
In `@config/views.yaml`:
- Around line 2508-2512: The 4.22 compliance view named
"4.22-lp-Interop-compliance" uses a sliding base_release window (relative_start:
now-30d / relative_end: now) which is inconsistent with other GA-based
compliance views; change base_release.release and its window to use the GA
baseline style (e.g., set base_release.release to "4.21" with relative_start:
ga-30d and relative_end: ga) or confirm and document why the sliding window is
intentional by updating the view metadata; edit the block for
"4.22-lp-Interop-compliance" (adjusting base_release.release, relative_start,
and relative_end) to match the other GA baselines.

@openshift-ci-robot
Copy link

openshift-ci-robot commented Feb 6, 2026

@xiaojiey: This pull request references CMP-3987 which is a valid jira issue.

Warning: The referenced jira issue has an invalid target version for the target branch this PR targets: expected the story to target the "4.22.0" version, but no target version was set.

Details

In response to this:

Overview

  1. This PR adds support for tracking Component Readiness for the Compliance Operator as a separate layered product dashboard. The Compliance Operator includes both upstream (ComplianceAsCode) and downstream testing, and we need dedicated dashboards to track readiness across these components.

  2. Component Readiness views are added for Compliance across actively supported OCP versions (4.16-4.21).

Changes

  1. Configuration Views (config/views.yaml)

Added Component Readiness views for Compliance across OCP versions:

  • 4.22-lp-Interop-compliance: Compares 4.22 vs 4.21
  • 4.21-lp-Interop-compliance: Compares 4.21 vs 4.20
  • 4.20-lp-Interop-compliance: Compares 4.20 vs 4.19
  • 4.19-lp-Interop-compliance: Compares 4.19 vs 4.18
  • 4.18-lp-Interop-compliance: Compares 4.18 vs 4.17
  • 4.17-lp-Interop-compliance: Compares 4.17 vs 4.16
  • 4.16-lp-Interop-compliance: Compares 4.16 vs 4.15
  1. All views are configured with:
  • LayeredProduct filter: lp-interop-compliance
  • Platforms: azure, gcp, aws
  • Architectures: amd64, arm64
  • Owners: eng, qe
  • Metrics and regression tracking: enabled
  • Base releases use ga-30d to ga for GA'd releases
  1. Suite Registration (pkg/db/suites.go)
  • Added Compliance-lp-interop to the test suites list
  1. Variant Registry (pkg/variantregistry/ocp.go)
  • Added mapping rules for compliance jobs tagged as LayeredProduct lp-interop-compliance:
    • Jobs containing -complianceascode- (upstream tests)
    • Jobs containing -compliance-destructive (downstream destructive tests)
    • Jobs containing -compliance (downstream tests)
  1. Snapshot (pkg/variantregistry/snapshot.yaml)
  • Updated 66 compliance job entries to use LayeredProduct: lp-interop-compliance

Related Jobs

This tracks the following Compliance periodic jobs:

Upstream (ComplianceAsCode) Jobs:

  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-node-compliance (amd64/arm64)
  • periodic-ci-ComplianceAsCode-content-master-{version}-e2e-aws-openshift-platform-compliance (amd64/arm64)

Downstream Jobs:

  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance
  • periodic-ci-openshift-openshift-tests-private-release-{version}-{arch}-nightly-{platform}-*-compliance-destructive

Coverage includes versions 4.12-4.21 across amd64, arm64, and multi architectures on platforms: aws, azure, gcp, baremetal, vsphere.

  1. Testing
  • Views follow the established naming pattern: {OCP_RELEASE}-lp-Interop-{product}
  • Configuration aligns with other LP-Interop views (CNV, Quay, ServiceMesh, COO, etc.)
  • Metrics and regression tracking enabled for proactive monitoring
  • Both engineering and QE owned jobs are included for comprehensive coverage

Summary by CodeRabbit

  • New Features

  • Added multiple historical lp-interop-compliance release entries to expand multi-release readiness and analysis.

  • Tests

  • Added COO and Compliance lp-interop test suites and expanded snapshot coverage for compliance variants.

  • Chores

  • Standardized layered-product mappings and snapshot defaults to ensure consistent variant coverage, multi-release analysis, and aligned test options across releases.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot
Copy link

Scheduling required tests:
/test e2e

@xiaojiey xiaojiey force-pushed the compliance-dashboard branch from 2e683eb to 96d48f8 Compare February 6, 2026 09:54
@openshift-ci-robot
Copy link

Scheduling required tests:
/test e2e

@xiaojiey
Copy link
Author

xiaojiey commented Feb 6, 2026

@neisw @deepsm007 Could you please help to review this PR, thanks.

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Feb 6, 2026

@xiaojiey: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@neisw
Copy link
Contributor

neisw commented Feb 6, 2026

It looks like my comment on your ci-test-mapping pr is still valid. To use Component Readiness it must map to a valid OCPBUGS component.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants