-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[keps] Proposing a scope
field for KEP metadata
#2311
Comments
/sig architecture |
I'm not sure about exact values the fields should be able to have, but I like the idea of the field itself. |
I'm also unsure of the exact types, but I think this is a good idea, and recently observed that we now have all of the PRR stuff which seems like a good idea for kubernetes/kubernetes features with feature gates etc. but largely superfluous for KEPs that are meta / not affecting production. |
Policy feels ambiguous but I guess it's a good catch-all for project process changes, build / test changes, etc. |
Going with |
type
field for KEP metadatascope
field for KEP metadata
From @johnbelamaric in #1783 (comment):
|
I think Feature/Process/Tooling is broad enough to cover most keps and specific enough to put them all in an appropriate general bucket. 👍 |
So the current ideas are:
And:
Thinking from the "people --> process --> tools" standpoint... More importantly, the people are always the first concern. Success here is getting a clear indication of who needs to action on something, so to me, at a baseline, there are two buckets:
Also, just because something is out-of-tree, doesn't necessarily mean it's not a "feature". I'm going to move forward with:
Additionally, we should match our repo labels to this, so:
If anyone has objections, let me know. EDIT -- Slack thread: https://kubernetes.slack.com/archives/C1L57L91V/p1613086744161300 |
Are, for example, build scripts |
More discussion here: https://kubernetes.slack.com/archives/C1L57L91V/p1615412485006300 Current thoughts:
Anything that hits the With those permutations, I see:
|
I think @johnbelamaric hit the nail right on the head: we need a concrete definition of what changes constitute |
This is relevant to #2567. One thing that has come out of that is that I think we need a follow on issue to this that provides some concrete guidance around the use of stage/milestone things that are |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten I'm not sure I see consensus on how we should categorize our stuff instead:
I noticed there is a PR out that assumes scope could be I think at the very least I'm going to propose I add |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This is coming up every cycle... /reopen |
@justaugustus: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
cc: @kubernetes/enhancements @kubernetes/release-team @kubernetes/production-readiness |
I've mentioned in some of the recent Enhancements subproject meetings, but filing an issue now, as I was reminded by a line of code in #2280.
As we've used KEPs for some time as a community, we've seen them implemented to capture changes in:
kubernetes/kubernetes
(in-tree)For non-
in-tree
enhancements, much of the metadata/enforcement for KEPs may not be relevant to proposing/implementing a change in policy, infrastructure, out-of-tree components.Suggesting here that we introduce a
scope
field to KEP metadata to allow for scenarios where we might want to skip stricter validation checks.Proposed values for the
scope
field:in-tree
(assumed if not populated)out-of-tree
policy
(Somewhat related to kubernetes/community#3795 and kubernetes/sig-release#486.)
From @jeremyrickard in #1783:
cc: @kubernetes/enhancements @spiffxp
PRR: @johnbelamaric @deads2k @wojtek-t
The text was updated successfully, but these errors were encountered: