-
Notifications
You must be signed in to change notification settings - Fork 397
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Process and communication improvements for Release Engineering #732
Comments
@tpepper and @justaugustus are added as managers of the list, and can add/manager additional members/managers |
Given the type of communications sent to the security release team list, I think the list name should reflect its security-sensitive or private nature. (e.g. [email protected], [email protected], etc) |
@liggitt @jonpulsifer -- sounds good.
|
that seems reasonable |
+1, sgtm |
+1 Let me know which I can help with. |
+1 |
@idealhack @cpanato -- Most of this will need to be handled by administrators of the relevant properties (SIG Chairs, PSC, kubernetes.io GSuite Admins), but I'll let you know if there's anything we can delegate! :) |
+1, lgtm |
@justaugustus what will the [email protected] list be used for? Do you think we should consider using the https://github.com/kubernetes/k8s.io/blob/fc4218bdc7de25fc2fe4b7dca00d61c5bde61366/groups/groups.yaml automation? |
@philips i have been thinking the same thing. though currently the automation that drives the groups.yaml has a hard coded prefix |
@philips -- @jbeda created the group for me earlier. I've closed out the steering issue (kubernetes/steering#115). We'll use [email protected] for general communications for all Release Managers and [email protected] for private comms (PSC + internal comms for Patch Release Team, SIG Chairs, and Build Admins). Both will also be used for permissions to SIG Release projects on GCP. And yes, I definitely want to use the yaml-based configs eventually, but as @dims mentioned, there is currently a restriction on group naming. I've added an item for it above. |
The mailing list changes have been approved in this thread. I'll wait until that time passes and all potential members of the private mailing list have agreed to uphold the security embargo before proceeding with any group membership changes/renames/archivals. |
Notified k-security-discuss, release-managers, k-release-managers-private, k-sig-release, k-release-team, steering, community of changes and lazy consensus period: https://groups.google.com/d/topic/kubernetes-sig-release/xHrHQcjwWjk/discussion |
Lazy consensus for mailing lists changes has been achieved. @jbeda has granted me owner access to [email protected] and I've changed the list email address to [email protected]. |
Documentation updates: kubernetes/committee-security-response#45, #751 |
Before granting [email protected] GCP access, I'd like to clean up membership leaving only Release Managers. IIUC, the PSC was only on this list to manage membership, which is no longer required. Any issues with removing the following people?
Additionally, can we create Per @tallclair's suggestion on the thread, this (and unnesting Will send to ML as well. |
Most of the non-nebulous, cross-group tasks here have been completed, so we're just about ready to close this out. @kubernetes/product-security-committee -- How do we want to handle coordinating security releases? Option 1Continue as-is, with Option 2Use
Here, Patch Release Team members would have to be explicitly added to the thread to action on coordinating a release. Let me know what you think. |
Ping @kubernetes/release-engineering for any last-minute thoughts... |
Looks good to me! 👍 |
PSC is trending towards option two, so I've opened kubernetes/k8s.io#492 for discussion/review. Opened #896 to track documentation updates. |
kubernetes/k8s.io#492 has merged and I've confirmed that the The remaining tasks on the list have been opened as individual issues:
/close |
@justaugustus: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Some near term goals in my head:
So concretely, what I'd like to do:
Branch Managers, and Build Admins are members of [email protected](Started from conversation on k-security-discuss.)
/assign
/cc @kubernetes/sig-release-admins @kubernetes/release-engineering @kubernetes/product-security-committee
/area release-eng
/priority important-soon
/kind feature cleanup
/milestone v1.16
The text was updated successfully, but these errors were encountered: