-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add a Prow command to create branches #15779
Comments
/sig docs |
@zacharysarah -- This is timely! Releng is discussing possibilities here: kubernetes/release#857 cc: @kubernetes/release-engineering |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
This is still important. /remove-lifecycle stale |
/remove-lifecycle frozen We haven't decided if/how we would do this, so it doesn't really qualify for frozen. I'm not sure what the workflow would even look like for this.. we don't really do repo-scoped commands. They are all issue or PR scoped. |
If we implement branch creation as a plugin, we can just enable the plugin on a single repo. |
@stevekuznetsov That's not what I mean. I mean where would you issue the command to create a branch? |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Rotten issues close after 30d of inactivity. Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@fejta-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What to add
Consider adding a Prow command to create new branches.
Why it matters
SIG Docs handles localizations for Kubernetes docs.
When SIG Docs adds a new localization, we add the team's leaders to a repo team with write permissions so that leaders can create long-running branches for team collaboration.
As the number of localizations increases, the number of people with write access to k/website also increases. This poses a security risk that worsens at scale. We've already seen two incidents in the past two months of contributors using write permissions to bypass Prow:
We need to minimize the number of people with write permissions to k/website while preserving the ability of localization teams to work on collaborative branches.
Thanks in advance for your consideration!
Additional context
#sig-docs Slack
cc @jimangel @kbarnard10 @cblecker
The text was updated successfully, but these errors were encountered: