Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add secrets-store-csi-driver project #658

Merged
merged 4 commits into from
Apr 1, 2020

Conversation

aramase
Copy link
Member

@aramase aramase commented Mar 12, 2020

  • secrets-store-csi-driver was recently moved to kubernetes-sigs
  • onboarding the project, so we can start publishing the images to gcr.io

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Mar 12, 2020
@aramase
Copy link
Member Author

aramase commented Mar 12, 2020

/assign @dims

@k8s-ci-robot k8s-ci-robot added size/S Denotes a PR that changes 10-29 lines, ignoring generated files. and removed size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Mar 12, 2020
groups/groups.yaml Outdated Show resolved Hide resolved
@aramase
Copy link
Member Author

aramase commented Mar 12, 2020

/cc @ritazh

groups/groups.yaml Outdated Show resolved Hide resolved
Copy link
Member

@thockin thockin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So we finally get to have the granularity discussion. :)

On its face this seems fine and consistent with precedent, but...

Should we force grouping? E.g. should sig- get a quota on stagings? Or something?

Or should we nest "directories" in GCR? E.g. instead of k8s.gcr.io/csi-foobar and k8s.gcr.io/csi-quuxzorb, should we encourage k8s.gcr.io/csi/{foobar,quuxzorb}?

@detiber re capi - would you prefer to have some form of nesting in the output? Would you prefer to have distinct stagings or a smaller, more onmibus set?

@listx

infra/gcp/ensure-staging-storage.sh Outdated Show resolved Hide resolved
@listx
Copy link
Contributor

listx commented Mar 13, 2020

So we finally get to have the granularity discussion. :)

On its face this seems fine and consistent with precedent, but...

Should we force grouping? E.g. should sig- get a quota on stagings? Or something?

Or should we nest "directories" in GCR? E.g. instead of k8s.gcr.io/csi-foobar and k8s.gcr.io/csi-quuxzorb, should we encourage k8s.gcr.io/csi/{foobar,quuxzorb}?

+1 for nesting, seems like the right paradigm, at least from a technical standpoint

@thockin
Copy link
Member

thockin commented Mar 13, 2020 via email

@detiber
Copy link
Member

detiber commented Mar 16, 2020

I've added an agenda item to the next Cluster API meeting to discuss the topic of nesting staging repos.

@thockin
Copy link
Member

thockin commented Mar 16, 2020 via email

@aramase
Copy link
Member Author

aramase commented Mar 16, 2020

@thockin Updated the PR based on the comments, PTAL!

@aramase
Copy link
Member Author

aramase commented Mar 18, 2020

@dims @thockin PTAL when you get a chance!

@ncdc
Copy link
Member

ncdc commented Mar 19, 2020

@thockin re capi, I'd be ok with all the sig-sponsored cluster api images going into a single bucket, with distinct paths. e.g. we currently have k8s-staging-cluster-api/cluster-api-controller and k8s-staging-cluster-api-aws/cluster-api-aws-controller (just to name 2). I'm fine moving everything under a cluster-api bucket (core cluster api + all sig-sponsored providers), if that works for everyone else.

Also xref #671, which is requesting a staging bucket for the digitalocean capi provider.

cc @timothysc @vincepri @CecileRobertMichon @yastij @randomvariable and I'm sure there are others I'm leaving off

@listx
Copy link
Contributor

listx commented Mar 19, 2020

If we do end up reorganizing some of the final prod image paths, we should not delete the old (existing) promoter manifests because they will serve as a historical record. (I.e., let's not be forced to do this again).

@vincepri
Copy link
Member

I'm +1 to organize all CAPI projects under the CAPI staging project. In terms of timeline, where are we looking to do this change?

@detiber
Copy link
Member

detiber commented Mar 20, 2020

If we do organize under a single staging bucket for cluster-api, building on what @ncdc mentioned, I think it should be organized something like this:

cluster-api/ <- hosts all images that are built from cluster-api project directly
cluster-api/<provider-type>/<provider-name> <- hosts images related to that provider

This would allow for separation of ownership/access for sig-sponsored sub-projects that might have separate ownership on individual repos.

Should we rally around a doc/issue for hashing a concrete proposal, including transition plan and maintaining the historical record (as well as maintaining backward compat)?

@dims
Copy link
Member

dims commented Mar 20, 2020

/hold

looks like lots of discussions here

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Mar 20, 2020
@spiffxp
Copy link
Member

spiffxp commented Mar 25, 2020

@detiber

Should we rally around a doc/issue for hashing a concrete proposal, including transition plan and maintaining the historical record (as well as maintaining backward compat)?

Yes. I just opened #696 let's take the discussion over there.

/assign @thockin @dims
I question whether we should continue to block this PR. It's unclear to me how quickly we're going to sort this out, and we're going to have to migrate things anyway. What do you think?

@aramase
Copy link
Member Author

aramase commented Mar 30, 2020

@dims @thockin Can we unblock this PR as per @spiffxp comment?

@dims
Copy link
Member

dims commented Mar 30, 2020

/hold cancel

@k8s-ci-robot k8s-ci-robot removed the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Mar 30, 2020
Copy link
Member

@thockin thockin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks!

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Apr 1, 2020
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: aramase, thockin

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Apr 1, 2020
@k8s-ci-robot k8s-ci-robot merged commit 9e78983 into kubernetes:master Apr 1, 2020
@aramase aramase deleted the secrets-store-csi-driver branch April 1, 2020 22:42
Copy link
Member

@thockin thockin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is activated

@aramase
Copy link
Member Author

aramase commented Apr 1, 2020

Thank you @thockin!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

10 participants