-
-
Notifications
You must be signed in to change notification settings - Fork 11.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add sops (mozilla-services/sops) #2603
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Review all reportcard topics pls
I believe that due to a delay with the review this project got some new issues with the go lint. They needs to be fixed or at least discussed before merging. I took a look in the tests and I this that the tests looks reasonable. Maintainers just omitted some functions with something like |
@kirillDanshin The lint fixes are already in the "development" branch of SOPS. Whenever the team decides its a good time to cut a new release, they will be merged to master |
Actually, as I can see the PRs mentioned here are merged in master |
@adrianosela here's your commit in sops master: getsops/sops@4b99fa1 Here's the current goreportcard golint: I saw your commits from that PRs in the master before typing in previous message :) I think what we can do here is just get them a |
@kirillDanshin You are correct, my mistake. @avelino SOPS moves too fast to be squashing lint fixes, and the CI on it doesnt require them. How do we move on from here? I believe given that it is a project maintained by a large org (Mozilla) we should let it in; what do you think? |
We must presar for quality libraries (I assume this as a premise), not all software/library maintained by large corporations has quality (or thing to be improved). |
@adrianosela I saw that you are a project contributor, when you have time to leave the project with the minimum quality we ask to open a new PR please |
SOPS is an encryption at rest -- secrets management solution -- which allows teams to access secrets in encrypted files by having a minimum number of keys as per configuration, for example a personal PGP key and a shared AWS KMS or GCP KMS key.
Note that even though test coverage is hovering around the 50%, it is an in-production repository maintained by a dedicated team of professional engineers at Mozilla.
Make sure that you've checked the boxes below before you submit PR: