-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add erikgb as maintainer #32
Conversation
Signed-off-by: Tim Ramlot <42113979+inteon@users.noreply.github.com>
Erik has been the MVP of the cert-manager community for a long time. He's active in meetings, highly knowledgable, and a good person to chat to. I fully support his nomination and I fully support this proposal 👍 |
NOTE: this vote has been accepted. I'm on holiday right now, so I won't be able to make the administrative changes until I'm back. Other maintainers might be able to make them sooner. |
Erik is also on holiday at the moment, so there's no great rush on this! |
Pre-Onboarding Checklist — info to be requested to the new maintainer:
Onboarding Checklist — tasks to be performed by an existing maintainer: Onboarding Maintainer: @inteon
Initial Privileges:
Self-access Privileges:
Privileges added outside of the CNCF Service Desk:
|
@inteon Thanks for taking care of the onboarding checklist. Feel free to edit the checklist message above with your progress (PR link, etc) sor any additional steps that isn't in the list. |
Not sure why this PR hasn't been merged yet 😅 The lazy-consensus vote ended on July 19th, 2024, which means this PR can be approved. /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: maelvls The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Erik (@erikgb) has been an important contributor to cert-manager and more specifically trust-manager.
Adding Erik as a maintainer will diversify our maintainers team and it will allow us to give him admin privileges on the trust-manager project, so he can cut releases of trust-manager when required (see https://github.com/cert-manager/community/blob/main/GOVERNANCE.md for requirements wrt. admins).
I (@inteon) think @erikgb is an important part of our community and for that reason must receive the privileges required to contribute optimally. I would trust @erikgb with more admin privileges, but think it is better to restrict his privileges to the actions he is interested in (in case of compromise of his account), additionally this will reduce the scope of the perceived responsibilities that come with these privileges (both for Erik and the rest of the community, eg. no one will ping him to do a cert-manager release).