-
Notifications
You must be signed in to change notification settings - Fork 835
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GCS bucket to store the KEPs metadata #2490
Comments
I'm not opposed to making a new bucket for y'all, but can I ask why this couldn't live in-repo? It feels mildly weird to have two different sources of truth about the state of KEPs, one a git repo, one a GCS bucket. |
For example, we have some workflows where contributors must run a That places the burden contributor-side though, which isn't super fun. Another option would be to have a presubmit responsible for adding a commit to the branch that does the Another option would be to have a bot auto-PR a change to the well-known file in the repo, and use a specific tide query to have it automatically merged. This is the workflow that prow currently uses to auto-update itself. |
What I'd imagined is that pushing to the k/enhancements default branch would render / generate a machine-readable KEP list as an artifact, and push that into object storage. Then the consumer end fetches the JSON from object storage (eg to render a list of KEPs for https://k8s.dev/) No need for contributors to do the build locally or to commit the generated file. To make things slick we ought to test pull requests as well, making sure that any change that breaks the generation fails some test.
That works too. A third option is to dedicate an otherwise-empty branch to the generated files. You can then serve the generated files via Git and, if you want to, also via GitHub Pages. My usual preference for this is to build artifacts from a clone of the default branch, then store those somewhere that isn't Git (this is similar to how you'd handle compiled code, container images, etc). |
We might also want to consider reliability. If the generated KEP list is served from something that has good availability guarantees, we can consider fetching it using AJAX. If the primary storage is as a file in Git source control on GitHub, then to me that isn't available enough - GitHub does have outages and doesn't make strong promises about service availability. |
OK, so I'm cool with creating a bucket, and setting up a service account that can write to that bucket. For support/debugging purposes, who else should have write access to this bucket? Anything prow touches we are ensuring k8s-infra-prow-oncall@ has full permissions over. But for specific jobs or pieces of infra, we also want a more focused group of people with the domain expertise needed to troubleshoot. I'm also fine if it the answer is "nobody should have access to this, to keep us honest." I'll have a sample PR up by tomorrow. |
Or... today. But not deploying today. |
/priority important-soon |
/assign |
/assign @palnabarun |
/milestone clear |
With #2570 merged, is this done? |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi team,
We have PR: kubernetes/contributor-site#222
kepctl query
Slack thread: https://kubernetes.slack.com/archives/CCK68P2Q2/p1628494118056300
The text was updated successfully, but these errors were encountered: