Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

REQUEST: New repository kubernetes-sigs/seccomp-operator #1873

Closed
saschagrunert opened this issue May 12, 2020 · 12 comments
Closed

REQUEST: New repository kubernetes-sigs/seccomp-operator #1873

saschagrunert opened this issue May 12, 2020 · 12 comments
Assignees
Labels
area/github-repo Creating, migrating or deleting a Kubernetes GitHub Repository

Comments

@saschagrunert
Copy link
Member

saschagrunert commented May 12, 2020

New Repo, Staging Repo, or migrate existing

Migrate saschagrunert/seccomp-operator. 馃檭

Requested name for new repository

seccomp-operator

Which Organization should it reside

kubernetes-sigs

If not a staging repo, who should have admin access

@saschagrunert
@pjbgf
@hasheddan
@evrardjp

If not a staging repo, who should have write access

The admins

If not a staging repo, who should be listed as approvers in OWNERS

The admins

If not a staging repo, who should be listed in SECURITY_CONTACTS

The admins

What should the repo description be

The seccomp-operator should be an out-of-tree enhancement to iterate faster on possible security related enhancements to Kubernetes.

The full RFC can be found here:
https://github.com/saschagrunert/seccomp-operator/blob/master/RFC.md

We're planning to stay aligned with the current plans of seccomp - as laid out on in-flight KEPs (for example the promotion of seccomp to GA in 1.19). All of our work should stay in sync with the Kubernetes project and will bring valuable benefits into the main Kubernetes repository.

What SIG and subproject does this fall under in sigs.yaml

sig-node

Approvals

I'm kindly asking @dchen1107 and @derekwaynecarr for the approval. We pitched the idea in the regular SIG node meeting and want to utilize community resources like prow to integrate well into the overall ecosystem. 馃槆

@saschagrunert saschagrunert added the area/github-repo Creating, migrating or deleting a Kubernetes GitHub Repository label May 12, 2020
@saschagrunert saschagrunert changed the title [NEW REPOSITORY REQUEST] kubernetes-sigs/seccomp-operator REQUEST: New repository kubernetes-sigs/seccomp-operator May 12, 2020
@mrbobbytables
Copy link
Member

/assign @dchen1107 @derekwaynecarr
for sign off 馃憤

@pjbgf
Copy link
Member

pjbgf commented May 19, 2020

ping @dchen1107 @derekwaynecarr - do you mind having a look at this issue please?

@derekwaynecarr
Copy link
Member

i don't recall us coming to a conclusion on this in sig-node meeting.

@dchen1107 did i miss this discussion?

@pjbgf
Copy link
Member

pjbgf commented Jun 23, 2020

@derekwaynecarr we presented our vision and current state for the operator last week again. @dchen1107 then suggested we present it also to sig-auth, which we will be doing tomorrow.

@tallclair
Copy link
Member

From a sig-auth perspective, we're happy with the direction of this. We do agree that this should be under sig-node though.

Putting on my sig-node hat, I like this direction. I do think we still need some upstream improvements to the local profiles, but that should be complementary to this out-of-core operator, and shouldn't block progress.

@saschagrunert
Copy link
Member Author

saschagrunert commented Jul 2, 2020

Kindly pinging again for SIG node approval from @dchen1107 and @derekwaynecarr. We discussed it in the last SIG node meeting and agreed that this can live under SIG node.

@derekwaynecarr
Copy link
Member

@saschagrunert apologies for lag. i caught up on the currrent state of the linked repo, and look forward to your work in the sig to make this optional add-on successful for the broadest set of users.

I approve as SIG Node lead.

/lgtm
/approve

@saschagrunert
Copy link
Member Author

@nikhita @mrbobbytables may I ask you to support me with the repository migration? Should I create a dummy org where both of you have admin access or do we already have something like this?

@nikhita
Copy link
Member

nikhita commented Jul 14, 2020

@saschagrunert yes, we'll need to move it to a dummy org first. I'll reach out to you on slack to coordinate this :)

@nikhita
Copy link
Member

nikhita commented Jul 14, 2020

Repo has been migrated - https://github.com/kubernetes-sigs/seccomp-operator 馃帀

Created:

@evrardjp is listed as an admin in the issue body but they are not a member of @kubernetes or @kubernetes-sigs. To be added as an admin, they'll need to be a member of k-sigs and would need to apply for membership as per the instructions here.

We can close this issue once both PRs have merged.

@nikhita nikhita self-assigned this Jul 14, 2020
@nikhita
Copy link
Member

nikhita commented Jul 20, 2020

Repo has been added to sigs.yaml and teams have been granted access

/close

@k8s-ci-robot
Copy link
Contributor

@nikhita: Closing this issue.

In response to this:

Repo has been added to sigs.yaml and teams have been granted access

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/github-repo Creating, migrating or deleting a Kubernetes GitHub Repository
Projects
None yet
Development

No branches or pull requests

8 participants