-
Notifications
You must be signed in to change notification settings - Fork 873
Update test-infra for kubernetes-security/kubernetes #7588
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
/assign @BenTheElder /kind feature |
... also related: #4981 |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
Had a few more discussions about this, there's additionally concern that our test environments don't currently have concern of info leak and many of them are barely maintained (e.g. kube-up.sh), we could mitigate that cheaply by simply not using some of them here though. But if/when we do this, we should be careful about e.g. the e2e test environments as well. I'm still concerned about sigs.k8s.io/prow in particular, which basically has one active approver, and would have much higher expectations if it needs to secure a private repo. We need to fix that regardless, but "recruiting" for this work has been ... tough. I had a new thought for this: We could select a subset of tests and wire them up with github actions as a stopgap? It will be difficult to guarantee that we definitely get the same results for everything when the patches go public, and that we keep the configs in sync, but it's probably better than doing nothing, and a lot of our testing doesn't require cloud e2e anymore (since we're able to use sigs.k8s.io/kind in particular). The biggest question is how to coordinate ongoing upkeep, maybe we could form a team that agrees to the embargo restrictions for this purpose? There are a relatively small set of maintainers particularly active on kubernetes/kubernetes PR test configuration (SIG Testing TLs, |
cc @kubernetes/sig-testing-leads @kubernetes/sig-k8s-infra-leads @kubernetes/security-response-committee |
@Vyom-Yadav FYI who will be looking at this going forward 🙇 |
Goals:
Outcome:
cc @BenTheElder
The text was updated successfully, but these errors were encountered: