-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
🟢 :k8s: O2 - community ownership of the Kubernetes Conformance Bot #1
Comments
Do you possibly mean sig-arch? |
@BobyMCbobs can you write up documentation for all the accounts and services required for the Conformance Bot |
@hh, I'm not sure what those accounts or services would be other than GitHub and the GitHub app used for installing on a repo. Those aren't required since the kubernetes-sigs org has it's own Prow instance which should be nearly ready to go. Thinking right now, the most we might need to coordinate is
|
Probably need to migrate from prow.cncf.io to prow.k8s.io
Do you have the deployment configuration?
…On Sun, 28 Jan 2024 at 13:24, Caleb Woodbine ***@***.***> wrote:
@hh <https://github.com/hh>, I'm not sure what those accounts or services
would be other than GitHub and the GitHub app used for installing on a
repo. Those aren't required since the kubernetes-sigs org has it's own Prow
instance which should be nearly ready to go.
Thinking right now, the most we might need to coordinate is
- with Taylor or Jorge on the k8s-conformance repo having prow.k8s.io
installed onto it
- ensuring the verify-conformance app gets deployed
—
Reply to this email directly, view it on GitHub
<#1 (comment)>, or
unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAAHUY22KU4HZNSEA3ZNDTTYQ2XYZAVCNFSM6AAAAAA25ZDYRKVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTSMJTG4YTCOBWGM>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
@hh, it is currently configured here |
Noting there is another project tracking this Objective: |
I think the other document I was looking for is here: |
Let's prioritize the AWS Infrastructure migration first from CNCF AWS accounts to Kubernetes. |
There is no fast path on this, due to timezone coordination and verify-conformance app deployment. Updated migration todos are in the top comment now. Some notes
|
Looking at which pieces will need to be teared down outta AWS and it looks like cncf-infra/prow-config//infra/aws and cncf-infra/aws-infra//terraform/iam are the two repos. These two repos in cncf-infra and several others will be likely candidates for repo archival. |
Looking at https://github.com/cncf-infra/aws-infra/blob/main/terraform/iam/providers.tf#L20-L55 IMPORTANT: the cncf-infra/aws-infra repo should not be entirely teared down. Only the following type of resources should be destroyed:
There's three providers for aws into the follow respective accounts
Given the IAM role changes which had previously allowed access, I may now not have access to after the migration the two accounts: registry-k8s-io, k8s-infra-accounts. This meaning that others will need to delete some of the resources instead of me. |
As verify-conformance is now running in GitHub Actions, several PRs will now be closed due to change in requirements. |
verify-conformance has been turned off in the old EKS cluster, seen here: https://github.com/cncf-infra/prow-config/tree/master/infra/aws |
ii folks the only people maintaining the k8s-conformance-bot, this needs to change. It will require buy in from #sig-k8s-infra
Key Results:
Remaining Steps:
The text was updated successfully, but these errors were encountered: