-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Setup org-wide automation for kubernetes #9342
Setup org-wide automation for kubernetes #9342
Conversation
Some repos will get new plugins as a result. Excluding staging repos, there are 6 repos that get approve, and 22 repos that get blunderbuss +blunderbuss client-go cluster-registry dashboard dns examples features ingress-nginx federation gengo kops kubeadm kubectl kubernetes-template-project minikube release steering +approve +blunderbuss autoscaler frakti git-sync k8s.io kompose kubernetes-anywhere
This will add the following repos that weren't previously in tide: autoscaler frakti git-sync k8s.io kompose kubrnetes-anywhere
b049630
to
c0b76ad
Compare
This LGTM. Biggest concern is merge automation that could catch people off guard. |
Yeah I'm planning on tagging repos and owners of those repos once I get a feel for a good lazy consensus deadline. |
LvGTM |
LGTM for adding tide to |
I don't want to chase down 22 repo owners for blunderbuss, but that's a somewhat wide blast radius, so I sent out a kubernetes-dev@ thread with lazy consensus deadline of Monday 2018-09-17 10am PT |
LGTM for kubernetes/frakti, thanks a lot! |
LGTM for kubernetes/kompose, thanks a lot! |
LGTM for k8s.io and git-sync repos. |
/lgtm /hold (please cancel when appropriate) |
/hold cancel |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dims, spiffxp The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
why hasn't prow picked this up? |
We're lucky it didn't. #9447 We think it was a dropped webhook |
That revert was just for config.yaml, so this means plugins.yaml is still out of sync with the repo |
This makes our config for kubernetes match our config for kubernetes-sigs,
by configuring things at the org level rather than a per-repo level.
This is consistent with our rules for core repositories
As a consequence, the following repos will have
approve
andblunderbuss
enabled, and will be added to tide (ref: #6227):The following repos will have
blunderbuss
enabled:/hold
for comment, and to give us more time to ensure kubernetes/kubernetes is functioning well
/assign @cjwagner
I think you've expressed performance/token concerns about enabling approve and blunderbuss at the org level in the past
/kind cleanup
/area prow
/priority important-longterm