-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add KEP for publishing packages in provisional
state
#843
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
|
||
> [color=#ff0000] **TODO** | ||
|
||
- *Risk*: We don't find a proper way to share secrets like the singing key* |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@dims ^?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Currently our prow in test-infra does use secrets, so we should see if we can extend this to OpenPGP keys:
https://github.com/kyma-project/test-infra/blob/master/docs/prow/prow-secrets-management.md
Another thing to think about is how often we need to change the signing keys, see how openstack folks do this:
https://docs.openstack.org/infra/system-config/signing.html
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We know that the WG-k8s-infra are thinking about that. Still there is the risk that there isn't a fitting solution in time for when we want to implement this KEP.
Mitigation however might be:
- we just don't sign packages for now, which is at least not worse than the current state
- or we use
git-crypt
to manage secrets in git repos
and revisit that as soon as we have proper means to share and manage secrets?
- Unify some user stories / scenarios - Add more detail about publishing different architectures - Some typo fixes Signed-off-by: Hannes Hörl <[email protected]>
/cc @listx |
/assign @timothysc |
/cc @neolit123 as suggested by @timothysc |
@hoegaarden: GitHub didn't allow me to request PR reviews from the following users: as, suggested, by. Note that only kubernetes members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/cc @frapposelli |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we've done enough bike-shedding, let's get this one in and iterate.
/lgtm
/approve
/lgtm |
/hold |
I'd rather not hold this. |
/hold cancel |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
@spiffxp, can we merge that as In the meantime I'd like to do some experiments re. promotion tool to get a better feel what we need if we
I can then update the KEP with those findings and move it to |
/lgtm |
/lgtm |
1 similar comment
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: hoegaarden, spiffxp, timothysc, tpepper The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
The purpose here is to get alignment on the Goals/Non-Goals and the rough proposal to get this KEP merged as
provisional
early.Further (implementation) details and eventually the transition to
implementable
can be done with further PRs.Supersedes: https://hackmd.io/PbH8KD09SFC0yn7ZhqVTRA?both
/cc @timothysc @sumitranr @Klaven @ixdy @ncdc @spiffxp @tpepper
/sig release
/area release-eng
/sig cluster-lifecycle
/kind kep