-
Notifications
You must be signed in to change notification settings - Fork 853
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding Windows Operational Readiness container registry #4079
Conversation
651b52e
to
ef943db
Compare
/sig windows |
ef943db
to
e4de619
Compare
e4de619
to
4f8b04e
Compare
k8s.gcr.io/manifests/k8s-staging-op-readiness/promoter-manifest.yaml
Outdated
Show resolved
Hide resolved
c8fab22
to
d31f85f
Compare
@knabben We should ensure a Google Group exists in https://github.com/kubernetes/k8s.io/blob/main/groups/sig-windows/groups.yaml and added to the restrictions file: https://github.com/kubernetes/k8s.io/blob/main/groups/restrictions.yaml#L191-L194. |
d31f85f
to
02c8eeb
Compare
02c8eeb
to
cc22465
Compare
LGMT from sig windows |
/assign @nikhita |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ameukam, knabben The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Project created: ...
+- member: group:[email protected]
+ role: roles/storage.objectAdmin
- member: projectEditor:k8s-staging-win-op-rdnss
role: roles/storage.legacyBucketOwner
- member: projectOwner:k8s-staging-win-op-rdnss
@@ -4,6 +4,8 @@
role: roles/storage.legacyBucketOwner
- member: group:[email protected]
role: roles/storage.objectAdmin
+- member: group:[email protected]
+ role: roles/storage.legacyBucketWriter
- member: group:[email protected]
role: roles/storage.objectAdmin
- member: projectEditor:k8s-staging-win-op-rdnss
Ensuring [email protected] can use GCB in project: k8s-staging-win-op-rdnss
Updated IAM policy for project [k8s-staging-win-op-rdnss].
@@ -1,5 +1,7 @@
- member: group:[email protected]
role: roles/viewer
+- member: group:[email protected]
+ role: roles/cloudbuild.builds.editor
- member: group:[email protected]
role: roles/viewer
- member: serviceAccount:[email protected]
Updated IAM policy for project [k8s-staging-win-op-rdnss].
@@ -2,6 +2,8 @@
role: roles/viewer
- member: group:[email protected]
role: roles/cloudbuild.builds.editor
+- member: group:[email protected]
+ role: roles/serviceusage.serviceUsageConsumer
- member: group:[email protected]
role: roles/viewer
- member: serviceAccount:[email protected]
Ensuring [email protected] can use GCB in project: k8s-staging-win-op-rdnss
Updated IAM policy for project [k8s-staging-win-op-rdnss].
@@ -8,6 +8,8 @@
role: roles/viewer
- member: serviceAccount:[email protected]
role: roles/cloudbuild.builds.builder
+- member: serviceAccount:[email protected]
+ role: roles/cloudbuild.builds.builder
- member: serviceAccount:k8s-infra-gcr-vuln-scanning@k8s-artifacts-prod.iam.gserviceaccount.com
role: roles/containeranalysis.occurrences.viewer
- member: serviceAccount:[email protected]
@@ -14,3 +14,5 @@
role: roles/storage.legacyBucketOwner
- member: projectViewer:k8s-staging-win-op-rdnss
role: roles/storage.legacyBucketReader
+- member: serviceAccount:[email protected]
+ role: roles/storage.objectCreator
@@ -16,3 +16,5 @@
role: roles/storage.legacyBucketReader
- member: serviceAccount:[email protected]
role: roles/storage.objectCreator
+- member: serviceAccount:[email protected]
+ role: roles/storage.objectViewer
Configuring special cases for Release Managers
Empowering [email protected] as project viewers in k8s-staging-artifact-promoter
Empowering [email protected] as project viewers in k8s-staging-build-image
Empowering [email protected] as project viewers in k8s-staging-ci-images
Empowering [email protected] as project viewers in k8s-staging-cip-test
Empowering [email protected] as project viewers in k8s-staging-experimental
Empowering [email protected] as project viewers in k8s-staging-kubernetes
Empowering kubernetes-release-test GCB service account to admin GCR
Empowering [email protected] as project viewers in k8s-staging-releng
Empowering [email protected] as project viewers in k8s-staging-releng-test
Empowering [email protected] as project viewers in k8s-staging-publishing-bot
Done |
Adding a k8s official repository for the
kubernetes-sigs/windows-operational-readiness
project