Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CODEOWNERS: Add ownerships for IPsec team #21567

Merged
merged 1 commit into from
Oct 4, 2022

Conversation

pchaigno
Copy link
Member

@pchaigno pchaigno commented Oct 3, 2022

It's not always possible to know, based on filenames only, if IPsec code was changed. This commit therefore tries to find a good balance, by requesting reviews of a pull request from the IPsec team only if the pull request is likely to have IPsec changes.

The most controversial file is probably node.go but it contains critical IPsec logic; hence both datapath and IPsec team are requested on that file to be safe.

@pchaigno pchaigno added area/encryption Impacts encryption support such as IPSec, WireGuard, or kTLS. release-note/misc This PR makes changes that have no direct user impact. sig/contributing Impacts contribution workflow, guidelines, and tools. labels Oct 3, 2022
@pchaigno pchaigno requested review from a team and YutaroHayakawa and removed request for a team October 3, 2022 21:29
@pchaigno pchaigno marked this pull request as ready for review October 3, 2022 21:33
@pchaigno pchaigno requested a review from a team as a code owner October 3, 2022 21:33
CODEOWNERS Outdated Show resolved Hide resolved
CODEOWNERS Show resolved Hide resolved
CODEOWNERS Outdated Show resolved Hide resolved
CODEOWNERS Outdated Show resolved Hide resolved
CODEOWNERS Show resolved Hide resolved
Copy link
Member

@aditighag aditighag left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Are these errors expected?

Screen Shot 2022-10-04 at 8 37 57 AM

It's not always possible to know, based on filenames only, if IPsec code
was changed. This commit therefore tries to find a good balance, by
requesting reviews of a pull request from the IPsec team only if the
pull request is likely to have IPsec changes.

The most controversial file is probably node.go but it contains critical
IPsec logic; hence both datapath and IPsec team are requested on that
file to be safe.

Signed-off-by: Paul Chaignon <paul@cilium.io>
@joestringer joestringer merged commit 7335755 into cilium:master Oct 4, 2022
@pchaigno pchaigno deleted the codeowners-ipsec-team branch October 4, 2022 17:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/encryption Impacts encryption support such as IPSec, WireGuard, or kTLS. release-note/misc This PR makes changes that have no direct user impact. sig/contributing Impacts contribution workflow, guidelines, and tools.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants