New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix root OWNERS approvers #93637
Comments
/sig contributor-experience |
/committee steering |
Without a way to self-limit, I think the group should be kept very small. As I think about it, I intentionally DON'T approve PRs because I don't want it to apply too broadly. I suggested on slack for contribex: What if I could |
I want to get @cjwagner's input, I think he's got the most prior experience with approvers and repoowners I think it's a good idea. My gut tells me it would be somewhat involved, N weeks ish |
I also think, separately, that we should consider hitting root OWNERS a failure mode and immediately address by adding OWNERS in a deeper/more relevant dir. It used to be that the approval message would suggest the fewest possible approvers who could cover N OWNERS files but I think it now outputs leaf approvers. Something like: either the root owner should boostrap a deeper file with themselves and then seek out more appropriate people, or the author of the PR shouldn't be allowed to merge it until they've added an OWNERS file that would rectify the situation going forward. |
Regarding removing people from root approvers, I volunteer to be moved to emeritus status, as I can't respond to most/any PR approval requests, anyway. |
Do we have a way to audit uses of root OWNERS approval power? If not, that would be useful to implement. I used to get regular pings to approve changes to CHANGELOG.md. CONTRIBUTING.md and .gitignore were recently updated. go.mod already has a distinct reviewer set. |
Unfortunately the go.mod reviewer set cannot actually approve (it doesn't
function) so mostly it just results in auto assigning the entire team to
review every PR touching go.mod, with liggitt doing the actual approval
typically.
I don't think such a tool exists.
…On Mon, Aug 3, 2020 at 6:01 PM Brian Grant ***@***.***> wrote:
Do we have a way to audit uses of root OWNERS approval power? If not, that
would be useful to implement.
I used to get regular pings to approve changes to CHANGELOG.md.
CONTRIBUTING.md and .gitignore were recently updated.
go.mod already has a distinct reviewer set.
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#93637 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAHADK6ZMT7PDWME43VFHT3R65MWVANCNFSM4PSZIRBA>
.
|
plenty of files can't be moved out of the root easily (think go.mod, go.sum, .gitignore ...) and lots of tools are unhappy with symlinks. |
I'm with @bgrant0607 that I'm ok being moved to emeritus, I don't think I have approved a PR in > 1 year. I'm also happy to continue if that is preferrable, as can be seen from the stats, I'm not abusing the power :) |
This sounds good to me, here are my two cents: Forbidding root level OWNERS approval unless the PR includes an update to the OWNERS files such that root approval would not be required once merged is an interesting idea. That would mean that root level approvers would really only be responsible for delegating approval permissions (possibly to themselves in non-root OWNERS though). This would definitely need to be an opt-in feature and I'm not sure where it would be best to implement ( |
Would it be enough to make root owners non-recursive? Would e.g. adding new top-level directories play nicely with that? |
I think we'll need a KEP for the approval plugin revamp before moving onto the implementation (I have previously looked at the plugin and have bandwidth to work on this now). The KEP would cover:
Added this to today's SIG Contribex meeting agenda so that we can reach consensus and look at starting work on this. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale
…On Tue, Nov 3, 2020 at 4:41 PM fejta-bot ***@***.***> wrote:
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually
close.
If this issue is safe to close now please do so with /close.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta
<https://github.com/fejta>.
/lifecycle stale
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#93637 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AD24BUFSXOISLEMWLD66CATSN7QOTANCNFSM4PSZIRBA>
.
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
/remove-lifecycle rotten
…On Wed, Mar 3, 2021 at 5:38 PM fejta-bot ***@***.***> wrote:
Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close.
Send feedback to sig-contributor-experience at kubernetes/community
<https://github.com/kubernetes/community>.
/lifecycle rotten
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#93637 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AD24BUD7LYPOX7AWPQSIMKDTBYRELANCNFSM4PSZIRBA>
.
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
/remove-lifecycle stale cc @ykakarap |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Follow up from: #85638 (comment)
@bgrant0607 @brendandburns @dchen1107 @lavalamp @liggitt @smarterclayton @thockin @wojtek-t , your thoughts please!
It's been a while since the previous discussion in #85638. So at this point either we move forward by implementing what @lavalamp mentions above or document steps to add someone to the root OWNERS. Let's pick one and move on.
The text was updated successfully, but these errors were encountered: