@pyvista/maintainers and @pyvista/developers, please help verify the org migration landed cleanly.
PyVista has surpassed 1M downloads/month and is now a load-bearing dependency for scientific workflows at a lot of organizations. The blast radius of an org-level mistake is much bigger than it used to be. A compromised maintainer token or a misplaced repo grant could push bad code into a lot of workflows fast. This migration is an effort to tighten up our security posture in light of all the recent supply chain attacks.
We migrated PyVista's GitHub org management to Infrastructure as Code here. Everything now lives in this repo as declarative YAML: org members, teams, repo access, and security policies. Every change flows through a PR with a dry-run diff before it touches live org state. The README has the full picture.
Since the migration removed 10+ inactive members and pruned outside collaborators, there's a real chance someone's access slipped unintentionally. Please work through the checklist below and comment with anything that looks wrong.
Checklist
If something is off
- Missing access you need: open a PR moving your handle into the right team in
org.yaml, or comment here and I'll do it.
- Access you have that you shouldn't: comment here or PR the fix.
- Team layout feels wrong: open a new issue. The structure is easy to change and we likely want to move away from our current wide-reaching team structure (currently,
developers get write access to ALL repositories in the org... probably not the best situation)
- Security concern: email
support@pyvista.org or raise on the Slack as a Direct Message. Don't post it on this issue.
Thanks for bearing with the churn!
@pyvista/maintainers and @pyvista/developers, please help verify the org migration landed cleanly.
PyVista has surpassed 1M downloads/month and is now a load-bearing dependency for scientific workflows at a lot of organizations. The blast radius of an org-level mistake is much bigger than it used to be. A compromised maintainer token or a misplaced repo grant could push bad code into a lot of workflows fast. This migration is an effort to tighten up our security posture in light of all the recent supply chain attacks.
We migrated PyVista's GitHub org management to Infrastructure as Code here. Everything now lives in this repo as declarative YAML: org members, teams, repo access, and security policies. Every change flows through a PR with a dry-run diff before it touches live org state. The README has the full picture.
Since the migration removed 10+ inactive members and pruned outside collaborators, there's a real chance someone's access slipped unintentionally. Please work through the checklist below and comment with anything that looks wrong.
Checklist
org.yamland confirmed I'm in the team(s) I expect.maintainers, I can merge PRs where my approval is required.If something is off
org.yaml, or comment here and I'll do it.developersget write access to ALL repositories in the org... probably not the best situation)support@pyvista.orgor raise on the Slack as a Direct Message. Don't post it on this issue.Thanks for bearing with the churn!