Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proposal to split the cosigned webhook to it's own repository. #9

Closed
vaikas opened this issue Apr 22, 2022 · 24 comments
Closed

Proposal to split the cosigned webhook to it's own repository. #9

vaikas opened this issue Apr 22, 2022 · 24 comments
Assignees

Comments

@vaikas
Copy link
Contributor

vaikas commented Apr 22, 2022

There's been a few times in the past where the point about splitting the cosigned webhook into its own repository has been brought up.

So, I wanted to formalize that a little bit and see how y'all are feeling about it and if that would be doable? I'd be happy to drive the mechanics of pulling apart the cosigned bits and importing into the new repo.

Pros I think are (some, not even close to all):

  • Remove / reduce dependencies on k8s libraries in the main sigstore/cosign repo.
  • Keep us more honest about the SDK aspect moving forward. Point I'm trying to make that by making sure the interfaces between the 'core' cosign APIs are now reusable by two different repos will make it clearer where the boundaries of SDK are, vs. just public functions in the repo that are callable. Hope that makes sense.

I think on the con side there's obvs the initial grunt work on pulling things apart, but I think in the longer term it will be cleaner to split the webhook into it's own repo with its own maintainers, release cadence, etc.

Thoughts?
@bobcallaway @dlorenc @lukehinds

@vaikas vaikas added the enhancement New feature or request label Apr 22, 2022
@imjasonh
Copy link
Member

Related: sigstore/cosign#1462

@dlorenc
Copy link
Member

dlorenc commented Apr 22, 2022

I'm fine either way here.

@lukehinds
Copy link
Member

lukehinds commented Apr 22, 2022

sounds OK to me. One thing if possible, when re-factoring out code (if it makes sense), it would be good to utilise sigstore/sigstore.

@lukehinds
Copy link
Member

also kudos for using the this repo to ask! we should try to keep this working context going forward, as its then a recorded decision (and not lost when slack purges messages).

@lukehinds
Copy link
Member

Last one: I think a name change would be beneficial, and the code move would be a good opportunity to do that. It's very easy to mistake cosigned as a cosign (vice versa), when spoken out loud.

@vaikas
Copy link
Contributor Author

vaikas commented Apr 23, 2022

That's facts about cosign/cosigned being easily confused when spoken out lout. Mayhaps to explicity spell it out the repo could be something like:
cosigned-webhook
cosign-webhook
cosign-admission-controller

But I should not be counted on to come up with a good name :)

@dlorenc
Copy link
Member

dlorenc commented Apr 23, 2022

I like the last one.

@vaikas
Copy link
Contributor Author

vaikas commented Apr 28, 2022

@bobcallaway what are your thoughts?

@dlorenc
Copy link
Member

dlorenc commented Apr 28, 2022

Have you figured out how to do the split? It's always a bit tricky when you try to preserve history.

@vaikas
Copy link
Contributor Author

vaikas commented Apr 28, 2022

I hadn't thought about the history, naively thought the history would live in sigstore/cosign prior to the move and stay there. I'm totes open to suggestions on doing the right thing, I just don't know what it is.

@dlorenc
Copy link
Member

dlorenc commented Apr 28, 2022

I think there's a git filter-tree thingy, but that's fine too

@bobcallaway
Copy link
Member

+1 to this idea, as well as to luke's reminder about sigstore/sigstore

@elfotografo007
Copy link

+1

@hectorj2f
Copy link

The main historical reason aimed to keep the dependencies together. That could ease the maintenance and testing of cosigned.

This is also related to sigstore/cosign#651

@lukehinds lukehinds added new-project and removed enhancement New feature or request labels May 10, 2022
@lukehinds lukehinds self-assigned this May 10, 2022
@vaikas
Copy link
Contributor Author

vaikas commented May 10, 2022

Do folks have any major objections for the repo being:
sigstore/cosign-admission-controller

Certainly very descriptive :)

@hectorj2f
Copy link

hectorj2f commented May 11, 2022

I am certainly not good at naming things, I am happy with any name better than X Æ A-12.

e.g. sigstore/cosign-policy-controller in case things evolve in the future.

@adamd-vmw
Copy link

I like either of those two options.

@dlorenc
Copy link
Member

dlorenc commented May 11, 2022

Either works for me.

@adamd-vmw
Copy link

also could consider sigstore-policy-controller or sigstore-admission-controller

thoughts?

@imjasonh
Copy link
Member

also could consider sigstore-policy-controller or sigstore-admission-controller

thoughts?

If it's under the sigstore org I'd say you could avoid some stutter if you just call it sigstore/policy-controller etc.

@adamd-vmw
Copy link

One other note, for our purposes, it would really help if we can finish the bump to v1beta1 before splitting out the repo, and also come to a decision on the package name as soon as we can.

@lukehinds
Copy link
Member

also could consider sigstore-policy-controller or sigstore-admission-controller
thoughts?

If it's under the sigstore org I'd say you could avoid some stutter if you just call it sigstore/policy-controller etc.

That's sounds good to me, has my +1

@hectorj2f
Copy link

I believe we have a winner sigstore/policy-controller :) here.

@lukehinds
Copy link
Member

approved: repo name: sigstore/policy-controller

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

8 participants