Consider adding a Prow command to create new branches.
SIG Docs handles localizations for Kubernetes docs.
When SIG Docs adds a new localization, we add the team's leaders to a repo team with write permissions so that leaders can create long-running branches for team collaboration.
As the number of localizations increases, the number of people with write access to k/website also increases. This poses a security risk that worsens at scale. We've already seen two incidents in the past two months of contributors using write permissions to bypass Prow:
We need to minimize the number of people with write permissions to k/website while preserving the ability of localization teams to work on collaborative branches.
Thanks in advance for your consideration!
cc @jimangel @kbarnard10 @cblecker
/sig docs
@zacharysarah -- This is timely! Releng is discussing possibilities here: https://github.com/kubernetes/release/issues/857
cc: @kubernetes/release-engineering
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale
This is still important.
/remove-lifecycle stale
/lifecycle frozen
/priority important-longterm
/remove-lifecycle frozen
We haven't decided if/how we would do this, so it doesn't really qualify for frozen.
I'm not sure what the workflow would even look like for this.. we don't really do repo-scoped commands. They are all issue or PR scoped.
If we implement branch creation as a plugin, we can just enable the plugin on a single repo.
@stevekuznetsov That's not what I mean. I mean where would you issue the command to create a branch?
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale
/remove-lifecycle stale
Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
If this issue is safe to close now please do so with /close.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
If this issue is safe to close now please do so with /close.
Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle rotten
Most helpful comment
@zacharysarah -- This is timely! Releng is discussing possibilities here: https://github.com/kubernetes/release/issues/857
cc: @kubernetes/release-engineering