-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use excludedRepos for kubernetes org tide query #10846
Comments
/milestone v1.14 |
22 of the 67 Kubernetes repos are not using Tide today:
Special note: We already have Tide configured for We have a couple ways to move forward with this.
I think the first option is the best? edit: accidentally included "kubernetes/kubernetes" for which Tide is certainly already enabled. |
/sig contributor-experience |
With the exception of kubernetes/kompose, all of the repos listed are staging repos (https://github.com/kubernetes/kubernetes/tree/master/staging) They don't want any PR's to land there, instead redirecting to encourage PR's to k/k/staging |
/assign @nikhita @sttts But, I feel like we have sufficient safeguards in place today:
I sorta want to understand if we can instead whittle the list down to nothing and reduce ongoing maintenance burden. |
/assign @caesarxuchao |
Hmm.. would a blockade configuration for those repos be a good idea? Just blockade on any PR? |
I guess I was hoping to avoid ongoing maintenance but fair, blockade would be my recommendation if we need another safeguard. |
It would be ideal if we can instruct Tide to block PRs by setting up some special files in the staging repos. Does Tide support that? |
I think if someone is listed as an approver for a staging repo, they know not to approve PRs directly to the published repo....but +1 about having safeguards in place. If we don't want to use |
If we don't want Tide to merge PRs to a repo we should just use
I think we only really care about minimizing the number of Blockade or any other mechanisms that block PRs from merging still require Tide to search for PRs in those repos, process them, and post statuses to them. The GH API is already struggling with the size of our requests so we should try to avoid increasing load in cases where we have a more efficient alternative that is sane. |
AKA switch to using
org: kubernetes -repo:kubernetes/kubernetes
with theexcludedRepos
fieldper @cjwagner's suggestion in #10569 (review)
/assign @cjwagner
because you suggested it... or maybe this is for whomever is test-infra on call?
/assign @amwat
you'll want to double check whether this means any updates to the test-infra playbook for release-team, I don't think so? but I'm being too lazy to check while writing this
The text was updated successfully, but these errors were encountered: