-
Notifications
You must be signed in to change notification settings - Fork 5.3k
update sigs.yaml with more wg info #2176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
/sig contributor-experience |
+1 This distinction is becoming more important as sigs proliferate. |
How would you see this looking? Are these well defined for each working group? Adding fields and such to the sig docs generator isn't hard, but it isn't clear to me what is being asked for, or how this would look in the final generated doc. |
I put the 'what it would look like' at the bottom of the issue.
If it's the wg apply it would be something like: We need this info to make sure we are getting regular updates from the wg's at the community meetings, auditing, and reviewing wgs, etc. and this would be an easy way to figure out that information. |
in order for a working group to be formed, they need to have sponsoring sigs so they are defined. |
If all WGs need sponsoring sigs, would listing "sponsoring sigs" work? I guess it's the "OR" bit that's confusing and unclear to me. |
Ah - I meant OR as a suggestion of a title - I'm 100% ok with "sponsoring sigs". |
/assign |
+1 |
We discussed during steering and were ok with adding a field. Uncertain how clearly defined this list of sigs is for each wg |
I looked through the resources linked to from the sig-list and organized the information about the relationships in the following table:
* - These are other working groups, but are included for completeness. |
@zjs Thanks! /committee steering |
Created #3069 to try to move this forward. I think we still need input from steering and/or each WG on their stakeholder SIGs -- but I created the PR so that we can either iterate or start the discussion on it. |
@zjs - want to PR in each one of these individually for those that are still blank and then tag the appropriate chairs of the wg as the approvers? I'll send you a shirt or swag item of your choice after if you'd like. :) |
@parispittman - I'd be happy to help with that, assuming it's not urgent; I'm on vacation next week, and I'm not sure I'll get to it before I leave. |
@parispittman - what else needs to get done here? |
hey @zjs - back from vacation and want to PR this? |
Yes, @parispittman, I'll take a stab at that — and thank you for the ping. |
@timothysc, the remaining work as I understand it is to generate a PR for each WG that doesn't have any stakeholder SIGs listed on the SIG/WG list based on our best guess (#2176 (comment)) and get review from the chairs of the WG. |
I've posted a set of PRs to fill in the blanks.
|
@zjs just want to explicitly say thank you for all the work! And for the pretty table linking each pull request! 😍 |
Just needs one more PR for wg-security-audit and then this can be closed. 👍 |
/good-first-issue @zjs if you want to take up wg-security-audit, feel free to remove the good first issue and help wanted label :) |
@nikhita: Please ensure the request meets the requirements listed here. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
👋 Hello from wg-security-audit! I was reached out to on the kube slack by @nzoueidi about this issue and wanted to try and provide some clarification and ask questions about what makes sense to include for our WG. The origin of the WG came from the proposal by CNCF and the PST starting with members of sig-auth to construct the wg. kubernetes/steering#71 (comment) While sig-auth is definitely a stake holder in our results then, the audit being conducted is something that covers many (if not all) sig's in its results. Trying to better understand the intent here - Would it make sense to list them all? keep it to sig-auth as the originator? and/or use the new CNCF sig-security instead? |
@cji - i would just do sig-auth then. intent is for mapping sigs to wgs so we can get updates, points of contact, flow of info, etc. for organizational purposes. |
Thank you @parispittman ! |
It would be good to see if the WG is horizontal, domain-specific, etc. and maybe what SIGs they cross into on the sigs/wg list. if folks are in agreement, we'd need to update sigs.yaml.
ie:
The text was updated successfully, but these errors were encountered: