Use dedicated cve-feed-maintainers group for CVE feed bucket#9081
Use dedicated cve-feed-maintainers group for CVE feed bucket#9081Pnkcaht wants to merge 2 commits intokubernetes:mainfrom
Conversation
Signed-off-by: pnkcaht <samzoovsk19@gmail.com>
|
Welcome @Pnkcaht! |
|
Hi @Pnkcaht. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
|
/ok-to-test |
|
/lgtm |
xmudrii
left a comment
There was a problem hiding this comment.
My understanding is that the key issue is that the project is inaccessible (kubernetes/sig-security#149 (comment)). I don't think this is going to be fixed by this PR. I think that @tabbysable is correct that nested group membership is not supported, we usually add everyone to each group instead.
There was a problem hiding this comment.
I don't think audit files are supposed to be changed manually, but someone from @kubernetes/sig-k8s-infra-leads can correct me if I'm wrong.
There was a problem hiding this comment.
We need to somehow apply this, @upodroid can we use Atlantis for this?
There was a problem hiding this comment.
I'll wait for his response, but in any case, depending on what it is, just let me know and I'll do it right away.
|
Please undo the change to iam.json |
|
atlantis plan |
This comment has been minimized.
This comment has been minimized.
Signed-off-by: pnkcaht <samzoovsk19@gmail.com>
|
New changes are detected. LGTM label has been removed. |
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: Pnkcaht The full list of commands accepted by this bot can be found here. DetailsNeeds approval from an approver in each of these files:Approvers can indicate their approval by writing |
|
|
@upodroid I applied the change and reverted the code, doing what you asked. Anyway, thank you, I understand you guys, especially since I don't yet have the "credibility" to handle highly sensitive projects. I'm an active Docker contributor, so I deal with the infrastructure directly and I'm somewhat used to it :) Thanks friend |
|
atlantis plan |
|
Ran Plan for dir: Plan Error Show Output |
What this PR does
This PR completes the separation of duties for the Kubernetes CVE feed by introducing a dedicated maintainer group and aligning all related infrastructure references.
Specifically, it:
security-tooling-private@kubernetes.iowithcve-feed-maintainers@kubernetes.ioas the owner group for thek8s-cve-feedGCS bucketThis ensures CVE feed alerts and access are scoped only to the appropriate maintainers while keeping prow-oncall and automation unchanged.
Related Issue