k8s-infra-prow-oncall members should be empowered to manage and troubleshoot prow infrastructure #1743
Labels
area/access
Define who has access to what via IAM bindings, role bindings, policy, etc.
area/prow
Setting up or working with prow in general, prow.k8s.io, prow build clusters
lifecycle/frozen
Indicates that an issue or PR should not be auto-closed due to staleness.
priority/important-soon
Must be staffed and worked on either currently, or very soon, ideally in time for the next release.
sig/k8s-infra
Categorizes an issue or PR as relevant to SIG K8s Infra.
sig/testing
Categorizes an issue or PR as relevant to SIG Testing.
This is intended to be a punch list for ensuring test-infra-oncall has the access they're used to with k8s-prow and k8s-prow-builds (or identifying a subset of permissions/access that is more appropriate for k8s-infra). Beyond that, this list should ensure that group members have sufficient permissions to use our scripts/terraform to manage prow infrastructure.
Up until now I've mostly been managing prow infrastructure as an account that has
organization.admin
androles/owner
for the kubernetes.io organization. As able, I will switch to an alternate account that is solely within the oncall group.It would also be helpful to get folks from @kubernetes/ci-signal in k8s-infra-prow-viewers@ to raise issues they have about being unable to see things they expect to.
Thanks to @ameukam and @cjwagner for pointing out some gaps to get me started:
(co-mingled with state for
aaa
cluster, should split out)ensure-e2e-projects.sh
(should either get permission to link billing accounts, or ensure_project shouldn't require these privileges when the project already exists)I'll update this with what the group has access to, but for now:
roles/owner
for cluster projects:k8s-infra-prow-build
,k8s-infra-prow-build-trusted
roles/owner
for e2e projects:k8s-infra-e2e-*
/sig testing
/area prow
/area access
/priority important-soon
The text was updated successfully, but these errors were encountered: