Open BenTheElder opened 3 months ago
/assign @dargudear-google
@aramase: GitHub didn't allow me to assign the following users: dargudear-google.
Note that only kubernetes-sigs members with read permissions, repo collaborators and people who have commented on this issue/PR can be assigned. Additionally, issues/PRs can only have 10 assignees at the same time. For more information please see the contributor guide
You can find the jobs by searching "secrets-store" in https://github.com/kubernetes/test-infra/blob/master/docs/job-migration-todo.md
Secrets | File Path | Job | Link |
---|---|---|---|
[] | config/jobs/kubernetes-sigs/secrets-store-csi-driver/secrets-store-csi-driver-config.yaml | pull-secrets-store-csi-driver-e2e-akeyless | Search Results |
[] | config/jobs/kubernetes-sigs/secrets-store-csi-driver/secrets-store-csi-driver-config.yaml | pull-secrets-store-csi-driver-e2e-gcp | Search Results |
[] | config/jobs/kubernetes-sigs/secrets-store-csi-driver/secrets-store-csi-driver-config.yaml | release-secrets-store-csi-driver-e2e-gcp | Search Results |
[] | config/jobs/kubernetes-sigs/secrets-store-csi-driver/secrets-store-csi-driver-config.yaml | secrets-store-csi-driver-e2e-gcp-postsubmit | Search Results |
https://github.com/kubernetes/test-infra/issues/33226
removing these will block https://github.com/kubernetes/test-infra/issues/33129 which will block migrating prow
we can re-create these on community resources once someone explains what GCP resources are necessary to provision in SIG k8s Infra
Same issue, but akeyless instead https://github.com/kubernetes/test-infra/pull/33232
Will have to reach out to #sig-k8s-infra slack.k8s.io, or https://github.com/kubernetes/k8s.io/issues to sort out standing up resources on prow.k8s.io going forward. We will not be retaining any dependency on arbitrary company-internal assets in the Kubernetes project's CI. See the announcements linked previously for more details.
The Kubernetes project currently lacks enough contributors to adequately respond to all issues.
This bot triages un-triaged issues according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
This is being discussed in https://github.com/kubernetes/k8s.io/issues/7246
As previously announced in february ...
https://groups.google.com/a/kubernetes.io/g/dev/c/p6PAML90ZOU
This repo is at risk with a handful of jobs still not migrated.
I would've filed something sooner but I thought they were all from the Azure jobset (a few other similar projects are ...) which are being bulk migrated now that we have SIG K8s Infra Azure resources.
There are a few CI jobs for this repo that use GCP, and don't appear to be able to just use our commodity GCP Kubernetes e2e test project rental.
thread: https://kubernetes.slack.com/archives/C09QZ4DQB/p1722024643376909
sig-k8s-infra can help ... but it's not clear what exactly is needed in order to provide comparable resources under the community infrastructure.
Currently these jobs are at risk of being shut down, though they could be recreated later.
/kind bug