kubernetes / community

Kubernetes community content
Apache License 2.0
12k stars 5.17k forks source link

Clean up github service accounts #2324

Closed cblecker closed 3 years ago

cblecker commented 6 years ago

I'd like to clean up the following GitHub service accounts:

Does anyone have any objections to this?

cc: @kubernetes/sig-testing-misc @kubernetes/sig-contributor-experience-misc-use-only-as-a-last-resort

cblecker commented 6 years ago

also cc: @calebamiles @idvoretskyi @grodrigues3

cblecker commented 6 years ago

@bgrant0607

idvoretskyi commented 6 years ago

@cblecker no objections from me.

BenTheElder commented 6 years ago

I'd suggest maybe holding onto the *bot accounts, we can only pack so much automation on to each and I know @fejta at least is building new tools to automate GitHub toil.

On Jun 27, 2018 11:11, "Christoph Blecker" notifications@github.com wrote:

@bgrant0607 https://github.com/bgrant0607

— You are receiving this because you are on a team that was mentioned. Reply to this email directly, view it on GitHub https://github.com/kubernetes/community/issues/2324#issuecomment-400778637, or mute the thread https://github.com/notifications/unsubscribe-auth/AA4Bq0y8ve-GeKiu3mAjzwysdWDYOkTRks5uA8q1gaJpZM4U6JwD .

justaugustus commented 6 years ago

Azure mirrors (excluding k8s-mirror-azure-misc) have been destroyed as part of #2313: https://github.com/kubernetes/community/pull/2313#issuecomment-400189640

cblecker commented 6 years ago

On the bots topic, I know we need to keep: @k8s-ci-robot - k8s-ci-robot @k8s-merge-robot - Kubernetes Submit Queue k8s-merge-robot

I'm proposing that we kick the following bots out of the org: @cadvisorJenkinsBot - cadvisorJenkinsBot @k8s-bot - Kubernetes Bot k8s-bot @k8s-cherrypick-bot - k8s-cherrypick-bot @k8s-publish-robot - k8s-publish-robot k8s-publish-robot @k8s-slack - k8s-slack

If we need more tokens for future automation, we can either re-add these accounts, or make new ones. I don't think we should have privileged tokens just hanging around if we aren't actively using them.

cblecker commented 6 years ago

I'm also going to put a time box on this.. Leaving open for comment until July 11 at 5pm PDT as I know a lot of people are OoO for the July 4th holiday.

BenTheElder commented 6 years ago

Can't we delete the tokens [1] / de-privilege the accounts while still reserving the usernames / accounts (though perhaps not cadvisorJenkinsBot)?

I'm also not sure, what account does the publisher robot use? k8s-publish-robot sounds like it.

[1] https://blog.github.com/2013-05-16-personal-api-tokens/

On Wed, Jul 4, 2018, 12:18 Christoph Blecker notifications@github.com wrote:

On the bots topic, I know we need to keep: @k8s-ci-robot https://github.com/k8s-ci-robot - k8s-ci-robot @k8s-merge-robot https://github.com/k8s-merge-robot - Kubernetes Submit Queue k8s-merge-robot

I'm proposing that we kick the following bots out of the org: @cadvisorJenkinsBot https://github.com/cadvisorJenkinsBot - cadvisorJenkinsBot @k8s-bot https://github.com/k8s-bot - Kubernetes Bot k8s-bot @k8s-cherrypick-bot https://github.com/k8s-cherrypick-bot - k8s-cherrypick-bot @k8s-publish-robot https://github.com/k8s-publish-robot - k8s-publish-robot k8s-publish-robot @k8s-slack https://github.com/k8s-slack - k8s-slack

If we need more tokens for future automation, we can either re-add these accounts, or make new ones. I don't think we should have privileged tokens just hanging around if we aren't actively using them.

— You are receiving this because you are on a team that was mentioned. Reply to this email directly, view it on GitHub https://github.com/kubernetes/community/issues/2324#issuecomment-402545934, or mute the thread https://github.com/notifications/unsubscribe-auth/AA4Bq5lFBATEq4zBbYQ5pMgC6pOWlhxhks5uDRTzgaJpZM4U6JwD .

cblecker commented 6 years ago

Kicking the bots out of the org doesn't delete the accounts or release the names. We could re-add the accounts to the org at any time. It just means they don't have any privileges.

The staging repo publishing bot is @k8s-publishing-bot (don't want to kick it out)

BenTheElder commented 6 years ago

Ah, thanks. I misunderstood "clean up the following GitHub service accounts" as 'delete the following accounts'. 👍

SGTM

On Wed, Jul 4, 2018, 12:30 Christoph Blecker notifications@github.com wrote:

Kicking the bots out of the org doesn't delete the accounts or release the names. We could re-add the accounts to the org at any time. It just means they don't have any privileges.

The staging repo publishing bot is @k8s-publishing-bot https://github.com/k8s-publishing-bot (don't want to kick it out)

— You are receiving this because you are on a team that was mentioned. Reply to this email directly, view it on GitHub https://github.com/kubernetes/community/issues/2324#issuecomment-402547511, or mute the thread https://github.com/notifications/unsubscribe-auth/AA4Bq7_iXfIDAjKhMI8bP-ozpeZ0VFMWks5uDRftgaJpZM4U6JwD .

sttts commented 6 years ago

@k8s-publishing-bot is the publishing bot. @k8s-publish-robot though can be removed, it's old.

spiffxp commented 6 years ago

This is followup to https://github.com/kubernetes/community/pull/2302. Is there an umbrella issue to catch cleaning up detritus related to that? ie: I think devstats needs a touchup, I personally would like to nuke the k8s-mirror accounts I have credentials for, we're not sure what to do about the teams and renaming and the bots that apply labels based on their usage, etc.

cblecker commented 6 years ago

All the accounts listed above have been removed from the org. We should decide which ones are worth going back and deleting, but as of now, they don't have access to anything in kubernetes/

spiffxp commented 6 years ago

I removed the sig-testing accounts https://groups.google.com/forum/#!topic/kubernetes-sig-testing/h9MnFx348Gs

idvoretskyi commented 6 years ago

/assign

spiffxp commented 6 years ago

@idvoretskyi ping

what's the plan to call this issue done?

idvoretskyi commented 6 years ago

@spiffxp

update sigs.yaml to remove references to non-existent google groups

for the k8s-mirror, k8s-sig users

delete all referenced google groups

This - immediately.

delete all referenced github accounts

This - after I'll collect the 2FA keys from the github account owners.

spiffxp commented 6 years ago

/area github-management

spiffxp commented 6 years ago

I will be adjusting the doc generator / sigs.yaml to stop linking the mirror google groups in a PR later today

EDIT: https://github.com/kubernetes/community/pull/2500

spzala commented 6 years ago

FYI, I have just deleted k8s-mirror-ibmcloud-misc GitHub account.

liggitt commented 6 years ago

sig-auth mirror accounts and secondary mailing lists have been removed

bgrant0607 commented 6 years ago

k8s-external-contributor has been deleted

fejta-bot commented 5 years ago

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale

idealhack commented 5 years ago

/remove-lifecycle stale

idvoretskyi commented 5 years ago

Sent out the notification to https://groups.google.com/d/msg/kubernetes-sig-contribex/rzwrLOLHgR8/P8A8nuqhFQAJ; the deadline to reach the lazy consensus is Feb 1st.

idvoretskyi commented 5 years ago
  • k8s-sig-onprem-api-reviews
  • k8s-sig-onprem-bugs
  • k8s-sig-onprem-feature-requests
  • k8s-sig-onprem-misc
  • k8s-sig-onprem-pr-reviews
  • k8s-sig-onprem-proposals
  • k8s-sig-onprem-test-failures
  • k8s-sig-openstack-api-reviews
  • k8s-sig-openstack-bugs
  • k8s-sig-openstack-feature-requests
  • k8s-sig-openstack-pr-reviews
  • k8s-sig-openstack-proposals
  • k8s-sig-openstack-test-failures

I can confirm that I can remove the above ^

idvoretskyi commented 5 years ago

SIG-Release is done - https://github.com/kubernetes/sig-release/issues/353

idvoretskyi commented 5 years ago

SIG-OnPrem GitHub accounts and mailing lists are successfully deleted.

idvoretskyi commented 5 years ago

The following groups own the mailing lists that still exist:

@kubernetes/sig-api-machinery-misc @kubernetes/sig-architecture-misc-use-only-as-a-last-resort @kubernetes/sig-autoscaling-misc @kubernetes/sig-aws-misc @kubernetes/sig-cli-misc @kubernetes/sig-cloud-provider @kubernetes/sig-cluster-lifecycle @kubernetes/sig-multicluster-misc @kubernetes/sig-release and SIG-VMware.

I can delete these mailing lists after at least +1 from a SIG-lead of the respective group.

nikhita commented 5 years ago

I'll take care of removing the GitHub teams.

idvoretskyi commented 5 years ago

/assign @nikhita

nikhita commented 5 years ago

/priority important-soon

nikhita commented 5 years ago

/kind cleanup

nikhita commented 5 years ago

/lifecycle active

nikhita commented 5 years ago

/milestone May

nikhita commented 5 years ago

/milestone Next

spiffxp commented 5 years ago

This has been sitting open for a while. What is our definition of done here?

There are lots of incremental updates here, but I no longer have a sense of:

The most recent update talks about a few stragglers from a mailing list perspective https://github.com/kubernetes/community/issues/2324#issuecomment-462736648

spiffxp commented 5 years ago

/remove-priority important-soon /priority important-longterm Given the speed with which we've been moving on this. Ideally I would like to scope this down to something we can close out this release cycle. I am comfortable calling the remaining accounts and mailing list abandoned detritus if necessary, but would like to at least understand what remains

nikhita commented 5 years ago

I think I had agreed to work on this to remove GitHub teams in a contribex meeting but revisiting this now, I'm confused...did we intend to delete the GitHub accounts listed in the main PR body or also the prefixed GitHub teams for each SIG?

whether there is a desire to delete all of the associated prefixed teams (it's not clear to me how to gather data on whether these teams are being used or not)

Anecdotally, some SIGs use the prefixed teams heavily, some don't use that much. Don't really have any data on this. :/ I feel like there is some value in having these teams but it could use an audit -- though this feels like a separate issue to me.

If we intended to delete the GitHub accounts: @idvoretskyi, do you have access to all google groups/emails behind these accounts? Or is that only SIG leads?

nikhita commented 5 years ago

Related: issue for establishing team structure for SIGs (https://github.com/kubernetes/community/issues/2323)

fejta-bot commented 4 years ago

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale

nikhita commented 4 years ago

/remove-lifecycle stale

On Wed 20 Nov, 2019, 6:03 AM fejta-bot, notifications@github.com wrote:

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta https://github.com/fejta. /lifecycle stale

— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/kubernetes/community/issues/2324?email_source=notifications&email_token=AD24BUAG7QMIIRGCHT7IHR3QUU7TDA5CNFSM4FHITQB2YY3PNVWWK3TUL52HS4DFVREXG43VMVBW63LNMVXHJKTDN5WW2ZLOORPWSZGOEESCFGY#issuecomment-556016283, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD24BUAY2Z3XXTOK5B7XWODQUU7TDANCNFSM4FHITQBQ .

fejta-bot commented 4 years ago

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale

ghost commented 4 years ago

This is the most commented topic so I support it! Devs need to communicate.

fejta-bot commented 4 years ago

Stale issues rot after 30d of inactivity. Mark the issue as fresh with /remove-lifecycle rotten. Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle rotten

nikhita commented 4 years ago

/remove-lifecycle rotten

On Wed, Jun 24, 2020 at 4:03 AM fejta-bot notifications@github.com wrote:

Stale issues rot after 30d of inactivity. Mark the issue as fresh with /remove-lifecycle rotten. Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta https://github.com/fejta. /lifecycle rotten

— You are receiving this because you were mentioned. Reply to this email directly, view it on GitHub https://github.com/kubernetes/community/issues/2324#issuecomment-648462669, or unsubscribe https://github.com/notifications/unsubscribe-auth/AD24BUEUGARTJUJA3QMYXYDRYEUSFANCNFSM4FHITQBQ .

fejta-bot commented 4 years ago

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale

mrbobbytables commented 4 years ago

Will follow up at the next github admin meeting.

fejta-bot commented 3 years ago

Stale issues rot after 30d of inactivity. Mark the issue as fresh with /remove-lifecycle rotten. Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle rotten

fejta-bot commented 3 years ago

Rotten issues close after 30d of inactivity. Reopen the issue with /reopen. Mark the issue as fresh with /remove-lifecycle rotten.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /close