kubernetes / community

Kubernetes community content
Apache License 2.0
12k stars 5.17k forks source link

Discuss project grooming #3267

Closed justaugustus closed 4 years ago

justaugustus commented 5 years ago

In recent discussions in Steering and SIG PM, I mention the possibility of having SIG PM assist with backlog grooming for project-wide groups e.g., Steering, PM, Architecture, ContribEx.

Overall, there's been positive reception so far, but I'd like to document the intent and open the floor for comments. This is something that would get added as something in-scope for the forthcoming SIG PM charter.

Some thoughts:

Additionally, there is some chatter around project mgmt improvements in ContribEx. We should work to consolidate that discussion under SIG PM.

/sig pm architecture contributor-experience /committee steering

/assign @jdumars @justaugustus cc: @calebamiles @idvoretskyi @sarahnovotny @bgrant0607 @liggitt @cblecker

justaugustus commented 5 years ago

cc: @parispittman

justaugustus commented 5 years ago

Question for peribolos wizards (@cblecker, @fejta, @cjwagner, @spiffxp): Is it possible to manage project board permissions with peribolos? It would be cool if this project-board-maintainers group was automatically added to org-level boards in the future.

nikhita commented 5 years ago

Is it possible to manage project board permissions with peribolos?

No, this is not possible today.

cblecker commented 5 years ago

Yeah, as Nikhita said, no, this is not possible... but I think that's okay, mostly for the reason of this being "opt-in". Like, a sig should be able to say "yes, I would love sig-pm's help to maintain my board" or "no thank you, we would like to maintain our board ourselves".

The other tricky bit is for boards that are repo-scoped, rather than org-scoped. I wish all boards were just org-scoped, because we can then be explicit with granting perms.. The only way to grant perms to repo-scoped boards is to grant write access to the repo itself (which is not ideal).

justaugustus commented 5 years ago

Yeah, as Nikhita said, no, this is not possible... but I think that's okay, mostly for the reason of this being "opt-in". Like, a sig should be able to say "yes, I would love sig-pm's help to maintain my board" or "no thank you, we would like to maintain our board ourselves".

SGTM. While we're staffing, I'd only want to sign us up for managing a few boards (Steering, SIG PM, KEP Implementation Tracking, API Reviews, KEP Tracking). Those are in-scope for what @jdumars and myself have already been doing. From there, we would probably bring a few more people on and look at helping out SIG ContribEx next.

The other tricky bit is for boards that are repo-scoped, rather than org-scoped. I wish all boards were just org-scoped, because we can then be explicit with granting perms.. The only way to grant perms to repo-scoped boards is to grant write access to the repo itself (which is not ideal).

I'd prefer the boards we manage be org-scoped as well. In addition to being explicit about permissions, org-level boards are more discoverable than the repo-scoped ones. We can look at moving them once we lock this in. API Reviews has already made that move (https://github.com/kubernetes-sigs/architecture-tracking/projects/3 --> https://github.com/orgs/kubernetes/projects/13), as an example.

idvoretskyi commented 5 years ago

@justaugustus

Please, update the OP after the naming changes discussed here - https://github.com/kubernetes/org/pull/496#issuecomment-464932769.

idvoretskyi commented 5 years ago

I'd prefer the boards we manage be org-scoped as well. In addition to being explicit about permissions, org-level boards are more discoverable than the repo-scoped ones. We can look at moving them once we lock this in.

I disagree that org-scope should be mandatory (let's agree that it's a default and preferred behaviour, but not mandatory). There may be cases, when repo-wide boards are a preferred way to go.

justaugustus commented 5 years ago

Not implying that we should mandate org-level boards; they're just easier from the mgmt perspective for horizontal groups. Repo-scoped boards definitely work well for work that is tightly scoped to code.

bgrant0607 commented 5 years ago

It looks like it's now possible to access control org-level project boards? The lack of team-based ACLs is what previously drove us to create repos to contain projects, like architecture-tracking. https://help.github.com/articles/project-board-permissions-for-an-organization/

liggitt commented 5 years ago

It looks like it's now possible to access control org-level project boards? The lack of team-based ACLs is what previously drove us to create repos to contain projects, like architecture-tracking.

Yes. Examples for the API review project:

Org members can be scoped to read access:

screen shot 2019-02-20 at 12 04 24 am

And specific teams in the org given other levels of access:

screen shot 2019-02-20 at 12 04 35 am

justaugustus commented 5 years ago

Yep. I've noticed the defaults for the project boards are:

I'm thinking these should be:

Opened a separate issue for that: https://github.com/kubernetes/community/issues/3280

bgrant0607 commented 5 years ago

Oh, right. Org-level boards also used to only be visible to org members

mattfarina commented 5 years ago

Regarding the KEP board, because we merge early and often the PRs for those are not a useful thing to track on a board. We need to come up with a plan (short and long term) to get these wrangled.

A possible short term plan would be to have an issue for every KEP. Each of the PRs could be associated with the issue. A label could be used to track state (e.g., provisional, etc).

It would be nice of all of this were automated in a custom system. That's a long term goal.

@justaugustus I'm happy to put in time to get this wrangled. If we go with a board/short term solution I'm happy to do the work to get this up and going. The long term solutions is something I'll try to get more info on in the coming week. I'm not completely up to speed on where it is.

spiffxp commented 5 years ago

A possible short term plan would be to have an issue for every KEP

Sounds like the tracking issues that the release team uses. I agree there is much that could be done to improve them, but I would start there.

mattfarina commented 5 years ago

@spiffxp That is a good place to start. We also need to consider the features that are not in a k8s/k8s release but are a KEP. Thanks for the reminder.

fejta-bot commented 5 years ago

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale

justaugustus commented 5 years ago

/remove-lifecycle stale

fejta-bot commented 5 years ago

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale

markjacksonfishing commented 5 years ago

remove-lifecycle stale

fejta-bot commented 5 years ago

Stale issues rot after 30d of inactivity. Mark the issue as fresh with /remove-lifecycle rotten. Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle rotten

markjacksonfishing commented 5 years ago

/remove-lifecycle rotten

fejta-bot commented 4 years ago

Issues go stale after 90d of inactivity. Mark the issue as fresh with /remove-lifecycle stale. Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta. /lifecycle stale

justaugustus commented 4 years ago

/remove-lifecycle stale

spiffxp commented 4 years ago

/remove-committee steering For steering, this is the bosun's responsibility

/close All that's happened here over the last year is /remove-lifecycle

If we want to discuss improving the state of project board management, I would suggest opening up more granular well-scoped issues.

k8s-ci-robot commented 4 years ago

@spiffxp: Closing this issue.

In response to [this](https://github.com/kubernetes/community/issues/3267#issuecomment-608154009): >/remove-committee steering >For steering, this is the bosun's responsibility > >/close >All that's happened here over the last year is `/remove-lifecycle` > >If we want to discuss improving the state of project board management, I would suggest opening up more granular well-scoped issues. Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.