-
Notifications
You must be signed in to change notification settings - Fork 877
Setup a job to automatically run and PR the results of audit/audit-gcp.sh #244
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Comments
creating the cluster ref: #243 |
CronJob would open a PR (akin to how prow maintains a bump PR?) |
Depends on script in this PR: #213 |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
@hh is this issue still relevant? If so, it seems like there should be a CronJob that periodically checks that a specified cluster has the required IAM policies and when it doesn't open a PR in this repo to fix? Let me know if I'm missing anything. |
/remove-lifecycle stale I think it is. I think the point is to run this regularly and then output the details |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle rotten |
I am noodling on something over in https://github.com/bashfire/prow-config/blob/master/config/jobs/bashfire/k8s-io.yaml The job will output the diff at the end. What I'd like to do next is create a PR if there are any changes, and continue to update that PR until it's been merged |
/assign @spiffxp @bartsmykla |
I will sit with @munnerz next week and we'll move this thing forward together (as discussed at today's call) |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/priority important-soon |
/remove-priority backlog |
/lifecycle active |
Chatted with @hh about this |
/uncc @bartsmykla |
/assign @hh |
I didn't get a chance to dive deep into this, but we have a somewhat working similar script that does currently create or update a PR when changes have occurred in conformance data underpinning apisnoop.cncf.io : https://github.com/cncf/apisnoop/blob/gcb-snoodb-pr-gater/cloudbuild.yaml |
For this job I would suggest using the working pr-creator from the yaml hh posted above, cp -r coverage/[artifact] path/to/repo/[artifact] |
Currently we use gcb for our build which means our credentials/secrets are in the gcb project. |
/remove-help Discussed in meetings but to close the loop here:
|
/reopen |
@spiffxp: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
#1648 - auditor account didn't have access to secretmanager, add a one-off script for this for now Sample audit PR's manually opened by @hh
I have /held these PRs because I would like to merge the PR I opened last month that annotated many of the changes that have happened in the past 7 months commit by commit. I am in the midst of updating it right now, and suggest I leave out some of the questionable changes I can't account for, for the automation to PR instead (#1534 (comment)) |
We now have a set of partial-audits PR created via a prow job. It was created by using a gist of a slightly modify audit-gcp.sh over a few runs, using a different branch each time. The changes to the job are here: And the resulting list of 10 PRs: |
Copy-pasting from #1676 (comment) The partial-audit PR's opened by cncf-ci caught almost everything. I reviewed and approved them, but I can't do anything further to merge them until the account has signed the CLA. Use
The outstanding changes I didn't see covered in them are: |
/close I think we can call this done now:
I have some quality of life suggestions for improvements, but I will make those elsewhere. |
@spiffxp: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/assign @hh
/wg k8s-infra
EDIT: redoing description entirely, things have changed since this issue was created
We want a prowjob that does the following:
I am super open to suggestions about whether there are better or more-actionable ways to do auditing. But we need to start with something.
I sketched out what such a job would look like here: https://github.com/bashfire/prow-config/blob/435a8039bc9cf496690ad572884a72e9608ebb4e/config/jobs/bashfire/k8s-io.yaml
This is one of the first things we want to setup on a freshly created k8s-infra cluster to be sure we actually have the cluster and all of the IAM policies / roles created properlyFirst run as Job, next run as CronJobThe text was updated successfully, but these errors were encountered: