Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

April 25th, 2022 Community Meeting #80

Closed
qu1queee opened this issue Apr 20, 2022 · 7 comments
Closed

April 25th, 2022 Community Meeting #80

qu1queee opened this issue Apr 20, 2022 · 7 comments

Comments

@qu1queee
Copy link
Contributor

  • Please add a topic in this thread and add a link to the GitHub issue associated with the topic.
  • Please make sure you give folks enough time to review/discuss the topic offline on GitHub before coming into the meeting
  • (optional) Paste the image of an animal 😸
@qu1queee
Copy link
Contributor Author

@gabemontero
Copy link
Member

bump on shipwright-io/cli#112

@SaschaSchwarze0
Copy link
Member

Dependabot update.

🐗

@SaschaSchwarze0
Copy link
Member

What's your definition of an insecure registry?

  • HTTPS with self-signed certificate ?
  • HTTP ?

🦔

@otaviof
Copy link
Member

otaviof commented Apr 25, 2022

Status update on #68 proposal

🦄

@qu1queee
Copy link
Contributor Author

🐶

@SaschaSchwarze0
Copy link
Member

SaschaSchwarze0 commented Apr 25, 2022

kubectl plugin for shp CLI

  • Will mean that kubectl shp ... works
  • Gabe: Challenges ?
  • Otávio: no, only a PR against the plugin registry and release process extension to release a kubectl-shp binary
  • Enrique: nice to have but maybe not urgent?
  • Otávio: one gets visibility by being present in the plugin repository (which is here: https://krew.sigs.k8s.io/plugins/)
    -> we can target it for v0.10

Driver of grooming and community meetings

  • Enrique: helps if somebody is ready in advance and looks at what needs to be groomed
  • Sascha: combine it with the general Shipwright duty person that we discussed ? E: makes sense, but have not progressed on this
  • Otávio: should we document the roles and responsibilities ?
  • Next step: add document to community repo on definition of our meetings (purpose, role of host, etc) and use it to document who hosts when
    -> See issue: Add documentation about meetings #82

CLI PR on log following

  • Plan: Otávio looks at Gabe's PR and we merge that one in and then address the other points in a follow-on PR by Otávio

Dependabot update

  • Is enabled for Build repository
  • We will wait for the first PR to see how well it opens PRs before proceeding with other repos
  • What it updates? we have ignores for Kubernetes and Tekton (because of their interdependencies); Corey: it only updates in case of security-related findings
  • Matthias: we could have a dependabot specific handling in the release notes generation
    -> See issue: Investigate Dependabot improvements wrt release notes build#1047

Insecure registry

  • Otávio: insecure definately means that HTTPS without cert needs to be used; HTTP might require a different settings
  • Adam: there might have been changes in the go-containerregistry, ko publish --insecure-registry falls back to HTTP for communication ko-build/ko#488
  • Matthias: not remembering how it was in Docker Desktop
  • Otávio: let's look around how other tools behave
  • Baran: Docker CLI interprets insecure as everything that is not HTTPS with valid certificate = includes self-signed certificated and HTTP

Triggers ship

  • Otávio pushed some changes this morning
  • Ongoing discussions about status updates
  • Labels vs annotations vs first-class fields discussion
  • Please have a look

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants