Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@haircommander
Copy link
Member

What type of PR is this?

/kind documentation

What this PR does / why we need it:

more details in each commit

Which issue(s) this PR fixes:

Special notes for your reviewer:

Does this PR introduce a user-facing change?

none

@haircommander haircommander requested a review from mrunalp as a code owner January 4, 2023 19:27
@openshift-ci openshift-ci bot added the release-note-none Denotes a PR that doesn't merit a release note. label Jan 4, 2023
@haircommander haircommander changed the title Misc documentation fixes Misc documentation updates Jan 4, 2023
@openshift-ci openshift-ci bot added dco-signoff: yes Indicates the PR's author has DCO signed all their commits. kind/documentation Categorizes issue or PR as related to documentation. labels Jan 4, 2023
@openshift-ci openshift-ci bot requested review from QiWang19 and wgahnagl January 4, 2023 19:28
@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Jan 4, 2023
@mrunalp
Copy link
Member

mrunalp commented Jan 4, 2023

Looks great! Will let others review as well before we tag it.

@haircommander
Copy link
Member Author

In accordance with the policy as defined, this PR has a week voting period where folks can +1/-1 it before we merge

@nalind @giuseppe @umohnani8 @saschagrunert @fidencio @kolyshkin PTAL

### Community Member

### How to become a reviewer
* Anyone can and is encouraged to be a community member! The CRI-O community eagerly accepts PRs, issues, new users and questions.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This might be a good place to add also things that you don't mention in reviewer/maintainer sections and encourage users to participate more in the community, and become contributor, like helping with improving documentation, or improving website, evangelize the project by writing blog, etc. CNCF has good examples in their template under community participant

Copy link
Contributor

@jrvaldes jrvaldes left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@haircommander Thanks for working on this. I added a suggestion, PTAL.

GOVERNANCE.md Outdated
CRI-O, being a project whose purpose is linked to fulfilling the needs of Kubernetes, has a governance structure that mirrors many SIGs and sub-projects of Kubernetes. This document highlights important aspects of, and serves as a summary of the [Kubernetes' community documentation](https://www.kubernetes.dev/docs).
- [Values](#values)
- [Contribution Tiers](#contribution-tiers)
- [Becoming a Maintainer](#becoming-a-maintainer)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This section is no longer present in the proposed structure of the document. I suggest removing it or explicitly adding the subsections of Contribution Tiers.

GOVERNANCE.md Outdated

* If a community member would like to take on a more active role in the community, and one day become an approver, becoming a reviewer is a good first step.
* Becoming a reviewer allows someone to build trust with the community and deepen their knowledge of the code base.
* To become a reviewer, one should file an issue with [this template](https://github.com/cri-o/cri-o/issues/new?assignees=&labels=area%2Fgithub-membership&template=membership.yml&title=REQUEST%3A+New+membership+for+%3Cyour-GH-handle%3E).
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks like the membership.yml template is no longer there, use the following URL to leverage the current template.

https://github.com/cri-o/cri-o/issues/new?template=reviewer.yml&title=REQUEST%3A+New+reviewer+status+for+%3Cyour-GH-handle%3E

@haircommander
Copy link
Member Author

great catches @jrvaldes @lenicatko, thanks! I have adopted your feedback and squashed the changes

@jrvaldes
Copy link
Contributor

jrvaldes commented Jan 9, 2023

LTGM

@codecov
Copy link

codecov bot commented Jan 9, 2023

Codecov Report

Merging #6486 (437d7bb) into main (006639a) will not change coverage.
The diff coverage is n/a.

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #6486   +/-   ##
=======================================
  Coverage   42.49%   42.49%           
=======================================
  Files         128      128           
  Lines       14944    14944           
=======================================
  Hits         6350     6350           
  Misses       7904     7904           
  Partials      690      690           

@haircommander
Copy link
Member Author

GOVERNANCE.md Outdated

## Emeritus Approver
#### Distinction between top-level approvers and sub-tree approvers
Through the mechanism of the OWNERS file, it’s possible to define sub-tree approvers for areas of specialty. For the purposes of this document, when “approvers” is mentioned, sub-tree approvers are not automatically included, though they could be. One way this happens is if a section of code that a sub-tree approver is responsible for has a security vulnerability, they will be included in the discussions. However, they need not necessarily be included if there is not such a vulnerability.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Through the mechanism of the OWNERS file, it’s possible to define sub-tree approvers for areas of specialty. For the purposes of this document, when “approvers” is mentioned, sub-tree approvers are not automatically included, though they could be. One way this happens is if a section of code that a sub-tree approver is responsible for has a security vulnerability, they will be included in the discussions. However, they need not necessarily be included if there is not such a vulnerability.
Through the mechanism of the OWNERS file, it’s possible to define sub-tree approvers for areas of specialty. One way this happens is if a section of code that a sub-tree approver is responsible for has a security vulnerability, they will be included in the discussions. However, they need not necessarily be included if there is no such vulnerability. For the purposes of this document, when “approvers” is mentioned, sub-tree approvers are not automatically included, though they could be.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

and maybe: "when "approvers" is" to "when the word "approvers" is"

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have dropped the security section as upon reading again I found it clunky

GOVERNANCE.md Outdated
* In order to maintain an active reviewers and approvers list, the CRI-O team has a right to demote an approver or reviewer if they appear inactive for one year.
### Demotion

* In order to maintain an active reviewers and approvers list, the CRI-O team has a right to demote an approver or reviewer if they appear inactive for two years.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

two years seems too long. I'd go a year, maybe 6 months. YMMV

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I will drop to one

GOVERNANCE.md Outdated
* A weekly meeting is held to discuss CRI-O development. It is open to everyone.
* It is generally run by an approver.
* The details to join the meeting are on the [wiki](https://github.com/cri-o/cri-o/wiki/CRI-O-Weekly-Meeting).
There is an alias on github that one can use to ping all of the CRI-O reviewers and approvers: "@cri-o/cri-o-maintainers".
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
There is an alias on github that one can use to ping all of the CRI-O reviewers and approvers: "@cri-o/cri-o-maintainers".
There is an alias on GitHub that one can use to ping all of the CRI-O reviewers and approvers: "@cri-o/cri-o-maintainers".

GOVERNANCE.md Outdated

* This document was partially based off of [Envoy's GOVERNANCE.md](https://github.com/envoyproxy/envoy/blob/main/GOVERNANCE.md) file. Some credit goes to the maintainers of the Envoy project.
* As mentioned above, credit is also due to the Kubernetes community documentation, which also served as a foundation.
Thanks to the Jaeger Project, the Envoy project, the Kubernetes community documentation, and the CNCF for portions and structure of this document.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe add links to each of these?

@haircommander
Copy link
Member Author

In addition to addressing @TomSweeneyRedHat 's comments, I have also added a new commit adding a new tier of contributor: org member, which is a position that currently exists but was not documented, nor was the process of becoming one defined. This was done by inspiration from a slack thread, thanks Shunli (whose github handle I don't know yet)

roadmap.md Outdated
Often, though not always, CRI-O will attempt to support new features in Kubernetes while they’re in the Alpha stage, though sometimes this target is missed and support is added while the feature is in Beta.
To track the features that may be added to CRI-O from upstream, one can watch SIG-Node’s KEPs for a given release.
If a particular feature interests you, the CRI-O community recommends you open an issue in CRI-O so it can be included in the Milestone for that given release.
CRI-O maintainers are involved in SIG-Node in driving various upstream initiatives that can be tracked in the SIG-Node planning document.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There are multiple references of SIG-Node, but no link to it. Maybe adding a link here (or at the first occurrence of "SIG-Node") would be nice to help track those initiatives?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I added a couple of links embellishing references I made, PTAL @littlejawa :)

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 18, 2023

@littlejawa: changing LGTM is restricted to collaborators

Details

In response to this:

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@haircommander
Copy link
Member Author

/retest

Signed-off-by: Peter Hunt~ <[email protected]>
Signed-off-by: Peter Hunt~ <[email protected]>
Signed-off-by: Peter Hunt~ <[email protected]>
Signed-off-by: Peter Hunt~ <[email protected]>
Signed-off-by: Peter Hunt~ <[email protected]>
to account for folks who are members of the cri-o organizaiton but do not yet qualify as reviewers.

Signed-off-by: Peter Hunt~ <[email protected]>
Copy link
Member

@saschagrunert saschagrunert left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@openshift-ci openshift-ci bot added the lgtm Indicates that a PR is ready to be merged. label Jan 19, 2023
@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 19, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: haircommander, littlejawa, saschagrunert

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:
  • OWNERS [haircommander,saschagrunert]

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@haircommander
Copy link
Member Author

/override ci/prow/e2e-gcp-ovn
/override ci/prow/ci-rhel-integration
/override ci/kata-jenkins

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 19, 2023

@haircommander: Overrode contexts on behalf of haircommander: ci/kata-jenkins, ci/prow/ci-rhel-integration, ci/prow/e2e-gcp-ovn

Details

In response to this:

/override ci/prow/e2e-gcp-ovn
/override ci/prow/ci-rhel-integration
/override ci/kata-jenkins

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@saschagrunert
Copy link
Member

/override ci/prow/e2e-gcp-ovn
/override ci/prow/ci-rhel-integration
/override ci/kata-jenkins

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 20, 2023

@saschagrunert: Overrode contexts on behalf of saschagrunert: ci/kata-jenkins, ci/prow/ci-rhel-integration, ci/prow/e2e-gcp-ovn

Details

In response to this:

/override ci/prow/e2e-gcp-ovn
/override ci/prow/ci-rhel-integration
/override ci/kata-jenkins

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@saschagrunert
Copy link
Member

/override ci/prow/e2e-gcp-ovn
/override ci/prow/ci-rhel-integration
/override ci/kata-jenkins

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 20, 2023

@saschagrunert: Overrode contexts on behalf of saschagrunert: ci/kata-jenkins, ci/prow/ci-rhel-integration, ci/prow/e2e-gcp-ovn

Details

In response to this:

/override ci/prow/e2e-gcp-ovn
/override ci/prow/ci-rhel-integration
/override ci/kata-jenkins

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@saschagrunert
Copy link
Member

/override ci/prow/e2e-aws-ovn

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 20, 2023

@saschagrunert: Overrode contexts on behalf of saschagrunert: ci/prow/e2e-aws-ovn

Details

In response to this:

/override ci/prow/e2e-aws-ovn

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@saschagrunert
Copy link
Member

/override ci/prow/ci-crun-e2e
/override ci/prow/ci-rhel-e2e

@openshift-ci
Copy link
Contributor

openshift-ci bot commented Jan 20, 2023

@saschagrunert: Overrode contexts on behalf of saschagrunert: ci/prow/ci-crun-e2e, ci/prow/ci-rhel-e2e

Details

In response to this:

/override ci/prow/ci-crun-e2e
/override ci/prow/ci-rhel-e2e

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. dco-signoff: yes Indicates the PR's author has DCO signed all their commits. kind/documentation Categorizes issue or PR as related to documentation. lgtm Indicates that a PR is ready to be merged. release-note-none Denotes a PR that doesn't merit a release note.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

8 participants