Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cleanup / sort / re-organize Baloise Github Orga Groups, permissions, memberships, ... #13

Open
MarkusTiede opened this issue Mar 15, 2021 · 3 comments
Labels
help wanted Extra attention is needed

Comments

@MarkusTiede
Copy link
Member

KISS

@MarkusTiede
Copy link
Member Author

crrnt

@MarkusTiede
Copy link
Member Author

MarkusTiede commented Mar 15, 2021

idea(s)

open question(s)

current state

next step : ✅

v0

Organization ✅

  • Owner - Has full administrative access to the entire organization: CoP Open-Source
  • Member - Can see every member and non-secret team in the organization, and can create new repositories.
  • Outside Collaborators (not supported by peribolos)

Teams ✅

  • All
    • IT-CH_SECC_CM_Open-Source --> CoP Open-Source
    • CM_Monitoring
    • IT-CH_SECC_CM_Java
    • this-or-that
    • Developers -->All
    • CICD pipeline --> IT-Group_CICD_pipeline
    • IT-CH_Bets
    • technical user(s)
  • ...
  • Alumni

Repository ❌

@MarkusTiede MarkusTiede added this to To do in CoP Open-Source via automation Mar 15, 2021
@MarkusTiede MarkusTiede moved this from To do to On hold in CoP Open-Source Mar 15, 2021
@christiansiegel
Copy link
Member

How does the kubernetes project use peribolos?:

Even the kubernetes org doesn't seem to sync repo permissions via peribolos: https://github.com/kubernetes/org/blob/e1e8ec86d24aab7998a9804c7e996c6ca99117f7/admin/BUILD.bazel#L10-L13
Instead, they have 1..n teams per repo (could also be a group of repos): e.g. here https://github.com/kubernetes/org/blob/e1e8ec86d24aab7998a9804c7e996c6ca99117f7/config/kubernetes/org.yaml#L1563
Only admins (or bot admins) can create new repos. Default member repo permission is read. Probably the admins assign the team to the repos manually (or via the api) on creation.

Another interesting approach is to have only one org repo for all kubernetes github organizations. We could move the baloise-incubator config in here to reduce duplicated automation code. Also, having a dedicated baloise-retired org for alumni (or/and archived repos) may be a solution to restrict access.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

2 participants