-
Notifications
You must be signed in to change notification settings - Fork 5.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Repo for an AI experiment #8297
Comments
/sig contribex |
@ameukam: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/sig contributor-experience |
cc @kubernetes/sig-contributor-experience-leads |
Thinking out aloud, how about using kubernetes-sigs/maintainers for this? You wouldn't need a separate repo then. The said repo has some existing tooling to help maintainers maintain the OWNERS files. |
works @palnabarun ! (or hydrophone repo is fine as well ) |
We're mostly looking for autonomy in terms of PR approvals and CI setup. We don't have a proper definition of success for this experiment so I don't know how complex the code base will look like in the future. An existing repo is fine but I don't want to confuse any new contributor. |
kubernetes-sigs/maintainers seems to be a nice option then. Both tools (maintainers and the one you are proposing) have similar reasons to exist. |
SGTM. I guess we need to wait for the other TLs to chime in ? |
Hello folks (sorry I was out last week, just catching up & continuing the discussions from Jan, 2025 ContribEx meetings.) Not blocking on the request for using
Also some umbrella questions regarding the scope of AI experiments within the repo:
Can we define the "out of scope" items for the moment? (further, following up from the contribex meetings notes) |
@Priyankasaggu11929 This is out of scope for the Infra SIG. so we don't currently have any conversation regarding this within the SIG. |
There was a discussion about this in the Meeting of SIG k8s infra. I would like to align if this is already a good place to be and if SIG Testing want to be the host or if we want to open up a new central place under SIG ContribEx |
So I think that I and @ameukam are happy to start the ball rolling under kubernetes-sigs/maintainers, and I think we have consensus that this works as a venue, under an "experiments" folder. For now then we don't need a WG or a separate repo. Let's keep iterating under kubernetes-sigs/maintainers in the experiments folder, see what projects come out of it and who gets involved, and then we can use that to make an informed judgment on a WG or repo in a few months? |
@Priyankasaggu11929 For things out of scope at the moment:
|
Thanks for the confirmation @justinsb.
Let's document both (i) some timeline to review the progress for the future informed decision + (ii) out of scope items, in a readme in the new
Also @ameukam, @justinsb, checking if you both considered the |
@Priyankasaggu11929 there is no significant value to use k/test-infra repo at the moment. We can always reconsider its use if necessary. |
Related to: - kubernetes/community#8297 Add ameukam and justinsb as admins for the ksandbox experiment.
+1, not in the experimental stage. If we build something promising with increasing scope we should consider spinning it out (like we have done previously e.g. kind, prow, boskos)
I spoke to justinsb about it in the SIG Testing meeting, it has the benefit of an existing repo happy to host these and grant OWNERS to self-approve a subdir doing whatever project automation you want. Project automation is explicitly in scope for the SIG Testing charter and most project/github automation tools are SIG Testing sponsored (e.g. peribolos, prow, ...), though always in partnership with Contribex especially with respect to policies (which is also clearly denoted in the charter). I think the maintainers repo makes sense if this is focused around OWNERS automation, otherwise I don't think it's a good fit. I don't think e.g. general review automation makes sense there. Please FYI SIG Testing and Infra on any new automation we think the project will be running/hosting, if only for awareness to dedupe projects and to consider resource management. cc @kubernetes/sig-testing-leads There is another real downside to the maintainers repo: this currently has a single purpose-built tool that should be hosting tagged releases for that tool. I see a request to gain admin permissions over this repo which suggests it's not a simple experimental directory and will include modifying the repo itself. (Versus test-infra is already a catch-all repo for automation+testing configs and tools) |
If we need admin permissions then that's a big signal that we need a dedicated single-purpose experiment repo, which is not something the project has done well yet. https://github.com/kubernetes/org/pull/5394/files If we need that I think we can, but it probably shouldn't be a single-catch all then. Also, the SIG Contribex Charter does not currently clearly have scope for general automation other than moderation, policies procedure and public platform management. https://github.com/kubernetes/community/blob/master/sig-contributor-experience/charter.md |
I suppose you can argue this is "public platform management", but currently "repository automation tools" are definitely SIG Testing (see: peribolos and the charters). Regardless, I think the decision tree should be:
|
/sig testing |
(Also re: admin access as a ref flag: not so much for security as we know these contributors, but because admin access == modifying repo global state == not a good candidate for sharing a repo, and also isn't a repeatable pattern for other similar experiments) |
@kubernetes/sig-contributor-experience-leads With Ben's feedback (with steering hat ?) specifically with respect of the SIG Testing charter, Can we proceed with proceed with repo creation ? |
@ameukam clarified that admin access is for hosting content on GHCR / publishing releases, which I think indicates that we should make a Also
This project seems to have scope far beyond scanning OWNERS files
Docs generation should also involve looping in SIG Docs, if that's in scope. If not, let's scope to repo automation / triage and start a repo creation request in kubernetes/org. |
Let's use one of the upcoming SIG ContribEx meetings to discuss this further and then only we, move ahead with any next steps here. Since, the supposed scope of this AI project is also going to cross/overalap with the charter of SIG Testing, let's have the discussion with @kubernetes/sig-testing-leads in loop. @BenTheElder, @ameukam, @justinsb – does tomorrow's ContribEx meeting slot (wed, Feb 12, 9:00 AM PT) work for you all? |
SGTM. Can't guarantee I'll join but I'll do my best. |
I am -1 to the admin access request for k-sigs/maintainers anyway. I don't think it's needed. With the added context from @BenTheElder, is SIG Testing then going to primarily own the new repository? ContribEx and Docs can co-own but with the clarified context for the repo, my opinion is that it's suitable to be owned by SIG Testing. @kubernetes/sig-testing-leads -- please chime in for an acknowledgement. |
I don't think we need admin access to a GitHub repo - certainly not at the current time. I think the priority should be to gather code contributions so we can better understand the size and shape of the effort to improve the maintainer experience. For now, let's continue working in the maintainers repo. We can easily redirect to any other repo, all we need is an OWNERs file with @ameukam and myself. |
Describe the issue
We will like to get a new GitHub repository to host the codebase for an experimental tool that aims to improve the maintainer experience using Deep Learning techniques. This tool will leverage different AI tools to automate and enhance various aspects of repository maintenance, such as issue triaging, pull request review, and possibly documentation generation.
/assign @justinsb @ameukam
The text was updated successfully, but these errors were encountered: