-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: enable policy-bot evaluation #1960
base: main
Are you sure you want to change the base?
Conversation
3beac93
to
4cca811
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
Looks good to me, I'm not totally up to speed on the spec nuances but makes sense at a quick review
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@strantalis could we annotate this .policy.yml
document to help communicate what the sections mean and where to go for further information.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
NODTM with the policy, but please add .policy.yml
to the CODEOWNERS. This config can be very sensitive, so we should ensure it's protected.
So I think the goal would be to flatten the codeowners and have this rule enforce an approval from architecture or security if |
@jrschumacher I added a link to the configuration. Are you looking for more details than what is put in the descriptions? |
IMO we should simplify/reduce CODEOWNERs to avoid duplication of effort, but it doesn't seem to me that policy-bot will give us the kind of close integration with tooling we want to fully replace it. Also, I worry about reliability and visibility about using a private hosted service, especially on a public repo |
I think we would need to flatten the codeowners but I didn't want to change that until we felt comfortable with using policy-bot. We can also make the service public once we feel comfortable enough with using it. This shouldn't block any pull requests until we set a required status check. |
what is policy bot lacking that would give you the close integration you are looking for? Github doesn't natively support much of what can be done with policy bot, so it doesn't seem there is a better option. |
@strantalis I am not sure if putting this restriction in policy bot alone is sufficient. Unless I am mistaken, I believe the referenced policy config will be the one in the PR. The concern is that someone could modify the config as part of their PR to bypass or remove restrictions like these. I know the config can be referenced from a different repo, and that would address my concerns. Let me know if you know of anything else, but CODEOWNERS seems a straight forward solution. Additionally it's already pretty standard, I would prefer to keep ownership defined in CODEOWNERS. |
Proposed Changes
For more information on policy-bot spec https://github.com/palantir/policy-bot?tab=readme-ov-file#policyyml-specification
Checklist
Testing Instructions