►
From YouTube: SIG-Testing Weekly Meeting for 20220726
Description
SIG-Testing Weekly Meeting for 20220726
A
B
Okay,
cool
hi,
everybody
am,
I
audible
and
I
think
on
the
right
account
now
great.
Okay,
sorry!
For
the
late
start,
I
managed
to
turn
off
my
computer
right
when
I
was
trying
to
start
this,
so
it
was
fun.
Okay,
cool!
Let
me
just
make
sure
all
right
myself
is
in
order
and
we
can
go
ahead
and
get
started.
B
Okay,
cool
so
yeah,
it's
a
testing
meeting
for
today
looks
like
we
have
a
good
number
of
people
and
it's
also
about
four
pass.
So
a
lot
of
folks
struggle
in,
but
I
think
we
can
go
ahead
and
get
started
to
start.
Is
there
anybody
who's
new
here
and
wants
to
introduce
themselves
to
the
group.
B
Cool
saying
nobody
raise
hands,
let's
go
ahead
and
move
on
to
open
discussion.
I'm
liam,
I
think
you
have
it.
C
Yeah
hi
so
previously
in
like
last
last
meeting,
so
I've
brought
up
this
topic
where
we
are
wanting
to
introduce
four
of
our
ibm
cloud
resources.
Add
a
few
of
our
ibm
cloud
resources
to
bosco's.
C
We
are
clear
on
a
on
a
few
things
that
need
to
be
done
like
where
the
resources
to
be
added
in
the
general,
but
the
purpose
of
the
issue
was
two
main
things
which
is
secret
using
the
secret
manager,
and
second
thing
is:
how
do
we
is
there
a
systematic
approach
to
update
the
user
data
of
the
bosco's
resources
so
on
the
issue
the
latest
update
we've
mentioned:
is
that
we're
planning
to
use
gcp
secret
manager
from
the
suggestion
from
one
of
the
community
member?
C
So
is
there
any
suggestions,
and
how
do
we
proceed
with
it?
Like
we
have
a
few
accounts
where
ib
like
ibm
cloud
upstream
dedicated
accounts
like
case
caters,
staging
ibm
cloud
and
such
a
conflict.
Do
you
all
think
that
one
of
the
account
can
be
used
for
the
by
giving
access
to
the
secret
manager
also
yeah?
I
am
open
for
suggestions.
B
D
So
I
can't
answer
the
username
piece
I'll.
Let
someone
else
answer
that
one,
but
the
secret
itself.
What
you'll
want
to
do?
Basically,
the
ibm
employees
should
create
their
own
google
project
populate
the
secret
there,
and
hopefully,
once
you
do
that
we
can
give
you
the
email,
the
service
account
that
reads:
secrets
for
communities,
testing
for
and
then,
as
long
as
you
give
that
permissions,
we
can
pull
it
from
there
and
populate
the
secret
in
kubernetes
secrets.
D
D
That
user
data
piece-
I
don't
know
thanks
I'll.
Let
someone
else
answer
that
one.
B
Anybody
have
tips
on
the
user
data,
I
admit,
passing
familiarity
with
moscow,
so
I'm
not
super
familiar
with
the
resource
management
itself.
B
Okay,
if
nobody
in
this
meeting
has
a
particular
bosch
experience
for
this.
B
I
try
to
think
because,
like
the
books
that
I,
like
specifically
know,
are
like
some
familiar
with
bosco's,
but
not
necessarily
experts.
But
I'm
wondering
if
the
kate's
in
for
a
group
would
be
like
a
particularly
good
place
to
point
towards.
C
Okay,
so
I
didn't
reach
out
to
them,
but
it's
been
going
like
to
and
fro
from
sick
testing
to
caters
in
france.
So.
C
So
that
somebody
from
you
all
could
let
us
know
like
have
anybody,
does
that
I
mean
done
this
in
the
past.
Like
I
know,
aws
also
have
added
their
resources
quite
long
back.
So
was
the
process
different
than
because
then,
when
I
spoke
to
a
couple
of
folks,
they
mentioned
that
they
were
directly
in
contact
with
the
test
in
front
call
members,
and
they
were
just
sharing
data
and
they
were
updating
it
on
the
cluster
directly.
So
maybe
this
is
a
systematic
approach
right
now
to
do
it,
I'm
not
sure.
B
E
B
Cool
I'll
report
that
in
a
bit.
C
C
Yeah,
okay,
yeah
one
last
question
I
have
like
mohammed,
you
mentioned
about
the
gcp
account
we
handle
it.
So
what
is
your
take
on
using
one
of
the
like
community
owned
projects,
like
I
mentioned
before,
like
we
have
like
8
staging
improv
a
few
projects,
so
is
it
not
recommended
that
we
have
the.
D
You
could
take
that
approach,
you're
talking
about
the
staging
projects
where
these
two
images
right.
C
D
D
C
B
Awesome
all
right
muhammad,
I
think
you
have
the
next
agenda
item.
If
you
want
to
go.
D
Yeah,
so
the
next
one
is
about
migrating
to
artifact
registry
from
google
content
registry.
This
particular
issue
is
related
to
image
pushing
right
there.
I've
got
some
other
issues
open
for
serving
images
from
there,
so
this
particular
issue
is
when
changes
are
committed
into
repositories.
The
image
builder
runs
pushes
images
to
a
staging
repository
in
a
project,
so
something
I
want
to
do
is
make
sure
we
start
pushing
images
to
artifact
registry
within
those
projects
right
and
the
image
builder
is
something
that's
owned
by
testing
from
call.
D
So
I
need
to
talk
to
some
people
and
see
how
that
works.
One
question
that
I
have
is
some
repositories
have
like
the
card
build
the
ammo
where
they
have
the
images
key
in
there.
So
we
know
what
the
keys,
what
images
are
going
to,
but
most
of
the
repositories
that
I
looked,
don't
really
have.
The
images
key
seems
to
be
inserted
by
the
go
binary
that
seems
to
be
running
in
the
image
builder.
So
is
this
the
right
place
to
ask
that
or
do
I
need
to
go
and
find
someone
else.
D
E
D
Some
questions
about
the
image
builder
right:
there
is
a
little
code
that
runs
there
that
generates
or
completes
the
card
building.
Ammo
that's
present
in
repositories.
I
need
to
change
that
so
that
it
pushes
images
to
artifact
registry
instead.
So
the.
E
E
There
may
not
be
they're,
probably
not
pushing
using
cloud
build
to
push.
For
example,
if
I
want
to
push
a
multi-arch
image
it
and
like
construct
a
manifest
list,
then
I'm
probably
using
something
like
docker
build
x
or
docker
manifest
and
programmatically
pushing
it
from
a
step.
E
E
But
that
means
that
you're
building
with
docker,
which
we're
not
always
doing
sometimes
we're
using
co
and
local
storage,
doesn't
do
manifest
list
multi-arch
stuff.
C
E
D
Both
ends
right
yeah,
but
I.
E
Think
that
is
but
yeah,
but
I
I
think
that
it
will
be
more
disruptive
to
replace
all
of
the
staging
registries
and
for
less
gain.
I
think
that
it's
probably
worth
focusing
the
effort
on.
Can
we
can
we
get
the?
Can
we
get
promotion
into
artifact
registry
and
it
the
like?
It
should
be
pretty
negligible
on
most
of
the
staging
registries.
If
we
stage
to
gcr
still.
D
Okay,
okay,
that's
fine!
I
mean
the
other
piece
has
already
announced
that
it's
doable
all
the
work
is
in
fly.
I
just
need
to
get
the
right
approvals
for
it.
The
reason
I'm
looking
at
that
is
gcr
is
going
to
disappear
at
some
point
and
what
we're
talking
about
has
to
be
looked
at
at
some
point
in
the
future.
E
E
It's
frozen
so
we'll
like
we'll
want
to
move
to
artifact
for
other
things,
because
it's
also
an
opportunity
for
us
to
move
to
like
specific
regions
instead
of
multi-regional
and
okay,
because
at
some
point
we
might
want
features.
I
know
a
few
people
in
the
project
have
had
long-standing
requests
for
things
like
immutable
tags
and
we're
kind
of
like
implementing
that
ourselves
on
top
with
the
promoter.
E
B
E
I
do
think
it
makes
sense
long
term
to
standardize
on
it,
but
I
feel
like
it's
a
lot
more
pressing
to
work
through
how
we
get
it
into
the
production
promotion
and
other
than
like
getting
agreement
on
that
and
actually
standing
it
up.
I
think
that,
like
logistically,
that's
also
far
less
disruptive,
there's
a
lot
of
staging
registries
to
track
down
and
tell
projects
to
switch
to
pushing
to
some
different
location,
and
if
they
do
have
people
consuming
from
those
registries,
then
they
have
to
switch.
C
D
E
And
I
would
certainly
still
it
won't
be
helpful
here
and-
and
I
think
this
is
a
good
thing
to
do,
but
given
that
I've
also
seen
working
on
some
of
these
other
parts,
I
would
I
would
consider
like
shelving
this
one,
because
I
think
it's
probably
gonna
be
a
lot
more
work
than
it's
than
the
payoff.
For
the
moment.
B
B
Okay,
please
also
update
the
notes,
if
anything
in
there
it
looks
inaccurate,
I'm
trying
my
best
on
that
cool.
I
think
that's
all
the
stuff
that
was
listed
on
the
agenda
for
now.
Does
anybody
have
any
like
ad
hoc
agenda
items
that
they
want
to
discuss
right
now
on
purchasing
topics.
E
Hi
I
have
a
like
quick
fyi
for
folks
there's,
a
kep
from
sig
release
about
changing
the
kubernetes
kubernetes
main
repo
default
branch
from
master
to
main.
There
was
some
communication
going
out
about
doing
that
very
soon.
I
think
we're
gonna
delay
it
to
the
next
release
because
it
needs
more
input
but
I'll
be
trying
to
circle
back
and
drop
that
to
the
sig
in
slack
when
there's
a
pr
to
that
kept
where
we
can
discuss
more,
it
actually
didn't
get
marked
implementable,
yet
it's
still
marked
provisional.
E
So
we're
asking
them
to
follow
up
on
that
and
folks
from
this
sig
probably
can
help
provide
some
more
input
on
how
to
make
that
transition
smooth
from
the
like
infrastructure
side
of
things.
I
know
I
at
least
have
some
thoughts
about
the
ci
config
on
the
scale
of
that
project,
but
I
suspect
other
people
in
the
sick
will
too
we're
listed
as
a
participating
sig,
but
it
didn't
filter
here
yet
so
the
other
bit
of
feedback
is
to
circulate
all
those
things
so
lending
a
hand
here
we're
one
of
the
sigs.
E
We
should
be
taking
a
look
at
that
when
that
kept
comes
back
up.
Probably
you
know,
within
this
week.
E
Let
me
find
a
link
to
that
or
it
would.
There
was
a
notice
to
the
dev
mailing
list,
which
you
should
be
a
member
of.
E
E
I've
added
a
link
in
the
notes.
B
All
right,
I
think
in
that
case
we
can
close
this
out
thanks
everybody
for
attending
I've
got
an
action
on
me
and
it
sounds
like
there's
some
good
follow-ups
for
some
of
the
issues
mentioned.
So
thanks
for
everybody
see
you
all
later.