diff --git a/groups/restrictions.yaml b/groups/restrictions.yaml index 1fa8ab77ac7..4cf3a94e05a 100644 --- a/groups/restrictions.yaml +++ b/groups/restrictions.yaml @@ -194,6 +194,7 @@ restrictions: - "^k8s-infra-rbac-kubernetes-external-secrets@kubernetes.io$" - "^k8s-infra-staging-infra-tools@kubernetes.io$" - "^k8s-infra-ii-coop@kubernetes.io$" + - "^k8s-infra-sandbox-capg@kubernetes.io$" - "^sig-k8s-infra-leads@kubernetes.io$" - "^sig-k8s-infra-private@kubernetes.io$" - path: "**/*" # prevent any other file from containing anything diff --git a/groups/sig-k8s-infra/groups.yaml b/groups/sig-k8s-infra/groups.yaml index aebcfcc5b05..e198c1da605 100644 --- a/groups/sig-k8s-infra/groups.yaml +++ b/groups/sig-k8s-infra/groups.yaml @@ -131,6 +131,19 @@ groups: - stephen@ii.coop - zz@ii.coop + # owners of the k8s-infra-sandbox-capg project, working on cluster-api provider for GCP + - email-id: k8s-infra-sandbox-capg@kubernetes.io + name: k8s-infra-sandbox-capg + description: |- + ACL for CAPG sandbox + settings: + ReconcileMembers: "true" + members: + - davanum@gmail.com + - ctadeu@gmail.com + - jayesh0200@gmail.com + - ii.sayantani.ii@gmail.com + # RBAC groups: # - grant access to the `namespace-user` role for a single namespace on the `aaa` cluster # - must have WhoCanViewMemberShip: "ALL_MEMBERS_CAN_VIEW"