Closed xuzhenglun closed 2 years ago
Hi @xuzhenglun. Thanks for your PR.
I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test
on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test
label.
I understand the commands that are listed here.
[APPROVALNOTIFIER] This PR is NOT APPROVED
This pull-request has been approved by: xuzhenglun
To complete the pull request process, please assign justinsb after the PR has been reviewed.
You can assign the PR to them by writing /assign @justinsb
in a comment when ready.
The full list of commands accepted by this bot can be found here.
/test
@xuzhenglun: Cannot trigger testing until a trusted user reviews the PR and leaves an /ok-to-test
message.
@atoato88
remove labels if ignore
annotation is applied, does this solution ok for you?
@xuzhenglun
IMHO, labels set in r.options.labelMaker
are quite important on some situations.
e.g. Filter objects by those labels, ...
@justinsb Any ideas which don't delete those labels?
@xuzhenglun IMHO, labels set in
r.options.labelMaker
are quite important on some situations. e.g. Filter objects by those labels, ...@justinsb Any ideas which don't delete those labels?
@atoato88
Or maybe we can put a label addons.k8s.io/ignore
on the object which contains the annotation addons.k8s.io/ignore
.
Later, In prune progress, we can append a selector: !addons.k8s.io/ignore
. The corresponding kubectl
command could be kubectl apply --prune --selector=<user-labels>,!addons.k8s.io/ignore
Both of the two situations are ok for me. After deciding which one we should choose, then I'm willing to update this PR.
Thank you to comment your ideas. I think 2nd one is more reasonable for me;
Or maybe we can put a label addons.k8s.io/ignore on the object which contains the annotation addons.k8s.io/ignore.
But it's a breaking change from current codebase, so we should decide this with other approvers.
@justinsb WDYT?
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle stale
/lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle stale
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/remove-lifecycle rotten
/close
Please send feedback to sig-contributor-experience at kubernetes/community.
/lifecycle rotten
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.
This bot triages issues and PRs according to the following rules:
lifecycle/stale
is appliedlifecycle/stale
was applied, lifecycle/rotten
is appliedlifecycle/rotten
was applied, the issue is closedYou can:
/reopen
/remove-lifecycle rotten
Please send feedback to sig-contributor-experience at kubernetes/community.
/close
@k8s-triage-robot: Closed this PR.
/reopen
@JeffLuoo: You can't reopen an issue/PR unless you authored it or you are a collaborator.
What this PR does / why we need it: fix #209
Special notes for your reviewer:
Additional documentation: