Closed gabrielggg closed 4 months ago
Name | Link |
---|---|
Latest commit | 534d9233d3126a3bbd078ae2622ad9682dc9c443 |
Latest deploy log | https://app.netlify.com/sites/kubernetes-sigs-network-policy-api/deploys/65cd669e665f8c000888a1bd |
Deploy Preview | https://deploy-preview-181--kubernetes-sigs-network-policy-api.netlify.app |
Preview on mobile | Toggle QR Code...Use your smartphone camera to open QR code link. |
To edit notification comments on pull requests, go to your Netlify site configuration.
Welcome @gabrielggg!
It looks like this is your first PR to kubernetes-sigs/network-policy-api π. Please refer to our pull request process documentation to help your PR have a smooth ride to approval.
You will be prompted by a bot to use commands during the review process. Do not be afraid to follow the prompts! It is okay to experiment. Here is the bot commands documentation.
You can also check if kubernetes-sigs/network-policy-api has its own contribution guidelines.
You may want to refer to our testing guide if you run into trouble with your tests not passing.
If you are having difficulty getting your pull request seen, please follow the recommended escalation practices. Also, for tips and tricks in the contribution process you may want to read the Kubernetes contributor cheat sheet. We want to make sure your contribution gets all the attention it needs!
Thank you, and welcome to Kubernetes. :smiley:
Hi @gabrielggg. Thanks for your PR.
I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test
on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test
label.
I understand the commands that are listed here.
/ok-to-test
Thanks for your first PR!! @gabrielggg I'll review today
hi @astoycos , i squashed the commits and then proceeded to fix all the scripts so that the test is passing now, please check it out!
Looks pretty much there!! Can you rebase please?
Done with the rebase @astoycos
/retest
Hiya @gabrielggg!!! Will you have a chance to finish this up and get CI passing? Looks like there's still some things failing verification and you'll need to sign the K8s CLA
Additionally please try and signoff your commits :)
/retest
Hey @astoycos , i fixed the last failing tests and signed the K8s CLA, but for some reason, it still saying missing authorization on the EasyCLA item of the pipeline, can you please check that out?
/check-cla
/check-cla
Hrm not sure why the CLA isn't re-checking π€
/easycla
@gabrielggg Thanks for the update!! I'm thinking you may need to sign your commits with the same email used for the CLA verification?
Additionally it looks like you used different git accounts during the process and that may be messing things up
Gomez authored and Gabriel Fernando Gomez De La Torres Parod committed
It should look something like
hey @astoycos , thanks for the advice, i did that and know i think we are ready to go!
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: astoycos, gabrielggg
The full list of commands accepted by this bot can be found here.
The pull request process is described here
Hi.
This is to resolve https://github.com/kubernetes-sigs/network-policy-api/issues/94
This install.sh file is a script i created to simplify the instalation of shellcheck, it is a fork from this script https://github.com/golangci/golangci-lint/blob/master/install.sh which is used on the verify-golint.sh script from this repo. If you want i can upload that script also here, now it is hosted on my personal repo.
I took the same approach you used on https://github.com/kubernetes-sigs/network-policy-api/issues/37 creating a verify-shellcheck.sh script so that it gets automatically included on the ci pipeline because of the hack/verify-all.sh script wildcard usage.
p.s. This is my first PR to a kubernetes project, so i hope everything goes well.