-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prow /approve
not cleared on push
#1215
Comments
@goern it merged the operate-first/operate-first-twitter#10 PR 😕 |
Well, I would go with kubernetes/test-infra#17698 (comment) Is there a reason we want to deviate from the kubernetes behavior/workflow? /label triage/needs-information |
@goern the thing is that we probably don't understand the kubernetes behavior/workflow in detail enough to follow it to point. For me, this behavior is an unpleasant surprise that exposes approved PRs to be exploited to get nonapproved changes into the repo. This made me think if we have anything to do about this or if we're lacking any documentation in place how we should handle this. I have no idea if there's a code-change required here or rather a policy change or it's just about raising awareness of this and making sure that once a PR is approved it's monitored until merged to make sure there's no commits comming in (which still leaves the loophole exposed, but at least we know about it)... |
Since |
attempting to fix this via #1216 |
It seems the change #1216 worked as intended. At least for Second test PR behaved properly: operate-first/operate-first-twitter#12 |
From our point of view we should follow the Kubernetes workflows as close as possible, this will give us the highest leverage on using Prow. I will close this on for the moment, if some new requirements come out of the ADR creation, feel free to re-open. /close |
@goern: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Describe the bug
If a contributor force-pushes or pushes into a PR which has an
/approve
label on it, this label is not cleared - theapprove
plugin of Prow doesn't support this. This is in contrast with/lgtm
where this label get's cleared. See linked issues for details.This issue is created to raise awareness of this + seek guidance on how we should use the
/approve
command... Our current setup merges a PR if there's anapprove
label, no matter if there's anlgtm
.To Reproduce
See: operate-first/operate-first-twitter#10
Expected behavior
Approve label is either removed or the merge is blocked.
Additional context
Upstream bug (closed as WONTFIX): kubernetes/test-infra#17698
operate-first/operate-first-twitter#7 (comment)
The text was updated successfully, but these errors were encountered: