-
Notifications
You must be signed in to change notification settings - Fork 88
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ACM-16425-add-negative-label-filtering-to-Discovered-policies-table #4199
base: main
Are you sure you want to change the base?
ACM-16425-add-negative-label-filtering-to-Discovered-policies-table #4199
Conversation
Signed-off-by: John Swanke <[email protected]>
…-16425-add-negative-label-filtering-to-Discovered-policies-table Signed-off-by: John Swanke <[email protected]>
Signed-off-by: John Swanke <[email protected]>
/test unit-tests-sonarcloud |
Signed-off-by: John Swanke <[email protected]>
Signed-off-by: John Swanke <[email protected]>
Signed-off-by: John Swanke <[email protected]>
Signed-off-by: John Swanke <[email protected]>
/test unit-tests-sonarcloud |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey John,
Overall, the code looks good and it works well. I just found a couple issues:
- If I add a new policy with the discovered policies page open, when the search query next executes, the page crashes.
- Terminology question - can
isNegatable
only be used for a label? Are all labels negatable? TheequalsLabel
function seems to deem the two concepts equivalent, so I think either that function or the flag should be renamed.
Signed-off-by: John Swanke <[email protected]>
ok, this version:
|
Quality Gate passedIssues Measures |
/hold |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jeswanke, KevinFCormier The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/override "Red Hat Konflux / acm-213-enterprise-contract-registry-standard / console-acm-213" |
@KevinFCormier: Overrode contexts on behalf of KevinFCormier: Red Hat Konflux / acm-213-enterprise-contract-registry-standard / console-acm-213 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/override "Red Hat Konflux / mce-28-enterprise-contract-registry-standard / console-mce-mce-28" |
@KevinFCormier: Overrode contexts on behalf of KevinFCormier: Red Hat Konflux / mce-28-enterprise-contract-registry-standard / console-mce-mce-28 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Signed-off-by: John Swanke [email protected]