-
Notifications
You must be signed in to change notification settings - Fork 693
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New repo: kubernetes-sigs/kubebuilder-declarative-pattern #418
Comments
Reiterating my approval: 👍 for easy reference |
@cblecker is this something you can help with please? |
Would be awesome if we could have kubernetes/community#3018 (comment) get merged in as well and get ack's from the people listed there. |
/lgtm |
Until the followup mentioned in kubernetes/community#3018 (comment) is opened and merged, I would like an approval from SIG API machinery leadership, or a confirmation that the earlier approval of "kubebuilder-addon-pattern" applies for "kubebuilder-declaritive-pattern" |
/lgtm |
At this point the repo is ready for PR's. TODO:
|
@johnsonj it turns out you are not a member of kubernetes or kubernetes-sigs, so I can't add you to the things, can you please file a membership request? |
The postsubmit has run and the new teams have been created. I have updated access as follows:
The PR to update sigs.yaml (kubernetes/community#3278) has also merged, so closing this issue. /close |
@nikhita: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
New Repo, Staging Repo, or migrate existing
new repository
Requested name for new repository
kubebuilder-declarative-pattern
Which Organization should it reside
kubernetes-sigs
If not a staging repo, who should have admin access
@kubernetes-sigs/kubebuilder-admins, @justinsb, @johnsonj
If not a staging repo, who should have write access
@kubernetes-sigs/kubebuilder-admins, @justinsb, @johnsonj
If a new repo, who should be listed as approvers in OWNERS
@kubernetes-sigs/kubebuilder-admins, @justinsb, @johnsonj
If a new repo, who should be listed in SECURITY_CONTACTS
@kubernetes-sigs/kubebuilder-admins, @justinsb, @johnsonj
What should the repo description be
A toolkit for building declarative operators with kubebuilder.
What SIG and subproject does this fall under in sigs.yaml
This is part of the kubebuilder subproject for SIG API Machinery.
Approvals
src
Additional context for request
The text was updated successfully, but these errors were encountered: