-
Notifications
You must be signed in to change notification settings - Fork 551
Use the public npm registry #605
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use the public npm registry #605
Conversation
Thanks for your pull request. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please follow instructions at https://git.k8s.io/community/CLA.md#the-contributor-license-agreement to sign the CLA. It may take a couple minutes for the CLA signature to be fully registered; after that, please reply here with a new comment and we'll verify. Thanks.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Welcome @dominykas! |
I signed it |
hi @dominykas welcome :) and thanks for jumping in and fixing this. As you can see this was added in #510 which both @brendandburns and I reviewed. I think this must have slipped through the cracks. We should add a CI check to ensure only the public registry is used but quick googling didn't show up any built in configs to ensure this. Similar to https://docs.npmjs.com/cli/v6/configuring-npm/package-json#publishconfig but for pulling of NPM packages. I am curious to know why these tests kept passing in CI though. /lgtm |
Indeed I'm not aware of a thing that can enforce this, short of writing your own lint tool... Which is why I created an RRFC in npm to cover this case: npm/rfcs#340. Maybe someone already has a linter for that 🤷♂️ It shouldn't be hard to create one. |
Thanks for the PR, apologies for letting this slip in. /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: brendandburns, dominykas The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Should fix #594