Skip to content

Conversation

@LiZhenCheng9527
Copy link
Contributor

What type of PR is this?
/kind feature

Which issue(s) this PR fixes:
a part of #544

@kurator-bot
Copy link
Collaborator

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign hzxuzhonghu for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@netlify
Copy link

netlify bot commented Feb 19, 2024

Deploy Preview for kurator-dev canceled.

Name Link
🔨 Latest commit 141b1fd
🔍 Latest deploy log https://app.netlify.com/sites/kurator-dev/deploys/65d5ae100efa7c0008381535

name := customCluster.Name + "-" + ClusterHostsName
name = strings.ToLower(name)
if len(name) > 63 {
name = name[:63]
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Two cents:

  1. donot hardcode
  2. If we strip, could we get duplicate resource names?

Signed-off-by: LiZhenCheng9527 <lizhencheng6@huawei.com>
Copy link
Member

@hzxuzhonghu hzxuzhonghu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

iirc, this is not right, if the name is suffixed with random chars, when we reconcile delete, we could not cleanup the generated resources

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants