-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow dependabot to check go modules #6873
Conversation
Welcome @jlosito! |
Hi @jlosito. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Using dependabot is pretty cool (I use on my personal projects), but I'm afraid that it can bring some problems, for example with the kubernetes libraries. Usually before updating them, we try to make some tests. Is that possible to ignore some libraries in dependabot? If so, I think it would be good to configure this to at least ignore the k8s libraries, which are sort of the core of this controller. |
/ok-to-test |
If one wanted to ignore some packages, you can add something like the following.
I'm pretty sure the bot provides some chatop commands to ignore a dependency and it will automatically update the configuration file accordingly. |
Can we instead of use Dependabot to open PRs of old libraries, use it to generate a report that can be sent on a weekly based to a webhook (like Slack)? |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jlosito, rikatz The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Keeping up to date is not bad |
What this PR does / why we need it:
This change allows dependabot to check go dependencies which this project uses on a weekly basis and submit pull requests with version bumps in order to keep packages up-to-date.
https://docs.github.com/en/github/administering-a-repository/keeping-your-actions-up-to-date-with-dependabot
Types of changes
Which issue/s this PR fixes
How Has This Been Tested?
GitHub should already have a validator for these types of configuration files which is automatically ran in order to check the dependabot configuration is syntactically correct.
Checklist: