Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

⚠️ CONFLICT! Lineage pull request for: skeleton #60

Merged
merged 57 commits into from
Jun 28, 2021
Merged

Conversation

cisagovbot
Copy link

@cisagovbot cisagovbot commented Jun 3, 2021

Lineage Pull Request: CONFLICT

Lineage has created this pull request to incorporate new changes found in an
upstream repository:

Upstream repository: https://github.com/cisagov/skeleton-docker.git
Remote branch: HEAD

Check the changes in this pull request to ensure they won't cause issues with
your project.

The lineage/skeleton branch has one or more unresolved merge conflicts
that you must resolve before merging this pull request!

How to resolve the conflicts

  1. Take ownership of this pull request by removing any other assignees.

  2. Clone the repository locally, and reapply the merge:

    git clone git@github.com:cisagov/gatherer.git gatherer
    cd gatherer
    git remote add skeleton https://github.com/cisagov/skeleton-docker.git
    git remote set-url --push skeleton no_push
    git switch develop
    git checkout -b lineage/skeleton --track origin/develop
    git pull skeleton HEAD
    git status
  3. Review the changes displayed by the status command. Fix any conflicts and
    possibly incorrect auto-merges.

  4. After resolving each of the conflicts, add your changes to the
    branch, commit, and push your changes:

    git add .github/CODEOWNERS README.md docker-compose.yml tag.sh 
    git commit
    git push --force --set-upstream origin lineage/skeleton

    Note that you may append to the default merge commit message
    that git creates for you, but please do not delete the existing
    content
    . It provides useful information about the merge that is
    being performed.

  5. Wait for all the automated tests to pass.

  6. Check the "Everything is cool" checkbox below:

    • ✌️ The conflicts in this pull request have been resolved.
  7. Mark this draft pull request "Ready for review".


Note: You are seeing this because one of this repository's maintainers has
configured Lineage to open pull requests.

For more information:

🛠 Lineage configurations for this project are stored in .github/lineage.yml

📚 Read more about Lineage

felddy and others added 30 commits March 25, 2021 17:37
* Duplicates DockerHub tags for ghcr.io
* Adds login to GitHub Container Registry using the GITHUB_TOKEN secret.
* Documentation update to reflect multi-registry publication.
Co-authored-by: Nick M. <50747025+mcdonnnj@users.noreply.github.com>
* Add instructions for cross-platform builds
* Clean up shields
* Clean up tables for each Docker configuration item
* Add section about supported tags
This should resolve the following error:

Error: Workflows triggered by Dependabot on the "push" event run with read-only
access. Uploading Code Scanning results requires write access. To use Code
Scanning with Dependabot, please ensure you are using the "pull_request" event
for this workflow and avoid triggering on the "push" event for Dependabot
branches. See
https://docs.github.com/en/code-security/secure-coding/configuring-code-scanning#scanning-on-push
for more information on how to configure these events.
Co-authored-by: Hillary <hillary.jeffrey@trio.dhs.gov>
Co-authored-by: Hillary <hillary.jeffrey@trio.dhs.gov>
Co-authored-by: Hillary <hillary.jeffrey@trio.dhs.gov>
Co-authored-by: Hillary <hillary.jeffrey@trio.dhs.gov>
Co-authored-by: Hillary <hillary.jeffrey@trio.dhs.gov>
Co-authored-by: Nick M. <50747025+mcdonnnj@users.noreply.github.com>
Co-authored-by: Hillary <hillary.jeffrey@trio.dhs.gov>
Co-authored-by: Hillary <hillary.jeffrey@trio.dhs.gov>
Co-authored-by: Hillary <hillary.jeffrey@trio.dhs.gov>
* Add a comment describing what the files does.
* Add sections to organize patterns.
Due to her departure this removes hillaryj from the default CODEOWNERS we use
in our projects.
The semver package is needed by the bump_version.sh script, but it is not
included in requirements-dev.txt.
The version attribute has been depricated and will be removed once our 
systems move to a more recent release.
Co-authored-by: Hillary <hillary.jeffrey@trio.dhs.gov>
Since the GitHub Actions configuration builds images on tag pushes, we should
use the standard tagging script we use for the same purpose in other
repositories. This will make it easier to tag, build, and push Docker images
of a specific version in a standardized manner.
Co-authored-by: Shane Frasier <jeremy.frasier@trio.dhs.gov>
Hooks updated with the `pre-commit autoupdate` command.

Note:
The `ansible-lint` hook is intentionally being held back on 4.3.7 because of
ongoing issues with the 5.x version and how we use Ansible (standalone Galaxy
roles).
With the release of pyenv v2.0.0 there is a breaking change around startup
logic that necessitates an update for our pyenv setup instructions. Also
add a statement about how to get configuration instructions from pyenv
itself.
…ctions

Update Instructions for Configuring pyenv
Copy link
Member

@mcdonnnj mcdonnnj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

My only suggestion is that for any examples using a version number we use the latest version for the repository's image.

README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
README.md Outdated Show resolved Hide resolved
@dav3r
Copy link
Member

dav3r commented Jun 14, 2021

My only suggestion is that for any examples using a version number we use the latest version for the repository's image.

The downside of that is every time we update the version, we need to update the README. Not saying I'm completely opposed to this, but I think that's why we went with 0.0.1 in the first place.

@mcdonnnj
Copy link
Member

My only suggestion is that for any examples using a version number we use the latest version for the repository's image.

The downside of that is every time we update the version, we need to update the README. Not saying I'm completely opposed to this, but I think that's why we went with 0.0.1 in the first place.

I think it's 0.0.1 because that's what is pulled in from the skeleton which only has a 0.0.1 release. I know it creates more work, but I think at the minimum the "how to run this" sections should reference the latest version. Those are the most likely to be directly copy-pasted by someone coming in to use the image.

@dav3r
Copy link
Member

dav3r commented Jun 14, 2021

My only suggestion is that for any examples using a version number we use the latest version for the repository's image.

The downside of that is every time we update the version, we need to update the README. Not saying I'm completely opposed to this, but I think that's why we went with 0.0.1 in the first place.

I think it's 0.0.1 because that's what is pulled in from the skeleton which only has a 0.0.1 release. I know it creates more work, but I think at the minimum the "how to run this" sections should reference the latest version. Those are the most likely to be directly copy-pasted by someone coming in to use the image.

I'm on board with this plan. To make life easier, we should modify bump_version.sh so that it updates all of the version numbers in the README when the finalize option is used.

@jsf9k
Copy link
Member

jsf9k commented Jun 14, 2021

My only suggestion is that for any examples using a version number we use the latest version for the repository's image.

The downside of that is every time we update the version, we need to update the README. Not saying I'm completely opposed to this, but I think that's why we went with 0.0.1 in the first place.

I think it's 0.0.1 because that's what is pulled in from the skeleton which only has a 0.0.1 release. I know it creates more work, but I think at the minimum the "how to run this" sections should reference the latest version. Those are the most likely to be directly copy-pasted by someone coming in to use the image.

  1. Can we simply use image-name:latest and avoid having to update the README?
  2. We should update the skeleton's README accordingly.

Co-authored-by: dav3r <david.redmin@trio.dhs.gov>
@dav3r
Copy link
Member

dav3r commented Jun 14, 2021

My only suggestion is that for any examples using a version number we use the latest version for the repository's image.

The downside of that is every time we update the version, we need to update the README. Not saying I'm completely opposed to this, but I think that's why we went with 0.0.1 in the first place.

I think it's 0.0.1 because that's what is pulled in from the skeleton which only has a 0.0.1 release. I know it creates more work, but I think at the minimum the "how to run this" sections should reference the latest version. Those are the most likely to be directly copy-pasted by someone coming in to use the image.

  1. Can we simply use image-name:latest and avoid having to update the README?
  2. We should update the skeleton's README accordingly.

That would be much simpler. It depends how much we want to encourage people to pull in a specific version. I'm OK with using latest here.

…iner

This change was discussed among @cisagov/team-ois here:
#60 (review)

Also correct git comments to use the imperative mood.
@jsf9k jsf9k requested review from dav3r and mcdonnnj June 16, 2021 16:55
README.md Outdated Show resolved Hide resolved
Co-authored-by: dav3r <david.redmin@trio.dhs.gov>
README.md Show resolved Hide resolved
This is to encourage future developers to add the appropriate
information should this Docker container ever expose any ports.

Co-authored-by: dav3r <david.redmin@trio.dhs.gov>
@jsf9k jsf9k requested a review from dav3r June 16, 2021 18:04
Copy link
Member

@dav3r dav3r left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rock on! 🎸

Copy link
Member

@mcdonnnj mcdonnnj left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM ✔ Thanks for working with my change requests!

@jsf9k jsf9k merged commit 82876bc into develop Jun 28, 2021
@jsf9k jsf9k deleted the lineage/skeleton branch June 28, 2021 18:06
cisagovbot pushed a commit that referenced this pull request Jul 22, 2021
…onfiguration

Standardize the Layout of the Lineage Configuration File
Sallenmoore pushed a commit to Sallenmoore/foundryvtt-docker that referenced this pull request Jun 18, 2023
…iner

This change was discussed among @cisagov/team-ois here:
cisagov/gatherer#60 (review)

Also correct git comments to use the imperative mood.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
upstream update This issue or pull request pulls in upstream updates
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants