-
Notifications
You must be signed in to change notification settings - Fork 9.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Let dapendabot to auto-update docker for release 3.4&3.5. #17613
Let dapendabot to auto-update docker for release 3.4&3.5. #17613
Conversation
Hi @liangyuanpeng. Thanks for your PR. I'm waiting for a etcd-io member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/cc @jmhbnz |
/ok-to-test |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM - Thanks @liangyuanpeng
Based on my understanding of target-branch
dependabot will scan main
, detect an update is possible, and then raise a pull request against all three branches which seems like a good approach.
If dependabot is scanning main
but opening pr against release-3.5
I am not sure how it will figure out that there are actually 4x Dockerfiles in release-3.5
etc to update but lets give it a try and see what happens.
@jmhbnz Thanks for your qulick reply. check: |
Brilliant, those pr's look perfect, thanks! |
I am not sure whether or not it's a good practice to always automatically bump to the latest version for the stable releases. Probably not. Usually we only bump dependencies for stable releases when there are any CVEs or critical/major bug fixes. The same for base image? We can let this PR in, but I think we do need to figure out a best practice to bump the base image for the stable releases. |
Good question - Historically we always used |
No strong opinion. A temporary compromised solution I can think of is to bump the base image version for stable releases monthly instead of weekly, at least we have longer time to verify the base image in workflow before each patch releases. |
Signed-off-by: Lan Liang <gcslyp@gmail.com>
178f409
to
5620268
Compare
Make sense, this PR #17600 have not any CVE problem in the base image.
Updated. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
Thanks
Please read https://github.com/etcd-io/etcd/blob/main/CONTRIBUTING.md#contribution-flow.
Now we will automatically upgrade the docker image in the main branch, let's treat release-3.4 and release-3.5 similarly
Releated: