Skip to content

chore: auto approve dependabot#16777

Merged
mergify[bot] merged 2 commits intomasterfrom
epolon/auto-approve-dependabot
Oct 13, 2021
Merged

chore: auto approve dependabot#16777
mergify[bot] merged 2 commits intomasterfrom
epolon/auto-approve-dependabot

Conversation

@iliapolo
Copy link
Copy Markdown
Contributor

@iliapolo iliapolo commented Oct 4, 2021

On occasion, dependabot will create PR's that fix security vulnerabilities. This is regardless of whether we have a dependabot configuration in the repo.

See "Dependabot security updates" in https://github.com/aws/aws-cdk/settings/security_analysis

Right now, these PR's are not getting auto-approved because they don't container the auto-approve label. Unfortunately these PR are not configurable and we cannot add this label.

As discussed in the team, we decided to forgo the label requirement for these PR and allow dependabot to be merged given all checks pass.

This PR changes the auto approve conditions to allow either one of:

  • PR comes from dependabot[bot] user.
  • PR comes from the dependabot-preview[bot] user.
  • PR comes from the aws-cdk-automation user AND PR has the auto-approve label.

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license

@gitpod-io
Copy link
Copy Markdown

gitpod-io bot commented Oct 4, 2021

@iliapolo iliapolo requested a review from a team October 4, 2021 09:52
@mergify mergify bot added the contribution/core This is a PR that came from AWS. label Oct 4, 2021
mergify bot pushed a commit to aws/jsii that referenced this pull request Oct 4, 2021
See aws/aws-cdk#16777 (comment)

---

By submitting this pull request, I confirm that my contribution is made under the terms of the [Apache 2.0 license].

[Apache 2.0 license]: https://www.apache.org/licenses/LICENSE-2.0
@mergify
Copy link
Copy Markdown
Contributor

mergify bot commented Oct 13, 2021

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@mergify mergify bot merged commit 7c73880 into master Oct 13, 2021
@mergify mergify bot deleted the epolon/auto-approve-dependabot branch October 13, 2021 12:13
@mergify
Copy link
Copy Markdown
Contributor

mergify bot commented Oct 13, 2021

Thank you for contributing! Your pull request will be updated from master and then merged automatically (do not update manually, and be sure to allow changes to be pushed to your fork).

@aws-cdk-automation
Copy link
Copy Markdown
Collaborator

AWS CodeBuild CI Report

  • CodeBuild project: AutoBuildProject89A8053A-LhjRyN9kxr8o
  • Commit ID: 4b31f86
  • Result: SUCCEEDED
  • Build Logs (available for 30 days)

Powered by github-codebuild-logs, available on the AWS Serverless Application Repository

TikiTDO pushed a commit to TikiTDO/aws-cdk that referenced this pull request Feb 21, 2022
On occasion, dependabot will create PR's that fix security vulnerabilities. This is regardless of whether we have a dependabot configuration in the repo.

> See "Dependabot security updates" in https://github.com/aws/aws-cdk/settings/security_analysis

Right now, these PR's are not getting auto-approved because they don't container the `auto-approve` label. Unfortunately these PR are not configurable and we cannot add this label. 

As discussed in the team, we decided to forgo the label requirement for these PR and allow dependabot to be merged given all checks pass.

This PR changes the auto approve conditions to allow either one of:

- PR comes from `dependabot[bot]` user.
- PR comes from the `dependabot-preview[bot]` user.
- PR comes from the `aws-cdk-automation` user **AND** PR has the `auto-approve` label.

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

contribution/core This is a PR that came from AWS.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants