-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: simplify auto approve mechanism #17264
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
@@ -0,0 +1,17 @@ | ||||||||||||||||||||
# Apply various labels on PRs | ||||||||||||||||||||
|
||||||||||||||||||||
name: pr-labeler | ||||||||||||||||||||
on: | ||||||||||||||||||||
pull_request: | ||||||||||||||||||||
types: [ opened ] | ||||||||||||||||||||
|
||||||||||||||||||||
jobs: | ||||||||||||||||||||
auto-approve: | ||||||||||||||||||||
if: github.event.pull_request.user.login == 'dependabot[bot]' || github.event.pull_request.user.login == 'dependabot-preview[bot]' | ||||||||||||||||||||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I believe it should be possible to configure dependabot to add that label on its pull requests so this workflow shouldn't be required There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Its not possible because security related PR's are not coupled with any configuration file, and are controlled by the Dependabot security updates setting in the security analysis page. Note that dependabot right now is only explicitly configured to upgrade github actions: aws-cdk/.github/dependabot.yml Lines 5 to 13 in e26f5be
It does however still create security upgrade PR's: #16421 We decided to keep creating these PR's as a fallback to when our own dependency upgrade PR's is misbehaving. Unfortunately those security related PR's are not configurable, from what I could gather. |
||||||||||||||||||||
runs-on: ubuntu-latest | ||||||||||||||||||||
permissions: | ||||||||||||||||||||
pull-requests: write | ||||||||||||||||||||
steps: | ||||||||||||||||||||
- run: gh pr edit ${{ github.event.pull_request.number }} --add-label "pr/auto-approve" -R ${{ github.repository }} | ||||||||||||||||||||
env: | ||||||||||||||||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Note that this condition was removed because PR's created by
aws-cdk-automation
already contain thepr/auto-approve
label. For example:#17223