Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump alpine from 3.19 to 3.20 #1

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Oct 2, 2024

Bumps alpine from 3.19 to 3.20.

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps alpine from 3.19 to 3.20.

---
updated-dependencies:
- dependency-name: alpine
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file docker Pull requests that update Docker code labels Oct 2, 2024
Copy link

@sourcery-ai sourcery-ai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have skipped reviewing this pull request. Here's why:

  • It seems to have been created by a bot (hey, dependabot[bot]!). We assume it knows what it's doing!
  • We don't review packaging changes - Let us know if you'd like us to change this.

Copy link

PR-Agent was enabled for this repository. To continue using it, please link your git user with your CodiumAI identity here.

CI Failure Feedback 🧐

Action: main / auto-merge / auto-merge

Failed stage: Run dependabot/[email protected] [❌]

Failure summary:

The action failed due to an authentication error:

  • The error message "Api Error: (401) Bad credentials" indicates that the GitHub token provided is
    invalid or lacks the necessary permissions.
  • This caused the dependabot/[email protected] action to fail because it could not authenticate
    with the GitHub API.

  • Relevant error logs:
    1:  ##[group]Operating System
    2:  Ubuntu
    ...
    
    36:  Uses: khulnasoft/actions/.github/workflows/job-auto-merge.yml@refs/heads/master (9b7ac84c3944befe25fa7e2bbca2b28231ae69f6)
    37:  Complete job name: main / auto-merge / auto-merge
    38:  ##[group]Run dependabot/[email protected]
    39:  with:
    40:  github-token: ***
    41:  skip-commit-verification: false
    42:  skip-verification: false
    43:  ##[endgroup]
    44:  ##[error]Api Error: (401) Bad credentials
    

    ✨ CI feedback usage guide:

    The CI feedback tool (/checks) automatically triggers when a PR has a failed check.
    The tool analyzes the failed checks and provides several feedbacks:

    • Failed stage
    • Failed test name
    • Failure summary
    • Relevant error logs

    In addition to being automatically triggered, the tool can also be invoked manually by commenting on a PR:

    /checks "https://github.com/{repo_name}/actions/runs/{run_number}/job/{job_number}"
    

    where {repo_name} is the name of the repository, {run_number} is the run number of the failed check, and {job_number} is the job number of the failed check.

    Configuration options

    • enable_auto_checks_feedback - if set to true, the tool will automatically provide feedback when a check is failed. Default is true.
    • excluded_checks_list - a list of checks to exclude from the feedback, for example: ["check1", "check2"]. Default is an empty list.
    • enable_help_text - if set to true, the tool will provide a help message with the feedback. Default is true.
    • persistent_comment - if set to true, the tool will overwrite a previous checks comment with the new feedback. Default is true.
    • final_update_message - if persistent_comment is true and updating a previous checks message, the tool will also create a new message: "Persistent checks updated to latest commit". Default is true.

    See more information about the checks tool in the docs.

    Copy link

    github-actions bot commented Oct 2, 2024

    🦙 MegaLinter status: ✅ SUCCESS

    Descriptor Linter Files Fixed Errors Elapsed time
    ✅ DOCKERFILE hadolint 1 0 0.08s
    ✅ EDITORCONFIG editorconfig-checker 1 0 0.01s
    ✅ REPOSITORY checkov yes no 9.67s
    ✅ REPOSITORY gitleaks yes no 0.08s
    ✅ REPOSITORY git_diff yes no 0.0s
    ✅ REPOSITORY grype yes no 8.59s
    ✅ REPOSITORY secretlint yes no 0.74s
    ✅ REPOSITORY trivy-sbom yes no 0.97s

    See detailed report in MegaLinter reports
    Set VALIDATE_ALL_CODEBASE: true in mega-linter.yml to validate all sources, not only the diff

    MegaLinter is graciously provided by OX Security

    Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
    Labels
    dependencies Pull requests that update a dependency file docker Pull requests that update Docker code
    Projects
    None yet
    Development

    Successfully merging this pull request may close these issues.

    0 participants