-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: lock library dependencies #192
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Changes LGTM, Snyk seems unhappy though.
I do wonder whether it would be worthwhile to have an additional CI step that tests against latest. We could even run that on a schedule. This way we could reliably distinguish between a dependency breaking and PR changes breaking. I don't want to blow up the scope for this change though.
@strassl-snyk great point, added it not to regress on the “surprise” end that we had so far covered as part of the existing CI. |
🎉 This PR is included in version 4.20.0 🎉 The release is available on: Your semantic-release bot 📦🚀 |
What does this PR do?
This PR locks code-client dependencies for install reproducibility purposes in the CI.
The current solution of not having a lock, doesn't address the issue that it's meant to solve, as CLI (or any other consumer) would result in a different dependency resolution than the one happening in the current library's CI pipeline.
Where should the reviewer start?
How should this be manually tested?
Any background context you want to provide?
Coffee read: https://snyk.io/blog/what-is-package-lock-json.
Discussions: https://snyk.slack.com/archives/C0135Q8LP61/p1689183248655649
Screenshots
Additional questions