Jeff Widman
Jeff Widman
This is a great idea! Unfortunately, implementing that will take a bit of work--at least for the Dependabot service that GitHub runs, so not something we're likely to get to...
For now as a temp workaround, I'm doing: ```shell $ pip3 install --break-system-packages virtualenvwrapper ``` But while that works, I actually think it'd be slightly cleaner to be able to...
Related to (but not a duplicate of) https://github.com/dependabot/dependabot-core/issues/3651
Also, I don't use Windows, so it'd be great if someone who does could test this to get a second pair of 👀 before merging...
We've updated this repo's README with a [deprecation note](https://github.com/dependabot/dependabot-script?tab=readme-ov-file#this-repo-is-deprecated) which points to a [new example repo](https://github.com/dependabot/example-cli-usage/) we setup to demonstrate how to self-host Dependabot using the [Dependabot CLI](https://github.com/dependabot/cli). As a...
Also, great description of the underlying problem... thanks for including the screenshots and code notes, really helped me grok it.
The problem you're trying to solve makes complete sense... essentially we want the capability to filter out Security errors. But I think it might be more productive to have some...
> going a level further, additional meta tag regarding which dependency failed the update can be included. I like this idea, (regardless of how to implement) because I consistently see...
@sachin-sandhu can this be closed as your alternative approach is now merged? * https://github.com/dependabot/dependabot-core/pull/10120
@mctofu any suggestions on next steps here?