| ▲ | swatcoder 9 hours ago | ||||||||||||||||||||||||||||||||||
The point is to apply a cooldown to your "dumb" and unaccountable automation, not to your own professional judgment as an engineer. If there's a bugfix or security patch that applies to how your application uses the dependency, then you review the changes, manually update your version if you feel comfortable with those changes, and accept responsibility for the intervention if it turns out you made a mistake and rushed in some malicious code. Meanwhile, most of the time, most changes pushed to dependencies are not even in the execution path of any given application that integration with them, and so don't need to be rushed in. And most others are "fixes" for issues that were apparently not presenting an eminent test failure or support crisis for your users and don't warrant being rushed in. There's not really a downside here, for any software that's actually being actively maintained by a responsible engineer. | |||||||||||||||||||||||||||||||||||
| ▲ | jcalvinowens 9 hours ago | parent [-] | ||||||||||||||||||||||||||||||||||
You're not thinking about the system dependencies. > Meanwhile, most of the time, most changes pushed to dependencies are not even in the execution path of any given application that integration with them Sorry, this is really ignorant. You don't appreciate how much churn their is in things like the kernel and glibc, even in stable branches. | |||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||