区分依赖关系安全性和版本更新拉的请求?

发布于 2025-01-26 06:45:59 字数 164 浏览 3 评论 0原文

我们已经在存储库中启用了依赖性的安全漏洞,但也只是将其设置为版本化更新。我的理解是,后者的配置选项也会影响前者,尤其是在元数据选项时,例如设置PR标签或标题。

鉴于这一点,是否有一种方法可以区分依赖性依赖性的PR与安全漏洞打开的PR与它打开的PR,因为它只是过时的,对于我们要优先考虑前者的情况而已?

We've had Dependabot enabled for security vulnerabilities on our repos for a while, but just set it up for versioning updates as well. My understanding is that the configuration options for the latter can affect the former as well, particularly when it comes to the metadata options, like setting PR labels or titles.

Given that, is there a way to distinguish between PRs that Dependabot opens for security vulnerabilities versus ones it opens because it's simply out of date, for situations where we want to prioritize the former?

如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。

扫码二维码加入Web技术交流群

发布评论

需要 登录 才能够评论, 你可以免费 注册 一个本站的账号。

评论(2

萌化 2025-02-02 06:46:00

我今天遇到了完全相同的问题。我尚未找到一种将安全性PR和过时的PR与PRS本身区分开的方法,但是我已经弄清楚了一些事情:

  1. Displyabot的安全警报对您在disterabot.yml 配置文件。限制听起来像是它的硬编码为10
  2. 如果要优先考虑安全警报,则可以从仓库的“警报”页面上更轻松地完成此操作:https://github.com/ [user]/[repo]/[repo]/security/dissectabot。如果Displyabot为其中一个安全更新打开了PR,则它将在警报的右侧有一点拉动请求图标并链接。
  3. 我认为,如果现有的PR地址为依赖关系,DiDeStabot将不会打开安全警报(在警报页面上会告诉您很多)。因此,如果您看到没有任何生成的拉请请求的安全警报,则可以尝试通过非安全性依赖性PRS来查看它们是否解决您的安全警报。
  4. 最后要尝试的一件事可能是将非安全性依赖依性限制在次要版本和补丁版本中。从理论上讲,这限制了可以解决安全问题的PR数量,但也很难验证和合并,这可能有助于确定优先级。

我希望这会有所帮助!我敢肯定我也缺少一些东西,所以我很想看到这个问题的其他答案。

I ran into the exact same problem today. I haven't yet found a way to distinguish between security PRs and out-of-date PRs from the PRs themselves, but I have figured a few things out:

  1. Dependabot's Security Alerts have an independent PR limit from ones you set in your dependabot.yml config file. That limit sounds like its hardcoded to 10.
  2. If you want to prioritize security alerts, you can more easily do that from the alerts page for your repo: https://github.com/[user]/[repo]/security/dependabot. If Dependabot opened a PR for one of those security updates, it'll have a little pull request icon and link on the right-hand-side of the alert.
  3. I think Dependabot won't open a security alert if an existing PR addresses that dependency (it'll tell you as much on the alert page). So if you see that you have security alerts without any generated pull requests, you could try and work through the non-security Dependabot PRs to see if they resolve your security alerts.
  4. One final thing to try could be to limit non-security Dependabot to minor and patch versions only. In theory, that'd limit the number of PRs that would both fix a security issue but also be difficult to validate and merge, which could help with prioritization.

I hope this helps! I'm sure I'm missing something as well, so I'll be keen to see other answers to this question.

梦中楼上月下 2025-02-02 06:46:00

使用 fetch-metadata 操作,您可以设置arter> arter> arter-lookup:true ,这应该启用与安全性PR相关时填充的一些输出。缺点:需要使用PAT(没有尝试过GitHub应用程序令牌)

Using the fetch-metadata action, you can set alert-lookup: true, which should enable some outputs that are populated when the associated PR is security-related. Downside: requires use of a PAT (haven't tried a GitHub App token)

~没有更多了~
我们使用 Cookies 和其他技术来定制您的体验包括您的登录状态等。通过阅读我们的 隐私政策 了解更多相关信息。 单击 接受 或继续使用网站,即表示您同意使用 Cookies 和您的相关数据。
原文