-
Notifications
You must be signed in to change notification settings - Fork 777
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vulnerability_alerts
set to true does not enable "Dependabot security updates"
#588
Comments
I just ran into this issue as well, though what I'm seeing is slightly different from what blt is reporting. Creating a new repository with Running Terraform again will show What makes it more interesting is that we enabled these settings on the organization level. So I would expect these settings to be enabled regardless from what I specify in Terraform (see screenshot below). I'm testing this with private repositories. |
the option states |
Correct. I'm testing this on a newly-created repository through this Terraform provider. So I expect the setting to be enabled. |
I am seeing the same. If you re-apply it will correct the bug-induced drift. Not ideal, but at least eventually consistent. |
I've looked at this a tiny bit and I believe that setting is applied by this API. There's a helper function to set that vendored into this project, but it's currently unreferenced. I haven't tested calling that yet. Perhaps it'd be appropriate to add this as a new feature with its own syntax, separate from vulnerability_alerts? I wonder how/if that'd conflict with organization settings to enable it by default. |
Hey @kfcampbell - I was poking around this one and it seems there's a missing "Check if automated security fixes are enabled for a repository" API, analogous to this one for vulnerability alerts. Any thoughts on that? I'm looking to contribute here (and also to google/go-github) but hit a wall on the GitHub API. Thanks. |
@will-bluem-olo that's a great question. The GET 404s, which is too bad. I've asked internally about it and I'll post again here if I learn something useful. |
Hi @kfcampbell - not sure if you ever found anything interesting here, but we'd still be interested in this functionality if it could be added to the API. |
Ahh thanks for reminding me! I did not hear anything back, and just bumped the question again. |
Alright, there's an internal issue created to track this and the team seems receptive. I'm uncertain of the priority but it seems low at this point. 🤞 🤞 🤞 they jump on it! |
@kfcampbell |
@bahag-klickst I unfortunately do not have any updates. |
With the latest Terraform 1.6.6 and GitHub provider 5.43.0, a |
@kfcampbell any progress to report? My team would also appreciate a fix for this. |
I wish I had an update, sorry! You might consider asking your GitHub rep (if you're an enterprise customer) or posting here asking for API coverage. |
Any updates on this so far? |
There is a separate resource to enable security. It needs to be combination of
|
Terraform Version
Affected Resource(s)
Please list the resources as a list, for example:
Terraform Configuration Files
Expected Behavior
When flagging
vulnerability_alerts
to true we expect the following to be enabled:Actual Behavior
When flagged
vulnerability_alerts
to true and only the following were enabled:Steps to Reproduce
github_repository
withvulnerability_alerts
to true.terraform apply
Important Factoids
Nothing unusual.
References
None.
The text was updated successfully, but these errors were encountered: