Hi Jan,

On 28.07.2025 00:11, Jan Høydahl wrote:
> Dependabot is a public bot and deems it unsafe to execute custom
> scripts, so it is not supported. That’s why we run our own bot without
> such restrictions.

In Apache Logging, we've managed to work around this limitation by using
GitHub Actions on Dependabot PRs to tailor them to our needs: for
example, by automatically adding changelog entries for each update. I
believe a similar setup could be adapted for Apache Solr as well.

We currently have a workflow that runs on `pull_request_target` (yes,
not ideal), but we've also developed a new prototype [1] with a safer
and more flexible design:

- Metadata gathering workflow: A wrapper around
`dependabot/fetch-metadata` that runs on `pull_request`. It supports
grouped updates and might even be shareable across ASF projects. It also
exposes valuable metadata, including information on fixed security
vulnerabilities.
- Privileged workflow: Uses the gathered metadata to perform actions
needed to align the PR with project requirements.

For Solr, this could include:
- Opening a corresponding JIRA issue
- Renaming the Dependabot PR
- Applying Gradle-specific modifications directly to the PR

One clear advantage of Dependabot is that projects don't need to
maintain their own GitHub App or bot infrastructure. I'm currently
arranging a meeting with the Dependabot team, happy to schedule it for
when you're back from vacation if you're interested.


> Wrt separate dep PRs for 9.x, I have submitted fixes to renovatebot
> to support this even for forked mode. Need to test it. But currently on
> holiday so won’t be for another couple weeks.

Enjoy your vacation!

While I slightly prefer MIT-licensed Dependabot over AGPL-licensed
Renovatebot, I'll definitely take a closer look, especially to see how
it handles security updates.

Speaking of which, I was recently pointed to SecObserve [2], a
lesser-known but quite capable Python-based vulnerability management
system. It has broad integration support and can be configured to
respond directly to GitHub Dependabot Alerts, avoiding the need to
surface security updates in public PRs.

To remove *publicly disclosed* vulnerabilities in the dependencies of
Apache Solr, secrecy is not an issue, but it is a choice the PMC can
always make.

Piotr

References:
[1] https://github.com/apache/logging-parent/pull/419
[2] https://github.com/MaibornWolff/SecObserve

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@solr.apache.org
For additional commands, e-mail: dev-h...@solr.apache.org

Reply via email to