Skip to content

kirillcoso/dependabot-azure-devops

 
 

Repository files navigation

Dependabot for Azure DevOps

This repository contains tools for updating dependencies in Azure DevOps repositories using Dependabot.

GitHub Workflow Status Release license

In this repository you'll find:

  1. Dependabot updater in Ruby. See docs.
  2. Dockerfile and build/image for running the updater via Docker here.
  3. Dependabot server in .NET/C#. See docs.
  4. Azure DevOps Extension and source. See docs.

The hosted version is available to sponsors (most, but not all). It includes hustle free runs where the infrastructure is maintained for you. Much like the GitHub hosted version. Alternatively, you can run and host your own server. Once you sponsor, you can send out an email to an maintainer or wait till they reach out. This is meant to ease the burden until GitHub/Azure/Microsoft can get it working natively (which could also be never) and hopefully for free.

Using a configuration file

Similar to the GitHub native version where you add a .azuredevops/dependabot.yml or .github/dependabot.yml file, this repository adds support for the same official configuration options via a file located at .azuredevops/dependabot.yml or .github/dependabot.yml. This support is only available in the Azure DevOps extension and the managed version. However, the extension does not currently support automatically picking up the file, a pipeline is still required. See docs.

We are well aware that ignore conditions are not explicitly passed and passed on from the extension/server to the container. It is intentional. The ruby script in the docker container does it automatically. If you are having issues, search for related issues such as tinglesoftware#582 before creating a new issue. You can also test against various reproductions such as https://dev.azure.com/tingle/dependabot/_git/repro-582

Credentials for private registries and feeds

Besides accessing the repository only, sometimes private feeds/registries may need to be accessed. For example a private NuGet feed or a company internal docker registry.

Adding configuration options for private registries is setup in dependabot.yml according to the dependabot description.

Example:

version: 2
registries:
  my-Extern@Release:
    type: nuget-feed
    url: https://dev.azure.com/organization1/_packaging/my-Extern@Release/nuget/v3/index.json
    token: PAT:${{MY_DEPENDABOT_ADO_PAT}}
  my-analyzers:
    type: nuget-feed
    url: https://dev.azure.com/organization2/_packaging/my-analyzers/nuget/v3/index.json
    token: PAT:${{MY_OTHER_PAT}}
  artifactory:
    type: nuget-feed
    url: https://artifactory.com/api/nuget/v3/myfeed
    token: PAT:${{MY_ARTIFACTORY_PAT}}
  telerik:
    type: nuget-feed
    url: https://nuget.telerik.com/v3/index.json
    username: ${{MY_TELERIK_USERNAME}}
    password: ${{MY_TELERIK_PASSWORD}}
    token: ${{MY_TELERIK_USERNAME}}:${{MY_TELERIK_PASSWORD}}
updates:
  ...

Note:

  1. ${{VARIABLE_NAME}} notation is used liked described here BUT the values will be used from Environment Variables in the pipeline/environment. Template variables are not supported for this replacement. Replacement only works for values considered secret in the registries section i.e. username, password, token, and key

  2. When using an Azure DevOps Artifact feed, only the token property is required. The token notation should be PAT:${{VARIABLE_NAME}} otherwise the wrong authentication mechanism is used by Dependabot, see here for more details. When working with Azure DevOps Artifacts, some extra permission steps need to be done:

    1. The PAT should have Packaging Read permission.
    2. The user owning the PAT must be granted permissions to access the feed either directly or via a group. An easy way for this is to give Contributor permissions the [{project_name}]\Contributors group under the Feed Settings -> Permissions page. The page has the url format: https://dev.azure.com/{organization}/{project}/_packaging?_a=settings&feed={feed-name}&view=permissions.
  3. When using a NuGet package server secured with basic auth, the username, password, and token properties are all required. The token notation should be ${{USERNAME}}:${{PASSWORD}}, see here for more details.

  4. When your project contains a nuget.config file with custom package source configuration, the key property is required for each nuget-feed registry. The key must match between dependabot.yml and nuget.config otherwise the package source will be duplicated, package source mappings will be ignored, and auth errors will occur during dependency discovery.

    If your nuget.config looks like this:

     <?xml version="1.0" encoding="utf-8"?>
     <configuration>
       <packageSources>
         <clear />
         <add key="nuget.org" value="https://api.nuget.org/v3/index.json" />
         <add key="my-organisation1-nuget" value="https://dev.azure.com/my-organization/_packaging/my-nuget-feed/nuget/v3/index.json" />
       </packageSources>
       <packageSourceMapping>
         <packageSource key="nuget.org">
           <package pattern="*" />
         </packageSource>
         <packageSource key="my-organisation-nuget">
           <package pattern="Organisation.*" />
         </packageSource>
       </packageSourceMapping>
     </configuration>

    Then your dependabot.yml registry should look like this:

    version: 2
    registries:
      my-org:
        type: nuget-feed
        key: my-organisation1-nuget
        url: https://dev.azure.com/my-organization/_packaging/my-nuget-feed/nuget/v3/index.json
        token: PAT:${{MY_DEPENDABOT_ADO_PAT}}

Security Advisories, Vulnerabilities, and Updates

Security-only updates ia a mechanism to only create pull requests for dependencies with vulnerabilities by updating them to the earliest available non-vulnerable version. Security updates are supported in the same way as the GitHub-hosted version. In addition, you can provide extra advisories, such as those for an internal dependency, in a JSON file via the securityAdvisoriesFile input e.g. securityAdvisoriesFile: '$(Pipeline.Workspace)/advisories.json'. A file example is available here.

A GitHub access token with public_repo access is required to perform the GitHub GraphQL for securityVulnerabilities.

Development Guide

If you'd like to contribute to the project or just run it locally, view our development guides for:

Acknowledgements

The work in this repository is based on inspired and occasionally guided by some predecessors in the same area:

  1. Official Script support: code
  2. Andrew Craven's work: blog, code
  3. Chris' work: code
  4. andrcun's work on GitLab: code
  5. WeWork's work for GitLab: code

Issues & Comments

Please leave all comments, bugs, requests, and issues on the Issues page. We'll respond to your request ASAP!

About

Tools for updating dependencies in Azure DevOps repositories using https://dependabot.com

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Languages

  • Ruby 56.3%
  • C# 32.4%
  • TypeScript 7.7%
  • Bicep 1.9%
  • PowerShell 1.3%
  • Dockerfile 0.3%
  • Shell 0.1%