-
Notifications
You must be signed in to change notification settings - Fork 281
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automated mechanism to update library versions across all repos under OpenSearch project #2689
Comments
My thoughts
Adding @dblock |
@prudhvigodithi This looks like a clean initial approach for all OpenSearch plugins. But, we'll need a similar approach for OpenSearch dashboard plugins. Instead of gradle there, we can have node/yarn scripts or use npm-check-updates
|
It would be awesome if we can have this automated feature built into our current infra (even partially would save us a bunch of efforts). Some thoughts / wonderings :
|
And agreed with @ps48, we might need different approaches for OpenSeach v.s. OpenSearch Dashboards |
Not sure if https://docs.github.com/en/code-security/dependabot/dependabot-security-updates/configuring-dependabot-security-updates this dependabot offered by github would help in some way as well. |
I believe depandabot is already doing what is asked for here. Is there other than that, that we are trying to achieve? |
@gaiksaya I dont think depandabot works as expected all the time. I haven't seen it creating automated PR's for affected libraries in multiple repos and it still had multiple open issues. Reference: opensearch-project/OpenSearch#3782 |
Thanks for bringing this up. I agree with @gaiksaya that this is in theory what dependabot should be doing for us, so perhaps worth looking into why it's failing in some cases rather than building something else on the side? |
I see this way, there are chances sometimes we have to bump a library version that might not be identified as CVE (CVE sources are vast) by dependent bot, its worth to have a mechanism that can be done across for all plugins consistently. Another scenario I see is opensearch-project/OpenSearch#4556, jackson and snakeyml dependencies are updated in core, in order for the plugins to be consistent and align with core this mechanism would be useful. |
Dependabot doesn't scan dependencies present in |
@bbarani Dependabot works to upgrade the dependencies for multiple package ecosystems by scanning the dependency manifests. For example, in case of gradle, it scans the In order to allow Dependabot to upgrade dependencies, a On top of Dependabot, we have also added a workflow which performs some required actions on a PR commit like Adding Dependabot to all plugins will help keep the dependencies up-to-date and will also keep versions consistent across them. Are there any specific plugin repos that you have seen issues with for Dependabot integration? |
@VachaShah Apologize for delay in my response. I have noticed multiple times when Dependabot didn't work as expected mainly due to the nature of the change log. For Example: CVE-2022-42003 has been fixed in Jackson 2.13.4.2 but its not yet updated across all the external sources that dependabot uses to track so we would need to wait until it reports it on our repo rather than proactively upgrading to patched version across all repos now since we know the fixed version. Also, as mentioned by @owaiskazi19 Dependabot doesn't scan dependencies present in version.properties file present in OpenSearch core repo - opensearch-project/OpenSearch#3782 so we can use this utility as a general purpose utility not targeted around remediating CVE but also to upgrade dependency to a specific version across multiple repos. |
Is your feature request related to a problem? Please describe
We are seeing CVE's and vulnerabilities across multiple repos under OpenSearch project that require upgrading / downgrading of the impacted libraries. This is currently a manual process that involves scanning all repositories and updating the reference of impacted libraries.
Describe the solution you'd like
Automated workflow to scan and raise the PR with appropriate versions of the upgraded library versions across all the repos.
Describe alternatives you've considered
No response
Additional context
No response
The text was updated successfully, but these errors were encountered: