Skip to main content

Enabling Dependabot for your enterprise

You can allow users of 您的 GitHub Enterprise Server 实例 to find and fix vulnerabilities in code dependencies by enabling Dependabot 警报 and Dependabot 更新.

Enterprise owners can enable Dependabot.

About Dependabot for GitHub Enterprise Server

Dependabot helps users of 您的 GitHub Enterprise Server 实例 find and fix vulnerabilities in their dependencies. You can enable Dependabot 警报 to notify users about vulnerable dependencies and Dependabot 更新 to fix the vulnerabilities and keep dependencies updated to the latest version.

About Dependabot 警报

With Dependabot 警报, GitHub identifies insecure dependencies in repositories and creates alerts on 您的 GitHub Enterprise Server 实例, using data from the GitHub Advisory Database and the dependency graph service.

We add advisories to the GitHub Advisory Database from the following sources:

After you enable Dependabot 警报 for your enterprise, vulnerability data is synced from the GitHub Advisory Database to your instance once every hour. Only GitHub-reviewed advisories are synchronized. For more information about advisory data, see "Browsing security advisories in the GitHub Advisory Database" in the GitHub.com documentation.

You can also choose to manually sync vulnerability data at any time. For more information, see "Viewing the vulnerability data for your enterprise."

Note: When you enable Dependabot 警报, no code or information about code from 您的 GitHub Enterprise Server 实例 is uploaded to GitHub.com.

When 您的 GitHub Enterprise Server 实例 receives information about a vulnerability, it identifies repositories in 您的 GitHub Enterprise Server 实例 that use the affected version of the dependency and generates Dependabot 警报. You can choose whether or not to notify users automatically about new Dependabot 警报.

For repositories with Dependabot 警报 enabled, scanning is triggered on any push to the default branch that contains a manifest file or lock file. Additionally, when a new vulnerability record is added to 您的 GitHub Enterprise Server 实例, GitHub Enterprise Server scans all existing repositories on 您的 GitHub Enterprise Server 实例 and generates alerts for any repository that is vulnerable. For more information, see "About Dependabot 警报."

About Dependabot 更新

注意: Dependabot 安全和版本更新目前处于私密测试阶段,可能会发生更改。 请联系您的客户管理团队,以获取有关启用 Dependabot 更新的说明。

After you enable Dependabot 警报, you can choose to enable Dependabot 更新. When Dependabot 更新 are enabled for 您的 GitHub Enterprise Server 实例, users can configure repositories so that their dependencies are updated and kept secure automatically.

Note: Dependabot 更新 on GitHub Enterprise Server requires GitHub Actions with self-hosted runners.

By default, GitHub Actions runners used by Dependabot need access to the internet, to download updated packages from upstream package managers. For Dependabot 更新 powered by GitHub Connect, internet access provides your runners with a token that allows access to dependencies and advisories hosted on GitHub.com.

With Dependabot 更新, GitHub automatically creates pull requests to update dependencies in two ways.

  • Dependabot 版本更新: Users add a Dependabot configuration file to the repository to enable Dependabot to create pull requests when a new version of a tracked dependency is released. For more information, see "About Dependabot 版本更新."
  • Dependabot 安全更新: Users toggle a repository setting to enable Dependabot to create pull requests when GitHub detects a vulnerability in one of the dependencies of the dependency graph for the repository. For more information, see "About Dependabot 警报" and "About Dependabot 安全更新."

Enabling Dependabot 警报

Before you can enable Dependabot 警报:

  1. 在 GitHub Enterprise Server 的右上角,单击您的个人资料照片,然后单击 Enterprise settings(Enterprise 设置)GitHub Enterprise Server 上个人资料照片下拉菜单中的"Enterprise settings(企业设置)"

  2. 在企业帐户边栏中,单击 GitHub Connect企业帐户边栏中的 GitHub Connect 选项卡

  3. Under "Repositories can be scanned for vulnerabilities", select the drop-down menu and click Enabled without notifications. Optionally, to enable alerts with notifications, click Enabled with notifications. Drop-down menu to enable scanning repositories for vulnerabilities

    Tip: We recommend configuring Dependabot 警报 without notifications for the first few days to avoid an overload of emails. After a few days, you can enable notifications to receive Dependabot 警报 as usual.

When you enable Dependabot 警报, you should consider also setting up GitHub Actions for Dependabot 安全更新. This feature allows developers to fix vulnerabilities in their dependencies. For more information, see "Managing self-hosted runners for Dependabot 更新 on your enterprise."

If you need enhanced security, we recommend configuring Dependabot to use private registries. For more information, see "Managing encrypted secrets for Dependabot."