Skip to content

Commit a7a4237

Browse files
committed
updating screenshots for dependabot with reusable workflows post
1 parent 512601a commit a7a4237

12 files changed

+7
-7
lines changed

_posts/2023-03-15-dependabot-reusable-workflows.md

+7-7
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,12 @@ image:
1010
path: dependabot-pr.png
1111
width: 100%
1212
height: 100%
13-
alt: A Dependabot-created pull request for a reusable workflow update version update
13+
alt: A Dependabot-created pull request for a reusable workflow version update
1414
---
1515

1616
## Overview
1717

18-
We already can use [Dependabot Version Updates](https://docs.github.com/en/code-security/dependabot/dependabot-version-updates/about-dependabot-version-updates) for keeping marketplace actions (in addition to custom internal/private actions) up to date (see my [post](/posts/github-dependabot-for-actions/)) for more details). However, as of [March 2023](https://github.blog/changelog/2023-03-13-dependabot-updates-support-reusable-workflows-for-github-actions/), we can use Dependabot for keeping Reusable Workflows up to date as well.
18+
We already can use [Dependabot Version Updates](https://docs.github.com/en/code-security/dependabot/dependabot-version-updates/about-dependabot-version-updates) for keeping marketplace actions (in addition to custom internal/private actions) up to date (see my [post](/posts/github-dependabot-for-actions/)) for more details). However, as of [March 2023](https://github.blog/changelog/2023-03-13-dependabot-updates-support-reusable-workflows-for-github-actions/), we can use Dependabot for keeping Reusable Workflows up to date as well.
1919

2020
## Configuration
2121

@@ -26,12 +26,12 @@ My previous [post](https://github.blog/changelog/2023-03-13-dependabot-updates-s
2626
1. When Dependabot can't access a private repository, the logs allow you to [grant authorization to Dependabot to access your repository](https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization#allowing-dependabot-to-access-private-dependencies)
2727
- Alternatively, add it in the organization settings --> Code security and analysis --> [Grant Dependabot access to private repositories](https://docs.github.com/en/organizations/keeping-your-organization-secure/managing-security-settings-for-your-organization/managing-security-and-analysis-settings-for-your-organization#allowing-dependabot-to-access-private-dependencies)
2828
- This setting requires organization admin permissions to access
29-
- Unfortunately, there isn't an API to automate this process
30-
2. If you plan to create a large number repositories that you want to be a source for Dependabot, creating a [Dependabot Secret](https://docs.github.com/en/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot#storing-credentials-for-dependabot-to-use) (preferably as an org-level Dependabot secret) with the value of a [personal access token](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token) (preferably a [fine-grained token](https://github.blog/2022-10-18-introducing-fine-grained-personal-access-tokens-for-github/)) that has read-access to the required repositories would be preferred
29+
- Unfortunately, there isn't an API to automate this process, it has to be done within the UI
30+
2. If you plan to create a large number repositories that you want to be a source for Dependabot, creating a [Dependabot secret](https://docs.github.com/en/code-security/dependabot/working-with-dependabot/configuring-access-to-private-registries-for-dependabot#storing-credentials-for-dependabot-to-use) (preferably as an org-level Dependabot secret) with the value of a [personal access token](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token) (preferably a [fine-grained token](https://github.blog/2022-10-18-introducing-fine-grained-personal-access-tokens-for-github/)) that has read-access to the required repositories would be preferred
3131
- I don't find it as detrimental to use a personal access token as a Dependabot secret since Dependabot secrets can *only be access by Dependabot*; you can't use a GitHub Actions workflow to expose the secret accidentally/intentionally
32-
- The only concern would be updating the token if it expires or is revoked
32+
- The only concern would be updating the token if it expires, is revoked, or the original author doesn't have access to the repo(s) anymore
3333

34-
If you only have a few, and rarely increasing set of repositories for custom actions / reusable workflows, I recommend the first approach. If you have a large number of repositories and/or are creating many new repositories for actions / reusable workflows, the second option scales better.
34+
If you only have a few, and rarely increasing set of repositories for custom actions / reusable workflows, I recommend the first approach. If you have a large number of repositories and/or are creating many new repositories for actions / reusable workflows, the **second option scales better**.
3535

3636
### YML
3737

@@ -99,4 +99,4 @@ _Example of a pull request for reusable workflow created by Dependabot_
9999

100100
## Summary
101101

102-
Now we can create and properly version reusable workflows AND have our downstream consumers be automatically notified of version updates. 🎉
102+
Now we can create and properly version reusable workflows AND have our downstream users automatically be notified of version updates. This helps a ton in making it front and center for developers that there's an update they need to look at! 🎉
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)