Dependabot requires private repo auth when it is unnecessary #9712
Labels
F: private-registries 💂♂️
Issues about using private registries with Dependabot; may be paired with an R: label.
F: security-updates 🔐
Issues specific to security updates
good first issue
L: python
T: bug 🐞
Something isn't working
Is there an existing issue for this?
Package ecosystem
pip
Package manager version
poetry 1.7.x
Language version
python 3.11
Manifest location and content before the Dependabot update
No response
dependabot.yml content
No response
Updated dependency
No response
What you expected to see, versus what you actually saw
When using poetry, dependabot cannot open PRs for vulnerable packages identified in
poetry.lock
because it is trying to install private packages that are not needed to update thepoetry.lock
file.For example, in GitHub, an error like this will be seen on the Dependabot vulnerability page.
However, locally I can do all that is needed to update the dependencies using the following pattern:
poetry update <vulnearble-dep> --lock
Here, the
--lock
will constrain the work to only updating the lock file, not needing to install all the other dependencies.Native package manager behavior
Images of the diff or a link to the PR, issue, or logs
No response
Smallest manifest that reproduces the issue
No response
The text was updated successfully, but these errors were encountered: