Skip to content

[FEAT]: Support managing grouped security updates for Dependabot #3334

@raz-drift

Description

@raz-drift

Describe the need

GitHub allows enabling Grouped security updates on a per-repository basis (Settings > Advanced Security > Grouped security updates). When enabled, Dependabot consolidates multiple security update alerts into a single pull request per package manager and directory, reducing PR noise.

Currently there is no Terraform resource or attribute to manage this setting. It can only be toggled through the GitHub UI. A previous request (#2444) was closed as not planned, but the need remains.

A new resource (similar to github_repository_dependabot_security_updates) would allow teams to enforce this setting via IaC:

resource "github_repository_dependabot_grouped_security_updates" "example" {
  repository = github_repository.my_repo.name
  enabled    = true
}

Why this matters

  • Organizations managing security settings as Infrastructure as Code have no way to enforce or detect drift on this setting
  • The GitHub REST API does not expose a per-repository endpoint to read or write grouped security update status, so even workarounds using null_resource + API calls are not possible
  • Without grouping, repositories with many dependencies can receive dozens of individual security PRs, creating significant review overhead
  • The org-level code security configurations API (/orgs/{org}/code-security/configurations) also does not include a field for this setting

Difference from #2444

Issue #2444 was closed as not planned. This issue provides additional context on why the feature is needed — specifically that there is no API-level workaround and that the org-level security configurations API also lacks this capability, making it impossible to manage at any layer of automation.

Workaround

None. The setting can only be managed through the GitHub UI. There is no REST API endpoint to read or write it at the repository level or organization level.

SDK Version

N/A

API Version

N/A

Relevant log output

N/A

Code of Conduct

  • I agree to follow this project's Code of Conduct

Metadata

Metadata

Assignees

No one assigned

    Labels

    Status: BlockedSome technical or requirement is blocking the issueStatus: TriageThis is being looked at and prioritizedType: FeatureNew feature or request

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions