Skip to main content



A monitoring.yml file is not yet required for Solus packages.

A monitoring.yml file is included in the Packages repository directory for every Solus package to enable automatic scanning for new releases and security advisories.

Checking for new releases is done by mapping the Solus package to an Anitya ID. Anitya is a Red Hat project, part of

Checking for security advisories (CVEs), is done by mapping the Solus package to a Common Platform Enumeration Name (CPE) from the National Vulnerability Database.

systemd as an example

Let's look at the monitoring.yml file for systemd as an example.

The systemd directory in the Packages repository looks like this:

├── monitoring.yml
├── package.yml
├── pspec_x86_64.xml
└── *lots of other files we can ignore*

The monitoring.yml looks like this:

id: 205088
# We only update to the n-1 stable release. So for now we're only interested in 252.x updates
- "253.*"
- vendor: systemd_project
product: systemd
- vendor: freedesktop
product: systemd
# A non-existent CVE added here as an example
- CVE-2022-55555

"releases" fields

Fields used to monitor for new versions.

FieldTypeRequired ?Description
idintegerYesAnitya ID from
ignorelist of regular expressionsNoList of regular expressions enclosed in quotes matching versions to ignore. Include a comment explaining the ignored versions.
rssURLNo, strongly encouragedURL for a releases RSS feed. If the only RSS feed you can find for a project is a general "news" feed, don't include the field. For GitHub projects, You can use the "tags" or "releases" feed:

Finding the Anitya ID

To find the Anitya ID, search by project name, then take the ID out of the URL for the correct search result.

For example, the correct systemd search result for us is systemd-stable with the URL, so we use 205088 in the id field

"security" fields

Fields used to monitor for security advisories (CVEs)

FieldTypeRequired ?Description
cpelistYesList of vendor:product pairs from a full CPE name. CVEs for a given project may be published under more than one CPE; include more than one if that is likely.
ignorelist of stringsNoList of specific CVE identifiers which can be ignored, including a comment explaining why each CVE was ignored. As an example, a CVE can be ignored if the Solus package includes a patch fixing the CVE.

What is a CPE Name?

A CPE Name is a structured naming scheme for information technology systems, primarily used to search for CVEs.

CPE names contain redundant information we can ignore, we are only interested in the vendor and the product.

For example, cpe:2.3:a:systemd_project:systemd is the CPE for the vendor systemd_project, and the product systemd.

Finding the CPE Name

The easiest way to search for CPE Names is with the following command; replacing systemd with your search term:

curl -s -X POST -d "{\"query\": [\"systemd\"]}" | jq .

Note this command uses the jq tool, which you may not have installed:

sudo eopkg it jq

If you have our helper functions installed, you can use the following command:

cpesearch systemd

Convert your search term to lower case and try variations on the search term if you get no results. The CPE search is not a "fuzzy" search.

The command returns the following:


Ignore the numerical ids, let's walk through the CPEs by vendor:

  • ubuntu_developers is for systemd patched by Ubuntu; we can ignore it
  • lennart_poettering is for the main systemd developer and is probably a bleeding edge vendor; ignore it
  • freedesktop is from and is a good candidate, so we add it
  • systemd_project is a good candidate, so we add it

No known CPE

If an established product hasn't had a security advisory in the past, it might not have a CPE.

In that case, include an empty security and cpe field with a comment in the following format:

# No known CPE, checked 20240123
cpe: ~

If you are unsure of what to do in this case, feel free to ask in the Solus Packaging Matrix room.