Skip to content

fix(renovate): address unresolved review on PR #124#125

Merged
CybotTM merged 1 commit into
mainfrom
fix/renovate-config-review-feedback
May 23, 2026
Merged

fix(renovate): address unresolved review on PR #124#125
CybotTM merged 1 commit into
mainfrom
fix/renovate-config-review-feedback

Conversation

@CybotTM
Copy link
Copy Markdown
Member

@CybotTM CybotTM commented May 23, 2026

Why

PR #124 was merged with 2 unresolved gemini-code-assist threads on the netresearch/* packageRule. Both addressed here.

What changed

Reviewer point Fix
Description referenced past commit 309fca0 — config should focus on policy, not history Removed the incident-history sentence; kept the policy statement + trust-model contrast
enabled: false is over-restrictive and blocks future security alerts on these refs Dropped to pinDigests: false alone — Renovate still surfaces vulnerability alerts and (eventually) @vN tag migration, but never produces digest-pin PRs that violated org policy

Test plan

Related

Part of a session-wide audit triggered by the user: 3 of 11 merged PRs (this one, snipe-it-docker-compose-stack#15, snipe-it-docker-compose-stack#16) had been merged with unresolved bot-reviewer threads. New memory rule `feedback_never_merge_with_unresolved_threads` now requires the GraphQL unresolved-threads query before every gh pr merge. Equivalent follow-up PR for the snipe-it threads (which included a HIGH-severity token-leak) is netresearch/snipe-it-docker-compose-stack#17.

PR #124 was merged with two unresolved gemini-code-assist threads on
the new netresearch/* packageRule. Both addressed here:

1. (medium) Description referenced a specific past commit (309fca0).
   The reviewer's point: configuration descriptions should focus on
   the policy, not the incident. Removed the historical-context
   sentence; kept the policy + trust-model contrast.

2. (medium) `enabled: false` is heavier than needed and blocks
   future security advisories on these refs. Switched to relying on
   `pinDigests: false` alone — Renovate still surfaces vulnerability
   alerts and (eventually) the @vn tag migration, but never produces
   the digest-pin PRs that violated org policy.

The previous `enabled: false` was a belt-and-suspenders choice during
incident remediation. With `pinDigests: false` set, Renovate has no
reason to open PRs against `^netresearch/` github-actions refs in the
default-update path — the original symptom (Renovate digest-pinning
@main) is closed without sacrificing security-alert reachability.

Original threads on #124 replied-to and
resolved with a link to this PR.

Signed-off-by: Sebastian Mendel <info@sebastianmendel.de>
@sonarqubecloud
Copy link
Copy Markdown

Copy link
Copy Markdown

@github-actions github-actions Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Automated approval for maintainer PR

All automated quality gates passed. See SECURITY_CONTROLS.md for compensating controls.

Copy link
Copy Markdown

@gemini-code-assist gemini-code-assist Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request updates the renovate.json configuration to enable a rule that prevents digest pinning for first-party Netresearch reusable workflows by removing the "enabled": false property. It also refines the description of this rule to better reflect organizational policy. I have no feedback to provide as there were no review comments.

@CybotTM CybotTM merged commit 1125d15 into main May 23, 2026
20 checks passed
@CybotTM CybotTM deleted the fix/renovate-config-review-feedback branch May 23, 2026 05:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant