Skip to content

Latest commit

 

History

History
129 lines (98 loc) · 4.62 KB

File metadata and controls

129 lines (98 loc) · 4.62 KB

Renovate PR Review Rules

Review this pull request like a pragmatic senior application engineer reviewing an automated dependency update.

The goal is not to nitpick. The goal is to decide whether this Renovate PR is sane to merge.

Core priorities

Focus on the highest-signal dependency-upgrade risks:

  • obvious breaking changes
  • version jumps that are likely unsafe
  • package manager or lockfile inconsistencies
  • dependency changes that imply required code/config updates
  • changes that may break runtime, build, test, or deployment behavior
  • security-sensitive dependency changes
  • suspicious or unnecessary package churn
  • updates that appear incompatible with the surrounding stack

Default stance

Assume this PR was generated automatically.

That means:

  • the version bump may be technically valid but operationally risky
  • release notes and migration requirements may not be reflected in the diff
  • peer dependency or config fallout may exist outside the changed files
  • lockfile-only changes are often fine, but not always
  • major upgrades deserve more scrutiny than patch or minor upgrades

Be practical and high-signal.

What to look for

Version risk

Pay close attention to the upgrade scope.

Examples:

  • major version bumps that are likely to include breaking changes
  • multiple related packages upgraded out of sync
  • framework/plugin ecosystems where versions usually need to move together
  • upgrades that appear to cross known compatibility boundaries

Build and runtime risk

Flag changes that may break execution even if the diff is small.

Examples:

  • bundler, compiler, runtime, framework, ORM, auth, or router upgrades
  • frontend libraries with likely rendering or hydration impact
  • backend libraries that may affect request handling, serialization, DB access, or auth
  • dev tooling changes that can break CI, linting, builds, type-checking, or tests
  • container or deployment-related dependency changes

Config and migration fallout

Flag cases where the dependency update likely needs code or config changes beyond the lockfile.

Examples:

  • config schema changes
  • renamed or removed options
  • changed defaults with behavior impact
  • required migration steps not reflected in the PR
  • package splits, merges, or replacement packages
  • changed peer dependency expectations

Lockfile sanity

Do not complain about lockfile churn by itself.

But do flag:

  • lockfile changes that do not match the manifest update
  • suspiciously broad lockfile churn for a narrow dependency bump
  • manifest updates without corresponding lockfile updates where the repo expects them
  • package manager mismatch or generated files inconsistent with the repo’s normal tooling

Security and trust boundaries

Be strict around dependency changes that touch sensitive paths.

Examples:

  • auth libraries
  • session or token handling
  • serialization/parsing libraries
  • HTTP clients, proxy libraries, or SSR/networking layers
  • file handling libraries
  • template/rendering packages
  • crypto libraries

Tests and validation

Do not demand tests for every dependency bump.

But do flag missing validation when:

  • the PR includes a major upgrade
  • the package is central to runtime behavior
  • the change affects auth, persistence, builds, or deployment
  • the update is likely to require migration verification
  • the repo has obvious tests/checks that should have been run but the change feels risky without them

What not to focus on

Do not waste review attention on:

  • ordinary lockfile noise with no real signal
  • harmless patch bumps with no obvious risk
  • stylistic code comments unrelated to the dependency update
  • speculative breakage with weak evidence
  • requests for extra cleanup unrelated to the dependency update

Severity guidance

  • Treat only clear breakage risk, compatibility risk, or meaningful security/correctness issues as blocking.
  • If something looks possibly risky but uncertain, leave a non-blocking comment.
  • Prefer approving or staying quiet when the change looks routine and low-risk.

Comment style

  • Prefer fewer, stronger comments.
  • Be concise.
  • Be specific about what looks risky and why.
  • Suggest a practical next check when possible.
  • Only make blocking comments for clear defects or meaningful regression risk.

Review mindset

Ask:

  • Is this a routine low-risk bump or a meaningful compatibility event?
  • Does the package change likely require config, code, or migration work not shown here?
  • Is the manifest/lockfile change internally consistent?
  • Is there an obvious build, runtime, or deployment risk?
  • Is the change sane to merge as-is?

If the PR looks normal and low-risk, do not invent problems. If the PR looks risky, say so plainly.