Skip to content

chore(v1.100 Phase 1): lifecycle-bridge data-integrity note + pre-PR-23 blockers + standing lifecycle-truth rule#483

Merged
itcmsgr merged 1 commit intomainfrom
chore/v1.100-phase1-postmerge-hygiene
Apr 19, 2026
Merged

chore(v1.100 Phase 1): lifecycle-bridge data-integrity note + pre-PR-23 blockers + standing lifecycle-truth rule#483
itcmsgr merged 1 commit intomainfrom
chore/v1.100-phase1-postmerge-hygiene

Conversation

@itcmsgr
Copy link
Copy Markdown
Owner

@itcmsgr itcmsgr commented Apr 19, 2026

Post-PR-22B hygiene per approved plan. One tight commit, no code changes.

CHANGELOG.md — new `[Unreleased]` section

  • Summary of PR-22A + PR-22B structural repair
  • Data-integrity note on the lifecycle-bridge authority-mapping bug: pre-PR-22B `observePlan`/`mapAuthority` switches silently hit default arms because of UPPERCASE-vs-lowercase comparison. Between v1.98 and the merge of PR-22B (v1.100 PR-22B — lifecycle truth repair (dry-run honesty + history gating + authority alignment + panel consent) #482), any lifecycle-telemetry consumer saw `PreserveAuthority`/`AuthorityNone` regardless of real decision. Kernel behavior + install_state + update-history unaffected — only the lifecycle bridge's external reporting surface. Forensic interpretation of pre-PR-22B lifecycle output should treat the authority decision as "unknown," not "preserve."

`internal/installer/uninstall/contract.md` — two new sections

1. Standing lifecycle-truth rule

Codifies the merge-discipline constraint approved at PR-22B merge:

No new lifecycle code may bypass the shared authority predicate, the history-write gate, or the dry-run contract.

Enumerates the five concrete requirements every new lifecycle PR must respect, and points at the CI gates that should catch bypass attempts.

2. Pre-PR-23 blockers

Explicit table of the six follow-up PRs that must land before PR-23 (uninstall mutation) can start:

# PR Blocking because
1 Prior-authority record hardening PR-24 restore cannot trust under-defined RecordUsable
2 External-firewall detection unification Detection drift between modules
3 Kernel/service snapshot CI gate Filesystem snapshot alone is insufficient
4 Exec-trace CI gate Strictest purity guarantee
5 Auto-elevate shim removal gate Prevents scaffold UX leaking into mutation era
6 Payload integrity minimum checks Presence-only validation passes truncated files

Plus the Phase 3 gating rule: verification audit after items 1–6 land, with three focused questions, no exploratory scope.

Non-goals

  • No code changes
  • No behavior changes
  • No CI changes

Institutional-memory commit only.

Test plan

  • Markdown renders cleanly
  • No CI gate fires (zero code surface)

🤖 Generated with Claude Code

…3 blockers + standing lifecycle-truth rule

Post-PR-22B hygiene per approved plan. One tight commit, no code changes.

CHANGELOG.md — new [Unreleased] section:
- summary of PR-22A + PR-22B structural repair
- data-integrity note on the lifecycle-bridge authority-mapping bug:
  pre-PR-22B `observePlan`/`mapAuthority` switches silently hit default
  arms because of UPPERCASE-vs-lowercase comparison. Between v1.98 and
  the merge of PR-22B (#482), any lifecycle-telemetry consumer saw
  `PreserveAuthority`/`AuthorityNone` regardless of real decision.
  Kernel behavior + install_state + update-history unaffected — only
  the lifecycle bridge's external reporting surface. Forensic
  interpretation of pre-PR-22B lifecycle output should treat the
  authority decision as "unknown," not "preserve."

internal/installer/uninstall/contract.md — two new sections:

1. Standing lifecycle-truth rule: codifies the merge-discipline
   constraint — no new lifecycle code may bypass the shared authority
   predicate, history gate, or dry-run contract. Enumerates the five
   concrete requirements that every new lifecycle PR must respect, and
   points at the CI gates that should catch bypass attempts.

2. Pre-PR-23 blockers: explicit table of the six follow-up PRs that
   must land before PR-23 (uninstall mutation) can start:
     (1) prior-authority record hardening
     (2) external-firewall detection unification
     (3) kernel/service snapshot CI gate
     (4) exec-trace CI gate
     (5) auto-elevate shim removal gate
     (6) payload integrity minimum checks
   Plus the Phase 3 gating rule: verification audit after items 1-6
   land, with three focused questions, no exploratory scope.

No code changes. No behavior changes. Institutional-memory commit.

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@github-actions
Copy link
Copy Markdown
Contributor

Dependency Review

✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.

Scanned Files

None

@itcmsgr itcmsgr merged commit ff22efa into main Apr 19, 2026
57 checks passed
@itcmsgr itcmsgr deleted the chore/v1.100-phase1-postmerge-hygiene branch April 19, 2026 21:29
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant