docs: clarify Dependabot workflow permissions#10
Conversation
|
Caution Review failedThe pull request is closed. ℹ️ Recent review info⚙️ Run configurationConfiguration used: defaults Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (3)
📝 WalkthroughWalkthroughDocumentation clarification added across three files explaining GitHub Actions Changes
Estimated code review effort🎯 1 (Trivial) | ⏱️ ~5 minutes Poem
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
This pull request updates the documentation to clarify the required GitHub Actions permissions and workflow setup for using Limier with Dependabot, especially when integrating the
dependabot/fetch-metadataaction. The changes emphasize the need to explicitly grantpull-requests: readpermission and provide more detailed, accurate sample configurations and guidance.Documentation improvements for Dependabot and GitHub Actions:
pull-requests: readpermission when usingdependabot/fetch-metadata, and clarified that once apermissionsblock is present in a workflow, omitted scopes default tonone(README.md,docs/guide/ci-and-deploy.md,examples/ci/README.md). [1] [2] [3] [4] [5]README.md,examples/ci/README.md). [1] [2]dependabot/fetch-metadataand the need for a read-only review job (docs/guide/ci-and-deploy.md,examples/ci/README.md). [1] [2] [3]README.md).pull_request_targetfor review runs (docs/guide/ci-and-deploy.md,examples/ci/README.md). [1] [2]Summary by CodeRabbit
pull-requests: readpermission must be explicitly declared when using Dependabot metadata operations