blob: f4e77a81b5790c47c21a64d821c08a1b726eaf53 [file] [log] [blame]
Edwin Kempinc500df02019-04-23 15:53:00 +02001= Gerrit Code Review - Development Processes
2
Edwin Kempin11932ad2019-04-24 15:58:02 +02003[[project-governance]]
4[[steering-committee]]
David Pursehouse7840d812019-05-28 08:58:59 +09005== Project Governance / Engineering Steering Committee
Edwin Kempin11932ad2019-04-24 15:58:02 +02006
David Pursehouse7840d812019-05-28 08:58:59 +09007The Gerrit project has an engineering steering committee (ESC) that is
8in charge of:
Edwin Kempin11932ad2019-04-24 15:58:02 +02009
10* Gerrit core (the `gerrit` project) and the core plugins
11* defining the project vision and the project scope
12* maintaining a roadmap, a release plan and a prioritized backlog
Edwin Kempin099a5ec2019-04-25 16:15:14 +020013* ensuring timely design reviews
Edwin Kempin11932ad2019-04-24 15:58:02 +020014* ensuring that new features are compatible with the project vision and
Edwin Kempin099a5ec2019-04-25 16:15:14 +020015 are well aligned with other features (give feedback on new
16 link:dev-design-docs.html[design docs] within 14 calendar days)
17* approving/rejecting link:dev-design-docs.html[designs], vetoing new
18 features
Edwin Kempinf13dfa92019-05-02 13:55:43 +020019* assigning link:dev-roles.html#mentor[mentors] for approved features
Edwin Kempin11932ad2019-04-24 15:58:02 +020020* accepting new plugins as core plugins
21* making changes to the project governance process and the
Edwin Kempin099a5ec2019-04-25 16:15:14 +020022 link:dev-contributing.html#contribution-processes[contribution
23 processes]
Edwin Kempin11932ad2019-04-24 15:58:02 +020024
25The steering committee has 5 members:
26
27* 3 Googlers that are appointed by Google
28* 2 non-Google maintainers, elected by non-Google maintainers for the
29 period of 1 year (see link:#steering-committee-election[below])
30
David Pursehouse5a4ae782019-09-18 12:11:51 +090031Refer to the project homepage for the link:https://www.gerritcodereview.com/members.html#engineering-steering-committee[
David Pursehoused93d2592019-05-28 09:02:17 +090032list of current committee members].
33
Edwin Kempin11932ad2019-04-24 15:58:02 +020034The steering committee should act in the interest of the Gerrit project
35and the whole Gerrit community.
36
37For decisions, consensus between steering committee members and all
38other maintainers is desired. If consensus cannot be reached, decisions
39can also be made by simple majority in the steering committee (should
40be applied only in exceptional situations).
41
42The steering committee is empowered to overrule positive/negative votes
43from individual maintainers, but should do so only in exceptional
44situations after attempts to reach consensus have failed.
45
46As an integral part of the Gerrit community, the steering committee is
47committed to transparency and to answering incoming requests in a
48timely manner.
49
50[[steering-committee-election]]
51=== Election of non-Google steering committee members
52
53The election of the non-Google steering committee members happens once
54a year in May. Non-Google link:dev-roles.html#maintainer[maintainers]
55can nominate themselves by posting an informal application on the
56non-public maintainers mailing list by end of April (deadline for 2019
57is Mon 13th of May). By applying to be steering committee member, the
58candidate confirms to be able to dedicate the time that is needed to
59fulfill this role (also see
60link:dev-roles.html#steering-committee-member[steering committee
61member]).
62
63Each non-Google maintainer can vote for 2 candidates. The voting
64happens by posting on the maintainer mailing list. The voting period is
6514 calendar days from the nomination deadline (except for 2019, where
66the initial steering committee should be confirmed during the Munich
67hackathon, the voting period goes from 14th May to 16th May).
68
69Google maintainers do not take part in this vote, because Google
70already has dedicated seats in the steering committee (see section
71link:steering-committee[steering committee]).
72
Edwin Kempinac69e582019-04-24 14:48:15 +020073[[contribution-process]]
74== Contribution Process
75
76See link:dev-contributing.html[here].
77
Edwin Kempin099a5ec2019-04-25 16:15:14 +020078[[design-doc-review]]
79== Design Doc Review
80
81See link:dev-design-docs.html#review[here].
82
Luca Milanesiob9ef6432019-08-22 15:08:26 +010083[[versioning]]
84== Semantic versioning
85
86Gerrit follows a light link:https://semver.org/[semantic versioning scheme] MAJOR.MINOR[.PATCH[.HOTFIX]]
87format:
88
89 * MAJOR is incremented when there are substantial incompatible changes and/or
90 new features in Gerrit.
91 * MINOR is incremented when there are changes that are typically backward compatible
92 with the earlier minor version. Features can be removed following the
93 link:#deprecating-features[feature deprecation process]. Dependencies can be upgraded
94 according to the link:dev-processes.html#upgrading-libraries[libraries upgrade policy].
95 * PATCH is incremented when there are backward-compatible bug fixes in Gerrit or its
96 dependencies. When PATCH is zero, it can be omitted.
97 * HOTFIX is present only when immediately after a patch release, some urgent
98 fixes in the code or the packaging format are required but do not justify a
99 new patch release.
100
101For every MAJOR.MINOR release there is an associated stable branch that follows well defined
102link:#dev-in-stable-branches[rules of development].
103
104Within a stable branch, there are multiple MAJOR.MINOR.PATCH tags created associated to the
105bug-fix releases of that stable release.
106
107Examples:
108
109* Gerrit v3.0.0 contains breaking incompatible changes in the functionality because
110 the ReviewDb storage has been totally removed.
111* Gerrit v2.15 contains brand-new features like NoteDb, however, still supports the existing
112 ReviewDb storage for changes and thus is considered a minor release.
113* Gerrit v2.14.20 is the 20th patch-release of the stable Gerrit v2.14.* and thus does not contain
114 new features but only bug-fixes.
115
Edwin Kempinc500df02019-04-23 15:53:00 +0200116[[dev-in-stable-branches]]
117== Development in stable branches
118
119As their name suggests stable branches are intended to be stable. This means that generally
120only bug-fixes should be done on stable branches, however this is not strictly enforced and
121exceptions may apply:
122
123 * When a stable branch is initially created to prepare a new release the Gerrit community
124 discusses on the mailing list if there are pending features which should still make it into the
125 release. Those features are blocking the release and should be implemented on the stable
126 branch before the first release candidate is created.
127 * To stabilize the code before doing a major release several release candidates are created. Once
128 the first release candidate was done no more features should be accepted on the stable branch.
Edwin Kempin11932ad2019-04-24 15:58:02 +0200129 If more features are found to be required they should be discussed with the steering committee
Edwin Kempinc500df02019-04-23 15:53:00 +0200130 and should only be allowed if the risk of breaking things is considered to be low.
131 * Once a major release is done only bug-fixes and documentation updates should be done on the
132 stable branch. These updates will be included in the next minor release.
Luca Milanesiob9ef6432019-08-22 15:08:26 +0100133 * For minor releases new features could be acceptable if the following conditions are met:
134 ** they are result of a new feature introduced through a merge of an earlier stable branch
135 ** they are justified for completing, extending or fixing an existing feature
136 ** does not involve API, user-interface changes or data migrations
137 ** is backward compatible with all existing features
138 ** the parts of the code in common with existing features are properly covered by end-to-end tests
139 ** is important to the Gerrit community and no Gerrit maintainers have raised objections.
140 * In cases of doubt or conflicting opinions on new features, it's the responsibility of the
141 steering committee to evaluate the risk of new features and make a decision based on these
142 rules and opinions from the Gerrit community.
Edwin Kempinc500df02019-04-23 15:53:00 +0200143 * The older a stable branch is the more stable it should be. This means old stable branches
144 should only receive bug-fixes that are either important or low risk. Security fixes, including
145 security updates for third party dependencies, are always considered as important and hence can
146 always be done on stable branches.
147
Luca Milanesiob9ef6432019-08-22 15:08:26 +0100148Examples:
149
150* Gerrit v3.0.0-rc1 and v3.0.0-rc2 may contain new features and API changes without notice,
151 even if they are both cut on the same stable-3.0 branch.
152* Gerrit v2.14.8 introduced the support for ElasticSearch as a new feature. This was an exception
153 agreed amongst the Gerrit maintainers, did not touch the Lucene indexing code-base, was supported
154 by container-based E2E tests and represents a completion of an high-level feature.
155
Edwin Kempinc500df02019-04-23 15:53:00 +0200156[[backporting]]
157== Backporting to stable branches
158
159From time to time bug fix releases are made for existing stable branches.
160
161Developers concerned with stable branches are encouraged to backport or push fixes to these
162branches, even if no new release is planned. Backporting features is only possible in compliance
163with the rules link:#dev-in-stable-branches[above].
164
165Fixes that are known to be needed for a particular release should be pushed for review on that
166release's stable branch. They will then be included into the master branch when the stable branch
167is merged back.
168
Edwin Kempin2fef5a622019-10-02 17:22:05 +0200169[[security-issues]]
170== Dealing with Security Issues
171
172If a security vulnerability in Gerrit is discovered, we place an link:#embargo[
173embargo] on it until a fixed release or mitigation is available. Fixing the
174issue is usually pursued with high priority (depends on the severity of the
175security vulnerability). The embargo is lifted and the vulnerability is
176disclosed to the community as soon as a fix release or another mitigation is
177available.
178
179[[report-security-issue]]
180=== How to report a security vulnerability?
181
182To report a security vulnerability file a
183link:https://bugs.chromium.org/p/gerrit/issues/entry?template=Security+Issue[
184security issue] in the Gerrit issue tracker. The visibility of issues that are
185created with the `Security Issue` template is automatically restricted to
186Gerrit maintainers and a few long-term contributors. This means as a reporter
187you may not be able to see the issue once it is created. Security issues are
188created on the `ESC` component so that they will be discussed at the next
189meeting of the link:#steering-committee[Engineering Steering Committee] which
190takes place biweekly.
191
192If an existing issue is found to be a security vulnerability it should be
193turned into a security issue by:
194
195. Setting the component to `ESC`
196. Adding the labels `Security` and `NonPublic`
197
198In case of doubt, or if an issue cannot wait until the next ESC meeting,
199contact the link:#steering-committee[Engineering Steering Committee] directly
200by sending them an mailto:gerritcodereview-esc@googlegroups.com[email].
201
202If needed, the ESC will contact the reporter for additional details.
203
204[[embargo]]
205=== The Embargo
206
207Once an issue has been identified as security vulnerability, we keep it under
208embargo until a fixed release or a mitigation is available. This means that the
209issue is not discussed publicly, but only on issues with restricted visibility
210(see link:#report-security-issue[above]) and at the mailing lists of the ESC,
211community managers and Gerrit maintainers. Since the `repo-discuss` mailing
212list is public, security issues must not be discussed on this mailing list
213while the embargo is in place.
214
215The reason for keeping an embargo is to prevent attackers from taking advantage
216of a vulnerability while no fixed releases are available yet, and Gerrit
217administrators cannot make their systems secure.
218
219Once a fix release or mitigation is available, the embargo is lifted and the
220community is informed about the security vulnerability with the advise to
221address the security vulnerability immediately (either by upgrading to a fixed
222release or applying the mitigation). The information about the security
223vulnerability is disclosed via the
224link:https://groups.google.com/d/forum/repo-discuss[repo-discuss] mailing list.
225
226[[handle-security-issue]]
227=== Handling of the Security Vulnerability
228
229. Engineering Steering Committee evaluates the security vulnerability:
230+
231The ESC discusses the security vulnerability and which actions should be taken
232to address it. One person, usually one of the Gerrit maintainers, should be
233appointed to drive and coordinate the investigation and the fix of the security
234vulnerability. This coordinator doesn't need to do all the work alone, but is
235responsible that the security vulnerability is getting fixed in a timely
236manner.
237+
238If the security vulnerability affects multiple or older releases the ESC should
239decide which of the releases should be fixed. For critical security issue we
240also consider fixing old releases that are otherwise not receiving any
241bug-fixes anymore.
242+
243It's also possible that the ESC decides that an issue is not a security issue
244and the embargo is lifted immediately.
245
246. Implementation of the security fix:
247+
248To keep the embargo intact, security fixes cannot be developed and reviewed in
249the public `gerrit` repository. In particular it's not secure to use private
250changes for implementing and reviewing security fixes (see general notes about
251link:intro-user.html[security-fixes]).
252+
253Instead security fixes should be implemented and reviewed in the non-public
254link:https://gerrit-review.googlesource.com/admin/repos/gerrit-security-fixes[
255gerrit-security-fixes] repository which is only accessible by Gerrit
256maintainers and Gerrit community members that work on security fixes.
257+
258The change that fixes the security vulnerability should contain an integration
259test that verifies that the security vulnerability is no longer present.
260+
261Review and approval of the security fixes must be done by the Gerrit
262maintainers. Verifications must be done manually since the Gerrit CI doesn't
263build and test changes of the `gerrit-security-fixes` repository (and it
264shouldn't because everything on the CI server is public which would break
265the embargo).
266+
267Once a security fix is ready and submitted, it should be cherry-picked to all
268branches that should be fixed.
269
270. Creation of fixed releases and announcement of the security vulnerability:
271+
272A release manager should create new bug fix releases for all fixed branches.
273+
274The new releases should be tested against the security vulnerability to
275double-check that the release was built from the correct source that contains
276the fix for the security vulnerability.
277+
278Before publishing the fixed releases, an announcement to the Gerrit community
279should be prepared. The announcement should clearly describe the security
280vulnerability, which releases are affected and which releases contain the fix.
281The announcement should recommend to upgrade to fixed releases immediately.
282+
283Once all releases are ready and tested and the announcement is prepared, the
284releases should be all published at the same time. Immediately after that, the
285announcement should be sent out to the
286link:https://groups.google.com/d/forum/repo-discuss[repo-discuss] mailing list.
287+
288This ends the embargo and any issue that discusses the security vulnerability
289should be made public.
290
291. Follow-Up
292+
293The ESC should discuss if there are any learnings from the security
294vulnerability and define action items to follow up in the
295link:https://bugs.chromium.org/p/gerrit[issue tracker].
296
Edwin Kempinc500df02019-04-23 15:53:00 +0200297[[upgrading-libraries]]
298== Upgrading Libraries
299
Edwin Kempin6671edc2019-04-24 11:22:53 +0200300Changes that add new libraries or upgrade existing libraries require an approval on the
301`Library-Compliance` label. For an approval the following things are checked:
302
303* The library has a license that is suitable for use within Gerrit.
304* If the library is used within Google, the version of the library must be compatible with the
305 version that is used at Google.
306
307Only maintainers from Google can vote on the `Library-Compliance` label.
308
Edwin Kempinc500df02019-04-23 15:53:00 +0200309Gerrit's library dependencies should only be upgraded if the new version contains
310something we need in Gerrit. This includes new features, API changes as well as bug
311or security fixes.
312An exception to this rule is that right after a new Gerrit release was branched
313off, all libraries should be upgraded to the latest version to prevent Gerrit
314from falling behind. Doing those upgrades should conclude at the latest two
315months after the branch was cut. This should happen on the master branch to ensure
316that they are vetted long enough before they go into a release and we can be sure
317that the update doesn't introduce a regression.
318
319[[deprecating-features]]
320== Deprecating features
321
322Gerrit should be as stable as possible and we aim to add only features that last.
323However, sometimes we are required to deprecate and remove features to be able
324to move forward with the project and keep the code-base clean. The following process
325should serve as a guideline on how to deprecate functionality in Gerrit. Its purpose
326is that we have a structured process for deprecation that users, administrators and
327developers can agree and rely on.
328
329General process:
330
331 * Make sure that the feature (e.g. a field on the API) is not needed anymore or blocks
332 further development or improvement. If in doubt, consult the mailing list.
333 * If you can provide a schema migration that moves users to a comparable feature, do
334 so and stop here.
335 * Mark the feature as deprecated in the documentation and release notes.
336 * If possible, mark the feature deprecated in any user-visible interface. For example,
337 if you are deprecating a Git push option, add a message to the Git response if
338 the user provided the option informing them about deprecation.
339 * Annotate the code with `@Deprecated` and `@RemoveAfter(x.xx)` if applicable.
340 Alternatively, use `// DEPRECATED, remove after x.xx` (where x.xx is the version
341 number that has to be branched off before removing the feature)
342 * Gate the feature behind a config that is off by default (forcing admins to turn
343 the deprecated feature on explicitly).
344 * After the next release was branched off, remove any code that backed the feature.
345
346You can optionally consult the mailing list to ask if there are users of the feature you
347wish to deprecate. If there are no major users, you can remove the feature without
348following this process and without the grace period of one release.
349
350GERRIT
351------
352Part of link:index.html[Gerrit Code Review]
353
354SEARCHBOX
355---------