The Confidential Containers project is an open source project licensed under the Apache License, Version 2.0.
It comprises a number of repositories under the GitHub Confidential Containers organisation. Unless explicitly stated otherwise, all the Confidential Containers repositories follow the process documented here.
All contributors must agree to the project code of conduct.
All the repositories accept contributions via GitHub Pull requests (PR). Submit PRs by following the GitHub workflow.
To get started, complete the prerequisites below.
-
Review Contributor roles that require special Git configuration.
-
Note: The email address you specify must match the email address you use to sign-off commits.
-
Fork and Clone the relevant repository at the Confidential Containers Project.
Example: Your local clone should show
your-github-username
, as follows.https://github.com/${your-github-username}/community
.
Special Git configuration is required for these contributors:
For all other contributor roles, follow the standard configuration, shown in Prerequisites.
- Review Go Code Review Comments to avoid common
Golang
errors. - Use
gofmt
to fix any mechanical style issues.
- Use
rustfmt
to fix any mechanical style issues. Rustfmt uses a style which conforms to the Rust Style Guide. - Use
clippy
to catch common mistakes and improve your Rust code.
You can install the above tools as follows.
$ rustup component add rustfmt clippy
In order to get a clear contribution chain of trust we use the signed-off-by language used by the Linux kernel project.
Raise a GitHub issue before starting work on a PR.
-
Our process requires an issue to be associated with every PR (see patch format)
-
If you are a new contributor, create an issue and add a comment stating that you intend to work on the issue. This notifies our team of the work you plan to do.
To report a bug that is not already documented, please open a GitHub issue for the repository in question.
If it is unclear which repository to raise your query against, first try to get in contact with us. If in doubt, raise the issue here and we will help you to handle the query by routing it to the correct area for resolution.
Our tooling requires adding a Fixes
comment to at least one commit in the PR, which triggers GitHub to automatically close the issue once the PR is merged:
pod: Remove token from Cmd structure
The token and pid data will be hold by the new Process structure and
they are related to a container.
Fixes #123
Signed-off-by: Sebastien Boeuf <[email protected]>
The issue is automatically closed by GitHub when the commit message is parsed.
Confidential Containers employs certain augmentations to a standard GitHub workflow. In this section, we explain these augmentations in more detail. Follow these guidelines when contributing to Confidential Containers repositories, except where noted below.
-
Complete the GitHub basic setup above before continuing.
-
Ensure each PR only covers one topic. If you mix up different items in your patches or PR, they will likely need to be reworked.
-
Follow a topic branch method for development.
-
Follow carefully the patch format for PRs.
-
Apply the appropriate GitHub labels to your PR. This is particularly relevant to maintain Stable branch backports. See also GitHub labels and keywords that block PRs
Note: External contributors should use keywords, explained in the link above. Labels may not be visible to external contributors.
-
Rebase commits on your branch and
force push
after each cycle of feedback.
Some Confidential Containers repositories
contain code written in the Go language (golang). Go
requires all code to be put inside the directory specified by the $GOPATH
variable. Follow this example to put the code in the standard location.
$ export GOPATH=${GOPATH:-$HOME/go}
$ mkdir -p "$GOPATH"
Note: If you intend to make minor edits, it's acceptable to simply fork and clone without adding the GOPATH variable.
In this example, we configure a Git environment to contribute to this very
Community
repo. We create a sample branch, incorporate reviewer feedback, and rebase our commits.
-
Fork the upstream repository:
-
While on your forked copy, select the green button
Clone or download
and copy the URL. -
Run the commands below and paste the copied URL (previous step), so your real GitHub user name replaces
your-github-username
below.
$ dir="$GOPATH/src/github.com/confidential-containers"
$ mkdir -p "$dir"
$ cd "$dir"
$ git clone https://github.com/{your-github-username}/community
$ cd community
Note: Cloning a forked repository automatically gives a remote
origin
.
Next, add the remote upstream
. Configuring this remote allows you to
synchronize your forked copy, origin
, with the upstream
. The
upstream
URL varies by repository. We use the upstream
from the Community for this example.
-
Change directory into
community
. -
Set the remote
upstream
as follows.$ git remote add upstream https://github.com/confidential-containers/community
-
Run
git remote -v
. Your remotes should appear similar to these:origin https://github.com/your-github-username/community.git (fetch) origin https://github.com/your-github-username/community.git (push) upstream https://github.com/confidential-containers/community (fetch) upstream https://github.com/confidential-containers/community (push)
For more details, see how to set up a git remote.
-
Create a new "topic branch" to do your work on:
$ git checkout -b fix-contrib-bugs
Warning: Never make changes directly to the
main
branch --always create a new "topic branch" for PR work. -
Make some editorial changes. In this example, we modify the file that you are reading.
$ $EDITOR CONTRIBUTING.md
Note: If editing in Windows make sure that all documents end with LF and not CRLF. The CI system will fail if carriage returns are in the document. Many editors support the ability to change this. There is a tool called dos2unix available on Git Bash for Windows and also available on Linux systems that can convert files to LF endings. See the Configuring Git to handle line endings guide for more details on how to configure
git
to automatically insert the correct line endings. -
Commit your changes to the current (
fix-contrib-bugs
) branch. Assure you use the correct patch format:$ git commit -as
-
Push your local
fix-contrib-bugs
branch to your remote fork:$ git push -u origin fix-contrib-bugs
Note: The
-u
option tellsgit
to "link" your local clone with your remote fork so that it knows from now on that the local repository and the remote fork refer to "the same" upstream repository. Strictly speaking, this option is only required the first time you callgit push
for a new clone. -
Create the PR:
- Browse to https://github.com/confidential-containers/community.
- Click the "Compare & pull request" button that appears.
- Click the "Create pull request" button.
Note: You do not need to change any of the defaults on this page.
Suppose you received some reviewer feedback that asked you to make some changes to your PR. You updated your local branch and committed those review changes by creating three commits. There are now four commits in your local branch: the original commit you created for the PR and three other commits you created to apply the review changes to your branch. Your branch now looks something like this:
$ git log main.. --oneline --decorate=no
4928d57 docs: Fix typos and fold long lines
829c6c8 apply review feedback changes
7c9b1b2 remove blank lines
60e2b2b doh - missed one
Note: The
git log
command compares your current branch (fix-contrib-bugs
) with themain
branch and lists all the commits, one per line.
Since all four commits are related to the same change, it makes sense to combine all four commits into a single commit on your PR. You need to git rebase multiple commits on your branch. Follow these steps.
-
Update the
main
branch in your local copy of the upstream repository:$ cd $GOPATH/src/github.com/confidential-containers/community $ git checkout main $ git pull --rebase upstream main
The previous command downloads all the latest changes from the upstream repository and adds them to your local copy.
-
Now, switch back to your PR branch:
$ git checkout fix-contrib-bugs
-
Rebase your changes against the
main
branch.$ git rebase -i main
Example output:
pick 2e335ac docs: Fix typos and fold long lines pick 6d6deb0 apply review feedback changes pick 23bc01d remove blank lines pick 3a4ba3f doh - missed one
-
In your editor, read the comments at the bottom of the screen. Do not modify the first line,
pick 2e335ac docs: Fix typos ...
. Instead, revisepick
tosquash
at the start of all following lines.Example output:
pick 2e335ac docs: Fix typos and fold long lines squash 6d6deb0 apply review feedback changes squash 23bc01d remove blank lines squash 3a4ba3f doh - missed one
-
Save your changes and quit the editor. Git puts you back into your editor. You will see all the commit messages.
-
At top is your first commit, which should be in the correct format. Keep your first commit and delete all the following commits, as appropriate, based on the review feedback.
-
Save the file and quit the editor. Once this operation completes, the four commits will have been converted into a single new commit. Check this by running the
git log
command again:$ git log main.. --oneline --decorate=no 3ea3aef docs: Fix typo
-
Force push your updated local
fix-contrib-bugs
branch toorigin
remote:$ git push -f origin fix-contrib-bugs
Note: Not only does this command upload your changes to your fork, it also includes the latest upstream changes to your fork since you ran
git pull --rebase upstream main
on the main branch and then merged those changes into your PR branch. This ensures your fork is now "up to date" with the upstream repository. The-f
option is a "force push". Since you created a new commit usinggit rebase
, you must "overwrite" the old copy of your branch in your fork on GitHub.
Your PR is now updated on GitHub. To ensure team members are aware of this, leave a message on the PR stating something like, "Review feedback applied". This notification allows the team to once again review your PR more quickly.
Confidential Containers CI systems have two methods that allow marking PRs to prevent them being merged. This practice is often used during development. The two methods are: 1) Use GitHub labels or; 2) Use keywords in the PR subject line. The keywords can appear anywhere in the subject line.
The following table summarises some common scenarios and appropriate use of labels or keywords:
Scenario | GitHub label | PR description contains |
---|---|---|
PR created "as an idea" and feedback sought | rfc |
RFC |
PR incomplete - needs more work or rework | do-not-merge wip |
WIP |
PR should not be merged (has all required "acks", but needs more reviewer input) | do-not-merge |
|
PR is a "work In progress", raised to get early feedback | wip |
WIP |
PR is complete but depends on another so should not be merged (yet) | do-not-merge |
If any of the values in the table above are set on a PR, it will be automatically blocked from merging.
Note: Often during discussions, the abbreviated and full terms are used interchangeably. For instance, often
DNM
is used in discussions as shorthand fordo-not-merge
. The CI systems only recognise the above phrases as shown.
If you raise a PR to update the vendored copy of one or more golang packages,
after running the
dep
command, ensure you add any modified files under the vendor/
directory to Git before committing the changes:
$ git add vendor/
There are two critical pieces of information you need to add to the commit body:
-
A brief explanation why the re-vendor is required.
For example, you should state if an important bug fix or new feature is required, or if a particular commit is needed.
-
The range of commits being added for these third-party packages.
It is possible that re-vendoring a particular package will also result in updates to other dependent packages. However, it is important to include the commit range (even if it is big) for the primary package(s) the re-vendor PR is raised for.
These details allow for easier troubleshooting if the re-vendor PR introduces bug or behavioral changes.
Generate the list of new commits added to the primary re-vendored package by comparing the previous and latest commits for the package being re-vendored.
The following example lists the steps you should take if a new version of
libcontainer
(part of therunc
repository) is required:-
Determine the previous and latest commits for the package by looking at the
diff
of theGopkg.toml
file in your branch. -
Run the commands below:
$ go get -d -u github.com/opencontainers/runc $ cd $GOPATH/src/github.com/opencontainers/runc $ old_commit="..." $ new_commit="..." $ git log --no-merges --abbrev-commit --pretty=oneline "${old_commit}..${new_commit}" | sed 's/^/ /g'
Paste the output of the previous command directly into the commit "as-is". Note that the four space indent added by the
sed
command is used to force GitHub to render the list in a fixed-width font, which makes it easier to read. -
For additional information on using the dep
tool, see
"Performing vendoring for the Confidential Containers project".
-
Confidential Containers utilizes Continuous Integration (CI) to automatically check every PR.
-
We strongly encourage you to run the same CI tests on individual PRs, using static checks
In repositories where a Makefile
is present, you can execute
static checks for testing and development. To do so, invoke the make check
and make test
rules, after developer mode is enabled.
$ export KATA_DEV_MODE=true
$ make check
$ make test
Running these checks should result in no errors. If errors are reported, fix them before submitting your PR.
To replicate the static checks performed by the CI system:
-
Ensure you have a "clean" source tree, as the checks cover all files present. Checks might fail if you have extra files or your files are out of date in your tree.
-
Ensure
golangci-lint
is current or has not been previously installed (the static check scripts will install it if necessary). Changing the linters can produce spurious errors that do not fail inside the CI systems.
Some submitted PRs fail to pass static checks. After such a PR fails, view its build logs to determine the cause of failure.
-
At the bottom of the PR, if a message appears, "Some checks were not successful," select "Details", as shown below.
-
Upon entering the Travis CI* web page, select the first number that appears below "Build jobs."
-
Scroll to the bottom of the build log and view the
ERROR
message(s). In the example below, theERROR
reads:... no signed-off-by specified
. This is a requirement. To fix, use the signed-off-by method while pushing a commit. See Patch format for more details.
Porting applies a patch set to an older ("backport") or a newer ("forward-port") branch or repository.
Backporting is necessary to ensure that older -- but still maintained -- releases benefit from bug fixes already applied to newer releases.
Forward porting is necessary where there are multiple development streams and bug fixes or new features have been applied to the older stream, but not the newer one.
Note:
Stable branches are considered maintenance branches, not development branches. Bug fixes must land in a newer development branch before landing in a stable branch to ensure the changes have been tested thoroughly before being applied to a stable release (maintenance) branch.
Porting is performed with a new PR meaning porting PRs must have an associated "parent" PR (the original bug fix or feature PR).
Every PR must indicate whether it should be ported in either direction; backwards (backport) or forwards (forward port). This is achieved by adding up to two labels per PR which signal the porting requirements for the PR.
The stable branch backports section provides information on the sorts of changes which should be backported.
The table below lists all valid combinations of GitHub labels. Every PR must be labelled as shown in the table row that most closely corresponds to the type of PR the user is raising.
Notes:
- The porting labels are enforced by a GitHub action. This means that PRs that do not have a valid set of porting labels cannot be merged.
- The "Common PR type" column in the table shows the most likely type of PR, but this is just a guide.
- A
backport
orforward-port
labelled PR must have an associated parent PR which caused the backport or forward port PR to be raised.
PR summary | Common PR type | Backport label | Forward port label | Notes |
---|---|---|---|---|
A "standalone" PR | Feature | no-backport-needed |
no-forward-port-needed |
PR does not need to be ported. For example, a PR used to add a new feature to the latest release. |
PR that needs to be backported only | Bug fix | needs-backport |
no-forward-port-needed |
|
PR that needs to be forward ported only | Bug fix or feature | no-backport-needed |
needs-forward-port |
|
A backport PR | Bug fix | backport |
PR to actually make the backport changes. Must have an associated "parent" PR. Title must contain original PRs title. |
|
A forward port PR | Bug fix or feature | forward-port |
PR to actually make the forward port changes. Must have an associated "parent" PR. Title must contain original PRs title. |
If you are not a member of the GitHub repository the PR is raised in, you may not be able to see the GitHub labels. In this scenario, please add a comment asking for the porting labels to be applied.
Forward port and backport PRs by definition should not be raised in isolation: there must be an existing PR that caused the porting PR to be raised.
If you know whether a PR should be backported or forward ported, please add a comment on the PR if you are unable to add the appropriate labels. If you do not know whether a PR should be backported or forward ported, the community will work with you to identify any porting requirements and to help with porting activities.
Confidential Containers maintains a number of stable branch releases. Bug fixes to the main branch are selectively applied to (or "backported") these stable branches.
In order to aid identification of commits that potentially should be
backported to the stable branches, all PRs submitted must be labeled with
one or more of the following labels. At least one label that is not
stable-candidate
must be included.
Label | Meaning |
---|---|
bug |
A bug fix, which will potentially be a backport candidate |
cleanup |
A cleanup, which will likely not be backported |
feature |
A new feature/enhancement, that will likely not be backported |
stable-candidate |
A PR selected for backporting - very likely a bug fix |
vendor |
A golang vendor update. Might be considered for backport if the vendor update includes critical bug fixes |
In the event that a bug fix PR is selected for backporting to the stable
branches, the stable-candidate
label is added if not already present, and
the original author of the PR is asked if they will submit the relevant
backport PRs.
For ports that are within the same repository (for example a stable backport to a 1.x PR), specify the same issue number as the original PR in the "fixes comment". See the patch format section for further details.
For ports in different repositories, create a new issue, referencing the original issue URL in the issue text.
Beside the Signed-off-by
footer, we expect each patch to comply with the
following format:
subsystem: One line change summary
More detailed explanation of your changes (why and how)
that spans as many lines as required.
A "Fixes #XXX" comment listing the GitHub issue this change resolves.
This comment is required for the main patch in a sequence. See the following examples.
Signed-off-by: Contributors Name <[email protected]>
As shown above, pull requests must adhere to these guidelines:
-
Preface the PR title with the appropriate keyword found in Subsystem
-
Ensure PR title length is 75 characters or fewer, including whichever
subsystem
term is used. -
Ensure the PR body line length is 72 characters or fewer.
The body of the message is not a continuation of the subject line and is not used to extend the subject line beyond its character limit. The subject line is a complete sentence and the body is a complete, standalone paragraph.
The "subsystem" describes the area of the code that the change applies to. It does not have to match a particular directory name in the source tree because it is a "hint" to the reader. The subsystem is generally a single word. Although the subsystem must be specified, it is not validated. The author decides what is a relevant subsystem for each patch.
Examples:
Subsystem | Description |
---|---|
build |
Makefile or configuration script change |
cli |
Change affecting command line options or commands |
docs |
Documentation change |
logging |
Logging change |
vendor |
Re-vendoring change |
To see the subsystem values chosen for existing commits:
$ git log --no-merges --pretty="%s" | cut -d: -f1 | sort -u
We recommend that each patch fixes one thing. Smaller patches are easier to review, more likely to be accepted and merged, and more conducive for identifying problems during review.
A PR can contain multiple patches. These patches should generally be related to the main patch and the overall goal of the PR. However, it is also acceptable to include additional or supplementary patches for things such as:
- Formatting (or whitespace) fixes
- Comment improvements
- Tidy up work
- Refactoring to simplify the codebase
Correct formatting of the PR patches is verified using the
checkcommits
tool.
The following is an example of a full patch description for the main change that shows the required "Fixes #XXX
" comment, which references the GitHub issue this patch resolves:
pod: Remove token from Cmd structure
The token and pid data will be hold by the new Process structure and
they are related to a container.
Fixes: #123
Signed-off-by: Sebastien Boeuf <[email protected]>
If a PR contains multiple patches, only one of those patches needs to specify the "Fixes #XXX
" comment. Supplementary patches have an identical format to the main patch, but do not need to specify a "Fixes #XXX
"
comment.
Example:
image-builder: Fix incorrect error message
Fixed an error message which was referring to an incorrect rootfs
variable name.
Signed-off-by: James O. D. Hunt <[email protected]>
Before your PRs are merged into the main code base, they are reviewed. We encourage anybody to review any PR and leave feedback.
See the PR review guide for tips on performing a careful review.
We use the GitHub Required Reviews system for reviewers to note if they agree or disagree with a PR. To have an acknowledgment or "nack" registered with GitHub, you must use the GitHub "Review changes" dialog to leave feedback. Notes left only in the comments fields, whilst sometimes useful, will not get registered in the acknowledgment counting system.
The following is an example of a valid "ack", as long as the "Approve" box is ticked in the Review changes dialog:
Excellent work - thanks for your contribution.
lgtm
The Confidential Containers project has a gating process to prevent introducing regressions. When your PR is submitted, a Continuous Integration (CI) system will run different checks on different platforms, based upon your changes.
Some of the checks are:
- Static analysis checks.
- Unit tests.
- Functional tests.
- Integration tests.
The CI jobs will wait to be triggered. A maintainer must add a /test
comment on the PR to let the CI jobs run.
All CI jobs must pass in order to merge your PR.
The Confidential Containers community can be reached through various channels.
The Confidential Containers project maintainers are the people accepting or rejecting any PR. Although anyone can review PRs, only the acknowledgement (or "ack") from an Approver counts towards the approval of a PR.
Approvers are listed in GitHub teams, one for each repository. The project
uses the
GitHub required status checks
along with the GitHub CODEOWNERS
file to specify who can approve PRs. All repositories are configured to require:
- Two approvals from the repository-specific approval team.