Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs(policy)_: Introduction of policy zero #6165

Open
wants to merge 5 commits into
base: develop
Choose a base branch
from

Conversation

Samyoul
Copy link
Member

@Samyoul Samyoul commented Dec 4, 2024

Summary

This pull request introduces Policy Zero, the foundational policy for creating, reviewing, and maintaining all policies in the status-go Git repository. Policy Zero establishes clear guidelines to ensure a collaborative, inclusive, and transparent process for defining and evolving repository policies. It sets the tone for a consensus-driven approach to repository governance.

Purpose

Policy Zero serves as the cornerstone for all subsequent policies by defining:

  1. How policies are proposed:

    • Encouraging open discussion with Core Contributors (CCs) and community members.
    • Formal submission requirements, including directory, format, and naming conventions.
  2. Review and approval processes:

    • Emphasising the importance of reaching consensus among CCs and key stakeholders.
    • Clear criteria for policy PR approval, including team leads and Guild involvement.
  3. Policy amendments and archival:

    • Outlining procedures for amending or archiving outdated or obsolete policies to ensure relevance.

Key Details

  1. Submitting Policies:

  2. Review Process:

    • Requires active participation from CCs, team leads, and the status-go Guild.
    • Specifies approval thresholds to ensure broad support and alignment.
  3. Amendments and Archival:

    • Enables flexibility in policy maintenance while mandating a transparent PR process.

Implementation Notes

  • This policy will be stored as 000-submitting-policy.md in _docs/policies.
  • The policy adheres to Markdown format and follows ADR file naming conventions.

Request for Reviewers

We encourage all Core Contributors, team leads, and status-go Guild members to review this PR. Your feedback will ensure the policy reflects the values of the status-go community and establishes a strong foundation for future policies.

Next Steps

Upon approval, Policy Zero will guide the submission and governance of all future policies in the status-go repository. This ensures a standardised, inclusive, and transparent process moving forward.

@status-im-auto
Copy link
Member

status-im-auto commented Dec 4, 2024

Jenkins Builds

Click to see older builds (38)
Commit #️⃣ Finished (UTC) Duration Platform Result
✔️ 85efbd3 #1 2024-12-04 14:38:31 ~4 min macos 📦zip
✔️ 85efbd3 #1 2024-12-04 14:39:05 ~5 min macos 📦zip
✔️ 85efbd3 #1 2024-12-04 14:39:56 ~6 min windows 📦zip
✔️ 85efbd3 #1 2024-12-04 14:40:24 ~6 min ios 📦zip
✔️ 85efbd3 #1 2024-12-04 14:44:10 ~10 min android 📦aar
✔️ 85efbd3 #1 2024-12-04 14:45:21 ~11 min linux 📦zip
✔️ 85efbd3 #1 2024-12-04 14:48:14 ~14 min tests-rpc 📄log
✖️ 85efbd3 #1 2024-12-04 15:12:40 ~38 min tests 📄log
✔️ 5d7cf41 #2 2024-12-10 14:47:03 ~4 min windows 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:47:11 ~4 min ios 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:47:19 ~4 min macos 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:47:52 ~5 min macos 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:48:51 ~6 min linux 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:49:07 ~6 min android 📦aar
✔️ 5d7cf41 #2 2024-12-10 14:49:21 ~6 min tests-rpc 📄log
✔️ 5d7cf41 #2 2024-12-10 15:14:26 ~31 min tests 📄log
✔️ fcea8b6 #3 2024-12-10 14:57:37 ~3 min windows 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:20 ~5 min ios 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:20 ~5 min macos 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:30 ~5 min macos 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:32 ~5 min linux 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:48 ~5 min android 📦aar
✔️ fcea8b6 #3 2024-12-10 15:01:21 ~6 min tests-rpc 📄log
✔️ aaadf85 #4 2024-12-10 15:00:34 ~2 min windows 📦zip
✔️ aaadf85 #4 2024-12-10 15:04:37 ~5 min ios 📦zip
✔️ aaadf85 #4 2024-12-10 15:04:56 ~5 min macos 📦zip
✔️ aaadf85 #4 2024-12-10 15:05:27 ~5 min macos 📦zip
✔️ aaadf85 #4 2024-12-10 15:06:19 ~6 min linux 📦zip
✔️ aaadf85 #4 2024-12-10 15:06:42 ~6 min android 📦aar
✔️ aaadf85 #4 2024-12-10 15:08:34 ~7 min tests-rpc 📄log
✔️ a804bb4 #5 2024-12-10 15:13:28 ~2 min windows 📦zip
✔️ a804bb4 #5 2024-12-10 15:14:54 ~4 min ios 📦zip
✔️ a804bb4 #5 2024-12-10 15:15:06 ~4 min macos 📦zip
✔️ a804bb4 #5 2024-12-10 15:15:39 ~5 min macos 📦zip
✔️ a804bb4 #5 2024-12-10 15:16:25 ~5 min linux 📦zip
✔️ a804bb4 #5 2024-12-10 15:16:29 ~6 min android 📦aar
✔️ a804bb4 #5 2024-12-10 15:16:42 ~6 min tests-rpc 📄log
✔️ a804bb4 #3 2024-12-10 15:44:18 ~29 min tests 📄log
Commit #️⃣ Finished (UTC) Duration Platform Result
✔️ d4f62c9 #6 2024-12-10 16:27:26 ~2 min windows 📦zip
✔️ d4f62c9 #6 2024-12-10 16:29:31 ~5 min ios 📦zip
✔️ d4f62c9 #6 2024-12-10 16:29:32 ~5 min macos 📦zip
✔️ d4f62c9 #6 2024-12-10 16:29:42 ~5 min macos 📦zip
✔️ d4f62c9 #6 2024-12-10 16:30:34 ~6 min linux 📦zip
✔️ d4f62c9 #6 2024-12-10 16:30:41 ~6 min android 📦aar
✔️ d4f62c9 #6 2024-12-10 16:31:07 ~6 min tests-rpc 📄log
✖️ d4f62c9 #4 2024-12-10 16:54:08 ~29 min tests 📄log
✔️ d4f62c9 #5 2024-12-10 17:29:16 ~30 min tests 📄log
✔️ f6b4b5e #7 2024-12-12 16:29:49 ~2 min windows 📦zip
✔️ f6b4b5e #7 2024-12-12 16:31:22 ~4 min macos 📦zip
✔️ f6b4b5e #7 2024-12-12 16:31:40 ~4 min ios 📦zip
✔️ f6b4b5e #7 2024-12-12 16:32:20 ~5 min macos 📦zip
✔️ f6b4b5e #7 2024-12-12 16:32:31 ~5 min linux 📦zip
✔️ f6b4b5e #7 2024-12-12 16:32:39 ~5 min android 📦aar
✔️ f6b4b5e #7 2024-12-12 16:32:55 ~5 min tests-rpc 📄log
✔️ f6b4b5e #6 2024-12-12 16:57:24 ~30 min tests 📄log

@igor-sirotin igor-sirotin marked this pull request as draft December 4, 2024 20:29
@Samyoul
Copy link
Member Author

Samyoul commented Dec 10, 2024

@igor-sirotin Do you know why my conventional commits validation is failing?

https://github.com/status-im/status-go/actions/runs/12259024416/job/34200188125?pr=6165

No release type found in pull request title "Introduction of policy zero". Add a prefix to indicate what kind of release this pull request corresponds to. For reference, see https://www.conventionalcommits.org/

Available types:
 - feat: A new feature
 - fix: A bug fix
 - docs: Documentation only changes
 - style: Changes that do not affect the meaning of the code (white-space, formatting, missing semi-colons, etc)
 - refactor: A code change that neither fixes a bug nor adds a feature
 - perf: A code change that improves performance
 - test: Adding missing tests or correcting existing tests
 - build: Changes that affect the build system or external dependencies (example scopes: gulp, broccoli, npm)
 - ci: Changes to our CI configuration files and scripts (example scopes: Travis, Circle, BrowserStack, SauceLabs)
 - chore: Other changes that don't modify src or test files
 - revert: Reverts a previous commit

All my PR commits are prefixed with docs(policy)_:

@Samyoul
Copy link
Member Author

Samyoul commented Dec 10, 2024

TODO. Add the README file

Copy link

codecov bot commented Dec 10, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 60.91%. Comparing base (233f2f9) to head (f6b4b5e).
Report is 18 commits behind head on develop.

Additional details and impacted files
@@             Coverage Diff             @@
##           develop    #6165      +/-   ##
===========================================
- Coverage    60.93%   60.91%   -0.03%     
===========================================
  Files          830      830              
  Lines       109807   109807              
===========================================
- Hits         66908    66885      -23     
- Misses       35050    35077      +27     
+ Partials      7849     7845       -4     
Flag Coverage Δ
functional 13.85% <ø> (-0.01%) ⬇️
unit 60.03% <ø> (-0.02%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

see 33 files with indirect coverage changes

@igor-sirotin
Copy link
Collaborator

Do you know why my conventional commits validation is failing?

@Samyoul yes, because PR title must follow the same rules as commit messages.
You can see that Validate commit message passed, but Validate PR title didn't:
image

@igor-sirotin igor-sirotin marked this pull request as ready for review December 10, 2024 19:34
Copy link
Contributor

@ilmotta ilmotta left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Although I left a few comments, I think this Policy Zero PR is a welcome addition 💯

I usually prefer more soft guidelines and building trust among core contributors instead of hard policies. Some policies are obviously good (e.g. PR descriptions).

Or in other words, I think a more healthy open-source project is one where policies are minimized and guidelines thrive because the best software engineers I worked with are the ones who use guidelines as tools. But maybe status-go and Status will greatly benefit from policies, so let's see 👀


# Review and Approval Process

The core function of the review and approval process for policy PRs is to reach consensus on any issue and to reflect the range of perspectives within the `status-go` community. Policy submissions must aim to achieve broad community support and give key stakeholders a chance to gain context of the policy requirements.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What is the meaning of "status-go community"? I ask that because I see status-go as simply a repo, a very important one, but still a repo. A community means a lot more. I don't see myself as a member of a status-go community, I see myself as part of the Status community.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That is a very fair question. I wanted to capture the meaning of "all contributors that want a voice about the way the repo works, that includes core contributors and external contributors."

@ilmotta What do you think about this:

Suggested change
The core function of the review and approval process for policy PRs is to reach consensus on any issue and to reflect the range of perspectives within the `status-go` community. Policy submissions must aim to achieve broad community support and give key stakeholders a chance to gain context of the policy requirements.
The core function of the review and approval process for policy PRs is to reach consensus on any issue and to reflect the range of perspectives among all contributors who wish to have a voice in how the repository operates, including both core contributors and external contributors. Policy submissions must aim to achieve broad community support and give key stakeholders a chance to gain context of the policy requirements.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

At least to me, your suggestion is an improvement @Samyoul

I remember seeing a few references to the word community in the policy, apart from this one.

_docs/policies/000-submitting-policy.md Outdated Show resolved Hide resolved
# Foundational Principles for Policies

**Purpose**: Policies establishes the fundamental rules that govern the creation, amendment, and enforcement of all actions within the status-go project. These policies reflect our core
values of inclusivity, transparency, and consensus-driven decision-making while defining enforceable rules that guide status-go contributions. Policies are not merely guidelines but are to be
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's unclear to me how the line will be drawn between guidelines vs policies. A policy is being stated as if it's the law, which in some cases could well be the way to go, but there's room for some people to abuse this policy system. At the same time, I much prefer this over a dictatorship model as many open-source projects follow.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for saying this. I 100% do not want this to be abused, I hope that have a very high quorum and a very high level of required consensus that it will make abuse more difficult. As we discussed offline I will continue to put serious thought into this.

_docs/policies/000-submitting-policy.md Outdated Show resolved Hide resolved
_docs/policies/000-submitting-policy.md Outdated Show resolved Hide resolved
- Policy ideas SHOULD be discussed with Core Contributors (CCs) and other community members.
- All policies MUST be submitted to the `_docs/policies` directory as a pull request (PR) within the `status-go` repository.
- All policies MUST be in Markdown format
- Policy file names MUST follow [File name conventions for ADRs](https://github.com/joelparkerhenderson/architecture-decision-record?tab=readme-ov-file#file-name-conventions-for-adrs), e.g. `000-submitting-policy.md`
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm very sorry for this confusion, which I brought to you.

The 000- prefix doesn't follow the ADR standard. It was my proposal if we should use the counter prefix or go with full accordance with ADR.

At this point I believe it's better to follow the standard and not make up our own one 😄

Suggested change
- Policy file names MUST follow [File name conventions for ADRs](https://github.com/joelparkerhenderson/architecture-decision-record?tab=readme-ov-file#file-name-conventions-for-adrs), e.g. `000-submitting-policy.md`
- Policy file names MUST follow [File name conventions for ADRs](https://github.com/joelparkerhenderson/architecture-decision-record?tab=readme-ov-file#file-name-conventions-for-adrs), e.g. `submitting-policy.md`


# Review and Approval Process

The core function of the review and approval process for policy PRs is to reach consensus on any issue and to reflect the range of perspectives within the `status-go` community. Policy submissions must aim to achieve broad community support and give key stakeholders a chance to gain context of the policy requirements.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I still think that this part if redundant. It basically summarises what's described in the README: consensus, transparency and inclusivity.

But let's see what others say.


# Policy Amendments and Archival

Policies can be amended or archived to ensure they remain relevant and aligned with community needs.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same here, this summarises (therefore duplicates) what's written further.
But this one is so short and constructive that I actually even like it a bit 😄

- **Final agreement**: Policies should be approved by a clear consensus, meaning that while not everyone may agree 100%, all should feel their voices were heard and respected, and the final decision
reflects the community’s general will.

## 4. Enforceability and Respect for Policies
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This part is probably the most important.

Although that sequentially I'd also put it after Inclusivity, Transparency and Consensus, I feel that it might be better to make it first. Otherwise most readers will not reach this most important part.

@igor-sirotin igor-sirotin changed the title Introduction of policy zero docs(policy)_: Introduction of policy zero Dec 10, 2024

- **Key stakeholder approval**: The guild does not have unilateral enforcement power. Instead, policies require explicit recorded approval from all key stakeholders before becoming enforceable. This
includes team leads, the status-go Guild, and other relevant parties.
- **Respect and adherence**: Policies are not optional guidelines. Once approved, they are enforceable rules that all contributors to the status-go project are expected to respect. This ensures
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's a bit unclear to me how the enforceability may work on a daily basis and how we can be sure that the policies are fully respected. Are reviewers the ones who are responsible for verification of given part of code regarding policies? Different people have different levels of understanding and can enforce them to different degrees. In practice, old habits also do well because they allow to move forward easily, even if it is a short-sighted action. Adjusting to new arrangements often means spending extra time to understand them and leaving the comfort zone, both for pr author and reviewers. In practice, this results in incomplete implementation of the arrangements. The question is whether we have any specific arrangements on how to counteract this

Copy link
Collaborator

@igor-sirotin igor-sirotin Dec 11, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@micieslak @alaibe

TLDR; Policies should not define HOW they're enforced, but define WHAT we agree to enforce.

This is just an instrument to agree on the rules of the game.
And we don't expect to have many policies.


It's a bit unclear to me how the enforceability may work on a daily basis

In my opinion, the real question should be: How can we ensure every core contributor is fully autonomous and able to contribute safely? Instead of asking, How can we enforce everything?

It depends on the certain policy. But in most cases it should be automated.

For example, "pull requests must have > 50% diff code coverage".
Obviously, it can't be checked by reviewers and should be automated (which we did).

Another example, "breaking changes policy", is not easy to automate, so indeed it would be mostly one developers and reviewers shoulders.

@alaibe
Copy link
Collaborator

alaibe commented Dec 11, 2024

I agree with the point above—policies are only valuable if they are enforced. I’ve seen many policies that were never enforced and ended up in limbo.

Wouldn’t it be better to focus on building shared knowledge rather than trying to police everything? In my opinion, the real question should be: How can we ensure every core contributor is fully autonomous and able to contribute safely? Instead of asking, How can we enforce everything?

Lately, there’s been a trend of issuing messages “by decree of the guild” followed now by a new policies system. However, I don’t recall being invited to demos showcasing what can already be done in, for example, status-go, or how the guild has improved things over time (and u guys did, no doubt). Instead, I often see decrees and policies.

To be clear, I do believe that adding policies is sometimes necessary and valuable—this is why I’m approving the PR. However, I’d love to see a shift towards a different approach: focusing on sharing knowledge rather than merely enforcing it

@igor-sirotin
Copy link
Collaborator

igor-sirotin commented Dec 11, 2024

I agree with the point above—policies are only valuable if they are enforced. I’ve seen many policies that were never enforced and ended up in limbo.

💯

Wouldn’t it be better to focus on building shared knowledge rather than trying to police everything?

  1. We don't want to police everything. This is to agree on the contribution rules.
  2. Keeping the agreements documented in the repo is exactly about sharing knowledge.

@alaibe Or I think I'm missing your point about "sharing knowledge"?
I feel that it's about sharing knowledge about the codebase, but it seems to be not related to the topic at all 🤔

Lately, there’s been a trend of issuing messages “by decree of the guild” followed now by a new policies system.
... I often see decrees and policies.

I am sorry if we made you feel this way. We never liked this and only allowed ourselves to use By Decree of the Guild for minor obvious things. In fact, it was only PR title check, status-go goals and Breaking Changes Guidelines. Which I believe are minor things (with 1 of them bing only informational) that didn't encounter any disagreement.

This policies system is exactly to prevent such one-sided notification system.

@osmaczko
Copy link
Contributor

The backbone of the Status product, aka status-go, is a place without ownership (there's no dedicated team; the status-go guild is just a collection of CCs from different teams who try to improve things on a best-effort basis). status-go is developed by every team in Status, and that's fine, as the work is mainly driven by business priorities. The lack of ownership has an obvious drawback, which is the health of the codebase. People jump in, implement features, and jump out. The frequency of such actions varies greatly between contributors and usually goes hand in hand with the quality of the changes. I believe that, in such an environment, guidelines are not enough. Note that policies can and will go hand in hand with guidelines.

In the past, we've struggled a lot with regressions, breaking changes, and development speed—all caused by the workflow we've had until now. The initiative with policies is to agree on things that are a clear MUST for status-go to improve. The process is designed to establish consensus among CCs before introducing any enforced policy. This is exactly to avoid decisions made in isolation and announcements like "By decree of the guild." The number of approvals and potential discussions makes it difficult to add or change policies, which, we believe, will result in a limited number of well-thought-out, high-quality, and unambiguous policies. Policies will be enforced by CI checks, where possible.

CC @ilmotta @alaibe

Copy link
Contributor

@friofry friofry left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it's good to have agreements on how we interact with the repo. The policy-0 may look a bit "formal" RFC style, but the intention is great, to reduce chaos and improve quality and transparency.

I look forward to seeing the first policy come out.

Copy link
Contributor

@osmaczko osmaczko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the PR.

I think we missed an important aspect, which is how to handle exceptions to the policies. I am pretty sure there will be some, and we need to apply common sense in this case. If there are many approved exceptions, it means the policy is wrong and needs to be re-formulated.

I propose to add:

Policy exceptions

  • Exception to the policy MUST be documented with a clear justification in textual form.
  • Exception to the policy MUST be approved by at least one team lead (of Status Desktop and Mobile).
  • Exception to the policy MUST be approved by at least one member of the status-go Guild.
  • Policies MAY define additional rules for exceptions, provided these baseline requirements are also met.


Policy Zero establishes the foundational guidelines for creating, reviewing, and maintaining policies in the `status-go` GitHub repository. This policy aims to create a collaborative, inclusive, and transparent process for defining repository policies, specifically regarding how developers engage with and contribute to the repository.

# Submitting a Policy Proposal
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe it would be helpful to include the justification for the given policy as well.

  • A policy MUST include a brief justification, addressing the question: "Why has this policy been introduced?"

@friofry
Copy link
Contributor

friofry commented Dec 12, 2024

Thanks for the PR.

I think we missed an important aspect, which is how to handle exceptions to the policies. I am pretty sure there will be some, and we need to apply common sense in this case. If there are many approved exceptions, it means the policy is wrong and needs to be re-formulated.

I propose to add:

Policy exceptions

  • Exception to the policy MUST be documented with a clear justification in textual form.
  • Exception to the policy MUST be approved by at least one team lead (of Status Desktop and Mobile).
  • Exception to the policy MUST be approved by at least one member of the status-go Guild.
  • Policies MAY define additional rules for exceptions, provided these baseline requirements are also met.

I recall the common understanding we agreed upon:
Any rule can be bypassed if it shouldn't block urgent PRs. However, the author must ensure a ticket is created to address this issue by the next release, with approval and awareness from some status-go members, team leads, and QA.

@igor-sirotin
Copy link
Collaborator

We can also specify codeowners for this directory, according to the rules in the policy:

/_docs/policies       @status-im/status-go-guild @iurimatias @alaibe @shivekkhurana @ilmotta

@igor-sirotin
Copy link
Collaborator

Also, do you think we clear everything else in _docs/policies/* in this PR?
As anything inside it should be introduced according to policy zero.

cc @status-im/status-go-guild

@shivekkhurana
Copy link
Contributor

shivekkhurana commented Dec 13, 2024

@Samyoul

  1. Do you feel it makes sense to have a template to introduce policies ? Like EIPs
  2. What happens if the Policy is not approved ? Do we just record the decision on the PR and close it ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants