Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs(policy)_: Introduction of policy zero #6165

Merged
merged 13 commits into from
Jan 22, 2025
Merged

Conversation

Samyoul
Copy link
Member

@Samyoul Samyoul commented Dec 4, 2024

Summary

This pull request introduces Policy Zero, the foundational policy for creating, reviewing, and maintaining all policies in the status-go Git repository. Policy Zero establishes clear guidelines to ensure a collaborative, inclusive, and transparent process for defining and evolving repository policies. It sets the tone for a consensus-driven approach to repository governance.

Purpose

Policy Zero serves as the cornerstone for all subsequent policies by defining:

  1. How policies are proposed:

    • Encouraging open discussion with Core Contributors (CCs) and community members.
    • Formal submission requirements, including directory, format, and naming conventions.
  2. Review and approval processes:

    • Emphasising the importance of reaching consensus among CCs and key stakeholders.
    • Clear criteria for policy PR approval, including team leads and Guild involvement.
  3. Policy amendments and archival:

    • Outlining procedures for amending or archiving outdated or obsolete policies to ensure relevance.

Key Details

  1. Submitting Policies:

  2. Review Process:

    • Requires active participation from CCs, team leads, and the status-go Guild.
    • Specifies approval thresholds to ensure broad support and alignment.
  3. Amendments and Archival:

    • Enables flexibility in policy maintenance while mandating a transparent PR process.

Implementation Notes

  • This policy will be stored as 000-submitting-policy.md in _docs/policies.
  • The policy adheres to Markdown format and follows ADR file naming conventions.

Request for Reviewers

We encourage all Core Contributors, team leads, and status-go Guild members to review this PR. Your feedback will ensure the policy reflects the values of the status-go community and establishes a strong foundation for future policies.

Next Steps

Upon approval, Policy Zero will guide the submission and governance of all future policies in the status-go repository. This ensures a standardised, inclusive, and transparent process moving forward.

@status-im-auto
Copy link
Member

status-im-auto commented Dec 4, 2024

Jenkins Builds

Click to see older builds (136)
Commit #️⃣ Finished (UTC) Duration Platform Result
✔️ 85efbd3 #1 2024-12-04 14:38:31 ~4 min macos 📦zip
✔️ 85efbd3 #1 2024-12-04 14:39:05 ~5 min macos 📦zip
✔️ 85efbd3 #1 2024-12-04 14:39:56 ~6 min windows 📦zip
✔️ 85efbd3 #1 2024-12-04 14:40:24 ~6 min ios 📦zip
✔️ 85efbd3 #1 2024-12-04 14:44:10 ~10 min android 📦aar
✔️ 85efbd3 #1 2024-12-04 14:45:21 ~11 min linux 📦zip
✔️ 85efbd3 #1 2024-12-04 14:48:14 ~14 min tests-rpc 📄log
✖️ 85efbd3 #1 2024-12-04 15:12:40 ~38 min tests 📄log
✔️ 5d7cf41 #2 2024-12-10 14:47:03 ~4 min windows 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:47:11 ~4 min ios 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:47:19 ~4 min macos 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:47:52 ~5 min macos 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:48:51 ~6 min linux 📦zip
✔️ 5d7cf41 #2 2024-12-10 14:49:07 ~6 min android 📦aar
✔️ 5d7cf41 #2 2024-12-10 14:49:21 ~6 min tests-rpc 📄log
✔️ 5d7cf41 #2 2024-12-10 15:14:26 ~31 min tests 📄log
✔️ fcea8b6 #3 2024-12-10 14:57:37 ~3 min windows 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:20 ~5 min ios 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:20 ~5 min macos 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:30 ~5 min macos 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:32 ~5 min linux 📦zip
✔️ fcea8b6 #3 2024-12-10 14:59:48 ~5 min android 📦aar
✔️ fcea8b6 #3 2024-12-10 15:01:21 ~6 min tests-rpc 📄log
✔️ aaadf85 #4 2024-12-10 15:00:34 ~2 min windows 📦zip
✔️ aaadf85 #4 2024-12-10 15:04:37 ~5 min ios 📦zip
✔️ aaadf85 #4 2024-12-10 15:04:56 ~5 min macos 📦zip
✔️ aaadf85 #4 2024-12-10 15:05:27 ~5 min macos 📦zip
✔️ aaadf85 #4 2024-12-10 15:06:19 ~6 min linux 📦zip
✔️ aaadf85 #4 2024-12-10 15:06:42 ~6 min android 📦aar
✔️ aaadf85 #4 2024-12-10 15:08:34 ~7 min tests-rpc 📄log
✔️ a804bb4 #5 2024-12-10 15:13:28 ~2 min windows 📦zip
✔️ a804bb4 #5 2024-12-10 15:14:54 ~4 min ios 📦zip
✔️ a804bb4 #5 2024-12-10 15:15:06 ~4 min macos 📦zip
✔️ a804bb4 #5 2024-12-10 15:15:39 ~5 min macos 📦zip
✔️ a804bb4 #5 2024-12-10 15:16:25 ~5 min linux 📦zip
✔️ a804bb4 #5 2024-12-10 15:16:29 ~6 min android 📦aar
✔️ a804bb4 #5 2024-12-10 15:16:42 ~6 min tests-rpc 📄log
✔️ a804bb4 #3 2024-12-10 15:44:18 ~29 min tests 📄log
✔️ d4f62c9 #6 2024-12-10 16:27:26 ~2 min windows 📦zip
✔️ d4f62c9 #6 2024-12-10 16:29:31 ~5 min ios 📦zip
✔️ d4f62c9 #6 2024-12-10 16:29:32 ~5 min macos 📦zip
✔️ d4f62c9 #6 2024-12-10 16:29:42 ~5 min macos 📦zip
✔️ d4f62c9 #6 2024-12-10 16:30:34 ~6 min linux 📦zip
✔️ d4f62c9 #6 2024-12-10 16:30:41 ~6 min android 📦aar
✔️ d4f62c9 #6 2024-12-10 16:31:07 ~6 min tests-rpc 📄log
✖️ d4f62c9 #4 2024-12-10 16:54:08 ~29 min tests 📄log
✔️ d4f62c9 #5 2024-12-10 17:29:16 ~30 min tests 📄log
✔️ f6b4b5e #7 2024-12-12 16:29:49 ~2 min windows 📦zip
✔️ f6b4b5e #7 2024-12-12 16:31:22 ~4 min macos 📦zip
✔️ f6b4b5e #7 2024-12-12 16:31:40 ~4 min ios 📦zip
✔️ f6b4b5e #7 2024-12-12 16:32:20 ~5 min macos 📦zip
✔️ f6b4b5e #7 2024-12-12 16:32:31 ~5 min linux 📦zip
✔️ f6b4b5e #7 2024-12-12 16:32:39 ~5 min android 📦aar
✔️ f6b4b5e #7 2024-12-12 16:32:55 ~5 min tests-rpc 📄log
✔️ f6b4b5e #6 2024-12-12 16:57:24 ~30 min tests 📄log
✔️ 776c52c #8 2024-12-16 12:01:38 ~2 min windows 📦zip
✔️ 776c52c #8 2024-12-16 12:03:08 ~4 min ios 📦zip
✔️ 776c52c #8 2024-12-16 12:03:23 ~4 min macos 📦zip
✔️ 776c52c #8 2024-12-16 12:03:51 ~5 min macos 📦zip
✔️ 776c52c #8 2024-12-16 12:04:17 ~5 min linux 📦zip
✔️ 776c52c #8 2024-12-16 12:04:23 ~5 min android 📦aar
✔️ 776c52c #8 2024-12-16 12:04:28 ~5 min tests-rpc 📄log
✔️ 776c52c #7 2024-12-16 12:28:46 ~30 min tests 📄log
✔️ e742eae #9 2024-12-16 12:08:02 ~2 min windows 📦zip
✔️ e742eae #9 2024-12-16 12:09:30 ~4 min macos 📦zip
✔️ e742eae #9 2024-12-16 12:09:43 ~4 min ios 📦zip
✔️ e742eae #9 2024-12-16 12:10:29 ~5 min macos 📦zip
✔️ e742eae #9 2024-12-16 12:10:41 ~5 min linux 📦zip
✔️ e742eae #9 2024-12-16 12:10:49 ~5 min android 📦aar
✔️ e742eae #9 2024-12-16 12:10:53 ~5 min tests-rpc 📄log
✔️ e742eae #8 2024-12-16 12:59:25 ~30 min tests 📄log
✔️ 85a8b33 #10 2024-12-16 20:38:03 ~3 min windows 📦zip
✔️ 85a8b33 #10 2024-12-16 20:39:10 ~4 min macos 📦zip
✔️ 85a8b33 #10 2024-12-16 20:39:18 ~4 min ios 📦zip
✔️ 85a8b33 #10 2024-12-16 20:40:29 ~5 min tests-rpc 📄log
✔️ 85a8b33 #10 2024-12-16 20:40:40 ~6 min linux 📦zip
✔️ 85a8b33 #10 2024-12-16 20:40:46 ~6 min macos 📦zip
✔️ 85a8b33 #10 2024-12-16 20:40:53 ~6 min android 📦aar
✖️ 85a8b33 #9 2024-12-16 21:05:13 ~30 min tests 📄log
✔️ b36055a #11 2024-12-16 20:41:12 ~3 min windows 📦zip
✔️ b36055a #11 2024-12-16 20:43:47 ~4 min macos 📦zip
✔️ b36055a #11 2024-12-16 20:44:21 ~4 min ios 📦zip
✔️ b36055a #11 2024-12-16 20:45:52 ~5 min linux 📦zip
✔️ b36055a #11 2024-12-16 20:46:23 ~5 min macos 📦zip
✖️ b36055a #11 2024-12-16 20:46:23 ~5 min tests-rpc 📄log
✔️ b36055a #11 2024-12-16 20:46:27 ~5 min android 📦aar
✔️ fec5c77 #12 2024-12-16 20:45:03 ~3 min windows 📦zip
✔️ fec5c77 #12 2024-12-16 20:48:20 ~4 min macos 📦zip
✔️ fec5c77 #12 2024-12-16 20:48:58 ~4 min ios 📦zip
✔️ 817d38a #13 2024-12-16 20:48:08 ~2 min windows 📦zip
✔️ 817d38a #12 2024-12-16 20:50:52 ~4 min linux 📦zip
✔️ 817d38a #12 2024-12-16 20:51:41 ~5 min android 📦aar
✔️ 817d38a #12 2024-12-16 20:51:50 ~5 min macos 📦zip
✔️ 817d38a #12 2024-12-16 20:52:46 ~6 min tests-rpc 📄log
✔️ 817d38a #13 2024-12-16 20:52:57 ~4 min macos 📦zip
✔️ 817d38a #13 2024-12-16 20:53:46 ~4 min ios 📦zip
✔️ 817d38a #10 2024-12-16 21:34:49 ~29 min tests 📄log
✔️ ec5886e #14 2024-12-17 14:51:22 ~3 min windows 📦zip
✔️ ec5886e #14 2024-12-17 14:52:43 ~4 min macos 📦zip
✔️ ec5886e #14 2024-12-17 14:52:57 ~4 min ios 📦zip
✔️ ec5886e #13 2024-12-17 14:53:28 ~5 min macos 📦zip
✔️ ec5886e #13 2024-12-17 14:53:36 ~5 min linux 📦zip
✔️ ec5886e #13 2024-12-17 14:53:48 ~5 min android 📦aar
✔️ ec5886e #13 2024-12-17 14:54:41 ~6 min tests-rpc 📄log
✖️ ec5886e #11 2024-12-17 15:17:45 ~29 min tests 📄log
✔️ 0697756 #15 2024-12-17 14:54:46 ~2 min windows 📦zip
✔️ 0697756 #15 2024-12-17 14:57:23 ~4 min macos 📦zip
✔️ 0697756 #15 2024-12-17 14:58:03 ~4 min ios 📦zip
✔️ 0697756 #14 2024-12-17 14:58:56 ~5 min linux 📦zip
✔️ 0697756 #14 2024-12-17 14:59:02 ~5 min macos 📦zip
✔️ 0697756 #14 2024-12-17 14:59:28 ~5 min android 📦aar
✔️ 0697756 #14 2024-12-17 15:01:26 ~6 min tests-rpc 📄log
✔️ 0697756 #12 2024-12-17 15:46:41 ~28 min tests 📄log
✔️ 29917ef #16 2024-12-20 16:04:26 ~2 min windows 📦zip
✔️ 29917ef #16 2024-12-20 16:05:45 ~4 min ios 📦zip
✔️ 29917ef #16 2024-12-20 16:06:00 ~4 min macos 📦zip
✔️ 29917ef #15 2024-12-20 16:06:28 ~5 min linux 📦zip
✔️ 29917ef #15 2024-12-20 16:06:37 ~5 min android 📦aar
✔️ 29917ef #15 2024-12-20 16:06:47 ~5 min macos 📦zip
✔️ 29917ef #15 2024-12-20 16:07:49 ~6 min tests-rpc 📄log
✔️ 29917ef #13 2024-12-20 16:30:54 ~29 min tests 📄log
04ff677 #17 2025-01-20 15:57:30 ~25 sec windows 📄log
✔️ 04ff677 #17 2025-01-20 16:00:32 ~3 min macos 📦zip
✔️ 04ff677 #16 2025-01-20 16:02:03 ~5 min linux 📦zip
✔️ 04ff677 #16 2025-01-20 16:02:31 ~5 min macos 📦zip
2c6f4b8 #18 2025-01-20 15:59:56 ~24 sec windows 📄log
✔️ 2c6f4b8 #18 2025-01-20 16:04:05 ~3 min macos 📦zip
✔️ 2c6f4b8 #17 2025-01-20 16:06:53 ~4 min linux 📦zip
✔️ 2c6f4b8 #17 2025-01-20 16:08:00 ~5 min macos 📦zip
2c6f4b8 #19 2025-01-21 10:08:32 ~23 sec windows 📄log
3bb0a5f #20 2025-01-21 10:12:02 ~25 sec windows 📄log
✔️ 3bb0a5f #19 2025-01-21 10:15:03 ~3 min macos 📦zip
✔️ 3bb0a5f #18 2025-01-21 10:16:05 ~4 min linux 📦zip
✔️ 3bb0a5f #18 2025-01-21 10:16:53 ~5 min macos 📦zip
✔️ 3bb0a5f #18 2025-01-21 10:59:47 ~4 min ios 📦zip
✔️ 3bb0a5f #17 2025-01-21 11:01:14 ~5 min tests-rpc 📄log
Commit #️⃣ Finished (UTC) Duration Platform Result
4a412fe #21 2025-01-21 13:39:57 ~28 sec windows 📄log
✔️ 4a412fe #20 2025-01-21 13:42:55 ~3 min macos 📦zip
✔️ 4a412fe #19 2025-01-21 13:43:05 ~3 min ios 📦zip
✔️ 4a412fe #19 2025-01-21 13:44:22 ~5 min linux 📦zip
✔️ 4a412fe #17 2025-01-21 13:44:38 ~5 min android 📦aar
✔️ 4a412fe #19 2025-01-21 13:44:43 ~5 min macos 📦zip
✖️ 4a412fe #18 2025-01-21 13:45:47 ~6 min tests-rpc 📄log
✔️ 4a412fe #19 2025-01-21 14:07:46 ~5 min tests-rpc 📄log
✖️ 4a412fe #15 2025-01-21 14:09:39 ~30 min tests 📄log
✔️ 4a412fe #16 2025-01-21 15:15:46 ~27 min tests 📄log
✔️ abb72b9 #21 2025-01-21 14:56:03 ~3 min macos 📦zip
✔️ abb72b9 #20 2025-01-21 14:57:57 ~5 min macos 📦zip
✔️ abb72b9 #22 2025-01-21 14:58:02 ~5 min windows 📦zip
✔️ abb72b9 #20 2025-01-21 14:58:02 ~5 min ios 📦zip
✔️ abb72b9 #20 2025-01-21 14:58:13 ~5 min linux 📦zip
✔️ abb72b9 #18 2025-01-21 14:58:50 ~6 min android 📦aar
✔️ abb72b9 #20 2025-01-21 14:58:57 ~6 min tests-rpc 📄log
✔️ abb72b9 #17 2025-01-21 15:46:03 ~30 min tests 📄log

@igor-sirotin igor-sirotin marked this pull request as draft December 4, 2024 20:29
@Samyoul Samyoul force-pushed the policy/policy-zero branch 2 times, most recently from aaadf85 to a804bb4 Compare December 10, 2024 15:10
@Samyoul
Copy link
Member Author

Samyoul commented Dec 10, 2024

@igor-sirotin Do you know why my conventional commits validation is failing?

https://github.com/status-im/status-go/actions/runs/12259024416/job/34200188125?pr=6165

No release type found in pull request title "Introduction of policy zero". Add a prefix to indicate what kind of release this pull request corresponds to. For reference, see https://www.conventionalcommits.org/

Available types:
 - feat: A new feature
 - fix: A bug fix
 - docs: Documentation only changes
 - style: Changes that do not affect the meaning of the code (white-space, formatting, missing semi-colons, etc)
 - refactor: A code change that neither fixes a bug nor adds a feature
 - perf: A code change that improves performance
 - test: Adding missing tests or correcting existing tests
 - build: Changes that affect the build system or external dependencies (example scopes: gulp, broccoli, npm)
 - ci: Changes to our CI configuration files and scripts (example scopes: Travis, Circle, BrowserStack, SauceLabs)
 - chore: Other changes that don't modify src or test files
 - revert: Reverts a previous commit

All my PR commits are prefixed with docs(policy)_:

@Samyoul
Copy link
Member Author

Samyoul commented Dec 10, 2024

TODO. Add the README file

Copy link

codecov bot commented Dec 10, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 61.76%. Comparing base (69855f2) to head (abb72b9).
Report is 15 commits behind head on develop.

Additional details and impacted files
@@             Coverage Diff             @@
##           develop    #6165      +/-   ##
===========================================
+ Coverage    61.75%   61.76%   +0.01%     
===========================================
  Files          843      843              
  Lines       111285   111285              
===========================================
+ Hits         68720    68733      +13     
+ Misses       34592    34590       -2     
+ Partials      7973     7962      -11     
Flag Coverage Δ
functional 21.53% <ø> (+0.07%) ⬆️
unit 60.28% <ø> (+0.03%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

see 37 files with indirect coverage changes

@igor-sirotin
Copy link
Collaborator

Do you know why my conventional commits validation is failing?

@Samyoul yes, because PR title must follow the same rules as commit messages.
You can see that Validate commit message passed, but Validate PR title didn't:
image

@igor-sirotin igor-sirotin marked this pull request as ready for review December 10, 2024 19:34
Copy link
Contributor

@ilmotta ilmotta left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Although I left a few comments, I think this Policy Zero PR is a welcome addition 💯

I usually prefer more soft guidelines and building trust among core contributors instead of hard policies. Some policies are obviously good (e.g. PR descriptions).

Or in other words, I think a more healthy open-source project is one where policies are minimized and guidelines thrive because the best software engineers I worked with are the ones who use guidelines as tools. But maybe status-go and Status will greatly benefit from policies, so let's see 👀

_docs/policies/000-submitting-policy.md Outdated Show resolved Hide resolved
_docs/policies/000-submitting-policy.md Outdated Show resolved Hide resolved
# Foundational Principles for Policies

**Purpose**: Policies establishes the fundamental rules that govern the creation, amendment, and enforcement of all actions within the status-go project. These policies reflect our core
values of inclusivity, transparency, and consensus-driven decision-making while defining enforceable rules that guide status-go contributions. Policies are not merely guidelines but are to be
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's unclear to me how the line will be drawn between guidelines vs policies. A policy is being stated as if it's the law, which in some cases could well be the way to go, but there's room for some people to abuse this policy system. At the same time, I much prefer this over a dictatorship model as many open-source projects follow.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for saying this. I 100% do not want this to be abused, I hope that have a very high quorum and a very high level of required consensus that it will make abuse more difficult. As we discussed offline I will continue to put serious thought into this.

Copy link
Member Author

@Samyoul Samyoul Dec 16, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • TODO: Improve the concept of policy versus guidelines.
  • TODO: Address the concept of "enforceability".

_docs/policies/000-submitting-policy.md Outdated Show resolved Hide resolved
_docs/policies/000-submitting-policy.md Outdated Show resolved Hide resolved
_docs/policies/000-submitting-policy.md Outdated Show resolved Hide resolved

# Review and Approval Process

The core function of the review and approval process for policy PRs is to reach consensus on any issue and to reflect the range of perspectives within the `status-go` community. Policy submissions must aim to achieve broad community support and give key stakeholders a chance to gain context of the policy requirements.
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I still think that this part if redundant. It basically summarises what's described in the README: consensus, transparency and inclusivity.

But let's see what others say.

_docs/policies/000-submitting-policy.md Outdated Show resolved Hide resolved
- **Final agreement**: Policies should be approved by a clear consensus, meaning that while not everyone may agree 100%, all should feel their voices were heard and respected, and the final decision
reflects the community’s general will.

## 4. Enforceability and Respect for Policies
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This part is probably the most important.

Although that sequentially I'd also put it after Inclusivity, Transparency and Consensus, I feel that it might be better to make it first. Otherwise most readers will not reach this most important part.

Copy link
Member Author

@Samyoul Samyoul Dec 16, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

  • TODO: Address the concept of "enforceability".

Copy link
Member Author

@Samyoul Samyoul Dec 16, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@igor-sirotin, @ilmotta, @micieslak and @alaibe

I've thought a lot about input from everyone on this particular subject of enforceability and I feel that I've failed in communicating well enough what our approach is. Given that you all have expressed your opinions on the concept of enforcement and enforceability would you mind giving me your thoughts on my newly phrased section for the subject.


Upholding Policies Through Consensus

Collective Agreement:

The enforceability of policies stems not from the authority of any single individual or group but from the collective agreement and shared commitment of all status-go contributors. Policies are not imposed unilaterally but are the result of transparent discussions and explicit recorded approval from key stakeholders. This includes team leads, members of the @status-im/status-go-guild GitHub team, and other relevant contributors.

Shared Responsibility:

Respecting and adhering to policies is a shared responsibility that reflects the values and goals of status-go contributors. Approved policies are not merely recommendations but agreed-upon standards, created through mutual understanding and collaboration, that guide how we work together and contribute to the project.

Mutual Enforcement through Alignment:

The power of enforcement does not rest with any one authority; it arises from the collective commitment of all contributors to uphold policies that have been collaboratively crafted and agreed upon. This ensures that policies are respected not out of obligation but because they represent the shared vision and trust of the contributors.

Fostering Alignment:

Policies are designed to ensure consistency, fairness, and alignment across the teams, creating a framework that supports effective collaboration and decision-making. By honouring the principles of inclusivity and consensus, we strengthen trust and accountability within all contributors.

By grounding our policies in transparency, mutual respect, and collective ownership, the status-go project ensures they are both enforceable and reflective of the shared goals of all contributors.

cc: @status-im/status-go-guild

@igor-sirotin igor-sirotin changed the title Introduction of policy zero docs(policy)_: Introduction of policy zero Dec 10, 2024

- **Key stakeholder approval**: The guild does not have unilateral enforcement power. Instead, policies require explicit recorded approval from all key stakeholders before becoming enforceable. This
includes team leads, the status-go Guild, and other relevant parties.
- **Respect and adherence**: Policies are not optional guidelines. Once approved, they are enforceable rules that all contributors to the status-go project are expected to respect. This ensures
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's a bit unclear to me how the enforceability may work on a daily basis and how we can be sure that the policies are fully respected. Are reviewers the ones who are responsible for verification of given part of code regarding policies? Different people have different levels of understanding and can enforce them to different degrees. In practice, old habits also do well because they allow to move forward easily, even if it is a short-sighted action. Adjusting to new arrangements often means spending extra time to understand them and leaving the comfort zone, both for pr author and reviewers. In practice, this results in incomplete implementation of the arrangements. The question is whether we have any specific arrangements on how to counteract this

Copy link
Collaborator

@igor-sirotin igor-sirotin Dec 11, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@micieslak @alaibe

TLDR; Policies should not define HOW they're enforced, but define WHAT we agree to enforce.

This is just an instrument to agree on the rules of the game.
And we don't expect to have many policies.


It's a bit unclear to me how the enforceability may work on a daily basis

In my opinion, the real question should be: How can we ensure every core contributor is fully autonomous and able to contribute safely? Instead of asking, How can we enforce everything?

It depends on the certain policy. But in most cases it should be automated.

For example, "pull requests must have > 50% diff code coverage".
Obviously, it can't be checked by reviewers and should be automated (which we did).

Another example, "breaking changes policy", is not easy to automate, so indeed it would be mostly one developers and reviewers shoulders.

Copy link
Member Author

@Samyoul Samyoul Dec 16, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you @micieslak, I have personally struggled with the concept of enforceability and where we draw the line between guidelines and rules. I don't like rules, and I don't like arbitrary rules.

The points you make are all reasonable and thoughtful, and I agree with everything you write, these are legitimate everyday scenarios. I believe that some cultural changes may be necessary from all status-go contributors and this will in some cases cause some slowing down of development speed. This is not a bad thing, in many cases it should reduce the overall development and QA time spent on features.

My opinion is that policies should be a social contract that status-go contributors agree to, this is why I have included a lot of detail about the importance of consensus and inclusivity. Policies should be introduced for things that can not be automated but are still essential for the long term health of the repo. The examples Igor make are good ones to highlight, as they show a distinction between what is automatable and what is not, yet both are needed for the long term health of the repo.

old habits also do well because they allow to move forward easily, even if it is a short-sighted action.

This particularly is an incredibly important point Michał, and it is in fact a major motivator for introducing a policy process that requires a high level of consensus. By engaging all contributors and leads my personal hope is that short-sighted behaviour will be seen as somewhat selfish and generally detrimental to the work of our fellow contributors, even across teams and specialities.

By requiring a very high level of consensus for any policy we can build mutually approved guidelines that will ensure that contributors from many teams and backgrounds have clear expectations and an even playing field.


Please see #6165 (comment)

@alaibe
Copy link
Collaborator

alaibe commented Dec 11, 2024

I agree with the point above—policies are only valuable if they are enforced. I’ve seen many policies that were never enforced and ended up in limbo.

Wouldn’t it be better to focus on building shared knowledge rather than trying to police everything? In my opinion, the real question should be: How can we ensure every core contributor is fully autonomous and able to contribute safely? Instead of asking, How can we enforce everything?

Lately, there’s been a trend of issuing messages “by decree of the guild” followed now by a new policies system. However, I don’t recall being invited to demos showcasing what can already be done in, for example, status-go, or how the guild has improved things over time (and u guys did, no doubt). Instead, I often see decrees and policies.

To be clear, I do believe that adding policies is sometimes necessary and valuable—this is why I’m approving the PR. However, I’d love to see a shift towards a different approach: focusing on sharing knowledge rather than merely enforcing it

@igor-sirotin
Copy link
Collaborator

igor-sirotin commented Dec 11, 2024

I agree with the point above—policies are only valuable if they are enforced. I’ve seen many policies that were never enforced and ended up in limbo.

💯

Wouldn’t it be better to focus on building shared knowledge rather than trying to police everything?

  1. We don't want to police everything. This is to agree on the contribution rules.
  2. Keeping the agreements documented in the repo is exactly about sharing knowledge.

@alaibe Or I think I'm missing your point about "sharing knowledge"?
I feel that it's about sharing knowledge about the codebase, but it seems to be not related to the topic at all 🤔

Lately, there’s been a trend of issuing messages “by decree of the guild” followed now by a new policies system.
... I often see decrees and policies.

I am sorry if we made you feel this way. We never liked this and only allowed ourselves to use By Decree of the Guild for minor obvious things. In fact, it was only PR title check, status-go goals and Breaking Changes Guidelines. Which I believe are minor things (with 1 of them bing only informational) that didn't encounter any disagreement.

This policies system is exactly to prevent such one-sided notification system.

@osmaczko
Copy link
Contributor

The backbone of the Status product, aka status-go, is a place without ownership (there's no dedicated team; the status-go guild is just a collection of CCs from different teams who try to improve things on a best-effort basis). status-go is developed by every team in Status, and that's fine, as the work is mainly driven by business priorities. The lack of ownership has an obvious drawback, which is the health of the codebase. People jump in, implement features, and jump out. The frequency of such actions varies greatly between contributors and usually goes hand in hand with the quality of the changes. I believe that, in such an environment, guidelines are not enough. Note that policies can and will go hand in hand with guidelines.

In the past, we've struggled a lot with regressions, breaking changes, and development speed—all caused by the workflow we've had until now. The initiative with policies is to agree on things that are a clear MUST for status-go to improve. The process is designed to establish consensus among CCs before introducing any enforced policy. This is exactly to avoid decisions made in isolation and announcements like "By decree of the guild." The number of approvals and potential discussions makes it difficult to add or change policies, which, we believe, will result in a limited number of well-thought-out, high-quality, and unambiguous policies. Policies will be enforced by CI checks, where possible.

CC @ilmotta @alaibe

Copy link
Contributor

@friofry friofry left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it's good to have agreements on how we interact with the repo. The policy-0 may look a bit "formal" RFC style, but the intention is great, to reduce chaos and improve quality and transparency.

I look forward to seeing the first policy come out.

Copy link
Contributor

@osmaczko osmaczko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the PR.

I think we missed an important aspect, which is how to handle exceptions to the policies. I am pretty sure there will be some, and we need to apply common sense in this case. If there are many approved exceptions, it means the policy is wrong and needs to be re-formulated.

I propose to add:

Policy exceptions

  • Exception to the policy MUST be documented with a clear justification in textual form.
  • Exception to the policy MUST be approved by at least one team lead (of Status Desktop and Mobile).
  • Exception to the policy MUST be approved by at least one member of the status-go Guild.
  • Policies MAY define additional rules for exceptions, provided these baseline requirements are also met.


Policy Zero establishes the foundational guidelines for creating, reviewing, and maintaining policies in the `status-go` GitHub repository. This policy aims to create a collaborative, inclusive, and transparent process for defining repository policies, specifically regarding how developers engage with and contribute to the repository.

# Submitting a Policy Proposal
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe it would be helpful to include the justification for the given policy as well.

  • A policy MUST include a brief justification, addressing the question: "Why has this policy been introduced?"

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That is an excellent point and I will add that now

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I actually added this to my latest pending commit.

@friofry
Copy link
Contributor

friofry commented Dec 12, 2024

Thanks for the PR.

I think we missed an important aspect, which is how to handle exceptions to the policies. I am pretty sure there will be some, and we need to apply common sense in this case. If there are many approved exceptions, it means the policy is wrong and needs to be re-formulated.

I propose to add:

Policy exceptions

  • Exception to the policy MUST be documented with a clear justification in textual form.
  • Exception to the policy MUST be approved by at least one team lead (of Status Desktop and Mobile).
  • Exception to the policy MUST be approved by at least one member of the status-go Guild.
  • Policies MAY define additional rules for exceptions, provided these baseline requirements are also met.

I recall the common understanding we agreed upon:
Any rule can be bypassed if it shouldn't block urgent PRs. However, the author must ensure a ticket is created to address this issue by the next release, with approval and awareness from some status-go members, team leads, and QA.

@igor-sirotin
Copy link
Collaborator

We can also specify codeowners for this directory, according to the rules in the policy:

/_docs/policies       @status-im/status-go-guild @iurimatias @alaibe @shivekkhurana @ilmotta

@igor-sirotin
Copy link
Collaborator

Also, do you think we clear everything else in _docs/policies/* in this PR?
As anything inside it should be introduced according to policy zero.

cc @status-im/status-go-guild

@osmaczko osmaczko requested a review from iurimatias December 12, 2024 20:31
@Samyoul
Copy link
Member Author

Samyoul commented Jan 8, 2025

Following on from our interaction @fryorcraken, I'd appreciate your input on this policy PR @plopezlpz . Specifically this line: https://github.com/status-im/status-go/pull/6165/files#diff-642a8833af0a32cbf0de25751911b7e61a166e315bae9ee8cf64fa8e9988115fR31

Would you like a requirement or at least a consideration from your team to approve future policies?

EDIT:

Also would you like to review this PR also?

@fryorcraken fryorcraken requested a review from plopezlpz January 9, 2025 00:55
.github/CODEOWNERS Outdated Show resolved Hide resolved
All discussions, decisions, and processes related to policy creation
must be fully transparent. This includes:

- **Open documentation**: Discussions leading to policy decisions

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would be good to have some guidelines on where you intend to hold these discussions and publish the documentation.

From experience, a lot of discussions are happening in private Discord groups or Discord channels.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But this clause is specifically about keeping the decisions public 🤔

In general, it will a PR, just like this one. All comments and resolutions are publicly documented.
But the README shouldn't limit it to a specific platform. README document describes the intentions, it's not a policy itself.

At the same time _docs/policies/submitting-policy.md describes that the policy should be a PR and all feedbacl must be resolved. This covers the intentions described in the README.

@fryorcraken does this make sense?

_docs/policies/submitting-policy.md Outdated Show resolved Hide resolved
@Samyoul Samyoul force-pushed the policy/policy-zero branch from 04ff677 to 2c6f4b8 Compare January 20, 2025 15:59
@Samyoul Samyoul force-pushed the policy/policy-zero branch from 2c6f4b8 to 3bb0a5f Compare January 21, 2025 10:11
@jakubgs
Copy link
Member

jakubgs commented Jan 21, 2025

You will need to rebase your branch on develop in order for the CI job to run using new Nix interpreter:

@Samyoul
Copy link
Member Author

Samyoul commented Jan 21, 2025

@jakubgs I have rebased, you can see commit hash dfe65c6f06c9fb8dec15523af5d3811220217596 in my git log.

Screenshot 2025-01-21 at 13 33 08

dfe65c6

My branch HEAD is commit b2bb680ccca3a7e6b6fc2dd6bd4e742607fa5726 (origin/develop, origin/HEAD, develop)
Screenshot 2025-01-21 at 13 34 52
b2bb680

@Samyoul Samyoul force-pushed the policy/policy-zero branch from 3bb0a5f to 4a412fe Compare January 21, 2025 13:39
@Samyoul
Copy link
Member Author

Samyoul commented Jan 21, 2025

I've just re-rebased, and my HEAD is commit 69855f2e36c5e377d8ca536d5287eab36dc73794 (origin/develop, origin/HEAD, develop)

Screenshot 2025-01-21 at 13 40 00

@Samyoul Samyoul force-pushed the policy/policy-zero branch from 4a412fe to abb72b9 Compare January 21, 2025 14:52
Copy link
Member

@micieslak micieslak left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great, thank you!

@Samyoul Samyoul merged commit 5240da6 into develop Jan 22, 2025
19 checks passed
@Samyoul Samyoul deleted the policy/policy-zero branch January 22, 2025 15:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.