User:AKlapper (WMF)/T273164

Rights and responsibilities
Most Wikimedia Gerrit repositories are configured such that when a user gives a "+2" code review, Jenkins will automatically merge the change after running tests. So the right to give a +2 code review is restricted to people in particular Gerrit groups. Typically, there is a Gerrit group named after each repository which grants privileges on that repository. Also, some Gerrit groups grant privileges on multiple repositories. Most notably, the group grants privileges on the MediaWiki core and all extensions and skins, as well as some other MediaWiki-related repositories.

Gerrit groups can derive their members from LDAP groups. Most WMF employees are in the group in LDAP, which automatically grants them membership of the  group.

Gerrit administrators are able to add and remove members from Gerrit groups.

Merging a change to the MediaWiki core or an extension deployed by Wikimedia is a big deal. The change will be automatically deployed to the, a virtualized staging environment, as soon as it's been merged in. It will also be automatically picked up in the next MediaWiki core deployment window (see Deployments) unless it is reverted before the release branch is cut.

Your merge could cause Wikipedia or other sites to fail. It could create a security vulnerability that allows attackers to delete or corrupt data, or to gain access to private information. And in the more common case, it could cause to increase if the code doesn't have tests, is poorly implemented or poorly socialized. You should carefully read this document and all relevant policies before using +2.

+2 is a strong expression of trust, and trust is maintained through good judgement and careful action.

In code review, design discussions, and bug comments, those with +2 power have a special responsibility to see from others' points of view.

Merging without review
Merging code without review is bad for code quality and bad for morale. The point of +2 rights is to separate development and code review. The purpose of merging a change in Gerrit is to tell the world that "Yes, I've ensured that this change follows MediaWiki conventions, good engineering practices and is sensible." (Cf. [ https://www.codinghorror.com/blog/2006/01/code-reviews-just-do-it.html "Code Reviews: Just Do It" by Jeff Atwood].) Inline comments can be used to indicate issues with the code that should be addressed before it is merged.

Merging your own code without approval from a reviewer may be grounds for revocation of privileges.

This is not necessarily the same as giving +2 to a Gerrit change owned by yourself. For example:


 * If a change receives +2 from a reviewer, but the Jenkins build fails, the owner might need to give it +2 to restart the build job.
 * Reverts can generally be self-merged, as long as the commit it is reverting was recent. You are reverting to a version which was presumably reviewed at the time.
 * In deployment branches and the Puppet repository, changes are merged by the person doing the deployment, who is often also the author. In these cases, code review is typically indicated by giving +1 to the change.
 * A commit in Gerrit may have two authors: an owner, and a reviewer who uploads an amendment. Typically, the owner and reviewer each review the other's work.  As long as all the changes have been reviewed and approved, the commit may be merged.

Very few changes are trivial enough to self-merge. Self-merging is tolerated in some cases like trivial documentation changes or projects with only one maintainer.

For extensions (and other projects) not deployed to the Wikimedia cluster, the code review policy is up to the maintainer or author of the extension. Some non-Wikimedia extensions follow Wikimedia's policy of prohibiting self-merges, but there is no requirement of that. If you are the only person writing the extension and have nobody to review your change, or if the extension is abandoned, it is acceptable to self-merge your changes.

Intra-team review and shared ownership
If you're working as part of a team, review by members of your team are not only permitted, but strongly encouraged. Having peers review your code on an ongoing basis is a great way to keep momentum of development going, and ensure that your reviewers are familiar with what you're doing.

When you're doing intra-team review, be especially sensitive about blind spots, cognitive biases, and the need to get buy-in for large changes outside the group of people you're working in. Most open source projects, including MediaWiki, are full of abandoned efforts to create fancy new abstraction layers, skinning systems, testing frameworks, etc. Consider the impact of your changes on the ecosystem as a whole, and engage in conversations through requests for comment, wikitech-l, IRC and other venues. Shared ownership of code ([ https://www.martinfowler.com/bliki/CodeOwnership.html to a greater or lesser degree]) helps to ensure that what you're doing has lasting long term value.

Must read for code reviewers

 * - and subpages
 * - and related pages
 * - keep this in mind when making schema changes (which should be implemented following this process)
 * - and related pages
 * - keep this in mind when making schema changes (which should be implemented following this process)
 * - keep this in mind when making schema changes (which should be implemented following this process)

Requesting Gerrit privileges
To request membership in the group, [ https://phabricator.wikimedia.org/maniphest/task/create/?projects=MediaWiki-Group-Requests&title=Request%20membership%20in%20%3CINSERT%20GROUP%20NAME%3E%20group%20for%20%3CINSERT%20YOUR%20GERRIT%20USERNAME%3E&description=Please%20make%20sure%20that%20you%20read%20and%20understood%20https%3A%2F%2Fwww.mediawiki.org%2Fwiki%2FGerrit%2FPrivilege_policy%20,%20and%20provide%20all%20required%20information:%0D%0A%0D%0A*%20Your%20Gerrit%20username%3A%20%0D%0A*%20The%20Gerrit%20repository%20or%20repositories%20to%20which%20access%20is%20required%3A%20%0D%0A*%20Your%20reason%2C%20including%20links%20to%20patches%20written%20and%20reviewed%3A%20 create a new task] under the MediaWiki-Gerrit-Group-Requests project in Phabricator. Then send an email to the wikitech-l mailing list. However, if you are a WMF staff member, request membership in the "wmf" LDAP group instead of creating a new task under the MediaWiki-Gerrit-Group-Requests project in Phabricator.

To request membership in another group, [ https://phabricator.wikimedia.org/maniphest/task/create/?projects=Gerrit-Privilege-Requests,Release-Engineering-Team&title=Request%20membership%20in%20%3CINSERT%20GROUP%20NAME%3E%20group%20for%20%3CINSERT%20YOUR%20GERRIT%20USERNAME%3E&description=Please%20make%20sure%20that%20you%20read%20and%20understood%20https%3A%2F%2Fwww.mediawiki.org%2Fwiki%2FGerrit%2FPrivilege_policy%20,%20and%20provide%20all%20required%20information:%0D%0A%0D%0A*%20Your%20Gerrit%20username%3A%20%0D%0A*%20The%20Gerrit%20repository%20or%20repositories%20to%20which%20access%20is%20required%3A%20%0D%0A*%20Your%20reason%2C%20including%20links%20to%20patches%20written%20and%20reviewed%3A%20 create a new task] under the Gerrit-Privilege-Requests project in Phabricator.

In either case, the Phabricator task should specify:


 * Gerrit username
 * repository or repositories to which access is required
 * reasoning, including links to patches written and reviewed

Additionally, for repositories other than mediawiki-core (and specifically all extensions and services deployed in the WMF cluster), at least two of the repository's maintainer(s) must also be notified. Their explicit consent on the Phabricator task is needed for the request to be granted.

Should the request be made for a repository without an active maintainer, the request must also be sent as an email to the wikitech-l mailing list.

Developers commenting on a privilege request should consider whether the applicant has contributed high quality patches, has exercised +1 rights well, and has demonstrated competence. Negative comments should be written with tact, they should not be overly strident.

If there is a consensus of trusted developers on the Phabricator task, any of the [ https://ldap.toolforge.org/group/gerritadmin Gerrit administrators] can resolve the request. The task must remain open for at least a week, to allow interested developers to comment. Additional time should be allowed if the request is open during travel or holiday periods.

If there is no consensus on a request in Phabricator, it may be referred to the Developer Advocacy Team for adjudication.

Previously, some extension maintainers were given ownership rights on the relevant project in Gerrit, so that they could add new group members without making a request in Phabricator. This model should not be used for new extensions. Gerrit administrators should not grant repository ownership to ordinary developers. Before an extension is deployed to the Wikimedia cluster for the first time, the rights should be audited, and legacy ownership privileges should be downgraded to +2 access.

Expedited process for trusted organisations
Gerrit administrators may immediately act on requests from the following trusted organisations for the granting and revocation of membership in their managed groups, specifically:

It is not necessary to file a Phabricator task or demonstrate consensus.

This facility is intended to allow these organisations to rapidly on-board staff members, who are assumed to be trusted by virtue of the hiring process. It also allows trusted organisations to grant access to volunteers who are well known and trusted by those organisations.

WMF employees may be added to the group in LDAP when they are hired. Wikimedia Deutschland employees may be added to the group in LDAP when they are hired.

The Developer Advocacy Team, the Wikimedia Release Engineering Team, or the CTO in consultation with one of these teams, may direct a Gerrit administrator to add any person to a Gerrit group.

To add an organization to the list of trusted organisations, create a request in Phabricator.

To request expanding the list of repositories of an existing group in Gerrit, create a request in Phabricator.

Revocation
Revocation of Gerrit rights is permitted in the following circumstances:


 * In an emergency, such as a compromised account, Gerrit administrators may revoke access immediately, at their discretion. Reversal of emergency revocation may be done at the administrator's discretion if the emergency is judged to have passed.  The Developer Advocacy Team, or the CTO in consultation with the Developer Advocacy Team, may review an emergency revocation and direct its reversal.
 * Revocation of privileges of a WMF employee may be directed by that employee's manager, in consultation with WMF Talent and Culture, as discussed in the Staff Handbook.
 * Revocation of privileges from any person may be directed by the Developer Advocacy Team, or by the CTO in consultation with the Developer Advocacy Team.

The reasons for revocation may include:


 * Merging bad code
 * Merging your own code without review
 * Failing to socialize high impact changes within the development community
 * Not following the guidelines above
 * Inappropriate behaviour, in particular, violating the Code of Conduct
 * Termination of employment or contract

It is WMF policy to revoke all privileges when staff members depart, even if those privileges were granted prior to the beginning of employment by virtue of volunteer work. Consistent application of this policy helps to protect the privacy of departing staff members: no fault is implied. If departed staff members wish to continue to contribute in a volunteer capacity, they may reapply for access by the usual process.

Requesting revocation
Emergency revocation should be requested by directly contacting a Gerrit administrator, for example using IRC. Revocation for reasons of competence or behaviour should generally be handled in private, following a defined escalation path. For more details, refer to the following table:

Amendments to this policy
Amendments to this policy must be approved by the CTO, in consultation with the Developer Advocacy Team.

Definitions

 * CTO: The Chief Technology Officer of the Wikimedia Foundation, or the Chief Technology and Product Officer of the Wikimedia Foundation.
 * Developer Advocacy Team: The Wikimedia Foundation Developer Advocacy team.
 * Trusted developers: The group of developers that were granted the +2 right at least one year prior to the request, still have the +2 right at the time of the request, and have actively contributed to either the repository in question or to mediawiki-core since.