Most repositories have a name pattern like this:
open-telemetry/opentelemetry-foo
. The reason to include opentelemetry
in the
name of the repository is to simplify repositories distinction in forks. So when
one will fork the repository - fork's name will still indicate that this
repository is from OpenTelemetry organization.
Everything not mentioned is left at the GitHub default.
- Merging pull requests
- Allow merge commits:
unchecked
- Allow squash merging: ✔️
- Allow rebase merging:
unchecked
- (only allowing squash merging to ensure a clean history)
- Allow merge commits:
- Automatically delete head branches: ✔️
- (so that merged branches are not left lying around)
A note on discussions: Discussions are disabled by default when creating a new repository. Maintainers may enable discussions, but in doing so take on the responsibility of moderating conversations in accordance with the code of conduct. Maintainers who enable discussions are encouraged to configure the discussion categories to suit their needs, e.g. by removing categories which overlap with issues.
- Every repository has three teams associated with it. Typically for the
repository
opentelemetry-foo
they will be namedfoo-triagers
,foo-approvers
, andfoo-maintainers
. - The
foo-maintainers
team should be a member of thefoo-approvers
team, and thefoo-approvers
team should be a member of thefoo-triagers
team. - Every member of
foo-maintainers
should be included explicitly infoo-approvers
andfoo-triagers
with the "Maintainer" role. This allows repository maintainers to invite new approvers and triagers to the team. - Every member of
foo-maintainers
should have the "Maintainer" role on thefoo-maintainers
team. This allows repository maintainers to invite new maintainers to the team. - The team
foo-triagers
hasTriage
permissions for the repository. If repository is using the Project Boards,foo-triagers
should haveWrite
permissions to have access to the Project Boards. Do not add members offoo-triagers
to the CODEOWNERS file, as their approvals should not count towards the required number of approvals for merging. - The team
foo-approvers
hasWrite
permissions for the repository. - The team
foo-maintainers
hasMaintain
permissions for the repository.
If requested, foo-maintainers
will be granted Admin
permissions, and in return
they must document any changes they make to the repository settings in a file named
.github/repository-settings.md
in their repository (other than temporarily
disabling "Do not allow bypassing the above settings", see branch protection rules
below).
Default branch: main
The order of branch protection rules is important, from docs.github.com:
If a repository has multiple protected branch rules that affect the same branches, the rules that include a specific branch name have the highest priority.
Protected branch rules that mention a special character, such as
*
,?
, or]
, are applied in the order they were created, so older rules with these characters have a higher priority.
Everything not mentioned is unchecked.
- Require a pull request before merging: ✔️
- Require approvals: ✔️
- Required number of approvals before merging:
1
- Required number of approvals before merging:
- Require review from Code Owners: ✔️
- Require approvals: ✔️
- Require status checks to pass before merging: ✔️
- Require branches to be up to date before merging: ✔️
- Status checks that are required:
EasyCLA
- Do not allow bypassing the above settings: ✔️
- Restrict who can push to matching branches: ✔️
- Restrict pushes that create matching branches: ✔️
Organization administrators, repository administrators, and users with the Maintain role
Important: the only ones of these rules which may be changed are
- Required number of approvals before merging
- (this can also be more than
1
)
- (this can also be more than
- Require branches to be up to date before merging
- (this can also be
unchecked
)
- (this can also be
- Status checks that are required
- More status checks can be added, but EasyCLA cannot be removed
- Do not allow bypassing the above settings
- Maintainers may temporarily disable this
Note: EasyCLA
check should show up automatically. If it doesn't, open a
Jira ticket
with the EasyCLA team.
Everything not mentioned is unchecked.
- Allow force pushes: ✔️
Everyone
(all users with push access)- (so that dependabot can rebase its pull requests)
- Allow deletions: ✔️
- (so that branches can be deleted after merging)
Note: "Require a pull request before merging" and
"Require status checks to pass before merging" both need to be unchecked
so that
these branches can be directly updated (without going through a pull request).
Same as for dependabot/**/**
above.
This branch protection rule is not set up automatically, but can be added for any repositories that are using Renovate.
Note: Since Renovate was enabled and disabled across all OpenTelemetry repositories at one point, you will need to follow one of these two options to re-onboard:
Option 1:
- Find the original
Configure Renovate
PR, e.g. open-telemetry/semantic-conventions-java#34, and rename that PR to something else, e.g.Configure Renovate - old
. - Enable Renovate on the repository (requires org admin permission).
- Renovate will send a new onboarding PR to the repository, e.g. open-telemetry/semantic-conventions-java#95.
Option 1:
- Merge
renovate.json
tomain
. - Enable Renovate on the repository (requires org admin permission).
- Go to Renovate, e.g. https://developer.mend.io/github/open-telemetry/opentelemetry-proto-go, and run Actions > Run Renovate scan.
- Renovate won't send a new onboarding PR in this case, but will directly start sending PRs to update dependencies.
Same as for dependabot/**/**
above.
This branch protection rule is not set up automatically, but can be added for any repositories that are using merge queues.
Same as for main
above.
- Fork pull request workflows from outside collaborators
Require approval for first-time contributors who are new to GitHub
- (this can also be
Require approval for first-time contributors
)
- (this can also be
- Dependabot alerts: ✔️
- Dependabot security updates: ✔️
Root-level CODEOWNERS
file on the repository should include superset of
people from both foo-approvers
and foo-maintainers
.
It is recommended to follow these best practices:
- Set up a security scanning tool like, for example, Github CodeQL.
- Set up a test coverage scanning tool like, for example, Codecov.
- Add status badges for passing builds and scans to the root README.
In order to change repository permissions (e.g., for temporary or permanent admin access, adding branch protection rules, or adding a new triagers team), an issue in the community repository needs to be created to keep track of changes. Please use the "Repository Maintenance Request" issue template for such requests. For temporary permission changes, the issue should be kept open until the work is finished and permissions can be reverted again.