-
Notifications
You must be signed in to change notification settings - Fork 183
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Breaking Change] Breaking change presence should not always result in a required review #6859
Comments
The PR has been deployed to production today at 10:25 AM PST. Closing this issue as completed. |
Reopening the issue as I realized there is one complexity to consider. While the Alternatively, I could modify the implementation so that if the relevant labels are not added, relevant required checks do not fail in the first place, but e.g. end up I think I like the solution in which folks can add a comment that will trigger adding the
@weshaggard @mikeharder @mikekistler @JeffreyRichter @heaths thoughts? |
I had a conversation with @weshaggard. The way we want to approach it is to make the breaking change checks be no longer We are also considering stopping the breaking change checks from even running on all the branches except these two that require breaking change board review. This means any PRs to dev branches will no longer provide any information about potential breaking changes, but perhaps this information is not that useful anyway. |
If GitHub's required checks feature isn't expressive enough, we do have that "Required validation" bot that could treat it as required - the one that lists checks / other issues that need to be addressed. That bot - as a check? - is required itself, so if it's not happy the PR can't be merged. Might be easier to keep all the "what's required" stuff centralized via that bot; though, GitHub's required checks icon is pretty nice. That said, in my experience, not a lot of spec authors seem to pay attention to it anyway. I often, as a review, have to point out the failures before it can be approved/merged. |
It might also be a good time to check out the new ruleset feature I mentioned to @weshaggard. These are a superset of branch rules, and you can define multiple matching branch names / patterns. It doesn't solve the problem as much as makes it easier to apply the same branch rules to numerous branches, so you could easily have a "production" ruleset (or whatever you want to call it) and a "development" ruleset that doesn't require the breaking change build. I've used it in one or two repos if I want me to give a quick tour / comparison. |
Per another chat I had with @weshaggard I executed on this plan. Audit log of my changes to GitHub branch protection rules: This closes this work item. |
As currently written here:
https://dev.azure.com/azure-sdk/internal/_wiki/wikis/internal.wiki/1009/Breaking-Change-Detection-Rules
Specifically the problem is that right now, if breaking change check detects an issue, it adds a label
BreakingChangeReviewRequired
orNewApiVersionRequired
. In addition, the check isrequired
in GitHub.But going forward we don't want that: sometimes there is a breaking change, but it is OK, hence no need for official breaking change review. We need to figure out how to surface / communicate it.
Note that sometimes the check fails to add the labels. If so, this is most likely #6169.
There is also ongoing discussion about "self-approval" in the email thread
Subject: FW: Need help in a false positive breaking change check in a API Spec PR
.Related email threads:
Subject: Re: Adding new POST action to swagger is causing BreakingChange check to fail.
Subject: RE: breaking changes detected in PR
Subject: FW: Need help in a false positive breaking change check in a API Spec PR
Subject: RE: Please approve the breaking changes of HDInsight private preview service
Related work:
The text was updated successfully, but these errors were encountered: