This page includes a list of things that reviewers should keep in mind when reviewing patches to OpenStack projects. There are some items that are common across all projects and others that are specific to a project.
Common Review Checklist
- The code should comply with everything in HACKING.
- The code should be 'pythonic' and look like the code around it, to make the code more uniform and easier to read
- When adding a new file:
- If it's not installed by setup.py, but should be included in the tarball, be sure to add it to `MANIFEST.in`.
- Commit Message and Change break-up
- Follow the advice of GitCommitMessages.
- Use the "DocImpact" tag on changes that affect documentation.
- Use the "SecurityImpact" tag on changes that should get the attention of the OpenStack Security Group (OSSG) for additional review.
- If the patch fixes a bug, it should reference a bug report.
- If the patch implements a feature, it should reference a blueprint. The blueprint should be approved before the patch is merged.
- Test Case implementation (Mock vs. Mox)
- New test cases should be implemented using Mock. It is part of the Python standard library in Python 3 and as such is the preferred method for OpenStack.
- Exceptions can be made for tests added where Mox was already in use, or any other situation where using Mock would cause excessive difficulty for some reason.
- There is no need to convert existing Mox test cases to Mock, but if you are changing a Mox test case anyway, please consider converting it to Mock at the same time.
Oslo Syncing Checklist
- When syncing from oslo:
- Ensure the proposed change has actually merged in oslo.
- It should provide some benefit, don't sync just to sync. Maybe it fixes a bug, or provides new functionality to be used. If providing new functionality it should have a dependent patch lined up to use that functionality.
- The commit message should list which oslo changes are being synced in.
Nova Review Checklist
- For REST API changes:
- The change should conform to APIChangeGuidelines
- Note that we can currently still make incompatible changes to the V3 API
- Produce a full API design in a blueprint in advance
- Follow the Nova API Style Guide
- Ensure there are new API samples produced using realistic data (they are used for documentation)
- If an API sample test template changes, ensure the doc samples are also updated.
- V2 api samples are added to nova/tests/integrated/test_api_samples.py
- V3 api samples are added to an extension specific file in nova/tests/integrated/v3
- If a bug fix is applied to the V2 or V3 API, check to see if it is appropriate to apply it to the V3 or V2 API as well
- New API methods should have an associated policy check for access control
- Check an entry has been added to nova/etc/nova/policy.json
- V3 API specific checks
- Confirm the extension has been at least added to nova.api.v3_extensions in setup.cfg
- A discoverable policy must be added for each extension or it won't be visible by default in the /v3/extensions listing. eg
- "compute_extension:v3:os-access-ips:discoverable": "",
- The change should conform to APIChangeGuidelines
- When changing an RPC interface
- Make sure the version numbers are updated appropriately and that backwards compatibility is maintained. More info here.
- If an existing method is being updated, make sure support for sending the old version of the method is still supported. Search for existing uses of "can_send_version()" for examples.
- When changing rootwrap filters
- Add Thierry Carrez to the review
- FIXME: add specific review checklist
- Criteria for new compute drivers
- Should support everything in the core OpenStack compute API
- Should have public CI doing functional testing (http://lists.openstack.org/pipermail/openstack-dev/2013-July/011280.html)
- Global code cleanup which should be a hacking rule
- For every patch that is going through the entire source tree to change something, which should be that way for all time, a hacking rule should be added within the same patch to make sure it doesn't come back. This can be done by adding a nova-specific rule to nova/hacking/checks.py, but if it should be a standard rule across all projects it should go into the openstack-dev/hacking project where it can be released in a library and each individual project can consume it.
- When to approve
- Every patch needs two +2s before being approved.
- Its ok to hold off on an approval until a subject matter expert reviews it, such as for neutron, xen, or glance related changes.
- If a patch has already been approved but requires a trivial rebase to merge, you do not have to wait for a second +2, since the patch has already had two +2s.
Notes for Non-Core Developers
- When you are reviewing, you may notice a review that has several +1's from other reviewers, passes the functional tests, etc. but the code still has not been merged. As only core developers can approve code for merging, you can help things along by getting a core developer's attention (preferably in IRC) and letting them know there is a review with lots of positive reviews and needs final approval.