/ArlosCommitNotation

A notation for small commits messages that show the risk involved in each step

Arlo's Commit Notation

This commit notation allows developers to convey 2 critical pieces of metadata about each commit:

  1. How risky is it? What has the original author done to mitigate risk?
  2. What was the intention? When the original author changed the code, what was s/he attempting to accomplish?

This information is conveyed in the first 3 characters of the commit summary line. That way a receiving developer can quickly scan the commit log in order to determine risk and intent for any incoming change set.

This is particularly useful when:

  1. As a reviewer, deciding whether to approve a pull request
  2. As a developer, getting your pull request approved faster and more easily
  3. Reading main — just the pull request commit summaries to understand the history of changes for a release.

The Four Risk Levels

Risk Level Code Example Meaning
Known safe lowercase letter r - Extract method Applesauce Addresses all known and unknown risks.
Validated uppercase letter R - Extract method Applesauce Addresses all known risks.
Risky uppercase followed by 2 bangs R!! Extract method Applesauce Some known risks remain unverified.
(Probably) Broken uppercase followed by 2 stars R** Start extracting method with no name No risk attestation.
  • Known safe: Developer performed the task in a way that prevents the potential risks, even for situations that developer is not aware of.
  • Validated: Developer performed the task in some way that includes validation for all risks the developer thought of. The most common technique is developer-written automated tests.
  • Risky: Developer is aware of risks and attempted to mitigate them as much as possible, but there is no formal verification. Commonly this includes a manual change that the developer could not fully verify.
  • Broken: Either known to be broken, or developer couldn't even check to see if it works. May not compile. Used when the developer cannot see the results of the work without checking in, or as a savepoint when the developer is about to switch tasks or direction.

Core Intentions

These developer intentions exist on every project. They are always allowed in commits that use this notation.

Each intention can appear at any of the 4 risk levels. Each intention's full details section includes the potential risks inherent in that kind of change, as well as common approaches to attain each risk level.

Prefix Name Intention
F Feature Change or extend one aspect of program behavior without altering others.
B Bugfix Repair one existing, undesirable program behavior without altering any others.
R Refactoring Change implementation without changing program behavior.
D Documentation Change something which communicates to team members and does not impact program behavior.

Feature

Known Risks

  • May alter unrelated feature (spooky action at a distance).
  • May alter a piece of this feature that you intended to remain unchanged.
  • May implement the intended change in a way different than intended.
Code Known Approaches
f - None known
F - Meets all of:
  • Change is <= 8 LoC5
  • Feature was fully unit tested prior to this change.
  • Change includes new or changed unit tests to match intended behavior alteration.
F!! Change includes unit tests for new behavior.
F** No automatic tests, or unfinished implementation.

Bugfix

A bugfix is a lot like a feature. However, the intention is to change an undesired — and usually unintentional — behavior of the current system. The risk profile is similar but the intention is different, so there are often more operational risks.

Known Risks

  • Intended change may have unintended consequences in the market. For example, customers may be depending on the bug.
  • May alter unrelated feature (spooky action at a distance).
  • May alter a piece of this feature that you intended to remain unchanged.
  • May implement the intended change in a way different than intended.
Code Known Approaches
b - None known
B - Meets all of:
  • Reviewed current and new behavior with customer representative.
  • Change is <= 8 LoC5
  • Bug's original (buggy) behavior was captured in a unit test prior to this change.
  • Change includes 1 changed unit test, matching intended behavior alteration.
B!! Change includes unit tests for new behavior.
B** No automatic tests, or unfinished implementation.

Refactoring or Remodeling

A Refactoring or Remodeling intends to alter the program in some way without changing any behavior. The risk levels indicate the probability of the commit living up to that intention, based on how the code change was executed.

Known Risks

  • May cause a bug.
  • May fix a bug.
  • May change a behavior in a way that doesn't impact a user.
  • May force a test update.
Code Known Approaches
r - One of:
  • Provable refactoring2
  • Test-supported Procedural Refactoring3 entirely within test code
R - Test-supported Procedural Refactoring3
R!! Identified single, named refactoring, but executed by editing code or without whole-project test coverage.
R** Remodeled by editing code, even in small chunks.

Documentation

Changes that don't impact the code, but do change documentation around the code. Note that this does not include end-user documentation1.

Known Risks

  • May mislead future developers.
  • May mislead other stakeholders.
  • May alter team processes in ways that have unintended consequences.
Code Known Approaches
d - Developer-visible documentation, not in a source file, or verified to generate byte-identical compilation.
D - Dev-impacting only, but changes compilation or process. E.g., changing text on a dev-only screen, or changes code-review checklist.
D!! Alters an important process.
D** Trying out a process change that is intended to gain info, not to work.

Extension Intentions

The basic intention annotations are comprehensive to describe any kind of change, but it may be useful to extend the notation to your project to provide additional detail that is useful in your context. Read more about Extension Intensions.

Provable Refactorings

If you can get a series of commits that is all lowercase commits, you can deploy without the need for Regression Testing, or lengthy conversations about accepting the pull request to trunk.

A provable refactoring requires a burden of proof. The main methods of proof are

  • automated refactoring via tool, with knowledge of tool bugs.
  • Scripted manual refactoring, using the compiler to verify each step. Recipes Here

With discipline these can prove bug-for-bug compatibility. They demonstrate safety for unknown bugs, even guaranteeing that you do not accidentally fix a bug you don't know exists (but your customers may be depending on).

All of these recipes use static analysis to demonstrate safety. As such, they work equally well on code that lacks tests. They can be a good way to make code testable. Their downside is that they are language-specific.

Test-supported Procedural Refactorings

These are refactorings with a lower standard of proof:

  1. Commit contains only a single refactoring.
  2. Refactoring is named and published (e.g., in Fowler's refactoring catalog).
  3. Either:
    1. Your entire product is very highly tested, or
    2. you are working on new code that is not yet called.
  4. You followed the published steps, including running full-suite test runs when indicated.

Note that this can not prove bug-for-bug compatibility. It can only demonstrate that you didn't cause any problems that have been thought of before; it does not demonstrate safety for novel bugs.

Requirement 3 is there because many refactorings can have non-local effects. It is not sufficient to have great tests on the code you are changing. You also need great tests on the code that you are not intending to change, to demonstrate that you didn't. Therefore, until your entire codebase is very highly tested, you will only be able to use the R commit designation on new code that is uncalled by your product.

End-User Documentation

End user documentation is a feature, bugfix, or refactoring, depending on its nature. Use those codes (including levels of risk) accordingly.

Small Features and Bug Fixes

Features and bug fixes intentionally change behavior. This makes them much riskier than refactorings. It is not possible to prove that they have only the intended effect. However, small changes are much lower risk for three reasons:

  1. It's only possible when the code is well-organized already.
  2. It's easy to see the possible side effects of small chunks of code.
  3. It's easy to code review, so you are likely to get good reviews.

Therefore, we treat any feature or bug fix as high risk if it changes more than 8 lines of code in one commit. This includes test changes.

One good approach to enable small features is to refactor until the feature change is easy, then add it. Then add the feature one piece at a time, with a test for each.

Living Documentation

We invite you to submit pull requests to help evolve this notation and methodology.

LoC: Lines of Code