-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secure OpenSSF/Core Infra Initiative Best Practices Badge #1942
Comments
@open-telemetry/sig-security-maintainers is this something you can drive? |
Yes @trask |
Ok, cool. It looks like it's a self-certification, so let me put it in here with a checklist in a new comment. |
Basics
FLOSS license
Other
Change Control
Unique version numbering
Release notes
Reporting
Vulnerability report process
Quality
Automated test suite
New functionality testing
Warning flags
Security
Analysis
Dynamic code analysis
|
I sent a formal request to get OpenSSF access for the organization. Not sure if the GC or TC has access to accept that |
cc @open-telemetry/technical-committee |
I did a quick pass on the requirements, and it indeed looks we are fine, but out of curiosity, has the Security SIG done a full review? |
Our draft badge using the Collector repo can be found here. @jpkrohling could you review the remaining items? We're at 76% percent but not sure of the status on the remaining |
I filled some more, but I believe we should have one badge per repository. I'll also bring this to the attention of Collector leads. |
Okay thank you! I can join the Collector sig if needed but when I joined the other day attendance was so high I didn't want to distract from the ongoing development discussion. |
@trask / @austinlparker we're at 99% but not technically passing on the Collector repo. For graduation are we required to be passing or just to have the badge in an acceptable state? |
I believe we need passing. What's missing? |
(technically we need this to be passing against each core repo, but I figure collector's the best place to start...?) |
Oh, I see, the CVE one... well, I don't think we've ever had a CVE, right? So we're in compliance there. We should make sure that there's some notes/automation somewhere to attach CVEs to release notes if a change happened as a result of a CVE |
Nvm I see what you mean. Updating to say we're in compliance but we'll need to mention in the maintainer meeting the disclosure in change log is needed. |
@austinlparker, do you know who'd be able to confirm that? While it might not matter for the Collector, it would be good to have guidance for other SIGs. Perhaps @yurishkuro has a different recollection, but I don't think we needed 100% passing score for Jaeger when it was graduated a few years ago. |
The OpenSSF badge is a required part of CNCF project graduation. The self reporting has been completed already and this is to demonstrate publicly we have done the required step. Relevant issue: open-telemetry/community#1942
This issue shall track our progress towards the OpenSSF Best Practices, a requirement for increasing project maturity.
The criteria are available here: https://www.bestpractices.dev/en/criteria
I believe that we already meet the passing criteria, so we should probably go ahead and sign up on the site to get the project started. This will require an org owner to authorize.
The text was updated successfully, but these errors were encountered: