Closed maoo closed 1 year ago
Currently working through confirming the items on the "passing" checklist:
A strategy has not yet been implemented for unique version numbering:
The project results MUST have a unique version identifier for each release intended to be used by users.
Releases are not yet part of the CFI lifecycle, though that could easily be established with a bit of planning
Until we finish migrating the structure to a module-based structure (#239) we will not be able to finish the following reuirement:
The project MUST clearly show or document how to run the test suite
Hey @eddie-knight 👋🏻
Thanks for picking this up. I have added to the kanban in progress
column.
Please use #256 to call for help if needed.
James.
Working with Bob today to identify action items necessary to complete the checklist above.
The next comment from Bob should contain our notes and suggested next steps, which we may convert into independent issues or otherwise just start making PRs against.
Proposed docs changes are below
Releases of CFI and its modules will include
CFI definition releases will be made in a Calendar Versioning (calver) fashion, in the format YYYY.mm-pointver
. There will be a monthly -0
release, automatically released on the first of the month.
It is expected that if any critical issues are found in a monthly release, a new point release will be made within the month, but functionality changes will not be released until the next month's release.
As a CFI module will not necessarily be compliant to a newly-released CFI documentation version, we intend not to use calver for these to reduce confusion. IAC Modules will be released using a semver versioning system, and release cadance will be based on contributions.
To automate the changelog generation, all Pull Requests will need a new section, which includes a short single-paragraph description of what the PR changes. This section being absent or unreadable will block merges, both automatically through github actions, and manually if a maintainer thinks it needs rewriting.
Request from @TheJuanAndOnly99
Hi @eddie-knight ,
I see there is a lot of progress on the OpenSSF badge issue! I think you are ready to submit it here and get a progress score (screenshot below of what it looks like).
We don't need all the answers yet and getting it submitted would let us know how far we are from a "passing" badge. What do you think?
Thanks,
Juan
Progress on the badge application can be seen by org and repo maintainers:
https://bestpractices.coreinfrastructure.org/en/projects/6557/edit#changecontrol
@eddie-knight 👋🏻
I believe this item can be submitted to OpenSSF now.
@TheJuanAndOnly99 to confirm.
James.
Submitted with the release and version items marked as unmet/pending
Closing this as the initial premise "Apply for badge" has been met, and the badge has been added to the README.
A follow-up task will need to be created when we are ready to do additional work on the badge.
FINOS is helping its hosted projects to establish a more secure approach to Open Source software development, by rolling out security scanning tools and by teaming up with LF initiatives like the OpenSSF Best Practices badge
We are aiming to publish an OpenSSF badge for each of the most strategic FINOS projects, and given that CFI is one of them, if would be great if someone from the CFI team could fill in the self assessment form on https://bestpractices.coreinfrastructure.org/ to get the
Passing
badge, and submit a Pull Request to publish it into theREADME.md
of this repository.Of course the FINOS team is always available to provide support, if and when needed; feel free to comment this issue if some question is unclear or need support.