Open austinlparker opened 9 months ago
@open-telemetry/sig-security-maintainers is this something you can drive?
Yes @trask
Ok, cool. It looks like it's a self-certification, so let me put it in here with a checklist in a new comment.
Basics Basic project website content
FLOSS license
Other
Change Control Public version-controlled source repository
Unique version numbering
Release notes
Reporting Bug-reporting process
Vulnerability report process
Quality Working build system
Automated test suite
New functionality testing
Warning flags
Security Secure development knowledge
Analysis Static code analysis
Dynamic code analysis
I sent a formal request to get OpenSSF access for the organization. Not sure if the GC or TC has access to accept that
I sent a formal request to get OpenSSF access for the organization. Not sure if the GC or TC has access to accept that
cc @open-telemetry/technical-committee
I did a quick pass on the requirements, and it indeed looks we are fine, but out of curiosity, has the Security SIG done a full review?
Our draft badge using the Collector repo can be found here. @jpkrohling could you review the remaining items? We're at 76% percent but not sure of the status on the remaining
I filled some more, but I believe we should have one badge per repository. I'll also bring this to the attention of Collector leads.
Okay thank you! I can join the Collector sig if needed but when I joined the other day attendance was so high I didn't want to distract from the ongoing development discussion.
@trask / @austinlparker we're at 99% but not technically passing on the Collector repo. For graduation are we required to be passing or just to have the badge in an acceptable state?
I believe we need passing. What's missing?
(technically we need this to be passing against each core repo, but I figure collector's the best place to start...?)
Oh, I see, the CVE one... well, I don't think we've ever had a CVE, right? So we're in compliance there. We should make sure that there's some notes/automation somewhere to attach CVEs to release notes if a change happened as a result of a CVE
It's not the CVE part. We're missing in the dynamic code analysis section -
Nvm I see what you mean. Updating to say we're in compliance but we'll need to mention in the maintainer meeting the disclosure in change log is needed.
I believe we need passing. What's missing?
@austinlparker, do you know who'd be able to confirm that? While it might not matter for the Collector, it would be good to have guidance for other SIGs. Perhaps @yurishkuro has a different recollection, but I don't think we needed 100% passing score for Jaeger when it was graduated a few years ago.
This issue shall track our progress towards the OpenSSF Best Practices, a requirement for increasing project maturity.
The criteria are available here: https://www.bestpractices.dev/en/criteria
I believe that we already meet the passing criteria, so we should probably go ahead and sign up on the site to get the project started. This will require an org owner to authorize.