open-telemetry / community

OpenTelemetry community content
https://opentelemetry.io
Apache License 2.0
795 stars 238 forks source link

Secure OpenSSF/Core Infra Initiative Best Practices Badge #1942

Open austinlparker opened 9 months ago

austinlparker commented 9 months ago

This issue shall track our progress towards the OpenSSF Best Practices, a requirement for increasing project maturity.

The criteria are available here: https://www.bestpractices.dev/en/criteria

I believe that we already meet the passing criteria, so we should probably go ahead and sign up on the site to get the project started. This will require an org owner to authorize.

trask commented 9 months ago

@open-telemetry/sig-security-maintainers is this something you can drive?

cartersocha commented 9 months ago

Yes @trask

austinlparker commented 9 months ago

Ok, cool. It looks like it's a self-certification, so let me put it in here with a checklist in a new comment.

austinlparker commented 9 months ago

Basics Basic project website content

FLOSS license

Other

Change Control Public version-controlled source repository

Unique version numbering

Release notes

Reporting Bug-reporting process

Vulnerability report process

Quality Working build system

Automated test suite

New functionality testing

Warning flags

Security Secure development knowledge

Analysis Static code analysis

Dynamic code analysis

cartersocha commented 9 months ago

I sent a formal request to get OpenSSF access for the organization. Not sure if the GC or TC has access to accept that

trask commented 9 months ago

I sent a formal request to get OpenSSF access for the organization. Not sure if the GC or TC has access to accept that

cc @open-telemetry/technical-committee

carlosalberto commented 9 months ago

I did a quick pass on the requirements, and it indeed looks we are fine, but out of curiosity, has the Security SIG done a full review?

cartersocha commented 9 months ago

Our draft badge using the Collector repo can be found here. @jpkrohling could you review the remaining items? We're at 76% percent but not sure of the status on the remaining

jpkrohling commented 9 months ago

I filled some more, but I believe we should have one badge per repository. I'll also bring this to the attention of Collector leads.

cartersocha commented 9 months ago

Okay thank you! I can join the Collector sig if needed but when I joined the other day attendance was so high I didn't want to distract from the ongoing development discussion.

cartersocha commented 9 months ago

@trask / @austinlparker we're at 99% but not technically passing on the Collector repo. For graduation are we required to be passing or just to have the badge in an acceptable state?

austinlparker commented 9 months ago

I believe we need passing. What's missing?

austinlparker commented 9 months ago

(technically we need this to be passing against each core repo, but I figure collector's the best place to start...?)

austinlparker commented 9 months ago

Oh, I see, the CVE one... well, I don't think we've ever had a CVE, right? So we're in compliance there. We should make sure that there's some notes/automation somewhere to attach CVEs to release notes if a change happened as a result of a CVE

cartersocha commented 9 months ago

It's not the CVE part. We're missing in the dynamic code analysis section - image

cartersocha commented 9 months ago

Nvm I see what you mean. Updating to say we're in compliance but we'll need to mention in the maintainer meeting the disclosure in change log is needed.

jpkrohling commented 9 months ago

I believe we need passing. What's missing?

@austinlparker, do you know who'd be able to confirm that? While it might not matter for the Collector, it would be good to have guidance for other SIGs. Perhaps @yurishkuro has a different recollection, but I don't think we needed 100% passing score for Jaeger when it was graduated a few years ago.