遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/7544)
<a href="https://www.bestpractices.dev/projects/7544"><img src="https://www.bestpractices.dev/projects/7544/badge"></a>
KubeBlocks helps developers and platform engineers manage database workloads (MySQL, PostgresSQL, Redis, MongoDB, Kafka and vector databases) on K8s inside your own cloud account. It supports multiple clouds, including AWS, Azure, GCP, and Alibaba Cloud.
https://github.com/apecloud/kubeblocks/blob/main/docs/CONTRIBUTING.md
https://cla-assistant.io/apecloud/kubeblocks
https://github.com/apecloud/kubeblocks/blob/main/CODE_OF_CONDUCT.md
KubeBlocks has as maintainer file: https://github.com/apecloud/kubeblocks/blob/main/MAINTAINERS.md No one will be the bottleneck. There're 5 maintainers who're also the admin of the project. Necessary keys and passwords are managed by two of the maintainers
There are totally 42 project members for KubeBlocks, out of which there are 5 maintainers, 8 approvers and 15 reviewers. The maintaners file can be found here: https://github.com/apecloud/kubeblocks/blob/main/MAINTAINERS.md The approvers file can be found here: https://github.com/apecloud/kubeblocks/blob/main/.github/CODEOWNERS
https://kubeblocks.io/docs/release-0.5/user_docs/introduction#architecture
There're some feature flags to narrow the use cases and make the system secure.
https://kubeblocks.io/docs/release-0.5/user_docs/kubeblocks-for-mysql/cluster-management/create-and-connect-a-mysql-cluster#recommended-create-a-cluster-on-a-tainted-node
https://kubeblocks.io/docs/release-0.5/user_docs/kubeblocks-for-mysql/cluster-management/scale-for-apecloud-mysql#vertical-scaling
https://kubeblocks.io/docs/preview/user_docs/quick-start/try-kubeblocks-on-your-laptop https://kubeblocks.io/docs/release-0.5/user_docs/quick-start/try-kubeblocks-on-cloud
The KubeBlocks documents are version based, currently the version is 1.5 than the doc is the version accordingly: https://kubeblocks.io/docs/release-0.5/user_docs/introduction
https://github.com/apecloud/kubeblocks
KubeBlocks can provide yaml based operations and command line tools kbcli, the are all just using terminal. https://kubeblocks.io/docs/release-0.5/user_docs/kubeblocks-for-mysql/cluster-management/create-and-connect-a-mysql-cluster
KubeBlocks provide English for docs and project tools, it also enables other languages to be added easily with the framework.
The project sites don't ask for passowrds.
https://kubeblocks.io/docs/release-0.5/user_docs/cli/kbcli_kubeblocks_upgrade
https://github.com/apecloud/kubeblocks/issues
no vulnerabilities resolved in the last 12 months
https://github.com/apecloud/kubeblocks/blob/main/SECURITY.md
KubeBlocks uses go as the primary language and configured the linter for check.
https://github.com/apecloud/kubeblocks/blob/main/.github/workflows/cicd-push.yml#L145
Configured as Github action triggered by PR push event. https://github.com/apecloud/kubeblocks/blob/main/.github/workflows/cicd-push.yml#L145
All binaries and container images are automatically generated:
images: https://github.com/apecloud/kubeblocks/blob/main/.github/workflows/release-image.yml helm chart: https://github.com/apecloud/kubeblocks/blob/main/.github/workflows/release-helm-chart.yml
All build logs are visible by all community users from Github actions. https://github.com/apecloud/kubeblocks/actions/workflows/release-image.yml
No recursively build subdirectories.
All build process can be repeated by following the action:
There are install and clean up section for this:
https://kubeblocks.io/docs/release-0.5/user_docs/installation/introduction
Here is the information for system target:
https://kubeblocks.io/docs/release-0.5/user_docs/installation/install-kbcli
Here's the development and contribution guide for KubeBlocks:
Listed in the go mod:
https://github.com/apecloud/kubeblocks/blob/main/go.mod
We use Synk for security scan and audit, receive weekly report. We use CI check items to scan security issues and integrate with Github security page for security notification.
https://github.com/apecloud/kubeblocks/security
We use go mod for this work.
Yes, we use go linter static check for this.
Every PR has this report, e.g.
https://github.com/apecloud/kubeblocks/pull/4302
Yes, 100% closed issues has test cases contained including unit-test, integrated tests and e2e tests.
Current met coverage to over 70%
Yes, KubeBlocks has a CI check new patches must not reduce the testing coverage.
https://github.com/apecloud/kubeblocks/pull/4258
Yes, KubeBlocks has a CI check new patches and it will shows the test coverage changes.
yes, KubeBlocks adopts klog and add warning logs in the code, users can use parameters to define the log level.
The KubeBlocks architecture (https://kubeblocks.io/docs/release-0.5/user_docs/introduction#architecture) is a standard Kubernetes operator, adhere to the secure design standards that are in compliance with Kubernetes operator.
All security-related interactions utilize the Secret resource within Kubernetes. And code reviews are put in place to ensure that the project does not depend on algorithms or modes with known serious weaknesses.
Yes, we have lint and static check for this to make sure.
KubeBlocks is run on Kubernetes, use ConfigMap to store configuration files, use Secret to store credentials only.
Our release are signed as a part of the release build: https://github.com/apecloud/kubeblocks/releases
We don't accept any inputs from arbitrary sources.
We use strict compiler flags: https://github.com/apecloud/kubeblocks/blob/main/Makefile#L63 And strictly use Kubernetes RBAC model
KubeBlocks uses golangci-lint and staticcheck as Github CI actions
KubeBlocks uses golang whiches not applicable on this.
后退