遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/9160)
<a href="https://www.bestpractices.dev/projects/9160"><img src="https://www.bestpractices.dev/projects/9160/badge"></a>
The Metal3 Project's mission is to empower organizations with a flexible, open-source solution for bare metal provisioning that combines the benefits of bare metal performance with the ease of use and automation provided by Kubernetes.
There are a number of great open source tools for bare metal host provisioning, including Ironic. Metal3 aims to build on these technologies to provide a Kubernetes native API for managing bare metal hosts via a provisioning stack that is also running on Kubernetes. We believe that Kubernetes Native Infrastructure, or managing your infrastructure just like your applications, is a powerful next step in the evolution of infrastructure management.
The Metal3 project is also building integration with the Kubernetes cluster-api project, allowing Metal3 to be used as an infrastructure backend for Machine objects from the Cluster API. These components integrate seamlessly to leverage the Kubernetes ecosystem and automate the provisioning and management of bare-metal infrastructure.
https://github.com/metal3-io/community/blob/main/maintainers/ALL-OWNERS
We have major contributors and org owners from Ericsson and Red Hat, as well as major contributors from elsewhere.
CNCF stats: https://all.devstats.cncf.io/d/66/developer-activity-counts-by-companies?orgId=1&var-period_name=Last%20year&var-metric=contributions&var-repogroup_name=Metal%C2%B3&var-country_name=All&var-companies=All
Boilerplate missing from individual files.
Each repository has LICENCE in its root, but not in each source file. https://github.com/metal3-io/community/blob/main/LICENSE
Github is used.
We have "help wanted", "good first issue" labels. https://github.com/issues?q=archived%3Afalse+user%3Ametal3-io+label%3A%22good+first+issue%22+is%3Aissue+sort%3Acreated-asc+is%3Aopen+
Some 2FA requirements are in place, but to be verified if enough is covered.
Github 2FA including TOTP should qualify for this.
All PRs must be reviewed by 2 persons. Self-review is not allowed.
To be verified if Go builds are reproducible as is, since the Go puts date, time, machine etc in the binary.
Tests are run in standard way per language. Example: CAPM3 https://github.com/metal3-io/cluster-api-provider-metal3/blob/db5d18f1b6e99e52189b2c0d136f8894acc9d67a/Makefile#L243
We use k8s Prow for managing CI, which consists of all levels of tests as requirement to merging changes. Prow, GH workflows and e2e in Jenkins, with various level of testing (integration, real hardware, features, etc)
https://prow.apps.test.metal3.io/
Coverage percentage to be verified.
We have TLS 1.3 by default and do not use old/weak protocols.
We have TLS 1.3 by default.
// X-Content-Type-Options was not set to "nosniff".
No external security review performed.
We are hardened by default, but do not have hardening documentation available. To be fixed.
No fuzzing is implemented yet.
No assertions are enabled in production builds. Gold check for dynamic analysis missing.
后退