遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/974)
<a href="https://www.bestpractices.dev/projects/974"><img src="https://www.bestpractices.dev/projects/974/badge"></a>
Software switch for virtual environments
http://docs.openvswitch.org/en/latest/internals/contributing/submitting-patches/ http://docs.openvswitch.org/en/latest/internals/contributing/coding-style/
A bug tracker is available at https://github.com/openvswitch/ovs-issues.
Open vSwitch can be installed and uninstalled with "make install" and "make uninstall", or more commonly by using the included Debian and Red Hat packaging.
https://docs.openvswitch.org/en/latest/internals/contributing/submitting-patches/ talks about testing and suggests adding tests as part of contributions.
Open vSwitch compiles warning free with its default set of warnings on common platforms. Many developers build with "-Werror" to ensure that warnings cause build failures.
I believe that OpenSSL as implemented on common platforms meets these requirements.
Open vSwitch supports TLS for network communication.
Open vSwitch uses OpenSSL.
Open vSwitch requires the user to provide SSL certificates and verifies them.
Open vSwitch does not use HTTP.
Coverity can report these.
Developers occasionally use "valgrind" on the testsuite, by running "make check-valgrind". Some developers use AddressSanitizer. We also use oss-fuzz.
后退