toc icon indicating copy to clipboard operation
toc copied to clipboard

[Incubation] Confidential Containers Incubation Application

Open mythi opened this issue 11 months ago • 6 comments

Confidential Containers Incubation Application

v1.6 This template provides the project with a framework to inform the TOC of their conformance to the Incubation Level Criteria.

Project Repo(s): https://github.com/confidential-containers (Github org) Project Site: https://confidentialcontainers.org/ Sub-Projects: see the detailed list with descriptions below Communication: #confidential-containers on CNCF Slack

Project points of contacts:

Incubation Criteria Summary for Confidential Containers

Application Level Assertion

  • [x] This project is currently Sandbox, accepted on 20220626 and applying to Incubation.
  • [ ] This project is applying to join the CNCF at the Incubation level.

Adoption Assertion

The project has been adopted by the following organizations in a testing and integration or production capacity:

  • https://github.com/confidential-containers/confidential-containers/blob/main/ADOPTERS.md

Application Process Principles

Suggested

N/A

Required

  • [x] Give a presentation and engage with the domain specific TAG(s) to increase awareness
    • This was completed and occurred on 28-Aug-2024, and can be discovered at https://zoom.us/rec/share/nCSdjZxN4DjxA7RopMqocddvDBPzxuO-Xpa2u-9xzB8MbumatD1Vtw0ePpNrobHy.Cby9t12K1IJfq_tk
    • https://github.com/cncf/tag-security/issues/1320
  • [x] TAG provides insight/recommendation of the project in the context of the landscape - Insight provided as part of presentation to engage on 28-Aug 2024 recorded here -> https://zoom.us/rec/share/nCSdjZxN4DjxA7RopMqocddvDBPzxuO-Xpa2u-9xzB8MbumatD1Vtw0ePpNrobHy.Cby9t12K1IJfq_tk - Further insight provided when Marina Moore presented to CoCo Project weekly meeting on 12 Sep 2024 -> ​​https://zoom.us/rec/share/CoBjav5zAv_AOZaOSJMgSJTlvz6vrzs8rFxfuaTy6qG8Q5fwToc7l5xyiS5U_rJj.Qurwv3NKGNSjKO8i

  • [x] All project metadata and resources are vendor-neutral.

  • Confidential containers github The CoCo project is in a public github repo vendor neutral.

  • [x] Review and acknowledgement of expectations for Sandbox projects and requirements for moving forward through the CNCF Maturity levels.

  • CNCF Sandbox Onboarding completed 26-06-2022.

  • [ ] Due Diligence Review.

Completion of this due diligence document, resolution of concerns raised, and presented for public comment satisfies the Due Diligence Review criteria.

  • [x] Additional documentation as appropriate for project type, e.g.: installation documentation, end user documentation, reference implementation and/or code samples.

Quickstart guides: https://github.com/confidential-containers/confidential-containers/blob/main/quickstart.md Confidential containers website (docs, blogs and additional information): https://confidentialcontainers.org/

Governance and Maintainers

Note: this section may be augmented by the completion of a Governance Review from TAG Contributor Strategy.

Suggested

  • [x] Clear and discoverable project governance documentation.

  • [x] Governance has continuously been iterated upon by the project as a result of their experience applying it, with the governance history demonstrating evolution of maturity alongside the project's maturity evolution.

    • See examples of iterations below.
    • https://github.com/confidential-containers/confidential-containers/pull/235
    • https://github.com/confidential-containers/confidential-containers/pull/229
  • [x] Governance is up to date with actual project activities, including any meetings, elections, leadership, or approval processes.

    • Regular updates of TSC members when companies are doing rotation
  • [x] Governance clearly documents vendor-neutrality of project direction.

    • The Confidential container project goals include specific points for enforcing vendor neutrality:
      • Transparent deployment of unmodified containers
      • Support for multiple TEE and hardware platforms
  • [x] Document how the project makes decisions on leadership, contribution acceptance, requests to the CNCF, and changes to governance or project goals.

See the community governance document

  • [x] Document how role, function-based members, or sub-teams are assigned, onboarded, and removed for specific teams (example: Security Response Committee).

See the community governance document

  • [x] Document a complete maintainer lifecycle process (including roles, onboarding, offboarding, and emeritus

See the community governance document

  • [x] Demonstrate usage of the maintainer lifecycle with outcomes, either through the addition or replacement of maintainers as project events have required.

  • [x] If the project has subprojects: subproject leadership, contribution, maturity status documented, including add/remove process.

    • subprojects follow the project org-level governance for contributions, maintainership etc.
    • the removal is not documented. bigger contributions that'd justify a sub-project creation follow the RFC process in the contributions guide

Required

  • [x] Document complete list of current maintainers, including names, contact information, domain of responsibility, and affiliation.

  • The community uses the github teams feature to track maintainers for the different repos: confidential containers teams

  • [x] A number of active maintainers which is appropriate to the size and scope of the project.

See confidential containers teams responsible for the different efforts in this project.

  • [x] Code and Doc ownership in Github and elsewhere matches documented governance roles.

Each repo has their CODEOWNERS pointing to the maintainers.

  • [x] Document agreement that project will adopt CNCF Code of Conduct.

https://github.com/confidential-containers/confidential-containers/blob/main/CODE_OF_CONDUCT.md

  • [x] CNCF Code of Conduct is cross-linked from other governance documents.

https://github.com/confidential-containers/confidential-containers/blob/main/CODE_OF_CONDUCT.md

  • [x] All subprojects, if any, are listed.

    • Trustee - CoCo attestation services
    • guest-components - CoCo TEE/client side components
    • cloud-api-adaptor - CoCo "peer-pods" deployment
    • operator - CoCo "installer"
    • trustee-operator - CoCo Trustee "installer"
    • td-shim - CoCo minimal virtual firmware

Contributors and Community

Note: this section may be augmented by the completion of a Governance Review from TAG Contributor Strategy.

Suggested

  • [x] Contributor ladder with multiple roles for contributors.

See community members and roles

Required

  • [x] Clearly defined and discoverable process to submit issues or changes.

  • Documented in the contribution guide.

  • [x] Project must have, and document, at least one public communications channel for users and/or contributors.

CNCF Slack (#confidential-containers)

Github org "front page": https://github.com/confidential-containers/

  • [x] List and document all project communication channels, including subprojects (mail list/slack/etc.). List any non-public communications channels and what their special purpose is.

Github org "front page": https://github.com/confidential-containers/

  • [x] Up-to-date public meeting schedulers and/or integration with CNCF calendar.

Github org "front page": https://github.com/confidential-containers/ has a pointer to our community meetings calendar. The meetings do not show up on CNCF Calendar yet.

  • [x] Documentation of how to contribute, with increasing detail as the project matures

  • Documented in the contribution guide.

  • [x] Demonstrate contributor activity and recruitment.

CNCF Dev Stats for Confidential Containers is available: https://confidentialcontainers.devstats.cncf.io/d/8/dashboards?orgId=1&refresh=15m

Engineering Principles

Suggested

  • [x] Roadmap change process is documented.

All changes to the CoCo roadmap are documented in the Confidential containers SC meeting notes and have also been shared with the communicate and documented in Confidential Containers Community Meeting

  • [x] History of regular, quality releases.

See our documented release folder: https://github.com/confidential-containers/confidential-containers/tree/main/releases

Required

  • [x] Document project goals and objectives that illustrate the project’s differentiation in the Cloud Native landscape as well as outlines how this project fulfills an outstanding need and/or solves a problem differently.

See the projects goals in our website: https://confidentialcontainers.org/

  • [x] Document what the project does, and why it does it - including viable cloud native use cases.

The projects website gives a high-level overview and the coco intro blog goes into more details.

  • [x] Document and maintain a public roadmap or other forward looking planning document or tracking mechanism.

https://github.com/confidential-containers/confidential-containers/blob/main/roadmap.md

  • [x] Document overview of project architecture and software design that demonstrates viable cloud native use cases, as part of the project's documentation.

The project website as a detailed architecture section.

  • [x] Document the project's release process.

The goal of the project is to release every 6 weeks (documented in https://github.com/confidential-containers/confidential-containers/blob/main/README.md) The release process is documented here: https://github.com/confidential-containers/confidential-containers/blob/main/.github/ISSUE_TEMPLATE/release-check-list.md

Security

Note: this section may be augmented by a joint-assessment performed by TAG Security.

Suggested

N/A

Required

  • [x] Clearly defined and discoverable process to report security issues.

Github org-wide setting.

  • [x] Enforcing Access Control Rules to secure the code base against attacks (Example: two factor authentication enforcement, and/or use of ACL tools.)

All project maintainers use a two factor authentication: https://github.com/confidential-containers/confidential-containers/blob/main/MAINTAINERS

  • [x] Document assignment of security response roles and how reports are handled.

https://github.com/confidential-containers/.github/blob/main/SECURITY.md

Documented on Tag-Security website.

  • [x] Achieve the Open Source Security Foundation (OpenSSF) Best Practices passing badge.

OpenSSF Best Practices

Ecosystem

Suggested

N/A

Required

  • [x] Publicly documented list of adopters, which may indicate their adoption level (dev/trialing, prod, etc.)

List of project adopters: https://github.com/confidential-containers/confidential-containers/blob/main/ADOPTERS.md

  • [x] Used in appropriate capacity by at least 3 independent + indirect/direct adopters, (these are not required to be in the publicly documented list of adopters)

Will be provided on demand.

The project provided the TOC with a list of adopters for verification of use of the project at the level expected, i.e. production use for graduation, dev/test for incubation.

  • [ ] TOC verification of adopters.

Refer to the Adoption portion of this document.

  • [x] Clearly documented integrations and/or compatibility with other CNCF projects as well as non-CNCF projects.

See confidential containers design overview.

CoCo interacts with the following CNCF projects:

CoCo interacts with the following non-CNCF projects:

Additional Information

mythi avatar Dec 10 '24 08:12 mythi

@mauilion to triage

angellk avatar Jan 21 '25 16:01 angellk

@angellk @mauilion any progress on triage or otherwise?

mythi avatar Apr 03 '25 15:04 mythi

@mythi the TOC is still in the KubeCon freeze period. Once the freeze period is over, a TOC member will triage your application to move forward in the board or to be closed. Please ensure your application is complete, including the security self assessment using the template from TAG Security and 5-7 adopters have been submitted.

angellk avatar Apr 05 '25 08:04 angellk

Hi there. I'm part of the confidential containers TSC and checking if there is any progress on this request or something additional we need to do :-)

ariel-adam avatar Apr 20 '25 07:04 ariel-adam

@mythi the TOC is still in the KubeCon freeze period. Once the freeze period is over, a TOC member will triage your application to move forward in the board or to be closed. Please ensure your application is complete, including the security self assessment using the template from TAG Security and 5-7 adopters have been submitted.

@angellk is some TOC member assigned to do the triage? @mauilion maybe (but looks like he's not on TOC)?

mythi avatar May 27 '25 05:05 mythi

@angellk to triage.

chadbeaudin avatar Jun 10 '25 15:06 chadbeaudin

@angellk to triage.

ping?

mythi avatar Jul 23 '25 12:07 mythi

In preparation for k8gb to be picked up by a TOC member please:

angellk avatar Oct 12 '25 13:10 angellk

@angellk we are in the process of getting the full list of adopters and should have it by EOW (especially new companies using CoCo). For now however we will start with the adopters we already have (https://github.com/confidential-containers/confidential-containers/blob/main/ADOPTERS.md) and representatives from each company will fill up the form

Please let us know if you have any questions

ariel-adam avatar Oct 19 '25 12:10 ariel-adam