You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Review and acknowledgement of expectations for Sandbox projects and requirements for moving forward through the CNCF Maturity levels.
Met during Project's application on DD-MMM-YYYY.
Due Diligence Review.
Completion of this due diligence document, resolution of concerns raised, and presented for public comment satisfies the Due Diligence Review criteria.
Additional documentation as appropriate for project type, e.g.: installation documentation, end user documentation, reference implementation and/or code samples. Installation Docmentation Best Practices
Governance and Maintainers
Note: this section may be augmented by the completion of a Governance Review from TAG Contributor Strategy.
Suggested
Clear and discoverable project governance documentation.
Governance has continuously been iterated upon by the project as a result of their experience applying it, with the governance history demonstrating evolution of maturity alongside the project's maturity evolution.
Demonstrate usage of the maintainer lifecycle with outcomes, either through the addition or replacement of maintainers as project events have required.
If the project has subprojects: subproject leadership, contribution, maturity status documented, including add/remove process.
Required
Document complete list of current maintainers, including names, contact information, domain of responsibility, and affiliation. Owners.Md
A number of active maintainers which is appropriate to the size and scope of the project.
Six
Code and Doc ownership in Github and elsewhere matches documented governance roles.
List and document all project communication channels, including subprojects (mail list/slack/etc.). List any non-public communications channels and what their special purpose is.
Document project goals and objectives that illustrate the project’s differentiation in the Cloud Native landscape as well as outlines how this project fulfills an outstanding need and/or solves a problem differently.
Document what the project does, and why it does it - including viable cloud native use cases.
Achieve the Open Source Security Foundation (OpenSSF) Best Practices passing badge.
Ecosystem
Suggested
N/A
Required
Publicly documented list of adopters, which may indicate their adoption level (dev/trialing, prod, etc.) ADOPTERS.md
Used in appropriate capacity by at least 3 independent + indirect/direct adopters, (these are not required to be in the publicly documented list of adopters)
To be completed by the TOC
The project provided the TOC with a list of adopters for verification of use of the project at the level expected, i.e. production use for graduation, dev/test for incubation.
TOC verification of adopters.
Refer to the Adoption portion of this document.
Clearly documented integrations and/or compatibility with other CNCF projects as well as non-CNCF projects.
Porter Mixins are extensions of Porter that interact with other Open Source tools, such as Terraform, Helm, and Spin. Contributors are encouraged to make their own mixins with the use of our Skeletor template.
The Porter Operator is also an Operator that enables a Kubernetes native usage of Porter.
The text was updated successfully, but these errors were encountered:
Porter Incubation Application
v1.5
This template provides the project with a framework to inform the TOC of their conformance to the Incubation Level Criteria.
Project Repo(s): GetPorter/Porter
Project Site: porter.sh
Sub-Projects: Porter Operator, Porter Mixins
Communication: #porter and #porter-maintainers in CNCF Slack
Project points of contacts:
Incubation Criteria Summary for Porter
Adoption Assertion
The project has been adopted by the following organizations in a testing and integration or production capacity:
*
See Adopters
Application Process Principles
Suggested
N/A
Required
Completion of this due diligence document, resolution of concerns raised, and presented for public comment satisfies the Due Diligence Review criteria.
Installation Docmentation
Best Practices
Governance and Maintainers
Note: this section may be augmented by the completion of a Governance Review from TAG Contributor Strategy.
Suggested
Governance.MD
Biweekly meetings are recorded and put on Youtube.
Contribution Ladder discusses roles, how to become each role, and removal.
ContributionLadder has emeritus, inactivity period, and covers involuntary removal.
Required
Owners.Md
Six
Owners.MD
Porter CoC (CNCF CoC)
CoC
Porter Operator
Contributors and Community
Note: this section may be augmented by the completion of a Governance Review from TAG Contributor Strategy.
Suggested
ContributionLadder.MD
Required
Clearly defined and discoverable process to submit issues or changes.
Via Github
Project must have, and document, at least one public communications channel for users and/or contributors.
Contact in Readme
Contact in Readme
Yes, recently updated! (and is on website)
Contributing.MD
Insights
Engineering Principles
Suggested
Proposal Documentation
Latest, Canary and Quarterly Releases
Required
What is Porter?
This Github project board that feeds into our release board
There’s a lot in the website’s documentation, but this one is significant.
Releases
Security
Note: this section may be augmented by a joint-assessment performed by TAG Security.
Suggested
N/A
Required
We leverage Github security reporting, and have it documented in the SECURITY.md
Two factor authentication enforced by getporter organization
SECURITY.md
Ecosystem
Suggested
N/A
Required
Publicly documented list of adopters, which may indicate their adoption level (dev/trialing, prod, etc.)
ADOPTERS.md
Used in appropriate capacity by at least 3 independent + indirect/direct adopters, (these are not required to be in the publicly documented list of adopters)
To be completed by the TOC
The project provided the TOC with a list of adopters for verification of use of the project at the level expected, i.e. production use for graduation, dev/test for incubation.
Refer to the Adoption portion of this document.
Porter Mixins are extensions of Porter that interact with other Open Source tools, such as Terraform, Helm, and Spin. Contributors are encouraged to make their own mixins with the use of our Skeletor template.
The Porter Operator is also an Operator that enables a Kubernetes native usage of Porter.
The text was updated successfully, but these errors were encountered: