You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Completion of this due diligence document, resolution of concerns raised, and presented for public comment satisfies the Due Diligence Review criteria.
Additional documentation as appropriate for project type, e.g.: installation documentation, end user documentation, reference implementation and/or code samples.
Governance has continuously been iterated upon by the project as a result of their experience applying it, with the governance history demonstrating evolution of maturity alongside the project's maturity evolution.
Document how role, function-based members, or sub-teams are assigned, onboarded, and removed for specific teams (example: Security Response Committee).
Demonstrate usage of the maintainer lifecycle with outcomes, either through the addition or replacement of maintainers as project events have required.
List and document all project communication channels, including subprojects (mail list/slack/etc.). List any non-public communications channels and what their special purpose is.
Document project goals and objectives that illustrate the project’s differentiation in the Cloud Native landscape as well as outlines how this project fulfills an outstanding need and/or solves a problem differently.
Used in appropriate capacity by at least 3 independent + indirect/direct adopters, (these are not required to be in the publicly documented list of adopters)
Will be provided on demand.
The project provided the TOC with a list of adopters for verification of use of the project at the level expected, i.e. production use for graduation, dev/test for incubation.
TOC verification of adopters.
Refer to the Adoption portion of this document.
Clearly documented integrations and/or compatibility with other CNCF projects as well as non-CNCF projects.
Confidential Containers Incubation Application
v1.6
This template provides the project with a framework to inform the TOC of their conformance to the Incubation Level Criteria.
Project Repo(s): https://github.com/confidential-containers (Github org)
Project Site: https://confidentialcontainers.org/
Sub-Projects: see the detailed list with descriptions below
Communication:
#confidential-containers
on CNCF SlackProject points of contacts:
Ariel Adam
Mikko Ylinen
(Post Incubation only) Book a meeting with CNCF staff to understand project benefits and event resources.
Incubation Criteria Summary for Confidential Containers
Application Level Assertion
Adoption Assertion
The project has been adopted by the following organizations in a testing and integration or production capacity:
Application Process Principles
Suggested
N/A
Required
TAG provides insight/recommendation of the project in the context of the landscape
- Insight provided as part of presentation to engage on 28-Aug 2024 recorded here -> https://zoom.us/rec/share/nCSdjZxN4DjxA7RopMqocddvDBPzxuO-Xpa2u-9xzB8MbumatD1Vtw0ePpNrobHy.Cby9t12K1IJfq_tk
- Further insight provided when Marina Moore presented to CoCo Project weekly meeting on 12 Sep 2024 -> https://zoom.us/rec/share/CoBjav5zAv_AOZaOSJMgSJTlvz6vrzs8rFxfuaTy6qG8Q5fwToc7l5xyiS5U_rJj.Qurwv3NKGNSjKO8i
All project metadata and resources are vendor-neutral.
Confidential containers github The CoCo project is in a public github repo vendor neutral.
Review and acknowledgement of expectations for Sandbox projects and requirements for moving forward through the CNCF Maturity levels.
CNCF Sandbox Onboarding completed 26-06-2022.
Due Diligence Review.
Completion of this due diligence document, resolution of concerns raised, and presented for public comment satisfies the Due Diligence Review criteria.
Quickstart guides: https://github.com/confidential-containers/confidential-containers/blob/main/quickstart.md
Confidential containers website (docs, blogs and additional information): https://confidentialcontainers.org/
Governance and Maintainers
Note: this section may be augmented by the completion of a Governance Review from TAG Contributor Strategy.
Suggested
Clear and discoverable project governance documentation.
Governance has continuously been iterated upon by the project as a result of their experience applying it, with the governance history demonstrating evolution of maturity alongside the project's maturity evolution.
Governance is up to date with actual project activities, including any meetings, elections, leadership, or approval processes.
Governance clearly documents vendor-neutrality of project direction.
Document how the project makes decisions on leadership, contribution acceptance, requests to the CNCF, and changes to governance or project goals.
See the community governance document
See the community governance document
See the community governance document
Demonstrate usage of the maintainer lifecycle with outcomes, either through the addition or replacement of maintainers as project events have required.
If the project has subprojects: subproject leadership, contribution, maturity status documented, including add/remove process.
RFC
process in the contributions guideRequired
Document complete list of current maintainers, including names, contact information, domain of responsibility, and affiliation.
The community uses the github teams feature to track maintainers for the different repos: confidential containers teams
See confidential containers teams responsible for the different efforts in this project.
Each repo has their
CODEOWNERS
pointing to the maintainers.https://github.com/confidential-containers/confidential-containers/blob/main/CODE_OF_CONDUCT.md
https://github.com/confidential-containers/confidential-containers/blob/main/CODE_OF_CONDUCT.md
All subprojects, if any, are listed.
Contributors and Community
Note: this section may be augmented by the completion of a Governance Review from TAG Contributor Strategy.
Suggested
See community members and roles
Required
Clearly defined and discoverable process to submit issues or changes.
Documented in the contribution guide.
Project must have, and document, at least one public communications channel for users and/or contributors.
CNCF Slack (
#confidential-containers
)Github org "front page": https://github.com/confidential-containers/
Github org "front page": https://github.com/confidential-containers/
Github org "front page": https://github.com/confidential-containers/ has a pointer to our community meetings calendar. The meetings do not show up on CNCF Calendar yet.
Documentation of how to contribute, with increasing detail as the project matures
Documented in the contribution guide.
Demonstrate contributor activity and recruitment.
CNCF Dev Stats for Confidential Containers is available: https://confidentialcontainers.devstats.cncf.io/d/8/dashboards?orgId=1&refresh=15m
Engineering Principles
Suggested
All changes to the CoCo roadmap are documented in the Confidential containers SC meeting notes and have also been shared with the communicate and documented in Confidential Containers Community Meeting
See our documented release folder: https://github.com/confidential-containers/confidential-containers/tree/main/releases
Required
See the projects goals in our website: https://confidentialcontainers.org/
The projects website gives a high-level overview and the coco intro blog goes into more details.
https://github.com/confidential-containers/confidential-containers/blob/main/roadmap.md
The project website as a detailed architecture section.
The goal of the project is to release every 6 weeks (documented in https://github.com/confidential-containers/confidential-containers/blob/main/README.md)
The release process is documented here: https://github.com/confidential-containers/confidential-containers/blob/main/.github/ISSUE_TEMPLATE/release-check-list.md
Security
Note: this section may be augmented by a joint-assessment performed by TAG Security.
Suggested
N/A
Required
Github org-wide setting.
All project maintainers use a two factor authentication: https://github.com/confidential-containers/confidential-containers/blob/main/MAINTAINERS
https://github.com/confidential-containers/.github/blob/main/SECURITY.md
Documented on Tag-Security website.
Ecosystem
Suggested
N/A
Required
List of project adopters: https://github.com/confidential-containers/confidential-containers/blob/main/ADOPTERS.md
Will be provided on demand.
The project provided the TOC with a list of adopters for verification of use of the project at the level expected, i.e. production use for graduation, dev/test for incubation.
Refer to the Adoption portion of this document.
See confidential containers design overview.
CoCo interacts with the following CNCF projects:
CoCo interacts with the following non-CNCF projects:
Additional Information
The text was updated successfully, but these errors were encountered: