Skip to content

Latest commit

 

History

History
338 lines (240 loc) · 14.8 KB

GOVERNANCE.md

File metadata and controls

338 lines (240 loc) · 14.8 KB

cert-manager Governance

This document defines project governance for the cert-manager project. Its purpose is to describe how decisions are made on the project and how anyone can influence these decisions.

This governance charter applies to every project under the cert-manager GitHub organisation. The term "cert-manager project" refers to any work done under the cert-manager GitHub organisation and includes the cert-manager/cert-manager repository itself as well as cert-manager/trust-manager, cert-manager/approver-policy and all the other repositories under the cert-manager GitHub organisation.

We have six levels of responsibility, each one building on the previous:

Contributor

cert-manager is for everyone. Whether you're an experienced developer, a dedicated documenter, a passionate community builder, or simply someone eager to make a positive impact, cert-manager welcomes you as a valued contributor.

Becoming a Contributor

Anyone can become a cert-manager contributor simply by contributing to the project, whether through code, documentation, blog posts, community management, or other means.

Contributor Responsibilities

GitHub Member

GitHub Members are active contributors to the cert-manager project, or one of the related projects in the cert-manager GitHub organisation.

A contributor is considered to be active when they have had at least one interaction (comment on an issue or PR or message in the #cert-manager or #cert-manager-dev channels in the Kubernetes Slack) within the last 18 months.

Members that have been inactive over the past 18 months may be removed from the GitHub organization.

Defined by: Member of the cert-manager GitHub organization.

Becoming a GitHub Member

To be added as a GitHub member of the cert-manager organization, you will need to look for two sponsors with at least the reviewer role. These two sponsors must have had some meaningful interaction with you on an issue on GitHub or on the #cert-manager or #cert-manager-dev channels on the Kubernetes Slack.

Then, open an issue on the community repository and mention your sponsors as well as links to the meaningful interactions (Slack threads, GitHub issues). Ask your sponsors to confirm their sponsorship by commenting on your PR. After that, your request will be reviewed by a cert-manager admin, in accordance with their SLO.

To be added as a GitHub member, you will also need to enable two-factor authentication on your GitHub account.

GitHub members are encouraged to engage with the mailing list [email protected] as well as the #cert-manager and #cert-manager-dev channels on the Kubernetes Slack.

GitHub Member Responsibilities

No extra responsibilities.

GitHub Member Privileges

  • GitHub Members can be assigned to issues and pull requests via /assign @username, they can self-assign with /assign, and people can ask members for reviews with a /cc @username.
  • GitHub Members do not need /ok-to-test. The CI run automatically on their pull requests.
  • GitHub Members can use the command /ok-to-test to enable tests on pull requests.
  • GitHub Members can manage pull requests and issues with /close and /reopen.

Reviewer

The mission of the reviewer is to read through PRs for quality and correctness on all or some part of cert-manager. Reviewers are knowledgeable about the codebase as well as software engineering principles. Individuals with expertise in documentation, website content, and other facets of the project are also encouraged to join as reviewers.

Defined by: the reviewers section in the file OWNERS.

Becoming a Reviewer

To become a reviewer, you will need to look for a sponsor with at least the approver role. Your sponsor must have had close interactions with you: they must have closely reviewed one of your PRs or worked with you on a complex issue.

Then, create a PR to add your name to the list of reviewers in the OWNERS file on the repository in which you want to become a Reviewer. The PR description should list your significant contributions and should mention your sponsor. Your sponsor is expected to give their approval as a comment on your PR. If you would like to become a reviewer for multiple repositories, you will need to repeat the process for each repository.

Reviewer Responsibilities

  • Review code changes when Prow selects you on a pull request.
  • When possible, review pull requests, triage issues, and fix bugs in their areas of expertise.
  • Ensure that all changes go through the project's code review and integration processes.

Reviewer Privileges

  • Reviewers can /lgtm on pull requests.

Approver

Note: some projects call this role "committer".

As an approver, your role is to make sure the right people reviewed the PRs. The approver's focus isn't to review the code; instead, they put a stamp of approval on an existing review with the command /approve. Note that it is always possible to review a PR as an approver with /lgtm, in which case the PR will be automatically approved.

Defined by: the approver section in the OWNERS file.

Becoming an Approver

To become an approver and start merging PRs, you must have reviewed 5 PRs.

You will then need to get sponsorship from one of the maintainers. The maintainer sponsoring you must have had close work interactions with you and be knowledgeable of some of your work.

To apply, open a PR to update the OWNERS file on the repository you would like to become an Approver for and mention your sponsor in the description. The PR description should also list the PRs you have reviewed. If you would like to become an approver for multiple repositories, you will need to repeat the process for each repository.

Approver Responsibilities

  • Expected to be responsive to review requests.
  • Stay up to date with the project's direction and goals, e.g., by attending some of the bi-weekly meetings, standups, or being around in the #cert-manager and the #cert-manager-dev channels on the Kubernetes Slack.

Approver Privileges

  • Can /approve on pull requests.

Maintainer

A maintainer is someone who can communicate with the CNCF on behalf of the project and who can participate in lazy consensus and votes.

Defined by: MAINTAINERS.md.

Becoming a Maintainer

Any existing Approver can become a cert-manager maintainer. Maintainers should be proficient in Go; have expertise in at least one of the domains (Kubernetes, PKI, ACME); have the time and ability to meet the maintainer expectations above; and demonstrate the ability to work with the existing maintainers and project processes.

To become a maintainer, start by expressing interest to existing maintainers. Existing maintainers will then ask you to demonstrate the qualifications above by contributing PRs, doing code reviews, and other such tasks under their guidance. After several months of working together, maintainers will decide whether to grant maintainer status.

Maintainer Privileges

  • Can communicate with the CNCF on behalf of the project.
  • Can participate in lazy consensus and votes.

Maintainer Responsibilities

  • Monitor cncf-cert-manager-* emails and help out when possible.
  • Respond to time-sensitive security release processes.
  • Create and attend meetings with the cert-manager Steering Committee (not less than once a quarter).
  • Attend "maintainers vote" meetings when one is scheduled.

Maintainer Decision-Making

Substantial changes to the project require a "maintainers decision". This includes, but is not limited to, changes to the project's roadmap, changes to the project's scope, fundamental design decisions, and changes to the project's governance.

A "maintainers decision" is made using lazy consensus. Email or Slack can be used to reach lazy consensus as long as the deliberation date and time are specified and the maintainers are CC'ed. You may use the following message template:

Dear maintainers, I'd like us to reach an agreement on the following matter using lazy consensus: [...]

  • 🧑‍💻 Participants: @cert-manager-maintainers
  • 📢 Deadline: April 3rd, 2023 23:59 UTC
  • 🚨 Note: to speed up the process, you may answer with a 👍 or a comment stating that you are lazy to help reach consensus before the deadline.

Any disagreements with regards to the decision must be posted as a comment on the Slack message or to the email thread along with an explanation of why. Disagreements posted without justification will not be considered.

While most decisions are typically reached through the principle of lazy consensus, there exists the option for a maintainer to propose a formal vote. Unless otherwise specified, such a vote would require a simple majority approval from all maintainers to be considered successful. Situations that might warrant a formal vote include, but are not limited to, cases where a decision necessitates explicit input from every participant or when disagreements arise during a lazy consensus discussion.

Stepping Down as a Maintainer

If a maintainer is no longer interested in or cannot perform the duties listed above, they should move themselves to emeritus status. If necessary, this can also occur through the decision-making process outlined above.

Admin

An admin is a maintainer who has admin privileges on the cert-manager infrastructure.

The admins aren't defined in any public file. The admins are the GitHub members on the cert-manager org that are set as "Owner". Additionally, admins have their email listed in GCP so that they can perform releases.

Becoming an Admin

To become an admin, you must already be a maintainer for a time and have some understanding of the technologies used in the cert-manager infrastructure (e.g., Prow). Then, create an issue on the community repository and mention each maintainer. Each maintainer will need to comment on the issue to express their approval.

Admin Privileges

  • Can change settings in the GitHub organization (e.g., remove protected branches, add GitHub members, etc.)
  • Can run the Google Cloud Build playbooks to release new versions of cert-manager.

Admin Responsibilities

  • Must have availability to allocate time to perform cert-manager releases.
  • Must be available to perform admin-related tasks (add a GitHub member, promote a GitHub user to "Owner", add someone to the GCP projects, etc.)
  • Must be responsible with the privileges granted to them.

Removing Contributors

Stepping Down

Anyone who has reached any level within the cert-manager project can step down at any time.

GitHub Members, Reviewers, Approvers, Maintainers and Admins should give notice of their intent to step down by raising an issue on the community repo, so that their permissions can be revoked for security reasons.

Timing Out

Maintainers

A review of the MAINTAINERS.md file is performed every year by active current maintainers. During this review, the maintainers that have not been active in the last 18 months are asked whether they would like to become an emeritus maintainer and they are expected to respond within 30 days.

If they do not respond, they will automatically be moved to emeritus status.

Other Levels

For security reasons, anyone at any level who isn't actively involved in the project for over a year is liable to be timed out upon review by an active maintainer.

Anyone who is timed out can reach out to a maintainer to request to be reinstated to their previous level.

There is no regularly scheduled check for any org level except for maintainer; timing out non-maintainers is ad-hoc.

Emeritus Status

Anyone who has reached the "Maintainer" level will be added to the list of "emeriti" maintainers in MAINTAINERS.md upon stepping down or timing out. This is a marker of thanks for people who were involved in shaping the project.

Removal

The cert-manager project abides by the code of conduct in CODE_OF_CONDUCT.md.

Everyone interacting with the project must abide by this code of conduct, whether officially assigned one of the levels listed in this document or if simply interacting with the project (e.g. by joining a meeting or commenting on a GitHub issue). The same rules apply for members of the steering committee.

If a committee with jurisdiction under the Code of Conduct recommends a person be removed from the project, then after the conclusion (if applicable) of any appeals, that person will be removed and will not be eligible to rejoin the project for at least one year from the date of their removal.

Project Permissions and Removal

If someone with an assigned level is undergoing an investigation by any committee with jurisdiction under the Code of Conduct, it may be appropriate for that users to have all permissions removed temporarily while the investigation is underway, as specified under Interim Protective Measures in the CNCF incident resolution process.

This could include removal from the GitHub organization, GCP projects, 1password or any other relevant space. This should coincide with any notifications made to the accused person, as detailed in the CNCF incident resolution process:

While the investigation is ongoing, the CoC Committee shall determine in its discretion whether, how, and when to notify the accused person, and how much information to share about the nature of the allegations, if any, taking into consideration risks of retaliation, evidence tampering or destruction, or witness tampering that might result from the notification.

If someone violates the Code of Conduct to a level such that removal from the project is recommended, they must immediately have all permissions removed from all cert-manager repos (if they hadn't already had permissions removed on a temporary basis).

Maintainers removed in this fashion are not eligible for emeritus status.