This document defines project governance for the cert-manager project. Its purpose is to describe how decisions are made on the project and how anyone can influence these decisions.
This governance charter applies to every project under the cert-manager GitHub organisation. The term "cert-manager project" refers to any work done under the cert-manager GitHub organisation and includes the cert-manager/cert-manager repository itself as well as cert-manager/trust-manager, cert-manager/approver-policy and all the other repositories under the cert-manager GitHub organisation.
We have six levels of responsibility, each one building on the previous:
cert-manager is for everyone. Whether you're an experienced developer, a dedicated documenter, a passionate community builder, or simply someone eager to make a positive impact, cert-manager welcomes you as a valued contributor.
Anyone can become a cert-manager contributor simply by contributing to the project, whether through code, documentation, blog posts, community management, or other means.
- Follow the cert-manager Code of Conduct.
- Follow the guidelines in the Contributing page.
GitHub Members are active contributors to the cert-manager project, or one of the related projects in the cert-manager GitHub organisation.
A contributor is considered to be active when they have had at least one
interaction (comment on an issue or PR or message in the #cert-manager
or
#cert-manager-dev
channels in the Kubernetes Slack) within the last 18 months.
Members that have been inactive over the past 18 months may be removed from the GitHub organization.
Defined by: Member of the cert-manager GitHub organization.
To be added as a GitHub member of the cert-manager organization, you will need
to look for two sponsors with at least the reviewer
role. These two sponsors
must have had some meaningful interaction with you on an issue on GitHub or on
the #cert-manager
or #cert-manager-dev
channels on the Kubernetes Slack.
Then, open an issue on the community repository and mention your sponsors as well as links to the meaningful interactions (Slack threads, GitHub issues). Ask your sponsors to confirm their sponsorship by commenting on your PR. After that, your request will be reviewed by a cert-manager admin, in accordance with their SLO.
To be added as a GitHub member, you will also need to enable two-factor authentication on your GitHub account.
GitHub members are encouraged to engage with the mailing list [email protected] as well as the #cert-manager
and #cert-manager-dev
channels on the Kubernetes Slack.
No extra responsibilities.
- GitHub Members can be assigned to issues and pull requests via
/assign @username
, they can self-assign with/assign
, and people can ask members for reviews with a /cc @username. - GitHub Members do not need
/ok-to-test
. The CI run automatically on their pull requests. - GitHub Members can use the command
/ok-to-test
to enable tests on pull requests. - GitHub Members can manage pull requests and issues with
/close
and/reopen
.
The mission of the reviewer is to read through PRs for quality and correctness on all or some part of cert-manager. Reviewers are knowledgeable about the codebase as well as software engineering principles. Individuals with expertise in documentation, website content, and other facets of the project are also encouraged to join as reviewers.
Defined by: the reviewers
section in the file OWNERS
.
To become a reviewer, you will need to look for a sponsor with at least the approver role. Your sponsor must have had close interactions with you: they must have closely reviewed one of your PRs or worked with you on a complex issue.
Then, create a PR to add your name to the list of reviewers
in the OWNERS
file on the repository in which you want to become a Reviewer. The PR
description should list your significant contributions and should mention your
sponsor. Your sponsor is expected to give their approval as a comment on your
PR. If you would like to become a reviewer for multiple repositories, you will
need to repeat the process for each repository.
- Review code changes when Prow selects you on a pull request.
- When possible, review pull requests, triage issues, and fix bugs in their areas of expertise.
- Ensure that all changes go through the project's code review and integration processes.
- Reviewers can
/lgtm
on pull requests.
Note: some projects call this role "committer".
As an approver, your role is to make sure the right people reviewed the PRs. The
approver's focus isn't to review the code; instead, they put a stamp of approval
on an existing review with the command /approve
. Note that it is always
possible to review a PR as an approver with /lgtm
, in which case the PR will
be automatically approved.
Defined by: the approver
section in the OWNERS
file.
To become an approver and start merging PRs, you must have reviewed 5 PRs.
You will then need to get sponsorship from one of the maintainers. The maintainer sponsoring you must have had close work interactions with you and be knowledgeable of some of your work.
To apply, open a PR to update the OWNERS
file on the repository you would like
to become an Approver for and mention your sponsor in the description. The PR
description should also list the PRs you have reviewed. If you would like to
become an approver for multiple repositories, you will need to repeat the
process for each repository.
- Expected to be responsive to review requests.
- Stay up to date with the project's direction and goals, e.g., by attending
some of the bi-weekly meetings, standups, or being around in the
#cert-manager
and the#cert-manager-dev
channels on the Kubernetes Slack.
- Can
/approve
on pull requests.
A maintainer is someone who can communicate with the CNCF on behalf of the project and who can participate in lazy consensus and votes.
Defined by: MAINTAINERS.md
.
Any existing Approver can become a cert-manager maintainer. Maintainers should be proficient in Go; have expertise in at least one of the domains (Kubernetes, PKI, ACME); have the time and ability to meet the maintainer expectations above; and demonstrate the ability to work with the existing maintainers and project processes.
To become a maintainer, start by expressing interest to existing maintainers. Existing maintainers will then ask you to demonstrate the qualifications above by contributing PRs, doing code reviews, and other such tasks under their guidance. After several months of working together, maintainers will decide whether to grant maintainer status.
- Can communicate with the CNCF on behalf of the project.
- Can participate in lazy consensus and votes.
- Monitor cncf-cert-manager-* emails and help out when possible.
- Respond to time-sensitive security release processes.
- Create and attend meetings with the cert-manager Steering Committee (not less than once a quarter).
- Attend "maintainers vote" meetings when one is scheduled.
Substantial changes to the project require a "maintainers decision". This includes, but is not limited to, changes to the project's roadmap, changes to the project's scope, fundamental design decisions, and changes to the project's governance.
A "maintainers decision" is made using lazy consensus. Email or Slack can be used to reach lazy consensus as long as the deliberation date and time are specified and the maintainers are CC'ed. You may use the following message template:
Dear maintainers, I'd like us to reach an agreement on the following matter using lazy consensus: [...]
- 🧑💻 Participants: @cert-manager-maintainers
- 📢 Deadline: April 3rd, 2023 23:59 UTC
- 🚨 Note: to speed up the process, you may answer with a 👍 or a comment stating that you are lazy to help reach consensus before the deadline.
Any disagreements with regards to the decision must be posted as a comment on the Slack message or to the email thread along with an explanation of why. Disagreements posted without justification will not be considered.
While most decisions are typically reached through the principle of lazy consensus, there exists the option for a maintainer to propose a formal vote. Unless otherwise specified, such a vote would require a simple majority approval from all maintainers to be considered successful. Situations that might warrant a formal vote include, but are not limited to, cases where a decision necessitates explicit input from every participant or when disagreements arise during a lazy consensus discussion.
If a maintainer is no longer interested in or cannot perform the duties listed above, they should move themselves to emeritus status. If necessary, this can also occur through the decision-making process outlined above.
An admin is a maintainer who has admin privileges on the cert-manager infrastructure.
The admins aren't defined in any public file. The admins are the GitHub members on the cert-manager org that are set as "Owner". Additionally, admins have their email listed in GCP so that they can perform releases.
To become an admin, you must already be a maintainer for a time and have some understanding of the technologies used in the cert-manager infrastructure (e.g., Prow). Then, create an issue on the community repository and mention each maintainer. Each maintainer will need to comment on the issue to express their approval.
- Can change settings in the GitHub organization (e.g., remove protected branches, add GitHub members, etc.)
- Can run the Google Cloud Build playbooks to release new versions of cert-manager.
- Must have availability to allocate time to perform cert-manager releases.
- Must be available to perform admin-related tasks (add a GitHub member, promote a GitHub user to "Owner", add someone to the GCP projects, etc.)
- Must be responsible with the privileges granted to them.
Anyone who has reached any level within the cert-manager project can step down at any time.
GitHub Members, Reviewers, Approvers, Maintainers and Admins should give notice of their intent to step down by raising an issue on the community repo, so that their permissions can be revoked for security reasons.
A review of the MAINTAINERS.md
file is performed every
year by active current maintainers. During this review, the maintainers that
have not been active in the last 18 months are asked whether they would like to
become an emeritus maintainer and they are expected to respond within 30 days.
If they do not respond, they will automatically be moved to emeritus status.
For security reasons, anyone at any level who isn't actively involved in the project for over a year is liable to be timed out upon review by an active maintainer.
Anyone who is timed out can reach out to a maintainer to request to be reinstated to their previous level.
There is no regularly scheduled check for any org level except for maintainer; timing out non-maintainers is ad-hoc.
Anyone who has reached the "Maintainer" level will be added to the list of
"emeriti" maintainers in MAINTAINERS.md
upon stepping down or timing out.
This is a marker of thanks for people who were involved in shaping the project.
The cert-manager project abides by the code of conduct in CODE_OF_CONDUCT.md
.
Everyone interacting with the project must abide by this code of conduct, whether officially assigned one of the levels listed in this document or if simply interacting with the project (e.g. by joining a meeting or commenting on a GitHub issue). The same rules apply for members of the steering committee.
If a committee with jurisdiction under the Code of Conduct recommends a person be removed from the project, then after the conclusion (if applicable) of any appeals, that person will be removed and will not be eligible to rejoin the project for at least one year from the date of their removal.
If someone with an assigned level is undergoing an investigation by any committee with jurisdiction under the Code of Conduct, it may be appropriate for that users to have all permissions removed temporarily while the investigation is underway, as specified under Interim Protective Measures in the CNCF incident resolution process.
This could include removal from the GitHub organization, GCP projects, 1password or any other relevant space. This should coincide with any notifications made to the accused person, as detailed in the CNCF incident resolution process:
While the investigation is ongoing, the CoC Committee shall determine in its discretion whether, how, and when to notify the accused person, and how much information to share about the nature of the allegations, if any, taking into consideration risks of retaliation, evidence tampering or destruction, or witness tampering that might result from the notification.
If someone violates the Code of Conduct to a level such that removal from the project is recommended, they must immediately have all permissions removed from all cert-manager repos (if they hadn't already had permissions removed on a temporary basis).
Maintainers removed in this fashion are not eligible for emeritus status.