遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/5398)
<a href="https://www.bestpractices.dev/projects/5398"><img src="https://www.bestpractices.dev/projects/5398/badge"></a>
The mission of the SEAPATH project is to develop a “reference design” and “industrial grade” open source real-time platform that can run virtualized automation and protection applications (for the power grid industry in the first place and potentially beyond). This platform is intended to host multi-provider applications
https://wiki.lfenergy.org/pages/viewpage.action?pageId=22980925
DCO check on github : https://github.com/seapath/ansible
https://github.com/seapath/.github/blob/main/seapath_governance.md
https://github.com/seapath/.github/blob/main/CODE_OF_CONDUCT.md
https://github.com/seapath/.github/blob/main/key_roles.md
The project is supported by 2 companies and the information is available in the documentation of the project https://github.com/seapath/.github/blob/main/key_roles.md
The project is backed up by 2 companies and rely on Open Source technologies. Therefore even if the bus factor criteria is not met. It will be possible to continue the project. Of course the quality of service would be lower during this transition.
Ex: https://github.com/seapath/TSC/blob/master/TSC_Minutes/24_11_2023%20%20Roadmap%20SEAPATH.md
https://github.com/seapath/seapath-architecture
https://wiki.lfenergy.org/display/SEAP/SEAPATH
Most of the developer documentation is available within the code
Already done for passing badge https://github.com/seapath
N/A : the project doesn't have an HMI https://github.com/seapath
no password set
The upgrade should be ok with the VM
GH issues are now used
No vulnerabilities found for the moment
https://github.com/seapath/.github/blob/main/SECURITY.md
https://github.com/seapath/.github/blob/main/CONTRIBUTING.md
SonarQube files generated (ex: vmmanager) migration on-going for online sonarqube tool. Needs to be add on github https://github.com/seapath
met for yocto ,do not apply debian
The project is deployed with ansible that already includes debug tools. Once the system is install you can relay on standard linux debug tools (journalctl and so on)
No compilation done
We're configuring an OS. therefore the rollback is to reinstall an OS
We're configuring an OS.
available in the yocto manifest (generated at compilation) available in debian (https://github.com/seapath/build_debian_iso/blob/main/srv_fai_config/package_config/SEAPATH)
yocto CVE check debian : https://security-tracker.debian.org/tracker/
yocto : patch debian :update packet (apt update packet name)
yocto : follow maintain branch (Dunfell) debian : follow maintain distribution (debian 11)
The project has it owns CI and the test reports are published on github
The review of the PR required tests for each new features. If a bug is detected by the user, if possible, a new test will be created to increase the test coverage of the CI.
We use cukinia that is an FLOSS for the tests.
see contributing policy. It's impossible to commit directly to the main branch it needs to pass the CI + manual review by a committer
everything is handled by bitbake for yocto N/A for debian
There are tests regarding security by design. The tests are continously improved and follow the french NT28 ANSII security guidelines https://github.com/seapath/ci/blob/reports/docs/reports/PR-debian-main/test-report___2023-02-23_15h47m37.pdf
https://github.com/seapath/meta-seapath/tree/master/classes/security
no cryptographic provided by the project appart from the ssh key to connect to the machines of the cluster and for user : https://www.cyberciti.biz/faq/understanding-etcpasswd-file-format/
https://www.cyberciti.biz/faq/understanding-etcpasswd-file-format/
TLS1.2 and 1.3 are used by the cluster (ceph for the distributed storage, corosync, syslog) the protocols are available and can be used by the end user.
TLS 1.2 and 1.3 are used
see clusterlabs project
out of the scope of the project. We do not provide a software but help to configure a debian/yocto based distribution
not widespread used
planned for the first official release.
The project only used certified debian repositories
Hardening ok on Yocto and ensure by the debian project for the debian branch (https://github.com/seapath/ansible/blob/debian-main/playbooks/cluster_setup_hardened_debian.yaml)
continous improvment process based on CI and tests (https://github.com/seapath/cukinia-tests) with cukinia (https://github.com/savoirfairelinux/cukinia/blob/master/cukinia)
https://github.com/seapath AnsibleLint, Shellcheck,Sonarcube
We do not provide code C/C++
后退