VMware Secrets Manager
Contribute to VSecM
Mark Your Calendars
The next
VSecM Contributor Sync
will be on…
Thursday, 2024-05-30
at 8:00am Pacific time.
Introduction
This section contains instructions to test and develop VMware Secrets Manager locally.
📚 Familiarize Yourself with the Contributing Guidelines
Please make sure you read the Contributing Guidelines and the Code of Conduct on the VSecM GitHub repo first.
Good First Issues for New Contributors
If you are new to VMware Secrets Manager or looking for smaller tasks to start contributing, we have a set of issues labeled as “good first issue” on our GitHub repository. These issues are a great place to start if you are looking to make your first contribution.
How to Find Good First Issues
- Navigate to the Issues tab in the GitHub repository.
- Use the label filter and select the “good first issue” label.
- Browse through the list and pick an issue that interests you.
Claiming an Issue
Before starting work on an issue, it’s a good practice to comment on it, stating that you intend to work on it. This prevents multiple contributors from working on the same issue simultaneously.
Need Help?
If you have questions or need further clarification on a “good first issue,” feel free to ask in the issue comments or reach out to the maintainers.
Code Review Requirements
While we value pragmatism over process, we do have some basic requirements for code reviews to ensure the quality and consistency of the codebase.
Conducting Code Reviews
- Pull Requests: All code changes must be submitted through a pull request (PR) on GitHub.
- Minimum Reviews: Each PR must be reviewed by at least one other person before it can be merged.
- Open for Feedback: PRs are open for comments and suggestions from any team member, not just the designated reviewer.
What Must Be Checked
These are the minimum set of items that must be checked during a code review. More items may be checked depending on the nature of the change.
- Canonical Go: The code should adhere to canonical Go practices.
- Formatting: The code must pass
gofmt
without any issues. - Consistency: The code should look like the rest of the codebase, as if it were written by a single individual.
Acceptance Criteria
- Approval: At least one reviewer must approve the PR.
- Automated Checks: All automated tests and checks must pass.
- No Conflicts: Resolve any merge conflicts before merging.
How to Conduct a Code Review
- Navigate to the Pull Requests tab in the GitHub repository.
- Choose a PR that is awaiting review.
- Review the code changes and provide your feedback, keeping the above criteria in mind.
- If the PR meets all the criteria, approve it; otherwise, request changes and provide constructive feedback.
Better Commits
At VMware Secrets Manager, we follow the Conventional Commits.
You are strongly encouraged (but not required) to follow the Conventional Commits specification when writing commit messages.
You are encouraged (but not required) to use the better-commits tool to help you create commit messages.
make commit
If you have better-commits installed, then you can execute
make commit
to create a commit message.
Signing Off Commits
We require a sign-off commit message in the following format on each commit in pull request with your name and email address:
Sample commit message.
Signed-off-by: Jane Doe <jane.doe@example.com>
Git has a -s | --sign-off
command line option to append the message
automatically. This will use your default value on your git configure in
user.name
, user.email
.
If you miss your sign-off on the last commit, you can amend the commit and then push to Github:
git commit --amend --signoff
If you miss series of commits, you can use git rebase
with -i
or --interactive
flags to edit and append.
Add Tests for New Features
As you contribute major new functionalities to the software, it’s essential to adhere to a policy that requires the addition of corresponding tests.
This policy underscores the importance of validating new features through thorough testing. For every significant addition you make, ensure that robust tests are included.
This practice is crucial for maintaining the VSecM’s quality, reliability, and stability. By integrating tests for new features, you contribute not only to the early detection of defects but also to the facilitation of smoother future enhancements and modifications.
Your commitment to this testing policy is integral to our collective success in software development.
What Technologies Do I Need to Know?
You don’t have to be an expert in all of these technologies to contribute to VMware Secrets Manager. However, being familiar with the following concepts and technologies will help you get started faster.
Go
VMware Secrets Manager is written in Go, so you should be familiar with the language and its idioms. If you are new to Go, we recommend going through the Go Tour and the Effective Go guide.
Kubernetes
VMware Secrets Manager is a Kubernetes-native application, so you should be familiar with the basics of Kubernetes. If you are new to Kubernetes, we recommend going through the Kubernetes Basics.
Helm
VMware Secrets Manager is packaged as a Helm chart, so you should be familiar with the basics of Helm. If you are new to Helm, we recommend going through the Helm Quickstart Guide.
SPIFFE and SPIRE
VMware Secrets Manager uses SPIFFE and SPIRE to establish an identity control plane, so you should be familiar with the basics of SPIFFE and SPIRE. If you are new to SPIFFE and SPIRE, we recommend going through the quickstart guides on the SPIFFE.
go-spiffe
VMware Secrets Manager uses the go-spiffe
to interact with the SPIFFE and SPIRE APIs, so you should be familiar with the
basics of go-spiffe
. If you are new to go-spiffe
, we recommend going through
the documentation.
ClusterSPIFFEID
and ClusterFederatedTrustDomain
VMware Secrets Manager uses the ClusterSPIFFEID
and ClusterFederatedTrustDomain
to dispatch identities to workloads, and federate cluster, respectively. If you
are new to these concepts, we recommend you check out the SPIRE Controller Manager
repository.
VSecM Architecture
VMware Secrets Manager has several components, each with its own responsibilities. Check out the architecture overview to get a high-level understanding of the components and their interactions.
While you are at there, we strongly recommend going through the entire documentation to get a good understanding of the product.
Docker
We have several Dockerfiles in the repository, so you should be familiar with the basics of Docker. If you are new to Docker, we recommend going through the Docker Get Started guide.
results matching ""
No results matching ""