|
| 1 | +- [Overview](#overview) |
| 2 | +- [Current Admins](#current-admins) |
| 3 | +- [Admin Permissions](#admin-permissions) |
| 4 | + - [Prioritize Security](#prioritize-security) |
| 5 | + - [Enforce Code of Conduct](#enforce-code-of-conduct) |
| 6 | + - [Add/Remove Maintainers](#addremove-maintainers) |
| 7 | + - [Adopt Organizational Practices](#adopt-organizational-practices) |
| 8 | +- [New Repos](#new-repos) |
| 9 | + |
| 10 | +## Overview |
| 11 | + |
| 12 | +This document explains who the admins are (see below), what they do in opensearch-project, and how they should be doing it. These individuals are members of an "admin" GitHub team that is given Admin-level permissions to every repository in opensearch-project organization. These are individuals that worked on creating the OpenSearch fork, and those that currently support the organization-wide infrastructure, such as the public [CI/CD](https://build.ci.opensearch.org/). |
| 13 | + |
| 14 | +If you're interested in becoming a maintainer, see [MAINTAINERS](MAINTAINERS.md). If you're interested in contributing, see [CONTRIBUTING](CONTRIBUTING.md). |
| 15 | + |
| 16 | +## Current Admins |
| 17 | + |
| 18 | +| Admin | GitHub ID | Affiliation | |
| 19 | +|--------------------| --------------------------------------------------- | ----------- | |
| 20 | +| Daniel Doubrovkine | [dblock](https://github.com/dblock) | Amazon | |
| 21 | +| Rishabh Singh | [rishabh6788](https://github.com/rishabh6788) | Amazon | |
| 22 | +| Prudhvi Godithi | [prudhvigodithi](https://github.com/prudhvigodithi) | Amazon | |
| 23 | +| Sayali Gaikawad | [gaiksaya](https://github.com/gaiksaya) | Amazon | |
| 24 | +| Peter Zhu | [peterzhuamazon](https://github.com/peterzhuamazon) | Amazon | |
| 25 | +| Zelin Hao | [zelinh](https://github.com/CEHENKLE) | Amazon | |
| 26 | + |
| 27 | +## Admin Permissions |
| 28 | + |
| 29 | +Admins have [admin-level permissions on a repository](https://docs.github.com/en/organizations/managing-access-to-your-organizations-repositories/repository-permission-levels-for-an-organization). Use those privileges to serve the community and protect the repository as follows. |
| 30 | + |
| 31 | +### Prioritize Security |
| 32 | + |
| 33 | +Security is your number one priority. Manage security keys and safeguard access to the repository. |
| 34 | + |
| 35 | +Note that this repository is monitored and supported 24/7 by Amazon Security, see [Reporting a Vulnerability](SECURITY.md) for details. |
| 36 | + |
| 37 | +### Enforce Code of Conduct |
| 38 | + |
| 39 | +Act on [CODE_OF_CONDUCT](CODE_OF_CONDUCT.md) violations by revoking access, and blocking malicious actors. |
| 40 | + |
| 41 | +### Add/Remove Maintainers |
| 42 | + |
| 43 | +Perform administrative tasks, such as [adding](RESPONSIBILITIES.md#adding-a-new-maintainer) and [removing maintainers](RESPONSIBILITIES.md#removing-a-maintainer). |
| 44 | + |
| 45 | +Please note that maintainers typically do not have admin-level permissions in their repos in this organization. Admin-level permissions allow for sensitive and destructive actions, such as managing security, or deleting a repository. Therefore, admin access in opensearch-project was designed to be deliberately centralized in ways that requires that two people to make any one sensitive change. If you need to perform an admin function, such as adding or removing a maintainer, please [follow the maintainer nomination process](RESPONSIBILITIES.md#becoming-a-maintainer), then ask to effect permissions by tagging `@admin` in your pull request, or the [#maintainers channel on the public Slack](https://opensearch.slack.com/archives/C05L60S4UBT). One of the above-mentioned admins will make this change for you. |
| 46 | + |
| 47 | +### Adopt Organizational Practices |
| 48 | + |
| 49 | +Adopt organizational practices documented in this repo, work in the open, and collaborate with other admins by opening issues before making process changes. Prefer consistency, and avoid diverging from practices in the opensearch-project rganization. |
| 50 | + |
| 51 | +## New Repos |
| 52 | + |
| 53 | +There are currently two ways new repositories may appear in the opensearch-project organization: creating a new repo and adopting, or moving a repo from outside of the organization into it. The process is the same. |
| 54 | + |
| 55 | +The AWS Open Source Program Office (OSPO) currently owns and manages the opensearch-project organization, and has permissions to create a new repo. While the admins above have admin-level permissions, they do not have permissions to create new repositories or move repositories into the organization. |
| 56 | + |
| 57 | +All new repositories inside opensearch-project follow the [security response process](SECURITY.md), and therefore require an Amazon team to be engaged when necessary. If you wish to create a repository in this organization, or move a repository into opensearch-project, please contact one of the above-mentioned admins via the [#maintainers channel on the public Slack](https://opensearch.slack.com/archives/C05L60S4UBT). |
| 58 | + |
| 59 | +While the opensearch-project organization has adopted [opensearch-plugin-template-java](https://github.com/opensearch-project/opensearch-plugin-template-java), or [opensearch-project/opensearch-learning-to-rank-base](https://github.com/opensearch-project/opensearch-learning-to-rank-base) in the past, we generally encourage you to start and run with your open-source project outside of the organization, and only consider making it part of it when you wish to include your already very popular component or tool in the "official" distribution. |
0 commit comments