Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: remove 50% code coverage expectation and add High vulnerabilities

...

Practice AreaCheckpointYes/NoEvidencesHow to?
Architecture


Has the Project team reviewed the APIs with the Architecture Committee (ARC)?

Architecture walkthrough to understand how each project contributes on Release Use Case. ARC to organize the walkthrough.

Is there a plan to address the findings the API review?
Link to planThe plan could be as simple as a Jira issue to track the implementation of findings or a documented plan within the wiki.
Does the team clearly understand that no changes in the API definition is allowed without formal TSC review and approval?
NAIn the case some changes are necessary, bring the request to the TSC for review and approval.

Is there any changes in the scope, functionalities, deliverable, dependency, resources, API, repositories since M1 milestone?


If Yes, please a link to the evidence of these changes.Critical point to understand is that change is inevitable, and that right timing and clear communication to the community will ease the process of accepting changes.
Provide link to the API Documentation.


Release ManagementAre committed Sprint Backlog Stories been marked as "Done" in Jira board?
Provide Link to Project backlog
Are all tasks associated with Sprint Backlog Stories been marked as "Done" in Jira?


Have all findings from previous milestones been addressed?
Provide link to JIRA findings
DevelopmentHas the project team reach the Automated Unit Test Code Coverage expectation? (Refer to artifacts available in Sonar)Goal: 50% for Incubation project in BeijingGuidance on Code Coverage and Static Code Analysis

Tools: Sonar

Is there any pending commit request older than 36 Business hours in Gerrit?


Do you have a plan to address by M4 the Critical  vulnerabilities  and High vulnerabilities in the third party libraries used within your project?

Ensure by M4 the Nexus-IQ report from “Jenkins CLM” shows 0 critical security vulnerability. Open the Nexus-IQ report for the details on each repo.

Are all the Jenkins jobs successfully passed ( Merge-Jobs)?


Provide link to evidence
Are all binaries available in Nexus?
Provide link to evidence
Integration and Testing

Have 50 % of System Integration Testing Use Cases been implemented successfully in Jenkins?


Provide link to evidence
Has the project code successfully passed the Daily Build process?

Goal is to ensure the latest project commit has not broken the Integration Daily Build