Skip to content

[Graduation] gRPC Graduation Application #2101

@gnossen

Description

@gnossen

Review Project Moving Level Evaluation

  • I have reviewed the TOC's moving level readiness triage guide, ensured the criteria for my project are met before opening this issue, and understand that unmet criteria will result in the project's application being closed.

gRPC Graduation Application

v1.6
This template provides the project with a framework to inform the TOC of their conformance to the Graduation Level Criteria.

Project Repo(s):

Project Site: https://grpc.io
Languages:

  • gRPC Go
  • gRPC Java
  • gRPC Swift
  • gRPC Dot Net
  • gRPC C++
  • gRPC Python
  • gRPC Node
  • gRPC Rust
  • gRPC Ruby
  • gRPC PHP

Communication: https://groups.google.com/g/grpc-io

Project points of contacts:


Graduation Criteria Summary for gRPC

Application Level Assertion

  • This project is currently Incubating, accepted on 2017/02/17, and applying to Graduate.

Adoption Assertion

The project has been adopted by the following organizations in a testing and integration or production capacity:

Application Process Principles

Suggested

N/A

Required

Completion of this due diligence document, resolution of concerns raised, and presented for public comment satisfies the Due Diligence Review criteria.

Governance and Maintainers

Note: this section may be augmented by the completion of a Governance Review from the Project Reviews subproject.

Suggested

  • Governance has continuously been iterated upon by the project as a result of their experience applying it, with the governance history demonstrating evolution of maturity alongside the project's maturity evolution.

    The gRPC project governance was first put into place in 2018.
    This iteration of the governance supported the project for several years until, in 2025, the sheer number of maintainers with differing levels of expertise in domain
    areas and experience in the project resulted in the introduction of a contributor ladder
    and overhaul of the governance. The gRPC project continues to monitor the effectiveness of the governance and evaluate ways
    to improve it.

Required

Contributors and Community

Suggested

  • Contributor ladder with multiple roles for contributors.

    The gRPC Contributor Ladder is defined here.

Required

Engineering Principles

  • Document project goals and objectives that illustrate the project’s differentiation in the Cloud Native landscape as well as outlines how this project fulfills an outstanding need and/or solves a problem differently. This requirement may also be satisfied by completing a General Technical Review.

    • A General Technical Review was completed/updated on 24-03-2026, and can be discovered here.
  • Document what the project does, and why it does it - including viable cloud native use cases. This requirement may also be satisfied by completing a General Technical Review.

    • A General Technical Review was completed/updated on 24-03-2026, and can be discovered here.
  • Document and maintain a public roadmap or other forward looking planning document or tracking mechanism.

    The project roadmap is defined by gRFCs, housed in this repository.

  • Roadmap change process is documented.

    The process for writing and reviewing gRFCs is outlined here.

  • Document overview of project architecture and software design that demonstrates viable cloud native use cases, as part of the project's documentation. This requirement may also be satisfied by completing a General Technical Review and capturing the output in the project's documentation.

    • A General Technical Review was completed/updated on 24-03-2026, and can be discovered here.
  • Document the project's release process and guidelines publicly in a RELEASES.md or equivalent file that defines:

    The release process is documented here and linked to from the project governance here.

    • Release expectations (scheduled or based on feature implementation)
    • Tagging as stable, unstable, and security related releases
    • Information on branch and tag strategies
    • Branch and platform support and length of support
    • Artifacts included in the release.
    • Additional information on topics such as LTS and edge releases are optional. Release expectations are a social contract between the project and its end users and hence changes to these should be well thought out, discussed, socialized and as necessary agreed upon by project leadership before getting rolled out.
  • History of regular, quality releases.

    The latest version of gRPC is v1.78, the 78th minor version since 1.0 in 2015. We have been releasing on a 6 week cadence for years. (C++ releases, Go releases, Java releases)

Security

Note: this section may be augmented by a joint-assessment performed by TAG Security and Compliance.

Suggested

  • Achieving OpenSSF Best Practices silver or gold badge.

Required

  • Clearly defined and discoverable process to report security issues.

    The CVE reporting process is defined here.

  • Enforcing Access Control Rules to secure the code base against attacks (Example: two factor authentication enforcement, and/or use of ACL tools.)

    All gRPC project contributors are required to enable 2-factor authentication in GitHub and access to repos is strictly controlled by Maintainers.

  • Document assignment of security response roles and how reports are handled.

    Security specializations are granted to gRPC project Core Contributors and gRPC project Maintainers based on their contributions in the security domain.

  • Document Security Self-Assessment.

    The gRPC project's security self-assessment can be found here.

  • Third Party Security Review.

    The gRPC project completed a Security Audit with cure53. The report is available here.

    • Moderate and low findings from the Third Party Security Review are planned/tracked for resolution as well as overall thematic findings, such as: improving project contribution guide providing a PR review guide to look for memory leaks and other vulnerabilities the project may be susceptible to by design or language choice ensuring adequate test coverage on all PRs.
  • Achieve the Open Source Security Foundation (OpenSSF) Best Practices passing badge.

Ecosystem

Suggested

N/A

Required

  • Publicly documented list of adopters, which may indicate their adoption level (dev/trialing, prod, etc.)

    While gRPC's adopters are too numerous to centrally track them all, several are listed on the showcase page of the project website.

  • Used in appropriate capacity by at least 3 independent + indirect/direct adopters, (these are not required to be in the publicly documented list of adopters)

    The showcase shared above lists tens of adopters out of the thousands of companies using gRPC.

The project provided the TOC with a list of adopters for verification of use of the project at the level expected, i.e. production use for graduation, dev/test for incubation.

  • TOC verification of adopters.

Refer to the Adoption portion of this document.

  • Clearly documented integrations and/or compatibility with other CNCF projects as well as non-CNCF projects.

    This is discussed at length in the General Technical Review.

Adoption

Adopter 1 - Netflix / Video Streaming

Blog post

Adopter 2 - LinkedIn / Human Resources and Recruiting

Interview

Adopter 3 - Datadog / Platform Engineering and Observability

Blog Post

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/ddProject DD or item related to the DD processlevel/graduationItem related to a graduation level project or the graduation criteria/process itself.toctoc specific issue

    Type

    No type

    Projects

    Status

    New

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions