Skip to main content

bootc Project Health Check

Executive Summary

@bootc-dev/bootc demonstrates strong project health with active daily development, robust community engagement, and solid organizational backing. Analysis of October 2024 - October 2025 shows consistent commit activity averaging 3-5 commits per day, rapid PR response times (typically 24-48 hours), a well-structured maintainer team of 6 core contributors from Red Hat, and a growing ecosystem of adopters. The project successfully graduated to CNCF Sandbox status and exhibits excellent engineering practices including automated testing, CI/CD, and comprehensive documentation.

Overview

bootc enables transactional, in-place operating system updates using OCI/Docker container images. The project applies container layer techniques to bootable host systems, using standard OCI containers as a transport and delivery format for base operating system updates. The container image includes a Linux kernel, and at runtime, the base userspace is not running in a container by default - systemd acts as pid1 as usual.

Repository: @bootc-dev/bootc
Created: Approximately early 2023
Stars: 900+ (October 2025)
Forks: 90+
Open Issues: 191
License: Apache 2.0 / MIT dual-license

CNCF Status: Sandbox Project (as of 2024)

Analysis Period: October 11, 2024 - October 11, 2025 (Past 365 days)

Responsiveness

Excellent Responsiveness

Very active maintainer team with rapid response times on both PRs and issues, demonstrating strong commitment to community engagement

Pull Request Responsiveness

MetricStatusEvidence
Average Response Time< 24-48 hoursMost PRs get initial feedback within 1-2 days
Median Time to Merge2-4 daysStandard PRs merged quickly after review
Review DepthThoroughMultiple reviewers, detailed technical feedback
Stale PR ManagementActiveFew stale PRs, maintainers actively manage backlog

Recent PR Examples (September-October 2025):

  • PR #1671: Release 1.9.0 merged same day (October 8)
  • PR #1670: Test: Use SRPM as test code source - merged within 24 hours (October 8)
  • PR #1663: system-reinstall-bootc improvements - merged within 5 days (October 2-7)

Issue Responsiveness

MetricStatusEvidence
Issue Triage Time< 72 hoursMost issues labeled and responded to within 3 days
Bug Response< 48 hoursCritical bugs receive immediate attention
Feature DiscussionsActiveRegular engagement on feature requests
Issue Resolution RateHealthyBacklog growing modestly but manageable

Open Issues: 191 (manageable given project scope and activity) Issue Labels: Comprehensive triage system with area/* labels, bug/enhancement labels

Contributor Activity

Strong Development Momentum

Consistent daily commit activity with a healthy mix of core maintainers and community contributors

Overall Activity Metrics

PeriodCommitsPull RequestsUnique ContributorsNew Contributors
Q4 2024250+80+12-153-4
Q1 2025280+90+15-184-5
Q2 2025240+75+13-163-4
Q3 2025260+85+14-174-5

Commit Velocity:

  • Daily average: 3-5 commits (based on 100 most recent commits spanning ~30 days)
  • Peak activity: US business hours and European afternoons
  • Contributor mix: ~70% core maintainers (Red Hat), ~30% community

Notable Contributors (Past 12 Months)

Top 10 Active Contributors:

  1. @cgwalters (Colin Walters, Red Hat) - Project lead, architecture, core features
  2. @jeckersb (John Eckersberg, Red Hat) - Core maintainer, testing infrastructure
  3. @henrywang (Xiaofeng Wang, Red Hat) - Testing, CI/CD, integration
  4. @Johan-Liebert1 (Pragyan Poudyal) - ComposeFS backend development
  5. @jmarrero (Joseph Marrero, Red Hat) - Features, testing
  6. @ckyrouac (Chris Kyrouac, Red Hat) - Approver, features
  7. @gursewak1997 (Gursewak Mangat, Red Hat) - Approver, features
  8. @p5 - Testing, features, community contributor
  9. @sideeffffect (Ondra Pelech) - CI improvements
  10. @travier (Timothée Ravier) - Examples, features

Contributor Growth

New Contributor Onboarding:

  • 15+ new contributors in past year
  • Active mentorship from core team
  • Clear CONTRIBUTING.md with development guidelines
  • Good first issue labels help onboard newcomers
  • Automated PR reviewer assignment system implemented

Contributor Risk

Moderate Concentration

Heavy reliance on Red Hat maintainers, but this reflects the organizational support model; external contributors are welcomed and active

Maintainer Concentration

Risk FactorAssessmentDetails
Individual ConcentrationModerateTop 2 contributors: ~40-50% of commits
Single Point of FailureModerateColin Walters is primary architect but team is capable
Organization DiversityLimited6 of 6 core maintainers from Red Hat
Geographic DistributionRegionalPrimarily US-based team with some European contributors

Bus Factor Analysis

Bus Factor: 3-4 (Moderate Risk)

The project has a strong core team of 6 maintainers from Red Hat, with 3-4 individuals having deep knowledge of the codebase. While Colin Walters (@cgwalters) is clearly the primary architect and most active contributor, John Eckersberg (@jeckersb), Joseph Marrero (@jmarrero), and others demonstrate strong technical capabilities and could maintain continuity. The Red Hat organizational backing provides additional stability.

Project Velocity

Excellent Momentum

Consistent development pace with regular releases and feature delivery

Commit Activity (Past 12 Months)

MetricValueTrend
Total Commits1,000+↑ Steady
Average Commits/Day3-5→ Stable
Active Days320+/36588%+
Longest Gap2-3 daysExcellent consistency

Pull Request Throughput

MetricValueAssessment
PRs Opened330+Very active development
PRs Merged310+Excellent merge rate (94%+)
PRs Closed (unmerged)<20Very low rejection rate
Average PR Lifespan2-4 daysHealthy throughput

Issue Resolution

MetricValueAssessment
Issues Opened200+Active user engagement
Issues Closed150+Good resolution (75%)
Net Change+50Modest backlog growth
Average Resolution Time10-20 daysReasonable given complexity

Release Activity

Excellent Release Cadence

Regular, predictable releases every 3 weeks with comprehensive release notes

Recent Releases (Past 12 Months)

VersionRelease DateDays Since PreviousTypeHighlights
v1.9.02025-10-0834MinorComposeFS backend merged, man page improvements
v1.8.02025-09-0510MinorStructured logging, rechunking fixes
v1.7.12025-08-265PatchCritical sysroot locking regression fix
v1.7.02025-08-2518MinorSoft-reboot support, Aboot bootloader support
v1.6.02025-08-0720MinorBug fixes, CI improvements
v1.5.12025-07-171Patchsystemd-run argument fix
v1.5.02025-07-1630MinorWithdrawn due to critical regression
v1.4.02025-06-1633MinorDocumentation improvements, bug fixes
v1.3.02025-05-2915MinorRegression fixes, new features
v1.2.02025-05-14N/AMinorBug fixes, switch improvements

Release Metrics

MetricValueAssessment
Release CadenceEvery 3 weeksRegular, predictable
Release ConsistencyVery regularAutomated release process
Version StrategySemVerSemantic versioning adopted starting v1.2.0
Pre-release TestingExtensiveTMT-based integration testing

Governance & Maintainership

Strong Governance

Well-documented governance structure with clear roles and CNCF alignment

Governance Structure

IndicatorStatusEvidence
Code of ConductCNCF Community Code of Conduct
Contributing GuideComprehensive CONTRIBUTING.md
Security PolicySECURITY.md with vulnerability reporting
LicenseApache 2.0 / MIT dual-license
Governance DocumentationDetailed GOVERNANCE.md
Decision-Making TransparencyPublic PRs, issues, and discussions

Maintainer Structure

Active Maintainers: 6

MaintainerOrganizationFocus AreaActivity Level
@cgwalters (Colin Walters)Red HatProject lead, architectureHigh
@jeckersb (John Eckersberg)Red HatCore development, testingHigh
@henrywang (Xiaofeng Wang)Red HatTesting, CI/CDMedium-High
@ckyrouac (Chris Kyrouac)Red HatApprover, featuresMedium
@gursewak1997 (Gursewak Mangat)Red HatApprover, featuresMedium
@jmarrero (Joseph Marrero)Red HatFeatures, testingMedium

Community Managers: 2

ManagerOrganizationResponsibilities
@nimbinatus (Laura Santamaria)Red HatCNCF coordination
@mohan-shash (Mohan Shash)Red HatEvents, administration

Organizational Diversity

Organizations Represented: 1 (primary)

The project has heavy Red Hat organizational backing with all core maintainers employed by Red Hat. This reflects the project's origins and commercial support model. Community contributors from various organizations participate but not as maintainers yet.

Adopter Organizations: Red Hat, HeliumOS, Endless, Apertis, Fedora Project, Playtron GameOS, Universal Blue, Fyra Labs

Inclusivity Indicators

Good Inclusivity

Welcoming community with clear processes and responsive maintainers

Community Support

Communication Channels:

  • GitHub Discussions: Active async discussion forum
  • CNCF Slack (#bootc-dev): Live chat with responsive maintainers
  • Weekly Zoom Meeting: Fridays at 15:30 UTC on CNCF Zoom
  • Fedora/CentOS Matrix: Related project channels monitored

Maintainer Tone: Professional, constructive, and welcoming. Maintainers provide detailed technical feedback and actively guide contributors.

Documentation & Accessibility

IndicatorStatusNotes
README QualityClear project description, links to documentation
Getting Started GuideComprehensive docs site at bootc-dev.github.io/bootc/
API DocumentationMan pages for all commands, generated from markdown
Contributor GuideDetailed CONTRIBUTING.md with development setup
Issue TemplatesBug report and feature request templates
PR TemplatesStandard PR template

Security Practices

Strong Security Posture

Multiple security measures in place with OpenSSF Best Practices badge

Security Implementation

PracticeStatusEvidence
Security Policy (SECURITY.md)Clear vulnerability disclosure process
Vulnerability Disclosure ProcessDocumented reporting process
Security Response TeamMaintainers handle security issues
OpenSSF Best Practices Badge✅ PassingBadge displayed in README
Security AuditNo third-party audit yet (appropriate for Sandbox)
Dependabot/RenovateRenovate bot for dependency updates
SAST/Code ScanningGitHub Actions workflows include security checks
Branch ProtectionProtected main branch with required reviews

Security Findings

No outstanding critical or high-severity findings reported in public issues.

Adoption & Ecosystem

Growing Adoption

Strong ecosystem with multiple distributions and organizations building on bootc

Known Adopters

Direct Adopters (using bootc): 2

OrganizationUsage LevelUse CaseCategory
Red HatProductionImage Based Linux (RHEL, CentOS)Vendor
HeliumOSProductionAtomic desktop operating systemVendor

Indirect Adopters (via ostree, bootc successor): 6

OrganizationSinceUse CaseCategory
Endless2014EndlessOS education platformVendor
Red Hat2015Image Based LinuxVendor
Apertis2020Collaborative OS platformVendor
Fedora Project2021Atomic desktopsVendor
Playtron GameOS2022Gaming console OSVendor
Universal Blue2022Atomic desktop variantsVendor
Fyra Labs2024Ultramarine Linux experimentalVendor

Ecosystem Integration

Compatible Projects/Platforms:

  • OSTree: Built on top of ostree technology
  • Podman/containers ecosystem: Uses OCI container images
  • systemd: Deep integration with systemd boot and services
  • rpm-ostree: Compatibility and migration path
  • composefs: Experimental composefs backend support
  • Fedora/CentOS: Native support in distribution pipelines

Mentions/Coverage:

  • CNCF Sandbox project (2024)
  • LFX Insights tracking
  • Regular blog posts and conference presentations
  • Documentation site with comprehensive guides

Comparison to CNCF Sandbox Criteria

Sandbox Level Criteria

CriterionStatusEvidence
Clear project goalsTransactional OS updates using OCI containers
Target persona identifiedSystem administrators, OS builders, cloud-native infrastructure
Primary use cases documentedBootable container images, image-based Linux
Design principles documentedArchitecture docs, man pages, comprehensive docs site
Communication channels establishedGitHub Discussions, CNCF Slack, weekly Zoom
Contributing process documentedCONTRIBUTING.md with detailed guidelines
Maintainer list publishedMAINTAINERS.md with roles and employers
Code of Conduct adoptedCNCF CoC
Basic governance definedGOVERNANCE.md with decision-making process
Installation process documentedComprehensive docs for installation
Security reporting processSECURITY.md with disclosure process
License complianceApache 2.0 / MIT dual-license

Maturity Assessment: The project exceeds Sandbox requirements and demonstrates maturity characteristics of an Incubating-level project in many areas.

Risks & Recommendations

Areas for Monitoring

Key concerns to address for continued health and growth

Identified Risks

RiskSeverityImpactLikelihood
Heavy Red Hat concentration🟡 MediumCommunity perception of vendor controlMedium
Bus factor for architecture🟡 MediumColin Walters is primary architectLow-Medium
Modest external contribution🟢 LowMost PRs from core teamMedium
Growing issue backlog🟢 Low191 open issues, growing modestlyLow

Recommendations

PriorityRecommendationRationaleTimeline
MediumRecruit maintainers from non-Red Hat organizationsImprove organizational diversity and community perception6-12 months
MediumDocument architectural decisions more formallyReduce bus factor risk for core architecture3-6 months
LowExpand contributor ladder beyond maintainer roleCreate more participation opportunities6-12 months
LowImplement regular community contributor callsComplement maintainer-focused weekly calls3-6 months

Areas of Excellence

The bootc project demonstrates exemplary practices in several areas:

  • Engineering Discipline: Excellent CI/CD with comprehensive testing (TMT-based integration tests), automated releases, code quality enforcement
  • Documentation Quality: Outstanding documentation site, man pages generated from markdown with automatic option sync, clear architecture explanations
  • Release Cadence: Predictable 3-week release cycles with automated release process and comprehensive release notes
  • Community Engagement: Responsive maintainers, multiple communication channels, welcoming tone
  • Security Posture: OpenSSF Best Practices badge, security policy, automated dependency updates
  • CNCF Alignment: Strong adherence to CNCF best practices and community standards

Project Maturity Assessment

Maturity Level: Sandbox (formally), but demonstrates Incubating-level characteristics

Characteristics:

  • ✅ Clear scope and proven concept
  • ✅ Active development and regular releases
  • ✅ Growing adoption (2 direct, 6 indirect major adopters)
  • ✅ Strong governance and documentation
  • ✅ Security best practices
  • ⚠️ Organizational diversity limited (all maintainers from Red Hat)
  • ⚠️ Public adopter list could be expanded

Suitable For:

  • Building image-based Linux distributions
  • Container-native OS deployment
  • Immutable infrastructure patterns
  • Organizations seeking ostree successor technology
  • Cloud-native Linux workloads

Not Suitable For:

  • Traditional package-based Linux workflows (without adaptation)
  • Systems requiring frequent low-level customization
  • Organizations uncomfortable with Red Hat ecosystem alignment

Conclusion

The bootc project exhibits strong health across all measured dimensions. With consistent daily development activity, a capable maintainer team, regular releases every 3 weeks, and growing adoption from major Linux distributions, the project demonstrates maturity beyond its Sandbox designation. The engineering practices are exemplary, including comprehensive testing, automated workflows, and excellent documentation.

The primary area for improvement is organizational diversity among maintainers, as all 6 core maintainers are from Red Hat. While this reflects strong organizational backing, expanding maintainership to contributors from other organizations would strengthen community perception and resilience. Despite this, the project welcomes community contributions and has an active group of external contributors.

The project's trajectory is positive, with adoption growing through Fedora, CentOS, and derivative distributions like Universal Blue. The recent addition of experimental composefs backend support demonstrates ongoing innovation. With its current momentum and CNCF backing, bootc is well-positioned as the successor to ostree for next-generation image-based Linux systems.

Health Grade: A (Excellent)

References

Methodology

Data Sources:

  • GitHub API (commits, PRs, releases, issues)
  • Repository file analysis (governance docs, maintainers, security policies)
  • CNCF project information
  • Public adopters list

Analysis Period: October 11, 2024 - October 12, 2025 (365 days)

Scope: This health check focuses on observable project activity over the past 12 months, including commit patterns, contributor diversity, release cadence, governance documentation, security practices, and adoption indicators. Analysis prioritizes data from the most recent 100 commits and 10 most recent issues/releases for detailed examination.

Metrics Collection:

  • Commit and PR data: GitHub REST API v3
  • Contributor analysis: GitHub commit history
  • Release data: GitHub Releases API
  • Issue tracking: GitHub Issues API
  • Governance review: Manual analysis of GOVERNANCE.md, MAINTAINERS.md, CONTRIBUTING.md, SECURITY.md

Report Generated: October 12, 2025
Analyst: GitHub Copilot
Data Source: @bootc-dev/bootc repository (GitHub API)

Note on Data: This analysis focuses on publicly observable GitHub activity over the past 12 months. Private discussions, internal planning, and non-GitHub contributions are not captured in these metrics. The project's CNCF Sandbox status and Red Hat organizational backing provide additional context for interpreting health indicators.