Re: [VOTE] Open Policy Agent from incubating to graduated
Isaac Mosquera
On Tue, Dec 8, 2020 5:08 PM, Brandon Lum lumjjb@... wrote:
|
|
Re: [VOTE] Open Policy Agent from incubating to graduated
Brandon Lum
+1 NB On Tue, Dec 8, 2020 at 12:05 PM Ricardo Aravena <raravena80@...> wrote:
|
|
Re: [VOTE] Open Policy Agent from incubating to graduated
Ricardo Aravena
+1 nb On Wed, Sep 30, 2020 at 9:01 AM Amye Scavarda Perrin <ascavarda@...> wrote:
|
|
Re: [EXTERNAL] [cncf-toc] [VOTE] Open Policy Agent from incubating to graduated
Tim St. Clair
+1 Non-binding
From: cncf-toc@... <cncf-toc@...> on behalf of Davanum Srinivas via lists.cncf.io <davanum=gmail.com@...>
Sent: Tuesday, December 8, 2020 10:48 AM To: bburns@... <bburns@...> Cc: CNCF TOC <cncf-toc@...>; ascavarda@... <ascavarda@...> Subject: Re: [EXTERNAL] [cncf-toc] [VOTE] Open Policy Agent from incubating to graduated +1 Non-binding
Davanum Srinivas ::
https://twitter.com/dims
|
|
Re: [EXTERNAL] [cncf-toc] [VOTE] Open Policy Agent from incubating to graduated
+1 Non-binding
--
Davanum Srinivas :: https://twitter.com/dims |
|
Re: [EXTERNAL] [cncf-toc] [VOTE] Open Policy Agent from incubating to graduated
Brendan Burns
+1, Binding
From: cncf-toc@... <cncf-toc@...> on behalf of Amye Scavarda Perrin via lists.cncf.io <ascavarda=linuxfoundation.org@...>
Sent: Wednesday, September 30, 2020 9:00 AM To: CNCF TOC <cncf-toc@...> Subject: [EXTERNAL] [cncf-toc] [VOTE] Open Policy Agent from incubating to graduated The Open Policy Agent project has applied for graduation from incubation to graduated. (https://github.com/cncf/toc/pull/520)
The due diligence document can be found here: https://docs.google.com/document/d/19M5fTpe57rQIMNxawRl5wSWvJUapuzY-CkV4O5pvieU/edit Brendan Burns has called for public comment: https://lists.cncf.io/g/cncf-toc/message/5281 Please vote (+1/0/-1) by replying to this thread. Remember that the TOC has binding votes only, but we do appreciate non-binding votes from the community as a sign of support! Amye Scavarda Perrin | Program Manager |
amye@...
|
|
[RFC] Refining the way we communicate deprecations/wide-reaching changes to the project
Forwarding here as well, if anyone is interested in leaving feedback. -- Stephen ---------- Forwarded message --------- From: Stephen Augustus <stephen.k8s@...> Date: Wed, Dec 2, 2020, 22:56 Subject: [k8s-steering] [RFC] Refining the way we communicate deprecations/wide-reaching changes to the project To: Kubernetes developer/contributor discussion <kubernetes-dev@...> Cc: steering <steering@...> Hey Kubernetes Community, tl;dr -- words are hard sometimes and we should take some time and care to assess the way we wield them. Looking for feedback on https://github.com/kubernetes/community/issues/5344. --- As we go through deprecations and infrastructure changes in the project, it might be a worthwhile exercise to assess and refine the way we communicate them. I can think of a few recent examples that caused some panic and required additional lift from contributors to reframe or contort/extend support to accommodate:
Without policing contributors, as maintainers of the project, we also have a responsibility to users to be careful and deliberate with our communications outside of the project, whether it be Twitter, Hacker News, etc., etc. So how can we improve? I think depending on the scope of a change, the following SIGs should be involved in crafting comms:
I'm curious to hear everyone's thoughts here. -- Stephen You received this message because you are subscribed to the Google Groups "steering" group. To unsubscribe from this group and stop receiving emails from it, send an email to steering+unsubscribe@.... To view this discussion on the web visit https://groups.google.com/a/kubernetes.io/d/msgid/steering/CAOqU-DRtVQRC79v1xM5zVpQ11hWoyqdhgrhOamkVQ3%2B5kJw44A%40mail.gmail.com. |
|
Agenda for 12/1
Amye Scavarda Perrin
Hi all, We'll be meeting tomorrow: Optional SIG Updates New Training Course on Diversity in Open Source Moved: Security Scanning for projects to December 15th when Liz is able to make the meeting |
|
Re: [VOTE] Buildpacks to move to incubation
Isaac Mosquera
On Wed, Nov 18, 2020 12:49 PM, Archy k ayrat.khayretdinov@... wrote:
|
|
Apologies
Liz Rice
I'm sorry folks, I have a conflict coming up on Tuesday 1st, and I am going to have to skip the TOC meeting Liz |
|
[RESULT] etcd for graduation
Amye Scavarda Perrin
The etcd project has been approved for graduation. (https://lists.cncf.io/g/cncf-toc/message/5452) +1 Binding 9/10 Matt Klein: https://lists.cncf.io/g/cncf-toc/message/5453 Brendan Burns: https://lists.cncf.io/g/cncf-toc/message/5461 Saad Ali: https://lists.cncf.io/g/cncf-toc/message/5473 Sheng Liang: https://lists.cncf.io/g/cncf-toc/message/5474 Xiang Li: https://lists.cncf.io/g/cncf-toc/message/5477 Alena Prokharchyk: https://lists.cncf.io/g/cncf-toc/message/5478 Dave Zolotusky: https://lists.cncf.io/g/cncf-toc/message/5482 Justin Cormack: https://lists.cncf.io/g/cncf-toc/message/5495 Liz Rice: https://lists.cncf.io/g/cncf-toc/message/5496 +1 NB Lee Calcote: https://lists.cncf.io/g/cncf-toc/message/5454 Bartłomiej Płotka: https://lists.cncf.io/g/cncf-toc/message/5455 John Hillegass: https://lists.cncf.io/g/cncf-toc/message/5456 Tim St. Clair: https://lists.cncf.io/g/cncf-toc/message/5457 Barak Stout: https://lists.cncf.io/g/cncf-toc/message/5458 Kevin Ryan: https://lists.cncf.io/g/cncf-toc/message/5459 Bhaarat Sharma: https://lists.cncf.io/g/cncf-toc/message/5460 Yin Ding: https://lists.cncf.io/g/cncf-toc/message/5462 Ken Owens: https://lists.cncf.io/g/cncf-toc/message/5463 Archy K: https://lists.cncf.io/g/cncf-toc/message/5464 Ken Sipe: https://lists.cncf.io/g/cncf-toc/message/5465 Ricardo Aravena: https://lists.cncf.io/g/cncf-toc/message/5466 Andrew Aitken: https://lists.cncf.io/g/cncf-toc/message/5467 Katie Gamanji: https://lists.cncf.io/g/cncf-toc/message/5468 Ido Samuelson: https://lists.cncf.io/g/cncf-toc/message/5469 Frederick Kautz: https://lists.cncf.io/g/cncf-toc/message/5470 Oleg Chornyi: https://lists.cncf.io/g/cncf-toc/message/5471 Keith Burdis: https://lists.cncf.io/g/cncf-toc/message/5472 alexis richardson: https://lists.cncf.io/g/cncf-toc/message/5475 Suresh Krishnan: https://lists.cncf.io/g/cncf-toc/message/5476 Kiran Mova: https://lists.cncf.io/g/cncf-toc/message/5479 Alois Reitbauer: https://lists.cncf.io/g/cncf-toc/message/5480 Romaric Philogène: https://lists.cncf.io/g/cncf-toc/message/5481 Bob Wise: https://lists.cncf.io/g/cncf-toc/message/5483 Stephen Augustus: https://lists.cncf.io/g/cncf-toc/message/5484 Golfen Guo: https://lists.cncf.io/g/cncf-toc/message/5485 Benjamin Texier: https://lists.cncf.io/g/cncf-toc/message/5486 Richard Hartmann: https://lists.cncf.io/g/cncf-toc/message/5487 Philippe Robin: https://lists.cncf.io/g/cncf-toc/message/5488 Xu Wang: https://lists.cncf.io/g/cncf-toc/message/5489 Alex Chircop: https://lists.cncf.io/g/cncf-toc/message/5490 Thomas Schuetz: https://lists.cncf.io/g/cncf-toc/message/5491 Isaac Mosquera: https://lists.cncf.io/g/cncf-toc/message/5492 Sunny Raskar: https://lists.cncf.io/g/cncf-toc/message/5493 Tzury Bar Yochay: https://lists.cncf.io/g/cncf-toc/message/5494 Robert Wilkins III: https://lists.cncf.io/g/cncf-toc/message/5497 Amye Scavarda Perrin | Program Manager | amye@... |
|
Re: [cncf-sig-security] [cncf-toc] Vulnerability scanning for CNCF projects
Vinay Venkataraghavan <vvenkatara@...>
Hello everyone, Just catching up on the thread and a little late to the discussion. I'm in total agreement with other points already brought up that we should:
I love the dashboard of the LFX security tool / project. Would be great to see how we could either incorporate or expand that for other security usecases for projects going through graduation. Thanks, - Vinay On Thu, Nov 19, 2020 at 10:01 AM Emily Fox <themoxiefoxatwork@...> wrote:
--
Technical Director, Office of the CTO Prisma Cloud | Palo Alto Networks |
|
FYI: CNCF TOC Panel at KubeCon NA 2020
Hey all, we are doing our traditional TOC panel at KubeCon today: Feel free to join us at the tail end of kubecon and if you have any questions, please let us know here on the list or on the #toc channel in Slack: https://docs.google.com/presentation/d/1Rsj1rLwTPDcltGEQLHTDDefeSyn6O9ZB4htruSZFHr8/edit?usp=sharing The big thing to bring up on my end is that we will be having TOC elections in January 2021 for about a handful of seats. Chris Aniszczyk (@cra) |
|
Re: FYI: New Training Course on Diversity in Open Source
Thanks, this is a discussion point for the TOC but I think the reality will be a roll out in 2021 at some level. Also thank you Arun for pushing me to get this done in time for kubecon :) Please continue taking the course and offer feedback, we plan on reserving budget every 1-2 years to do a refresh. On Fri, Nov 20, 2020 at 1:45 AM Luke Hinds <lhinds@...> wrote:
--
Chris Aniszczyk (@cra) |
|
Re: FYI: New Training Course on Diversity in Open Source
Luke A Hinds <lhinds@...>
Should we make it mandatory (which I think is a good idea), it would be useful to cross reference kubernetes who took the same approach for all leaders (I did the course as part of product security). That way we won't be nagging people to do training they have already completed. On Fri, Nov 20, 2020 at 1:55 AM Arun Gupta <arun.gupta@...> wrote:
|
|
Re: FYI: New Training Course on Diversity in Open Source
Chris,
toggle quoted message
Show quoted text
I just completed the course and it's extremely valuable. As already mentioned and noted for next TOC agenda, this should be a must for all leadership positions in CNCF. It took me > 1 hour to listen all audio transcripts and taking the quiz, but a great use of time. Here is the direct link: https://trainingportal.linuxfoundation.org/learn/course/inclusive-open-source-community-orientation-lfc102/ Thanks, Arun
|
|
Re: [cncf-sig-security] [cncf-toc] Vulnerability scanning for CNCF projects
Same! We would love a presentation! Shubhra please add itself to the agenda for an upcoming meeting in December. The Security SIG group meets every Wednesday at 10:00am PT (USA Pacific) Meeting minutes and agenda:https://docs.google.com/document/d/170y5biX9k95hYRwprITprG6Mc9xD5glVn-4mB2Jmi2g/ - Emily Fox @TheMoxieFox (personal handle)
|
|
Re: Vulnerability scanning for CNCF projects
Luke A Hinds <lhinds@...>
Add me as well. I am one of the maintainers on bandit (python ast based security linter) which hits around 25k downloads a day, so I have a fair amount of experience in what works / does not work well with security linters. As others have mentioned, false positives always happen so you need a developer UX that does not make the linter into something that gets yelled at all the time.
|
|
Re: Vulnerability scanning for CNCF projects
Same, I'd be interested. ~Dave On Thu, Nov 19, 2020 at 6:26 PM Justin Cormack via lists.cncf.io <justin.cormack=docker.com@...> wrote:
--
~Dave |
|
Re: Vulnerability scanning for CNCF projects
Justin Cormack
I would be interested in that. Justin On Thu, 19 Nov 2020 at 17:23, Shubhra Kar <skar@...> wrote:
|
|