Re: SIG-Security Tech Lead nominations
Justin Cormack
+1 binding Justin
On Fri, Dec 18, 2020 at 1:43 AM Jeyappragash Jeyakeerthi <jj@...> wrote:
|
|
Re: SIG-Security Tech Lead nominations
Brandon Lum
+1 NB. I've had the chance to work with all of the nominees over various projects, issues and security assessments in the sig and they are all great candidates for tech leads!
On Fri, Dec 18, 2020, 10:58 AM Chase Pettet <chase.mp@...> wrote:
|
|
Re: SIG-Security Tech Lead nominations
Chase Pettet <chase.mp@...>
A robust NB+1. I only know Andres well (and he's the bomb diggity), but I'm grateful for all of these folks.
On Thu, Dec 17, 2020 at 7:43 PM Jeyappragash Jeyakeerthi <jj@...> wrote:
|
|
Re: SIG-Security Tech Lead nominations
Liz Rice
Super that we have these qualified and enthusiastic candidates! I’m happy to call this TOC vote, and give it my +1 for all three nominees Liz
On Fri, 18 Dec 2020 at 05:22, Andrés Vega <andresvega1@...> wrote: Whoa! It's quite an honor to receive this nomination. More so, the opportunity to serve the community alongside those who I consider its pillar.
|
|
Re: SIG-Security Tech Lead nominations
Andrés Vega
Whoa! It's quite an honor to receive this nomination. More so, the opportunity to serve the community alongside those who I consider its pillar.
Many thanks to SIG-Security (co-chairs, TLs, and members) and all the great people who constitute the CNCF for the opportunity to give back in the TL capacity. -AV
|
|
Re: OPA to graduation
dpopes@...
+1
This is so great to hear! Congratulations to the OPA team! I'm the Group Tech Lead for the Security Org at Yelp. I've found great utility from the OPA project. At the time of this writing, I've implemented authorization semantics using OPA across several different use cases: - Service mesh authorization (via Envoy ext_authz filter) - Linux authorization (via PAM module) - Kubernetes Authorization (via Authorization Webhook) In all these cases, OPA has been able to meet all security and operational requirements. My experience with the documentation, tooling, and support from the maintainers and the community has been really positive. Daniel Popescu
|
|
Re: SIG-Security Tech Lead nominations
Justin Cappos <jcappos@...>
+1 NB for Ash and Andreas. I've worked closely with them both on security assessments. They are technically sharp, organized, and diligent. Apologies to Aradhana, who I haven't worked with yet for not saying something nice here too, but I hope to collaborate in the future!
On Fri, Dec 18, 2020 at 9:58 AM Emily Fox <themoxiefoxatwork@...> wrote:
|
|
Re: SIG-Security Tech Lead nominations
+1 NB and everything Sarah said. These three are stellar members who have supported our SIG not only through growth, but contributions and leading efforts. - Emily Fox @TheMoxieFox (personal handle)
On Thu, 17 Dec 2020, 20:52 Sarah Allen, <sarah@...> wrote:
|
|
Re: SIG-Security Tech Lead nominations
Sarah Allen
Ashutosh Narkar, Aradhana Chetal and Andres Vega have made significant contributions to SIG-Security already, and along with their background and experience, would make great Technical Leads for our SIG. Note that they would join (not replace) the current TLs, Brandon Lum and Justin Cappos. Sarah Allen SIG-Security Co-Chair
On Thu, Dec 17, 2020 at 8:43 PM Jeyappragash Jeyakeerthi <jj@...> wrote:
|
|
SIG-Security Tech Lead nominations
Jeyappragash Jeyakeerthi
Dear Technical Oversight Committee, On December 16th 2020, the SIG-Security co-chairs along with then TOC liason’s Liz Rice and Justin Cormack, agreed to nominate three Tech Leads for SIG-Security: Ashutosh Narkar, Aradhana Chetal and Andres Vega. “Tech leads are assigned following a 2/3 majority vote of the TOC and a 2/3 majority vote of SIG Chairs” — cncf-sig elections Thank you! Jeyappragash.J.J (On behalf of SIG-Security Chairs) TL Candidates - Dec 2020 Ashutosh Narkar
Aradhana Chetal
Andres Vega
|
|
[RFC] Inclusive Naming Initiative workstreams
Hey everyone, Some of y'all have asked how you can get more involved in the Inclusive Naming Initiative and the group has just proposed a set of potential workstreams. If you're interested, feel free to pop by the GitHub discussion and let us know where you'd like to help out/lead: https://github.com/inclusivenaming/org/discussions/12 -- Stephen
|
|
Re: Agenda for today
Liz Rice
Aha, I see in the public working doc today's meeting is down as cancelled. Enjoy your extra hour!
On Tue, Dec 15, 2020 at 1:08 PM Liz Rice <liz@...> wrote: Hi everyone,
|
|
Agenda for today
Liz Rice
Hi everyone,
Amye is OOO today (I believe unexpectedly) and I’m not quite sure where we are with an agenda for the TOC call today. Does anyone have something they were prepared / planning to discuss? Cheers, Liz
|
|
[TOC] Nominations Open through 12pm PT, January 11, 2021
Amye Scavarda Perrin
5 seats are open for nomination by the GB and End User Community. Nominations are open for the two Selecting Groups. We will be publishing the list of qualified nominees at the end of the qualification process. Timeline: December 14: Nominations open – 12 PM PT January 11: Nominations close - 12 PM PT Jan 11: Qualification period opens Jan 25: Qualification period closes Jan 25: Election opens, Voting occurs by a time-limited Condorcet-IRV ranking in CIVS Feb 1: Election closes at 12pm Pacific, results announced Amye Scavarda Perrin | Program Manager | amye@...
|
|
Re: OPA to graduation
jkrach@...
We've also been using OPA in production for use cases such as:
1. microservice authorization policy 2. internal webapp authorization policies via Envoy filter 3. kafka authorization We also spoke at Kubecon 2019 about some of our use cases, you can check it out here: https://www.youtube.com/watch?v=LhgxFICWsA8 Gatekeeper / K8S admission is actually one of the main use cases we still haven't fully integrated (in the works though)!
|
|
[cncf-dex-maintainers] [Announcement] First Maintainers Circle: Thursday! You're Invited!
(Forwarding to the TOC + ContribStrat mailing lists as well.) Join us next week for the first edition of the Maintainers Circle! Details below from Paris. :) -- Stephen ---------- Forwarded message --------- From: Paris <paris.pittman@...> Date: Fri, Dec 11, 2020 at 11:38 AM Subject: [cncf-dex-maintainers] [Announcement] First Maintainers Circle: Thursday! You're Invited! To: <maintainers@...> Please forward this to other maintainers and folks making key decisions for the project; not solely the TOC voting members(reviewers, approvers, committee members, et al.). 💫 SIG Contributor Strategy welcomes you to the first edition of the Maintainers Circle.💫 This Thursday, December 17th. In this first session, we will talk about burnout and time management. Full details and future sessions in the works in our repo. A tl;dr: Dorothy Howard, FOSS Researcher and Wikipedia Maintainer with the University of California, San Diego, and Aaron Crickenberger, Emeritus Steering Committee member and SIG Testing Chair for the Kubernetes project will be joining us to share their experiences and research. These interactive learning sessions will have ample opportunities to talk to your peers from across projects in small groups and hear from speakers that are academics, researchers, growth consultants, and other maintainers on topics that aren’t widely discussed. You'll be able to introduce yourself and the role you play. To RSVP: Join #maintainers-circle on CNCF Slack (https://slack.cncf.io/) and emoji react to the post (that’s it!) To add this to your calendar: Grab the sig-contributor-strategy meetings on the CNCF Calendar: https://www.cncf.io/calendar/ They will be re-labeled with the title of Maintainer Circle shortly. Wish this was during another day/time that is better for you? Let us know with the time range options: https://doodle.com/poll/z5gg4p6qyxedgf2c. We will make a schedule for 2021 to include times to better accommodate participants. See you soon, Paris SIG Contributor Strategy To unsubscribe from this group and stop receiving emails from it, send an email to maintainers+unsubscribe@....
|
|
Re: [VOTE] Open Policy Agent from incubating to graduated
Kiran Mova
|
|
Re: [VOTE] Open Policy Agent from incubating to graduated
+1 binding ~Dave
|
|
Re: [VOTE] Open Policy Agent from incubating to graduated
+1 NB
toggle quoted messageShow quoted text
This is an incredibly important project, and I think we are only seeing the beginning of its impact. Congratulations to the team for their achievements!
On Dec 9, 2020, at 11:22 AM, John Belamaric via lists.cncf.io <jbelamaric=google.com@...> wrote:
|
|
Re: OPA to graduation
Gareth Rushgrove
On Wed, 9 Dec 2020 at 19:11, Liz Rice <liz@...> wrote:
I think Gatekeeper is interesting, but it's a sub-project of Open Policy Agent, not the whole thing. Anecdotally I mainly talk to a lot more folks using OPA outside Kubernetes than those just using it for Kubernetes-related use cases. Download stats are imperfect, but do bring some data points. At least direct from GitHub, Conftest (https://github.com/open-policy-agent/conftest/, another sub-project) gets a lot more direct downloads than OPA. That's intentional (at least to me, as the creator and one of the maintainers!) as it's intended for local individual usage. It's developers downloading it to their desktops, from homebrew or direct from GitHub. The latest Conftest release has seen ~7000 downloads across platforms (not including the container image) and was shipped <1 month ago (14th November). The Docker Hub published images tell the other part of the story 10M+ https://hub.docker.com/r/openpolicyagent/opa/ 1M+ https://hub.docker.com/r/openpolicyagent/gatekeeper 100k+ https://hub.docker.com/r/openpolicyagent/conftest (formerly https://hub.docker.com/r/instrumenta/conftest) Gatekeeper here outstrips Conftest, given it's server vs local use case. OPA itself is more popular still, because while Gatekeeper is only for Kubernetes, OPA itself can be used with Kubernetes, but it's also used for other generic policy use cases in the broader cloud native ecosystem. GitHub Stars (pah!) are interesting in microcosm here as well: Conftest - 1.5k Gatekeeper - 1.4k OPA - 4.3k But that's also just direct usage. OPA itself I'd argue is also partly something others build on top of as a library. Others will have other private and public examples, but for instance https://forsetisecurity.org/docs/latest/configure/real-time-enforcer/opa-engine.html or https://docs.ceph.com/en/latest/radosgw/opa/. What ties all of those OPA-powered tools together is the Rego policy language and I think that's an important aspect here with regards to graduation. Another datapoint was there was enough Rego code on GitHub for them to add support for code search and highlighting last year https://github.com/github/linguist/pull/4371#issuecomment-533053406. The amount of public Rego code has continued to grow as well https://github.com/search?utf8=%E2%9C%93&type=Code&ref=searchresults&q=extension%3Arego+package, from around 200 results a over a year ago to more than 7000 now. Note as well most of the Rego written, by its nature, is going to be private. Hopefully that's useful context about the project and ecosystem. There are likely some good user stories as well that others can share to compliment my data deluge. The Gatekeeper folks can probably comment on Gatekeeper specifically too, but Open Policy Agent is a bigger project with a broader impact on the wider cloud native community I feel. Gareth -- Gareth Rushgrove @garethr garethr.dev devopsweekly.com
|
|