|
Re: FYI: Fuzzing for CNCF Projects
Thanks for sharing, this is a very useful initiative Chris.
I’ve been thinking about doing a proposal for the Falco project to adopt syzcaller[0] to perform continuous fuzzing of the inputs/language
Thanks for sharing, this is a very useful initiative Chris.
I’ve been thinking about doing a proposal for the Falco project to adopt syzcaller[0] to perform continuous fuzzing of the inputs/language
|
By
Lorenzo Fontana <fontanalorenz@...>
·
#5571
·
|
|
FYI: Fuzzing for CNCF Projects
Hey TOC and the wider community, some of our projects have taken advantage of fuzzing (through oss-fuzz and other tools), also we recently funded some fuzzing/audit work for fluentbit to see the
Hey TOC and the wider community, some of our projects have taken advantage of fuzzing (through oss-fuzz and other tools), also we recently funded some fuzzing/audit work for fluentbit to see the
|
By
Chris Aniszczyk
·
#5570
·
|
|
Agenda for 1/5
Hi all,
We'll be meeting tomorrow at 8am Pacific.
Agenda: https://docs.google.com/document/d/1jpoKT12jf2jTf-2EJSAl4iTdA7Aoj_uiI19qIaECNFc/edit
Presentation:
Hi all,
We'll be meeting tomorrow at 8am Pacific.
Agenda: https://docs.google.com/document/d/1jpoKT12jf2jTf-2EJSAl4iTdA7Aoj_uiI19qIaECNFc/edit
Presentation:
|
By
Amye Scavarda Perrin
·
#5569
·
|
|
FYI: CNCF Annual Report 2020!
Hey all, hope everyone is having a great 2021!
At the end of last year, we posted the CNCF annual report covering what we accomplished in 2020:
Hey all, hope everyone is having a great 2021!
At the end of last year, we posted the CNCF annual report covering what we accomplished in 2020:
|
By
Chris Aniszczyk
·
#5568
·
|
|
Re: SIG-Security Tech Lead nominations
+1 binding
Justin
By
Justin Cormack
·
#5567
·
|
|
Re: SIG-Security Tech Lead nominations
+1 NB. I've had the chance to work with all of the nominees over various projects, issues and security assessments in the sig and they are all great candidates for tech leads!
+1 NB. I've had the chance to work with all of the nominees over various projects, issues and security assessments in the sig and they are all great candidates for tech leads!
|
By
Brandon Lum
·
#5566
·
|
|
Re: SIG-Security Tech Lead nominations
A robust NB+1. I only know Andres well (and he's the bomb diggity), but I'm grateful for all of these folks.
A robust NB+1. I only know Andres well (and he's the bomb diggity), but I'm grateful for all of these folks.
|
By
Chase Pettet <chase.mp@...>
·
#5565
·
|
|
Re: SIG-Security Tech Lead nominations
Super that we have these qualified and enthusiastic candidates!
I’m happy to call this TOC vote, and give it my +1 for all three nominees
Liz
Super that we have these qualified and enthusiastic candidates!
I’m happy to call this TOC vote, and give it my +1 for all three nominees
Liz
|
By
Liz Rice
·
#5564
·
|
|
Re: SIG-Security Tech Lead nominations
Whoa! It's quite an honor to receive this nomination. More so, the opportunity to serve the community alongside those who I consider its pillar.
Many thanks to SIG-Security (co-chairs, TLs, and
Whoa! It's quite an honor to receive this nomination. More so, the opportunity to serve the community alongside those who I consider its pillar.
Many thanks to SIG-Security (co-chairs, TLs, and
|
By
Andrés Vega
·
#5563
·
|
|
Re: OPA to graduation
+1
This is so great to hear! Congratulations to the OPA team!
I'm the Group Tech Lead for the Security Org at Yelp. I've found great utility from the OPA project. At the time of this writing, I've
+1
This is so great to hear! Congratulations to the OPA team!
I'm the Group Tech Lead for the Security Org at Yelp. I've found great utility from the OPA project. At the time of this writing, I've
|
By
dpopes@...
·
#5562
·
|
|
Re: SIG-Security Tech Lead nominations
+1 NB for Ash and Andreas. I've worked closely with them both on security assessments. They are technically sharp, organized, and diligent.
Apologies to Aradhana, who I haven't worked with yet for
+1 NB for Ash and Andreas. I've worked closely with them both on security assessments. They are technically sharp, organized, and diligent.
Apologies to Aradhana, who I haven't worked with yet for
|
By
Justin Cappos <jcappos@...>
·
#5561
·
|
|
Re: SIG-Security Tech Lead nominations
+1 NB and everything Sarah said. These three are stellar members who have supported our SIG not only through growth, but contributions and leading efforts.
- Emily Fox
@TheMoxieFox (personal handle)
+1 NB and everything Sarah said. These three are stellar members who have supported our SIG not only through growth, but contributions and leading efforts.
- Emily Fox
@TheMoxieFox (personal handle)
|
By
Emily Fox
·
#5560
·
|
|
Re: SIG-Security Tech Lead nominations
Ashutosh Narkar, Aradhana Chetal and Andres Vega have made significant contributions to SIG-Security already, and along with their background and experience, would make great Technical Leads for our
Ashutosh Narkar, Aradhana Chetal and Andres Vega have made significant contributions to SIG-Security already, and along with their background and experience, would make great Technical Leads for our
|
By
Sarah Allen
·
#5559
·
|
|
SIG-Security Tech Lead nominations
Dear Technical Oversight Committee,
On December 16th 2020, the SIG-Security co-chairs along with then TOC liason’s Liz Rice and Justin Cormack, agreed to nominate three Tech Leads for SIG-Security:
Dear Technical Oversight Committee,
On December 16th 2020, the SIG-Security co-chairs along with then TOC liason’s Liz Rice and Justin Cormack, agreed to nominate three Tech Leads for SIG-Security:
|
By
Jeyappragash Jeyakeerthi
·
#5558
·
|
|
[RFC] Inclusive Naming Initiative workstreams
Hey everyone,
Some of y'all have asked how you can get more involved in the Inclusive Naming Initiative and the group has just proposed a set of potential workstreams.
If you're interested, feel free
Hey everyone,
Some of y'all have asked how you can get more involved in the Inclusive Naming Initiative and the group has just proposed a set of potential workstreams.
If you're interested, feel free
|
By
Stephen Augustus
·
#5557
·
|
|
Re: Agenda for today
Aha, I see in the public working doc today's meeting is down as cancelled. Enjoy your extra hour!
Aha, I see in the public working doc today's meeting is down as cancelled. Enjoy your extra hour!
|
By
Liz Rice
·
#5556
·
|
|
Agenda for today
Hi everyone,
Amye is OOO today (I believe unexpectedly) and I’m not quite sure where we are with an agenda for the TOC call today. Does anyone have something they were prepared / planning to
Hi everyone,
Amye is OOO today (I believe unexpectedly) and I’m not quite sure where we are with an agenda for the TOC call today. Does anyone have something they were prepared / planning to
|
By
Liz Rice
·
#5555
·
|
|
[TOC] Nominations Open through 12pm PT, January 11, 2021
5 seats are open for nomination by the GB and End User Community.
Nominations are open for the two Selecting Groups.
We will be publishing the list of qualified nominees at the end of the
5 seats are open for nomination by the GB and End User Community.
Nominations are open for the two Selecting Groups.
We will be publishing the list of qualified nominees at the end of the
|
By
Amye Scavarda Perrin
·
#5554
·
|
|
Re: OPA to graduation
We've also been using OPA in production for use cases such as:
1. microservice authorization policy
2. internal webapp authorization policies via Envoy filter
3. kafka authorization
We also spoke at
We've also been using OPA in production for use cases such as:
1. microservice authorization policy
2. internal webapp authorization policies via Envoy filter
3. kafka authorization
We also spoke at
|
By
jkrach@...
·
#5553
·
|
|
[cncf-dex-maintainers] [Announcement] First Maintainers Circle: Thursday! You're Invited!
(Forwarding to the TOC + ContribStrat mailing lists as well.)
Join us next week for the first edition of the Maintainers Circle!
Details below from Paris. :)
-- Stephen
---------- Forwarded message
(Forwarding to the TOC + ContribStrat mailing lists as well.)
Join us next week for the first edition of the Maintainers Circle!
Details below from Paris. :)
-- Stephen
---------- Forwarded message
|
By
Stephen Augustus
·
#5552
·
|