|
Re: [VOTE] Flux for incubation
+1 NB
By
Ken Owens
·
#5685
·
|
|
Re: [VOTE] Flux for incubation
+1 binding
From:cncf-toc@... <cncf-toc@...> on behalf of Amye Scavarda Perrin via lists.cncf.io <ascavarda=linuxfoundation.org@...>
Date: Friday, February 19, 2021 at 10:41 AM
To: CNCF TOC
+1 binding
From:cncf-toc@... <cncf-toc@...> on behalf of Amye Scavarda Perrin via lists.cncf.io <ascavarda=linuxfoundation.org@...>
Date: Friday, February 19, 2021 at 10:41 AM
To: CNCF TOC
|
By
Sheng Liang <sheng.liang@...>
·
#5684
·
|
|
Re: [VOTE] Flux for incubation
+1 nb
By
Jeff Billimek
·
#5683
·
|
|
Re: [VOTE] Flux for incubation
+1 binding
By
Michelle Noorali <michelle.noorali@...>
·
#5682
·
|
|
Re: [VOTE] Flux for incubation
+1 Non-binding.
I’m really excited by the “toolkit” approach that is part of flux2. That, for me, makes this much more useful in many more situations.
Joe
From:cncf-toc@...
+1 Non-binding.
I’m really excited by the “toolkit” approach that is part of flux2. That, for me, makes this much more useful in many more situations.
Joe
From:cncf-toc@...
|
By
Joe Beda <jbeda@...>
·
#5681
·
|
|
[VOTE] Flux for incubation
The Flux project has applied to move from sandbox to incubation: (https://github.com/cncf/toc/pull/567)
The due diligence document can be found here:
The Flux project has applied to move from sandbox to incubation: (https://github.com/cncf/toc/pull/567)
The due diligence document can be found here:
|
By
Amye Scavarda Perrin
·
#5680
·
|
|
Re: [cncf-flux-maintainers] [cncf-toc] Flux for Incubation Public Comment Period
Sounds great. We're ready to call for a vote then if you'll do the honors @Amye.
Thanks all.
Sounds great. We're ready to call for a vote then if you'll do the honors @Amye.
Thanks all.
|
By
Michelle Noorali <michelle.noorali@...>
·
#5679
·
|
|
Re: [cncf-flux-maintainers] [cncf-toc] Flux for Incubation Public Comment Period
Thanks Michael, Daniel & Stefan for your responses - this all seems reasonable to me so you can consider my comments resolved :-)
Thanks Michael, Daniel & Stefan for your responses - this all seems reasonable to me so you can consider my comments resolved :-)
|
By
Liz Rice
·
#5678
·
|
|
KEDA Annual Review
Dear CNCF TOC,
We are happy to share that the annual review for KEDA is open on https://github.com/cncf/toc/pull/607.
Kind regards,
Tom Kerkhove
Microsoft Azure MVP & Advisor - GitHub Star – CNCF
Dear CNCF TOC,
We are happy to share that the annual review for KEDA is open on https://github.com/cncf/toc/pull/607.
Kind regards,
Tom Kerkhove
Microsoft Azure MVP & Advisor - GitHub Star – CNCF
|
By
Tom Kerkhove
·
#5677
·
|
|
Vote - renaming CNCF SIGs to TAGs
In this week's meeting we talked about renaming CNCF SIGs to TAGs (Technical Advisory Group) to avoid confusion with the pre-existing Kubernetes SIGs. As discussed, the current confusion is real,
In this week's meeting we talked about renaming CNCF SIGs to TAGs (Technical Advisory Group) to avoid confusion with the pre-existing Kubernetes SIGs. As discussed, the current confusion is real,
|
By
Liz Rice
·
#5676
·
|
|
Re: security & CNCF projects
Not on the TOC, so hope it's ok to comment.
I have the same concerns as Liz, quite often metrics are gathered without all factors considered.
Take kubernetes for example, huge code base, huge user
Not on the TOC, so hope it's ok to comment.
I have the same concerns as Liz, quite often metrics are gathered without all factors considered.
Take kubernetes for example, huge code base, huge user
|
By
Luke A Hinds <lhinds@...>
·
#5675
·
|
|
Re: security & CNCF projects
thanks Liz
this is a *terrific resource* that costs lots of money & time, and it is useless if we don't make it public and prune out old stuff
thanks Liz
this is a *terrific resource* that costs lots of money & time, and it is useless if we don't make it public and prune out old stuff
|
By
alexis richardson
·
#5674
·
|
|
Re: security & CNCF projects
I've realised that one reason the results look so damning for the projects is that they are the sum of vulnerabilities found over a period of time (and an arbitrary period of time at that). For
I've realised that one reason the results look so damning for the projects is that they are the sum of vulnerabilities found over a period of time (and an arbitrary period of time at that). For
|
By
Liz Rice
·
#5673
·
|
|
Re: security & CNCF projects
I understand this is Beta
I believe all of the CNCF community should have equal access.
I understand this is Beta
I believe all of the CNCF community should have equal access.
|
By
alexis richardson
·
#5672
·
|
|
Re: security & CNCF projects
Alexis, the tool is freely available just like a variety of other security tools that CNCF projects use, from LFX Security (white labeled Snyk), Snyk, FOSSA, CodeQL, WhiteSource etc, lots of great
Alexis, the tool is freely available just like a variety of other security tools that CNCF projects use, from LFX Security (white labeled Snyk), Snyk, FOSSA, CodeQL, WhiteSource etc, lots of great
|
By
Chris Aniszczyk
·
#5671
·
|
|
Re: security & CNCF projects
I strongly disagree Chris, this is a great resource that all should be aware of.
Now that we don’t have FPs, can we just publish the data? Please do not assume that end users will not run their own
I strongly disagree Chris, this is a great resource that all should be aware of.
Now that we don’t have FPs, can we just publish the data? Please do not assume that end users will not run their own
|
By
alexis richardson
·
#5670
·
|
|
Re: security & CNCF projects
+1 to what Liz said here, this should be opt-in for project maintainers like any tool
Can we please just leave this as a per project decision as any other tool as we decided last time this came up,
+1 to what Liz said here, this should be opt-in for project maintainers like any tool
Can we please just leave this as a per project decision as any other tool as we decided last time this came up,
|
By
Chris Aniszczyk
·
#5669
·
|
|
Re: security & CNCF projects
The scan data from Snyk right now is fairly clean as they curate and weed out false positives proactively. In the tool, we do have flags on the bugs to dismiss it (in case it's still a false
The scan data from Snyk right now is fairly clean as they curate and weed out false positives proactively. In the tool, we do have flags on the bugs to dismiss it (in case it's still a false
|
By
Shubhra Kar
·
#5668
·
|
|
Re: security & CNCF projects
I have an idea that there were concerns about making the data publicly available because of false positives, and the worry that if projects appear (incorrectly) to be unsafe that will impede adoption.
I have an idea that there were concerns about making the data publicly available because of false positives, and the worry that if projects appear (incorrectly) to be unsafe that will impede adoption.
|
By
Liz Rice
·
#5667
·
|
|
Re: security & CNCF projects
Idea: It would be cool if all CNCF projects had the same metadata for representing "maintainers".
If that was standardized, some tool could ingest and compare against LFIDs.
-- Stephen
Idea: It would be cool if all CNCF projects had the same metadata for representing "maintainers".
If that was standardized, some tool could ingest and compare against LFIDs.
-- Stephen
|
By
Stephen Augustus
·
#5666
·
|