Re: Agenda for 4/20
Erin Boyd <erin_boyd@...>
I have to drop after 30 minutes. Apologies in advance,
toggle quoted message
Show quoted text
Erin
|
||
|
||
Re: [cncf-sig-security] Action Needed - Codecov bash uploader supply chain attack
Richard Hartmann
Just to confirm: Chris A already sent this to all maintainers.
|
||
|
||
Agenda for 4/20
Amye Scavarda Perrin
Hi all, We'll be meeting tomorrow at 8am Pacific. Tomorrow's discussion is on some updates to the incubating process. (https://github.com/cncf/toc/pull/640 has details.) Presentation: https://docs.google.com/presentation/d/1J9nti4JdiwLHxY15KtkmqyfP4OgNfrLAd3vxPvFTzsc/edit#slide=id.g25ca91f87f_0_0 Amye Scavarda Perrin | Program Manager | amye@... |
||
|
||
[cncf-sig-security] Action Needed - Codecov bash uploader supply chain attack
Liz Rice
🙏 Thanks to SIG Security for this advice on Codecov @chris @amye you’re probably already on top of this, but please could we make sure the relevant project maintainers are aware and acting on this? Per their note, SIG Security are available on Slack if anyone has any questions ---------- Forwarded message --------- From: Lorenzo Fontana <fontanalorenz@...> Date: Sat, 17 Apr 2021 at 23:49 Subject: [cncf-sig-security] Action Needed - Codecov bash uploader supply chain attack To: <cncf-sig-security@...> Hello everyone, On April 15th 2021, the Codecov team published a note [0] acknowledging a supply chain attack affecting their bash uploader. **Background of the attack** The Codecov bash uploader is the component responsible for reporting back coverage results to the CI systems of the projects using the service. This component is usually executed in a CI step by just downloading and executing the script via bash + cURL directly as described in their documentation [1]. This attack was possible because of an error in the image creation process that allowed the actor to extract the credential required to modify the script. From their announcement: The altered version of the bash uploader script could potentially affect: - Any credentials, tokens, or keys that our customers were passing through their CI runner that would be accessible when the bash uploader script was executed. - Any services, datastores, and application code that could be accessed with these credentials, tokens, or keys. - The git remote information (URL of the origin repository) of repositories using the bash uploader to upload coverage to Codecov in CI. **Action Items** CNCF projects using Codecov are recommended to do the following: - Rotate all the private credentials available in the context where the script was executed - Validate the bash script with a trusted copy of the SHA256 sum as described in the Codecov docs [2] - Watch out for any suspect usage of the tokens **Projects** The SIG does not have visibility on whether or not projects are using Codecov right now. However, we did a research and this is a list of the repositories that we found using Codecov: https://github.com/argoproj/argo-cd https://github.com/containerd/containerd https://github.com/coredns/coredns https://github.com/etcd-io/etcd https://github.com/goharbor/harbor https://github.com/jaegertracing/jaeger https://github.com/kubernetes/dashboard https://github.com/kubernetes/ingress-nginx https://github.com/prometheus/prometheus_api_client_ruby https://github.com/buildpacks/lifecycle https://github.com/cri-o/cri-o https://github.com/opentracing/opentracing-c If you don’t know how to check or have any other questions regarding this. Please feel free to reach out to the #sig-security channel on the CNCF Slack. The CNCF SIG-Security Team P.S: Thanks to Magno Logan, Emily Fox and Dan (POP) Papandrea for helping in getting this ready for the mailing list. [0] https://about.codecov.io/security-update/ [1] https://docs.codecov.io/docs/about-the-codecov-bash-uploader [2] https://docs.codecov.io/docs/about-the-codecov-bash-uploader#validating-the-bash-script |
||
|
||
[RESULT] Emissary-ingress approved for Incubation
Amye Scavarda Perrin
The Emissary-ingress project has been approved for incubation. 9/11 -- passes +1 B Liz Rice: https://lists.cncf.io/g/cncf-toc/message/5744 Justin Cormack: https://lists.cncf.io/g/cncf-toc/message/5715 Sheng Liang: https://lists.cncf.io/g/cncf-toc/message/5752 Dave Zolotusky: https://lists.cncf.io/g/cncf-toc/message/5754 Richardo Rocha: https://lists.cncf.io/g/cncf-toc/message/5755 Lei Zhang: https://lists.cncf.io/g/cncf-toc/message/5756 Alena Prokharchyk: https://lists.cncf.io/g/cncf-toc/message/5715 Davanum Srinivas: https://lists.cncf.io/g/cncf-toc/message/5791 Erin Boyd: https://lists.cncf.io/g/cncf-toc/message/5792 +1 NB Randy Abernethy https://lists.cncf.io/g/cncf-toc/message/5716 Matt Klein https://lists.cncf.io/g/cncf-toc/message/5717 Dave Sudia https://lists.cncf.io/g/cncf-toc/message/5719 Alois Reitbauer https://lists.cncf.io/g/cncf-toc/message/5724 Lee Calcote https://lists.cncf.io/g/cncf-toc/message/5725 Steve Flanders https://lists.cncf.io/g/cncf-toc/message/5730 Peter ONeill Jr https://lists.cncf.io/g/cncf-toc/message/5736 Flynn https://lists.cncf.io/g/cncf-toc/message/5737 Adam FitzGerald https://lists.cncf.io/g/cncf-toc/message/5738 Chris Short https://lists.cncf.io/g/cncf-toc/message/5739 Richard Li https://lists.cncf.io/g/cncf-toc/message/5740 Kan Yao https://lists.cncf.io/g/cncf-toc/message/5742 Johan Tordsson https://lists.cncf.io/g/cncf-toc/message/5743 Oleg Chornyi https://lists.cncf.io/g/cncf-toc/message/5745 Niraj Tolia https://lists.cncf.io/g/cncf-toc/message/5746 JJ https://lists.cncf.io/g/cncf-toc/message/5747 Barak Stout https://lists.cncf.io/g/cncf-toc/message/5749 Amye Scavarda Perrin | Program Manager | amye@... |
||
|
||
[cncf-sig-security] Supply Chain Security Paper Open for public comment
FYI ---------- Forwarded message --------- From: Emily Fox <themoxiefoxatwork@...> Date: Fri, Apr 9, 2021 at 11:20 AM Subject: [cncf-sig-security] Supply Chain Security Paper Open for public comment To: <cncf-sig-security@...> Hello! The cloud native security supply chain security group has worked diligently in creating an initial draft paper that provides the community with: * Recommendations for securing each point of an organisation's software supply chain, whether the organisation produces or consumes cloud native software. * Justifications and explanations for recommendations commensurate with the risk level and assurance requirements of an organization * Tooling to implement recommendations We are asking you, the community, to review the paper and provide comments/suggestions/improvements by Friday April 23rd 2021 so that we may incorporate them and finalized the initial version. You may access the document at the below URL: https://docs.google.com/document/d/1VURD9rdEhiuqPdixhEozkHw01Tk6e2AaJVjBK3pK6Zc/edit Chris Aniszczyk (@cra) |
||
|
||
Re: Agenda for 4/6 TOC meeting
Saad Ali
I will miss 4/6 meeting as well. On Tue, Apr 6, 2021 at 3:11 AM Justin Cormack via lists.cncf.io <justin.cormack=docker.com@...> wrote:
|
||
|
||
Re: Agenda for 4/6 TOC meeting
Justin Cormack
Apologies I don't think I will make it due to reschedules from yesterday's holiday. Justin On Tue, Apr 6, 2021 at 1:33 AM Amye Scavarda Perrin <ascavarda@...> wrote:
|
||
|
||
Agenda for 4/6 TOC meeting
Amye Scavarda Perrin
Hi all, We'll be meeting tomorrow at 8am Pacific. Presentation: https://docs.google.com/presentation/u/2/d/1jfMLPvO-oRFSwCyNYWCmZnhY5_qwi0PKinuvSMKmkxs/edit#slide=id.g25ca91f87f_0_0 Thanks! |
||
|
||
Brigade 2021 Annual review
Vaughn Dice <Vaughn.Dice@...>
Greetings,
I wanted to send an email to notify that Brigade's 2021 Annual review has been posted.
It can be seen via the following pull request: https://github.com/cncf/toc/pull/631
Thank you in advance for your feedback!
Vaughn Dice
Brigade Maintainer
|
||
|
||
Sandbox Inclusion Meeting Results
Amye Scavarda Perrin
The TOC met today to review the applications for projects wishing to be included as sandbox projects. We weren't able to make it through all of the applications, we'll hold a second review meeting on April 27th. Kuberhealthy - passes with a majority TOC vote - https://github.com/cncf/toc/issues/627 k8gb - Kubernetes Global Balancer - passes with a majority TOC vote - https://github.com/cncf/toc/issues/628 Vineyard - reviewing SIG Storage presentation, TOC to reach out to get more background He3local - waiting for more community momentum, reapply in 6 months Quark - waiting for more community momentum, reapply in 6 months Trickster - passes with a majority TOC vote - https://github.com/cncf/toc/issues/629 SSVM - TOC would like more clarification around possible rename ChaosBlade - moved to April 27th YARP – Yet Another Reverse Proxy - moved to April 27th KubeInvaders - moved to April 27th KubePlus - moved to April 27th Service Mesh Performance - moved to April 27th Meshery - moved to April 27th Fluid - moved to April 27th Amye Scavarda Perrin | Program Manager | amye@... |
||
|
||
Re: [VOTE] Emissary-Ingress (was: Ambassador) for incubation
Erin Boyd <erin_boyd@...>
+1 binding
toggle quoted message
Show quoted text
On Mar 25, 2021, at 2:05 PM, Davanum Srinivas <davanum@...> wrote:
|
||
|
||
Re: [VOTE] Emissary-Ingress (was: Ambassador) for incubation
+1 Binding On Fri, Mar 5, 2021 at 3:56 AM Liz Rice <liz@...> wrote:
--
Davanum Srinivas :: https://twitter.com/dims |
||
|
||
[RESULT] Tech Leads for SIG Storage Approved
Amye Scavarda Perrin
The proposed Tech Leads for SIG Storage have been approved. https://lists.cncf.io/g/cncf-toc/message/5718 8/11 - passes +1 Binding: Liz Rice: https://lists.cncf.io/g/cncf-toc/message/5722 Justin Cormack: https://lists.cncf.io/g/cncf-toc/message/5723 Cornelia Davis: https://lists.cncf.io/g/cncf-toc/message/5728 Lei Zhang: https://lists.cncf.io/g/cncf-toc/message/5729 Alena Prokharchyk: https://lists.cncf.io/g/cncf-toc/message/5731 Dave Zolotusky: https://lists.cncf.io/g/cncf-toc/message/5733 Ricardo Rocha: https://lists.cncf.io/g/cncf-toc/message/5734 Davanum Srinivas: https://lists.cncf.io/g/cncf-toc/message/5786 +1 Non-binding: Josh Berkus: https://lists.cncf.io/g/cncf-toc/message/5721 Lee Calcote: https://lists.cncf.io/g/cncf-toc/message/5726 Katie Gamanji: https://lists.cncf.io/g/cncf-toc/message/5735 Barak Stout: https://lists.cncf.io/g/cncf-toc/message/5748 Kiran Mova: https://lists.cncf.io/g/cncf-toc/message/5750a |
||
|
||
Re: security & CNCF projects
alexis richardson
Hi all Can we have a refresh on this. I think we need to get grown up about security processes for our projects. Alexis On Wed, 17 Feb 2021, 11:44 Luke Hinds, <lhinds@...> wrote:
|
||
|
||
Following up on SIG Observability / OpenTelemetry incubation concerns
Liz Rice
We held a private meeting today with representatives from SIG Observability, OpenTelemetry, OpenMetrics, TOC and CNCF staff to address the issues raised last week. Thank you so much for everyone's time today and for everyone’s constructive attitude. We recognize that this is a sensitive situation and we're mindful that it has caused friction in the community. The TOC does not think that anyone showed bias, and believes that all the individuals involved were working with good intentions. There were some missteps in the process for incubation that made this more challenging, and a lack of clarity about what was expected from the SIG, which resulted in the SIG pursuing significant due diligence work and assessment without clear guidance from a TOC sponsor. We don’t need to assign blame for those missteps, we need to learn from them going forward. Alena Prokharchyk will be taking the role of TOC Sponsor for both OpenTelemetry and OpenMetrics that have both applied for incubation, and she'll be leading the Due Diligence for both. Cornelia Davis has also stepped up to help Alena with this process. Alena and Cornelia will call on the SIGs and the project maintainers as needed for assistance putting together the due diligence, which will (when ready) be put out to public comment as usual. To avoid this situation happening again, we'll be discussing some changes to streamline the process for incubation and graduation: currently, projects go through a quick TOC Triage to determine what SIG should review for moving levels, and only after this SIG review is a TOC sponsor required. Moving forward, I'd like to propose that we change to requiring a TOC sponsor before moving onto SIG review (so after a project raises their incubation proposal in GitHub, the next step is TOC sponsorship). This change will allow for more guidance from the TOC and allow the SIGs to be better functional partners in our community. Thanks all for your patience, and for your contributions to our community |
||
|
||
Rescheduling Sandbox Review Meeting for March 30th
Amye Scavarda Perrin
For those who have applied to join the CNCF sandbox for this next review, we're moving our review meeting from March 23rd to March 30th. We normally wouldn't have a meeting at this time, but we'll hold a closed Sandbox Review meeting and accept projects there. This means that if you've applied, you have another week to add to your applications! If you haven't applied, you still have another week to apply! Feel free to reach out to me if you have questions about the process. - amye |
||
|
||
Re: Tech lead nominations for CNCF Storage SIG
+1 binding (for both candidates) On Tue, Mar 2, 2021 at 1:11 PM Justin Cormack via lists.cncf.io <justin.cormack=docker.com@...> wrote:
--
Davanum Srinivas :: https://twitter.com/dims |
||
|
||
Re: SIG Observability: Accusations during OpenTelemetry Incubation Recommendations
Hey all, thanks for the candid email here, I know that it can be a challenge as we don't timebox due diligence periods and that sometimes it can be hard to give and take feedback, especially as projects have expectations on how fast things can move (along with a mix of different technical opinions). As the due diligence is just about complete, I'd like to get us to a resolution by inviting everyone involved in the DD + on the OTel side to a private TOC meeting next week. I do want to remind everyone that the decision always rests with the TOC on a project moving maturity levels with expert opinion from relevant SIGs. I also want to remind folks that we have a code of conduct and set of principles we expect everyone to abide by, outside of the expectation of being kind. +Amye Scavarda Perrin will coordinate schedules with everyone on this thread and invite you to the meeting next week. On Fri, Mar 19, 2021 at 9:12 AM Bartłomiej Płotka <bwplotka@...> wrote:
--
Chris Aniszczyk (@cra) |
||
|
||
SIG Observability: Accusations during OpenTelemetry Incubation Recommendations
Dear Liz, I am cc-ing TOC, SIG Observability, Alolita, Constance, Priyanka, Richi and Chris for transparency. During the last SIG Observability call on 2021-03-16, when I was recommending against the OpenTelemetry incubation, it was stated that I had “conflict of interest”, “bias”, “subjective opinion” and “rude behavior”. To be clear, I am not offended. I just want to find a positive resolution and finish my work. At this point, I don’t know how and I’m asking for help. I would like to ask for an outside review of all my actions, documents and calls as the Tech Lead SIG Observability, doing Due Diligence for the OpenTelemetry. My honest belief is that I performed the assessment thoroughly and objectively to my best ability. I looked at all aspects of OpenTelemetry in the context of the CNCF Principles and Incubation requirements. I did an investigation and interviewed developers and users and listened to the advantages of OpenTelemetry. These accusations should be proven or disproven. I would love to improve my work if I did it wrong. I would love the feedback. We can discuss my assessment on the technical level, but last SIG Observability calls were less about the technical aspect, more about attempts to adjust Tech Lead opinion, make it sound softer, mask it (e.g put it out of the DD document), or even disregard completely from the TOC eyes due to accusations. I am not a decision-maker, I would be happy with any decision CNCF will make in the end. I only want my assessment to be registered as I take my duties as the Tech Lead seriously. Relevant SIG Observability calls:
Relevant documents: I would greatly appreciate your feedback. Kind Regards, Bartek Plotka, SIG Observability Tech Lead |
||
|