Re: [VOTE] Streamlining incubation process
Josh Berkus
On 4/22/21 2:05 PM, Amye Scavarda Perrin wrote:
A proposal has been made to streamline the incubation process: https://github.com/cncf/toc/pull/640 <https://github.com/cncf/toc/pull/640>+1 NB As someone who frequently advises projects on how to get through the process, this is a huge step forwards. -- -- Josh Berkus Kubernetes Community Architect OSPO, OCTO |
||
|
||
Re: [VOTE] Streamlining incubation process
Santiago Torres Arias <santiago@...>
+1 (NB)
toggle quoted message
Show quoted text
On Thu, Apr 22, 2021 at 02:05:02PM -0700, Amye Scavarda Perrin wrote:
A proposal has been made to streamline the incubation process: |
||
|
||
[VOTE] Streamlining incubation process
Amye Scavarda Perrin
A proposal has been made to streamline the incubation process: https://github.com/cncf/toc/pull/640 Please vote (+1/0/-1) by replying to this thread. Remember that the TOC has binding votes only, but we do appreciate non-binding votes from the community as a sign of support! Amye Scavarda Perrin | Program Manager | amye@... |
||
|
||
Re: Agenda for 4/20
Justin Cormack
I have a conflict too, I may be there for part of the call. Apologies Justin On Tue, Apr 20, 2021 at 8:13 AM Lei Zhang <resouer@...> wrote:
|
||
|
||
Re: Agenda for 4/20
Lei Zhang
Sorry, I happened to have conflict and have to miss this one. On Mon, Apr 19, 2021 at 10:45 AM Amye Scavarda Perrin <ascavarda@...> wrote:
|
||
|
||
Re: Agenda for 4/20
Erin Boyd <erin_boyd@...>
I have to drop after 30 minutes. Apologies in advance,
toggle quoted message
Show quoted text
Erin
|
||
|
||
Re: [cncf-sig-security] Action Needed - Codecov bash uploader supply chain attack
Richard Hartmann
Just to confirm: Chris A already sent this to all maintainers.
|
||
|
||
Agenda for 4/20
Amye Scavarda Perrin
Hi all, We'll be meeting tomorrow at 8am Pacific. Tomorrow's discussion is on some updates to the incubating process. (https://github.com/cncf/toc/pull/640 has details.) Presentation: https://docs.google.com/presentation/d/1J9nti4JdiwLHxY15KtkmqyfP4OgNfrLAd3vxPvFTzsc/edit#slide=id.g25ca91f87f_0_0 Amye Scavarda Perrin | Program Manager | amye@... |
||
|
||
[cncf-sig-security] Action Needed - Codecov bash uploader supply chain attack
Liz Rice
🙏 Thanks to SIG Security for this advice on Codecov @chris @amye you’re probably already on top of this, but please could we make sure the relevant project maintainers are aware and acting on this? Per their note, SIG Security are available on Slack if anyone has any questions ---------- Forwarded message --------- From: Lorenzo Fontana <fontanalorenz@...> Date: Sat, 17 Apr 2021 at 23:49 Subject: [cncf-sig-security] Action Needed - Codecov bash uploader supply chain attack To: <cncf-sig-security@...> Hello everyone, On April 15th 2021, the Codecov team published a note [0] acknowledging a supply chain attack affecting their bash uploader. **Background of the attack** The Codecov bash uploader is the component responsible for reporting back coverage results to the CI systems of the projects using the service. This component is usually executed in a CI step by just downloading and executing the script via bash + cURL directly as described in their documentation [1]. This attack was possible because of an error in the image creation process that allowed the actor to extract the credential required to modify the script. From their announcement: The altered version of the bash uploader script could potentially affect: - Any credentials, tokens, or keys that our customers were passing through their CI runner that would be accessible when the bash uploader script was executed. - Any services, datastores, and application code that could be accessed with these credentials, tokens, or keys. - The git remote information (URL of the origin repository) of repositories using the bash uploader to upload coverage to Codecov in CI. **Action Items** CNCF projects using Codecov are recommended to do the following: - Rotate all the private credentials available in the context where the script was executed - Validate the bash script with a trusted copy of the SHA256 sum as described in the Codecov docs [2] - Watch out for any suspect usage of the tokens **Projects** The SIG does not have visibility on whether or not projects are using Codecov right now. However, we did a research and this is a list of the repositories that we found using Codecov: https://github.com/argoproj/argo-cd https://github.com/containerd/containerd https://github.com/coredns/coredns https://github.com/etcd-io/etcd https://github.com/goharbor/harbor https://github.com/jaegertracing/jaeger https://github.com/kubernetes/dashboard https://github.com/kubernetes/ingress-nginx https://github.com/prometheus/prometheus_api_client_ruby https://github.com/buildpacks/lifecycle https://github.com/cri-o/cri-o https://github.com/opentracing/opentracing-c If you don’t know how to check or have any other questions regarding this. Please feel free to reach out to the #sig-security channel on the CNCF Slack. The CNCF SIG-Security Team P.S: Thanks to Magno Logan, Emily Fox and Dan (POP) Papandrea for helping in getting this ready for the mailing list. [0] https://about.codecov.io/security-update/ [1] https://docs.codecov.io/docs/about-the-codecov-bash-uploader [2] https://docs.codecov.io/docs/about-the-codecov-bash-uploader#validating-the-bash-script |
||
|
||
[RESULT] Emissary-ingress approved for Incubation
Amye Scavarda Perrin
The Emissary-ingress project has been approved for incubation. 9/11 -- passes +1 B Liz Rice: https://lists.cncf.io/g/cncf-toc/message/5744 Justin Cormack: https://lists.cncf.io/g/cncf-toc/message/5715 Sheng Liang: https://lists.cncf.io/g/cncf-toc/message/5752 Dave Zolotusky: https://lists.cncf.io/g/cncf-toc/message/5754 Richardo Rocha: https://lists.cncf.io/g/cncf-toc/message/5755 Lei Zhang: https://lists.cncf.io/g/cncf-toc/message/5756 Alena Prokharchyk: https://lists.cncf.io/g/cncf-toc/message/5715 Davanum Srinivas: https://lists.cncf.io/g/cncf-toc/message/5791 Erin Boyd: https://lists.cncf.io/g/cncf-toc/message/5792 +1 NB Randy Abernethy https://lists.cncf.io/g/cncf-toc/message/5716 Matt Klein https://lists.cncf.io/g/cncf-toc/message/5717 Dave Sudia https://lists.cncf.io/g/cncf-toc/message/5719 Alois Reitbauer https://lists.cncf.io/g/cncf-toc/message/5724 Lee Calcote https://lists.cncf.io/g/cncf-toc/message/5725 Steve Flanders https://lists.cncf.io/g/cncf-toc/message/5730 Peter ONeill Jr https://lists.cncf.io/g/cncf-toc/message/5736 Flynn https://lists.cncf.io/g/cncf-toc/message/5737 Adam FitzGerald https://lists.cncf.io/g/cncf-toc/message/5738 Chris Short https://lists.cncf.io/g/cncf-toc/message/5739 Richard Li https://lists.cncf.io/g/cncf-toc/message/5740 Kan Yao https://lists.cncf.io/g/cncf-toc/message/5742 Johan Tordsson https://lists.cncf.io/g/cncf-toc/message/5743 Oleg Chornyi https://lists.cncf.io/g/cncf-toc/message/5745 Niraj Tolia https://lists.cncf.io/g/cncf-toc/message/5746 JJ https://lists.cncf.io/g/cncf-toc/message/5747 Barak Stout https://lists.cncf.io/g/cncf-toc/message/5749 Amye Scavarda Perrin | Program Manager | amye@... |
||
|
||
[cncf-sig-security] Supply Chain Security Paper Open for public comment
FYI ---------- Forwarded message --------- From: Emily Fox <themoxiefoxatwork@...> Date: Fri, Apr 9, 2021 at 11:20 AM Subject: [cncf-sig-security] Supply Chain Security Paper Open for public comment To: <cncf-sig-security@...> Hello! The cloud native security supply chain security group has worked diligently in creating an initial draft paper that provides the community with: * Recommendations for securing each point of an organisation's software supply chain, whether the organisation produces or consumes cloud native software. * Justifications and explanations for recommendations commensurate with the risk level and assurance requirements of an organization * Tooling to implement recommendations We are asking you, the community, to review the paper and provide comments/suggestions/improvements by Friday April 23rd 2021 so that we may incorporate them and finalized the initial version. You may access the document at the below URL: https://docs.google.com/document/d/1VURD9rdEhiuqPdixhEozkHw01Tk6e2AaJVjBK3pK6Zc/edit Chris Aniszczyk (@cra) |
||
|
||
Re: Agenda for 4/6 TOC meeting
Saad Ali
I will miss 4/6 meeting as well. On Tue, Apr 6, 2021 at 3:11 AM Justin Cormack via lists.cncf.io <justin.cormack=docker.com@...> wrote:
|
||
|
||
Re: Agenda for 4/6 TOC meeting
Justin Cormack
Apologies I don't think I will make it due to reschedules from yesterday's holiday. Justin On Tue, Apr 6, 2021 at 1:33 AM Amye Scavarda Perrin <ascavarda@...> wrote:
|
||
|
||
Agenda for 4/6 TOC meeting
Amye Scavarda Perrin
Hi all, We'll be meeting tomorrow at 8am Pacific. Presentation: https://docs.google.com/presentation/u/2/d/1jfMLPvO-oRFSwCyNYWCmZnhY5_qwi0PKinuvSMKmkxs/edit#slide=id.g25ca91f87f_0_0 Thanks! |
||
|
||
Brigade 2021 Annual review
Vaughn Dice <Vaughn.Dice@...>
Greetings,
I wanted to send an email to notify that Brigade's 2021 Annual review has been posted.
It can be seen via the following pull request: https://github.com/cncf/toc/pull/631
Thank you in advance for your feedback!
Vaughn Dice
Brigade Maintainer
|
||
|
||
Sandbox Inclusion Meeting Results
Amye Scavarda Perrin
The TOC met today to review the applications for projects wishing to be included as sandbox projects. We weren't able to make it through all of the applications, we'll hold a second review meeting on April 27th. Kuberhealthy - passes with a majority TOC vote - https://github.com/cncf/toc/issues/627 k8gb - Kubernetes Global Balancer - passes with a majority TOC vote - https://github.com/cncf/toc/issues/628 Vineyard - reviewing SIG Storage presentation, TOC to reach out to get more background He3local - waiting for more community momentum, reapply in 6 months Quark - waiting for more community momentum, reapply in 6 months Trickster - passes with a majority TOC vote - https://github.com/cncf/toc/issues/629 SSVM - TOC would like more clarification around possible rename ChaosBlade - moved to April 27th YARP – Yet Another Reverse Proxy - moved to April 27th KubeInvaders - moved to April 27th KubePlus - moved to April 27th Service Mesh Performance - moved to April 27th Meshery - moved to April 27th Fluid - moved to April 27th Amye Scavarda Perrin | Program Manager | amye@... |
||
|
||
Re: [VOTE] Emissary-Ingress (was: Ambassador) for incubation
Erin Boyd <erin_boyd@...>
+1 binding
toggle quoted message
Show quoted text
On Mar 25, 2021, at 2:05 PM, Davanum Srinivas <davanum@...> wrote:
|
||
|
||
Re: [VOTE] Emissary-Ingress (was: Ambassador) for incubation
+1 Binding On Fri, Mar 5, 2021 at 3:56 AM Liz Rice <liz@...> wrote:
--
Davanum Srinivas :: https://twitter.com/dims |
||
|
||
[RESULT] Tech Leads for SIG Storage Approved
Amye Scavarda Perrin
The proposed Tech Leads for SIG Storage have been approved. https://lists.cncf.io/g/cncf-toc/message/5718 8/11 - passes +1 Binding: Liz Rice: https://lists.cncf.io/g/cncf-toc/message/5722 Justin Cormack: https://lists.cncf.io/g/cncf-toc/message/5723 Cornelia Davis: https://lists.cncf.io/g/cncf-toc/message/5728 Lei Zhang: https://lists.cncf.io/g/cncf-toc/message/5729 Alena Prokharchyk: https://lists.cncf.io/g/cncf-toc/message/5731 Dave Zolotusky: https://lists.cncf.io/g/cncf-toc/message/5733 Ricardo Rocha: https://lists.cncf.io/g/cncf-toc/message/5734 Davanum Srinivas: https://lists.cncf.io/g/cncf-toc/message/5786 +1 Non-binding: Josh Berkus: https://lists.cncf.io/g/cncf-toc/message/5721 Lee Calcote: https://lists.cncf.io/g/cncf-toc/message/5726 Katie Gamanji: https://lists.cncf.io/g/cncf-toc/message/5735 Barak Stout: https://lists.cncf.io/g/cncf-toc/message/5748 Kiran Mova: https://lists.cncf.io/g/cncf-toc/message/5750a |
||
|
||
Re: security & CNCF projects
alexis richardson
Hi all Can we have a refresh on this. I think we need to get grown up about security processes for our projects. Alexis On Wed, 17 Feb 2021, 11:44 Luke Hinds, <lhinds@...> wrote:
|
||
|