The presentation discusses the contribution process for adding a feature to Kubernetes and provides insights on how to navigate through the Kubernetes processes.
There are three stages in the contribution ladder: members, reviewers, and approvers.
To merge a PR, it must pass all automated tests and be approved by at least one Kubernetes approver.
For contributing a feature, it is important to make oneself familiar with the contribution process and to ensure that one understands the whole process.
The process starts from an unstable Alpha, goes through to the feature complete beta state, and finally to the stable GA state.
There are three different repos where changes need to be made: the enhancement repo, the Kubernetes repo, and the Kubernetes website repo.
Authors: Jeremy Rickard, Jason DeTiberus, Danielle Lancashire, Hilliary Lipsig, Xander Grzywinski
2023-04-19
tldr - powered by Generative AI
The conference presentation discusses the Code of Conduct Committee's approach to handling reported instances of misconduct in the open-source community.
The committee emphasizes confidentiality and offers anonymous reporting options
They approach reported instances by discussing them as a group and looking at power dynamics and context
They also consider situations where the Code of Conduct may be weaponized against marginalized individuals
The committee encourages kindness and respect in all interactions within the community
The presentation discusses the importance of project maturity and the steps that need to be taken to achieve it within the Cloud Native Computing Foundation (CNCF).
Project maturity is crucial for success within the CNCF
Security is a top priority and projects must undergo independent security audits and fix critical vulnerabilities
Clear and explicit definitions for project usage and contribution are necessary
Adoption, security, and contribution are the three main categories for achieving project maturity
Collaboration with Technical Advisory Groups (TAGs) is important for improving contributor base and project security
Archiving is a natural process and lessons learned should be applied to other projects within the foundation
The presentation discusses the importance of securing Kubernetes operators and suggests using a pipeline and static analyzer to detect vulnerabilities.
Operators are automated runbooks that can pose security risks if not properly secured
Bad Robot is a tool that can scan operator manifests for vulnerabilities
Developers should be explicit about the permissions and resources an operator can access
Restricting an operator to specific namespaces and resources can improve security
A pipeline and static analyzer can help detect vulnerabilities in operators