Update the results document for the September 2021 Kata Containers Architecture Committee elections.
Fixes#227
Signed-off-by: Wainer dos Santos Moschetta <wainersm@redhat.com>
As indicated, my candidacy was conditional to Archana not having submitted
hers. Having seen an announce on the mailing list, I assume she will also commit
it in this repository.
Fixes: #234
Signed-off-by: Christophe de Dinechin <dinechin@redhat.com>
This PR removes the travis reference in the Continuous Integration
System as it is not longer supported.
Fixes#219
Signed-off-by: Gabriela Cervantes <gabriela.cervantes.tellez@intel.com>
If you edit a doc in Windows there is a good chance the
editor will add CRLF to the end instead of LF which
causes CI failures.
Fixes: #210
Signed-off-by: Eric Adams <eric.adams@intel.com>
kata-agent is written in Rust currently, so it is better to add a
description about Rustlang coding style in the CONTRIBUTING document.
Fixes: #213
Signed-off-by: Manabu Sugimoto <Manabu.Sugimoto@sony.com>
Two nominations were received for the February 2021 elections:
- [`Peng Tao`](https://github.com/bergwolf)
- [`Samuel Ortiz`](https://github.com/sameo)
Two seats were available, so elections were over sooner.
The two members were (re-)admitted to the Architecture Committee on 2021-03-10
Fixes: #207
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
The goal here is to avoid spending time on discussions that could be
much more efficiently and inclusively discussed through github issues or
on the mailing list.
Fixes: #196
Signed-off-by: Samuel Ortiz <sameo@linux.intel.com>
Due to issues with the Kata Containers ML, the Architecture Committee
has agreed on postponing the election by one week.
This PR updates the dates according to the decision taken as part of the
Architecture Committee meeting held on March 2nd, 2021.
Fixes: #200
Signed-off-by: Fabiano Fidêncio <fidencio@redhat.com>
An insufficient validation of annotations affects Kata Containers prior to
version 1.11.5, making it possible to execute arbitrary programs on the
host. Unless specific filtering of the annotations is performed by the upper
layers of the stack, it makes it possible for a user to send manifests that
instruct kata-runtime to execute arbitrary code with the same privilege level as
kata-runtime itself.
Fixes: #191
Signed-off-by: Christophe de Dinechin <dinechin@redhat.com>
Various improvements to the KCSA document including:
- Add "Date" (of announcement) and "Affected Versions" columns to table.
- Sort table rows by date.
- Add section showing how to determine which version of Kata you are using.
- Add section with references to upgrading doc if you are affected by a KCSA.
- Add table of contents.
Fixes: #189.
Signed-off-by: James O. D. Hunt <james.o.hunt@intel.com>
We mentioned in the KCSA doc, that the advisories are listed
in reverse date order, but the advisories themselves are listed
in chronological order.
Change the order as it makes sense to list the most recent
KCSA first.
Signed-off-by: Archana Shinde <archana.m.shinde@intel.com>