-
Notifications
You must be signed in to change notification settings - Fork 614
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'main' into feat/k8sgpt-proposal
Signed-off-by: Ali Ok <[email protected]>
- Loading branch information
Showing
1 changed file
with
43 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -230,6 +230,49 @@ | |
- Zhongpei Qiao(@chivalryq, [email protected]) | ||
- Upstream Issue: https://github.com/kubevela/kubevela/issues/6435 | ||
|
||
### Kyverno | ||
|
||
#### Kyverno for Envoy Authorization | ||
|
||
- Description: Build an Envoy plugin to support authorisation based on Kyverno policies. | ||
- Expected Outcome: Enable users to perform autorisation with similar concepts as kyverno and kyverno-JSON using policies. | ||
- Recommended Skills: Golang, Kubernetes, Envoy | ||
- Mentor(s): | ||
- Charles-Edouard Brétéché (@eddycharly, [email protected]) | ||
- Anushka Mittal (@anushkamittal2001, [email protected]) | ||
- Upstream Issue: https://github.com/kyverno/kyverno/issues/9488 | ||
|
||
#### Kyverno VPA Recommender | ||
|
||
- Description: A common pain-point heard from users is improper resource allocations, and if Kyverno policies can help with that. This is an exploratory project to see if Kyverno can work with Kubernetes Vertical Pod Autoscalers (VPA). | ||
- Expected Outcome: Kyverno policies that work with VPA recommender. | ||
- Recommended Skills: Golang, Kubernetes | ||
- Mentor(s): | ||
- Jim Bugwadia (@jimbugwadia, [email protected]) | ||
- Khaled Emara (@KhaledEmaraDev, [email protected]) | ||
- Upstream Issue: https://github.com/kyverno/kyverno/issues/9429 | ||
|
||
|
||
#### Convert Kubernetes Best Practices Policies to CEL | ||
|
||
- Description: Kubernetes Best Practices policies are written using Kyverno patterns and JMESPath, which means they cannot be executed as ValidatingAdmissionPolicy resources in the API server. This project aims to convert Kubernetes Best Practices policies, and other validating policies, to CEL wherever possible. | ||
- Expected Outcome: Convert Kyverno policies for Kubernetes best practices to CEL. | ||
- Recommended Skills: Kubernetes, Kyverno policies, CEL | ||
- Mentor(s): | ||
- Anusha Hegde (@anusha94, [email protected]) | ||
- Mariam Fahmy (@MariamFahmy98, [email protected]) | ||
- Upstream Issue: https://github.com/kyverno/policies/issues/891 | ||
|
||
#### Verify Multiple Image Attestations | ||
|
||
- Description: Currently Kyverno cannot verify data across multiple attestations e.g. an image vulnerability scan report and a OpenVEX document. This project will enhance the image verification rules to support flexible checks across multiple attestations. | ||
- Expected Outcome: Support condition validation across multiple image verification attestations or context entry. | ||
- Recommended Skills: Golang, Kubernetes, VEX, Cosign, Notary | ||
- Mentor(s): | ||
- Vishal Choudhary (@vishal-chdhry, [email protected]) | ||
- Shuting Zhao (@realshuting, [email protected]) | ||
- Upstream Issue: https://github.com/kyverno/kyverno/issues/9456 | ||
|
||
### K8sGPT | ||
|
||
#### Enhance K8sGPT's analyzers Unit Test Coverage | ||
|