OSPOlogy Day Cloud Native 2026 Presentations, Demos & Facilitated Discussion Notes #776
Replies: 9 comments
-
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Beta Was this translation helpful? Give feedback.
-
Facilitated Discussion: Scaling LF/CNCF trainings and certs in a large corporate enterpriseHost: @grnrs Challenge: How to get colleagues to participate in CNCF ecosystem and take part in training and certifications as part of it. DiscussionNoting down 'engineers' as a general term, that can include other types of professionals.
|
Beta Was this translation helpful? Give feedback.
-
Faciliated Discussion; Contributing to oss at scale in large orgsHost: Thomas Challenge: 1) github account ≠ understanding oss, 2) being an engineer ≠ being an maintainer, 3) free for all vs. legal minefield Discussion
|
Beta Was this translation helpful? Give feedback.
-
|
Host: @nicorikken Discussion notes
|
Beta Was this translation helpful? Give feedback.
-
Facilitated Discussion: How the CRA will affect CNCF projectsHost: Natali Vlatko (@natalisucks) and Mirko Bohem Discussion:How did the CRA evolve and how are we (the CNCF) implementing it?
Things to note when making sure you understand the CRA:
What do stewards have to do as part of the CRA?
Responsible disclosure – this means means something different to everyone: If I found a vulnerability and decide to push that fix upstream without first communicating with the maintainers, isn’t that bad? Doesn’t that overtly affect other people using the project? According to CRA, no, you’re already exemplifying the behaviour they want in creating a patch and submitting it upstream. Voluntary attestations:
Penalties only affect manufacturers! (As in, 3% of your global revenue)
The responsibility for due diligence, when someone consumes from upstream, then places this in a product that goes onto the market, is on the first manufacturer that pulls the software and puts it into the product – there is no responsibility on the upstream project to maintain something secure or patch vulnerabilities! A lot of what the CRA contains isn’t new: how you should contribute and report upstream for example, isn’t new, we’ve practiced these behaviours before, it just makes these best practices explicit now Is there a mechanism to compel open software stewards to be doing the right thing per the CRA? Not at the moment – 95% of obligations are with the manufacturers, not the stewards So a manufacturer can be both a manufacturer and a steward!? But the courts won’t care about this: shouldn’t we as manufacturers just treat our open source like products? Or are we okay with treating these projects under the recommendation of “pulling from upstream”, even if our company is where the “upstream” is on GitHub? Vulnerability obligations as part of the CRA start from August 2026 |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Creating a thread for the OSPOlogy Day Cloud Native presentations, demos, and roundtable notes. Please add your slides, materials, and facilitated discussion's summary notes as new comments to this thread via like (e.g, Google Slides, SpeakerDeck, etc) or PDF upload.
Beta Was this translation helpful? Give feedback.
All reactions