Skip to content

Commit c6cb93e

Browse files
committed
Apply suggestions from code review
Co-authored-by: Mahé <[email protected]> Co-authored-by: Batuhan Apaydın <[email protected]> Co-authored-by: Cailyn <[email protected]> Added link to existing options that are broken or incomplete
1 parent 0f05384 commit c6cb93e

File tree

1 file changed

+11
-10
lines changed
  • keps/sig-security/3203-auto-refreshing-official-cve-feed

1 file changed

+11
-10
lines changed

keps/sig-security/3203-auto-refreshing-official-cve-feed/README.md

Lines changed: 11 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -167,26 +167,27 @@ Items marked with (R) are required *prior to targeting to a milestone / release*
167167
## Summary
168168

169169
Currently it is not possible to filter for issues or PRs that are related to
170-
CVEs announced by kubernetes. This KEP addresses this concern by labelling this
170+
CVEs announced by kubernetes. This KEP addresses this concern by labeling these
171171
issues or PRs with the new label **official-cve-feed** using the automation. The
172172
in-scope issues are the closed issues for which there is a CVE ID and is
173173
officially announced as a Kubernetes CVE by SRC in the past.
174174

175175
## Motivation
176176

177177
With the growing number of eyes on Kubernetes, the number of CVEs related to
178-
Kubernetes have increased. Although most CVEs are regularly fixed that directly
179-
or indirectly or transitively impact Kubernetes, there is no single place to
180-
programmatically subscribe or pull the data of fixed CVEs, for the end users of
181-
Kubernetes. Current options are either broken or incomplete.
178+
Kubernetes have increased. Although most CVEs that directly, indirectly, or
179+
transitively impact Kubernetes are regularly fixed, there is no single place
180+
for the end users of Kubernetes to programmatically subscribe or pull the data
181+
of fixed CVEs. Current options are either
182+
[broken or incomplete](https://github.com/kubernetes/sig-security/issues/1).
182183

183184
An auto-refreshing CVE feed will allow end users to programmatically fetch the
184-
list of CVEs and allow them to get the latest information from kubernetes
185+
list of CVEs and allow them to get the latest information from Kubernetes
185186
community.
186187

187188
### Goals
188189

189-
Create a periodically auto-refreshing machine-readable list of official
190+
Create a periodically auto-refreshing, machine-readable list of official
190191
Kubernetes CVEs
191192

192193
### Non-Goals
@@ -203,7 +204,7 @@ Kubernetes CVEs
203204
#### Story 1
204205

205206
As a K8s end user, I want a list of CVEs with relevant information that I can
206-
fetch programmatically, so I can understand when new CVEs are announced
207+
fetch programmatically, so I can track when new CVEs are announced.
207208

208209
#### Story 2
209210

@@ -219,7 +220,7 @@ feed manually
219220

220221
### Story 4
221222

222-
As a K8s platform provider, I want to automatically to know if my kubernetes
223+
As a K8s platform provider, I want to automatically know if my Kubernetes
223224
clusters are vulnerable to any of the CVEs SRC have announced. I want to have a
224225
programmatically available API to parse this kind of data so I can easily
225226
provide it to users of my platform.
@@ -276,7 +277,7 @@ label that can only be applied by SRC and SIG Security Tooling Leads.
276277
Blobs will only be rewritten, if the generated blob is different from existing
277278
blob. As hash file would be created and stored alongside generated blob. This
278279
hash file will be check everytime before push to the hash of the generated file.
279-
If the hash file matches, writing to bucket will be skipped, If hash file is
280+
If the hash file matches writing to the bucket will be skipped, if hash file is
280281
different writing to bucket, will be triggered.
281282

282283
## Design Details

0 commit comments

Comments
 (0)