HackMD
    • Create new note
    • Create a note from template
      • Sharing URL Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Customize slides
      • Note Permission
      • Read
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Write
        • Only me
        • Signed-in users
        • Everyone
        Only me Signed-in users Everyone
      • Engagement control Commenting, Suggest edit, Emoji Reply
      • Invitee
    • Publish Note

      Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

      Your note will be visible on your profile and discoverable by anyone.
      Your note is now live.
      This note is visible on your profile and discoverable online.
      Everyone on the web can find and read all notes of this public team.
      See published notes
      Unpublish note
      Please check the box to agree to the Community Guidelines.
      View profile
    • Commenting
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
      • Everyone
    • Suggest edit
      Permission
      Disabled Forbidden Owners Signed-in users Everyone
    • Enable
    • Permission
      • Forbidden
      • Owners
      • Signed-in users
    • Emoji Reply
    • Enable
    • Versions and GitHub Sync
    • Note settings
    • Engagement control
    • Transfer ownership
    • Delete this note
    • Save as template
    • Insert from template
    • Import from
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
    • Export to
      • Dropbox
      • Google Drive
      • Gist
    • Download
      • Markdown
      • HTML
      • Raw HTML
Menu Note settings Sharing URL Create Help
Create Create new note Create a note from template
Menu
Options
Versions and GitHub Sync Engagement control Transfer ownership Delete this note
Import from
Dropbox Google Drive Gist Clipboard
Export to
Dropbox Google Drive Gist
Download
Markdown HTML Raw HTML
Back
Sharing URL Link copied
/edit
View mode
  • Edit mode
  • View mode
  • Book mode
  • Slide mode
Edit mode View mode Book mode Slide mode
Customize slides
Note Permission
Read
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Write
Only me
  • Only me
  • Signed-in users
  • Everyone
Only me Signed-in users Everyone
Engagement control Commenting, Suggest edit, Emoji Reply
Invitee
Publish Note

Share your work with the world Congratulations! 🎉 Your note is out in the world Publish Note

Your note will be visible on your profile and discoverable by anyone.
Your note is now live.
This note is visible on your profile and discoverable online.
Everyone on the web can find and read all notes of this public team.
See published notes
Unpublish note
Please check the box to agree to the Community Guidelines.
View profile
Engagement control
Commenting
Permission
Disabled Forbidden Owners Signed-in users Everyone
Enable
Permission
  • Forbidden
  • Owners
  • Signed-in users
  • Everyone
Suggest edit
Permission
Disabled Forbidden Owners Signed-in users Everyone
Enable
Permission
  • Forbidden
  • Owners
  • Signed-in users
Emoji Reply
Enable
Import from Dropbox Google Drive Gist Clipboard
   owned this note    owned this note      
Published Linked with GitHub
5
Subscribed
  • Any changes
    Be notified of any changes
  • Mention me
    Be notified of mention me
  • Unsubscribe
Subscribe
# OCI Weekly Discussion ###### tags: `oci` `discussion` Time: 1700 GMT (1300 EST; 1000 PST; 1900 CET; 0300 AEST; 0100 CST) - [OCI Calendar](https://calendar.google.com/calendar/b/2/r?cid=bGludXhmb3VuZGF0aW9uLm9yZ19pMHNhZG8waTM3ZWtuYXI1MXZzdThtZDVoZ0Bncm91cC5jYWxlbmRhci5nb29nbGUuY29t) - [Conference URL](https://zoom.us/j/6449415895?pwd=S2tJVGVra0dYdlZCRjJwdXdPdGRQQT09) with embedded passcode - One tap mobile [+16465588656,,6449415895#](+16465588656,,6449415895#) US (New York) [+16699006833,,6449415895#](+16699006833,,6449415895#) US (San Jose) Passcode: 77777 *(5 7's)* Dial by your location +1 646 558 8656 US (New York) +1 669 900 6833 US (San Jose) 877 369 0926 US Toll-free 855 880 1246 US Toll-free Meeting ID: 644 941 5895 Find your local number: https://zoom.us/u/aLDk4OXTu Working groups: - Auth: <https://hackmd.io/YyhWh7X_RuCod0i0mGxVLg> - Image Compatibility: <https://hackmd.io/060HKC3DTV-NzzewNQbHCg> - FreeBSD: <https://hackmd.io/hq_NOVL4RZS7xYYMqfJ6-A> *template at the bottom* ## September 25, 2025 **Recording**: https://youtu.be/IpQrVMH4iNs ### Attendees: - Tianon - Brandon Mitchell - Ramkumar Chinchani ### Actionable Agenda Items: - Review needed: - Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581> - Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66> - Security annotation: <https://github.com/opencontainers/image-spec/pull/1284> ### Presentation/Discussion Agenda Items: - Progress with conformance redesign: <https://github.com/sudo-bmitch/distribution-spec/tree/pr-conformance-v2/conformance2> ### Notes: Notes from the zoom chat: 00:08:44 Ramkumar Chinchani: GH copilot could expedite? ## September 18, 2025 **Recording**: https://youtu.be/wkZj4Uq7GC0 ### Attendees: - Brandon Mitchell - Tianon - Brian Goff - Derek McGowan - Jeff Carter - Sajay Antony - James Kolb - Ramkumar Chinchani - Jory Burson ### Actionable Agenda Items: - Review needed: - Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581> - Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66> - Security annotation: <https://github.com/opencontainers/image-spec/pull/1284> - Okay to close? - Search for blob: <https://github.com/opencontainers/distribution-spec/issues/585> ### Presentation/Discussion Agenda Items: - Syntax on range headers: <https://github.com/opencontainers/distribution-spec/issues/586> - Layers missing parent directories: <https://github.com/opencontainers/image-spec/pull/970> - Any desire to take this PR over? - Self validating blobs? <https://github.com/opencontainers/image-spec/issues/1275> - Jory working on a Trademark Board meeting ### Notes: Notes from the zoom chat: 00:08:01 Sajay Antony: That's kind of ambiguous 00:11:15 Sajay Antony: Sorry my voice is totally gone. 00:11:43 Ramkumar Chinchani: this is like "robots.txt" 00:17:20 Jory Burson: Hiiiiii sorry I yam late 00:28:01 Ramkumar Chinchani: This is a known breakage 00:37:40 Sajay Antony: Thanks all, late for another meeting. Need to drop. See you next week. ## September 11, 2025 **Recording**: https://youtu.be/697AXluvdBk ### Attendees: - Brandon Mitchell - Tianon - Mike Brown - Sajay Antony - Michael Brown ### Actionable Agenda Items: - Review needed: - Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581> - Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66> ### Presentation/Discussion Agenda Items: - Security annotation: <https://github.com/opencontainers/image-spec/pull/1284> - runtime-spec is planning a 1.3 release: <https://github.com/opencontainers/runtime-spec/issues/1295> ### Notes: Notes from the zoom chat: 00:11:23 Sajay Antony: Do we need more maintainers in distribution? 00:18:01 Brandon Mitchell: <operations@opencontainers.org> 00:18:45 Sajay Antony: Artifact manifest 😂 ## September 4, 2025 **Recording**: https://youtu.be/r4hhQCHHpqY ### Attendees: - Brandon Mitchell - Tianon - Brian Goff - Ramkumar Chinchani - Jory Burson ### Actionable Agenda Items: - Review needed: - Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581> - Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66> ### Presentation/Discussion Agenda Items: - Security annotation: <https://github.com/opencontainers/image-spec/issues/1283> - Container Plumbing Days retro from Jory - About 30 attended - Trademark Board is planning on a meeting ### Notes: Notes from the zoom chat: 00:08:54 Tianon: "The URLs for accessing your security.txt file. It is important to include this if you are digitally signing the security.txt file, so that the location of the security.txt file can be digitally signed too. See the full description of Canonical" 00:09:19 Tianon: Replying to ""The URLs for access..." added justification for pointing to a URL instead of copying the data 00:10:40 Jory Burson: Hi hi 00:14:08 Ramkumar Chinchani: why not use referrer artifact for this? 00:14:28 Ramkumar Chinchani: seems like an attempt to standardize something 00:14:47 Tianon: Replying to "why not use referrer..." referrers are kind of heavy for something that's in most cases going to be just a URL 00:14:56 Tianon: Replying to "why not use referrer..." but there's nothing to stop anyone from using referrers 00:15:10 Tianon: Replying to "seems like an attemp..." this is the one - freeze the annotations spec 😈 ## August 28, 2025 **Recording**: https://youtu.be/GssZ0FpeYJk ### Attendees: - Kevin Li - Efim Verzakov - Brandon Mitchell - Peter Treese - Tianon - Ram Chinchani - Michael Brown ### Actionable Agenda Items: - Review needed: - Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581> - Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66> ### Presentation/Discussion Agenda Items: - vTPM: <https://github.com/opencontainers/runtime-spec/pull/1293> - Distribution spec conformance progress. (Brandon) - Pass through authentication with proxy namespaces. (Brandon) ### Notes: Notes from the zoom chat: 00:11:23 Kevin Li: https://github.com/opencontainers/runtime-spec/pull/1293 00:17:34 Tianon: in the VM example, libvirt creates and manages the swtpm process, right? https://github.com/libvirt/libvirt/blob/75e6158a95167f7655879f232af44a3737d30eb0/src/util/virtpm.c 00:18:08 Tianon: Replying to "in the VM example, l..." in that example, the runc comparison is qemu, and qemu does not create TPM devices (or run swtpm) 00:18:50 Tianon: Replying to "https://github.com/o..." https://github.com/opencontainers/runc/pull/4855 00:27:32 Ramkumar Chinchani: ntd early today 00:34:31 Tianon: https://bmitch.net/blog/2025-08-22-ghrc-appears-malicious/ 00:34:59 Tianon: Replying to "https://bmitch.net/b..." (now he gets to copy his personal blog link into the meeting notes, but not feel self-serving when he does so 😂) ## August 21, 2025 **Recording**: https://youtu.be/DaCyLP2hWdA ### Attendees: - Brandon Mitchell - Tianon - Jory Burson - Syed Ahmed - Jeff Carter - Sajay Antony - Mike Brown ### Actionable Agenda Items: None. ### Presentation/Discussion Agenda Items: - Clarifying predefined annotations: <https://github.com/opencontainers/image-spec/issues/833> ### Notes: Notes from the zoom chat: 00:12:23 Syed Ahmed: +1 for deprecating labels 00:14:19 Jory Burson: Oh no! 00:21:13 Sajay Antony: I’m out for the next 2 weeks. ## August 14, 2025 **Recording**: https://youtu.be/5v6eJrQWXdw ### Attendees: - Brandon Mitchell - Brian Goff - Ramkumar Chanchani - Tianon - Michael Brown - Jeff Carter - Syed Ahmed ### Actionable Agenda Items: None. ### Presentation/Discussion Agenda Items: - Shortened meeting reviewing some of the in-progress PRs. - Range header: <https://github.com/opencontainers/distribution-spec/pull/581> - Tag listing: <https://github.com/opencontainers/distribution-spec/pull/579> - Proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66> ### Notes: Notes from the zoom chat: 00:13:37 Tianon: ringing the bell of shame for Michael 🔔 00:15:57 Brandon Mitchell: We only say "SHOULD NOT" error, not "MUST NOT", so it's still spec compliant. ## August 7, 2025 **Recording**: https://youtu.be/2-ylZqX9phI ### Attendees: - Tianon - Jeff Carter - Mike Brown - Isaev Isa - Brandon Mitchell - Brian Goff - Jory Burson - Efim Verzakov - Ramkumar Chinchani - Sajay Antony ### Actionable Agenda Items: - Review needed: - Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581> - Mike asked for an example, and the GET response also needs to be updated. - Conformance tag list order: <https://github.com/opencontainers/distribution-spec/pull/583> - Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66> ### Presentation/Discussion Agenda Items: - Isa asked about adding vtpm support in runc. - Brandon suggested opening an issue in the runc and runtime-spec repos. ### Notes: Notes from the zoom chat: 00:26:03 Tianon: https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Range#requesting_multiple_ranges is really interesting (only barely related) 00:36:58 Sajay Antony: Folks NTD. Thank you. 00:45:48 Jory Burson: Bye q! ## July 31, 2025 **Recording**: https://youtu.be/HoNMtOJ1yV0 ### Attendees: - Brandon Mitchell - Tianon - Sajay Antony - Syed Ahmed - Derek McGowan - Ramkumar Chinchani - Jory Burson ### Actionable Agenda Items: - Review needed: - Conformance tag list order: <https://github.com/opencontainers/distribution-spec/pull/583> - Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66> ### Presentation/Discussion Agenda Items: - Tag listing: <https://github.com/opencontainers/distribution-spec/pull/579> ### Notes: Notes from the zoom chat: 00:19:46 Ramkumar Chinchani: Status of multi-hash? 00:23:00 Tianon: vbatts response will probably be "OHMAN" 00:23:25 Brandon Mitchell: Time's fun when you're having flies 00:23:47 Derek McGowan: It seems a missed a conversation where there was agreement to create the word “ASCIIbetical”. While cute, can we just say “ascii order” in the spec and can explain that in the first use that is equivalent to case-sensitive or byte ordering. 00:24:05 Tianon: Replying to "It seems a missed a ..." I didn't create it, though 😅 00:24:11 Tianon: Replying to "It seems a missed a ..." it's a pre-existing word, although not a super popular one 00:24:23 Tianon: Replying to "It seems a missed a ..." feel free to suggest an alternative wording on the PR and I'm happy to adjust 00:24:39 Ramkumar Chinchani: https://en.wiktionary.org/wiki/ASCIIbetical 00:26:29 Ramkumar Chinchani: "informal" means trouble in a technical spec 00:34:52 Sajay Antony: Folks need to drop for another meeting. Thank you. ## July 24, 2025 **Recording**: https://youtu.be/XPfMIv6vsOA ### Attendees: - Tianon - Brandon Mitchell - Sajay Antony - Brian Goff - Syed Ahmed - Mike Brown ### Actionable Agenda Items: - Review needed: - schema/go.sum: <https://github.com/opencontainers/image-spec/pull/1274> ### Presentation/Discussion Agenda Items: - Tag listing sort order: <https://github.com/opencontainers/distribution-spec/pull/583> - Version and media type inside the image config: <https://github.com/opencontainers/image-spec/issues/1275> ### Notes: Notes from the zoom chat: 00:02:57 Brandon Mitchell: https://github.com/opencontainers/image-spec/pull/1274 00:04:16 Tianon: Replying to "https://github.com/o..." git rm 😇 00:06:34 Brian Goff (@cpuguy83): https://en.wikipedia.org/?title=ASCIIbetical_order&redirect=no 00:10:16 Brian Goff (@cpuguy83): If we were all using Windows all these problems would just go away. Case sensitive filesystems, line endings. 00:11:59 Brian Goff (@cpuguy83): Jeez, should at least be using slices.Sort these days 🤣 00:12:23 Tianon: Syed had the perfect opportunity to say "the tag listing is supposed to be sorted??" 00:12:46 Tianon: Replying to "Jeez, should at leas..." Go too old, have to reload 00:13:54 Brian Goff (@cpuguy83): I can't have emoji in my tags?! 00:14:16 Tianon: Replying to "I can't have emoji i..." nope, but you sure can punycode them 00:14:29 Tianon: Replying to "I can't have emoji i..." https://oci.dag.dev/?image=tianon%2Ftest:xn--uo8h 00:14:39 Tianon: Replying to "I can't have emoji i..." https://oci.dag.dev/?image=tianon%2Ftest:xn--ls8h 00:16:00 Tianon: Replying to "I can't have emoji i..." https://bsky.app/profile/tianon.bsky.social/post/3lcmlcho5zs24 if you want the context for that 💩 one ## July 17, 2025 **Recording**: https://youtu.be/di21DKPFmNo ### Attendees: - Brandon Mitchell - Tianon - Jory Burson - Brian Goff - Sajay Antony ### Actionable Agenda Items: - Okay to merge schema go.mod changes? <https://github.com/opencontainers/image-spec/pull/1253> - Review needed for pandoc: <https://github.com/opencontainers/image-spec/pull/1272> - Review needed for proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66> ### Presentation/Discussion Agenda Items: - Range header changes need CI updates: <https://github.com/opencontainers/distribution-spec/pull/581> - Tag listing needs conformance tests: <https://github.com/opencontainers/distribution-spec/pull/579> ### Notes: Notes from the zoom chat: 00:12:22 Tianon: yep, "looks like shell" (https://github.com/moby/moby/pull/9637#issuecomment-66822505 ❤️) 00:14:35 Brian Goff (@cpuguy83): Replying to "yep, "looks like she..." Funny thing is he said "Looks like Bash" but the PR is making it *not* look like bash 😂 00:14:52 Tianon: Replying to "yep, "looks like she..." it's all the same to him 😂 ## July 10, 2025 **Recording**: https://youtu.be/_d8_IxMEMS0 ### Attendees: - Brian Goff - Sajay Antony - Mike Brown - Derek McGowan - Brandon Mitchell - Joseph Ferguson - Ramkumar Chinchani - Xiang Gao ### Actionable Agenda Items: - Review needed: - Broken link: <https://github.com/opencontainers/image-spec/pull/1271> - Broken link: <https://github.com/opencontainers/wg-auth/pull/14> ### Presentation/Discussion Agenda Items: - pandoc fixes: <https://github.com/opencontainers/image-spec/pull/1272> - alternative to linear layers: <https://github.com/opencontainers/image-spec/issues/1270> - chunked upload `Range` value ### Notes: Notes from the zoom chat: 00:14:05 Ramkumar Chinchani: https://github.com/google/go-containerregistry/blob/main/cmd/crane/rebase.md 00:31:49 Brian Goff (@cpuguy83): fs.FS makes this really nice. 00:36:06 Sajay Antony: Thanks all. Need to drop for another meeting. 00:42:45 Ramkumar Chinchani: https://datatracker.ietf.org/doc/html/rfc7233 ## July 3, 2025 **Recording**: https://youtu.be/QEhSkvi8qdY ### Attendees: - Tianon - Carmi Weinzweig - Brian Goff - Jory Burson - Brandon Mitchell - Derek McGowan ### Actionable Agenda Items: None. ### Presentation/Discussion Agenda Items: - Proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66> - Brandon will push a suggested phrasing for a header. ### Notes: Notes from the zoom chat: 00:06:14 Brian Goff (@cpuguy83): OCI Cullinary Community 00:08:35 Jory Burson: Open Cookery Initiative 00:24:26 Derek McGowan: https://github.com/containerd/containerd/blob/main/docs/hosts.md#setup-default-mirror-for-all-registries ## June 26, 2025 **Recording**: https://youtu.be/YuktrplNtzQ ### Attendees: - Jeff Carter - James Kolb - Carmi Weinzweig - Tianon - Derek McGowan - Brandon Mitchell - Brian Goff - Sajay Antony - Syed Ahmed - Mike Brown (IBM) - Ramkumar Chinchani ### Actionable Agenda Items: - Reviews needed: - FreeBSD: <https://github.com/opencontainers/runtime-spec/pull/1286> - GHA Badge: <https://github.com/opencontainers/image-spec/pull/1256> - GHA GOPATH: <https://github.com/opencontainers/image-spec/pull/1264> - Okay to close: - Streaming push: <https://github.com/opencontainers/distribution-spec/pull/576> - Dependabot: <https://github.com/opencontainers/distribution-spec/pull/572> ### Presentation/Discussion Agenda Items: - Tag Listing Proposal: <https://github.com/opencontainers/distribution-spec/pull/579> - Proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66> - Range header when 0 bytes transfered: <https://github.com/opencontainers/distribution-spec/issues/578> ### Notes: Notes from the zoom chat: 00:14:12 Tianon: "thanks Gobama" 00:14:12 Carmi Weinzweig: Thanks all. I will pass your comments back and probably be back next week. Heading off to take my car to the dealer, unless there is some other question for me. :-) 00:23:25 Sajay Antony: This is really nice. 00:24:01 Sajay Antony: Ah we are back to search. 00:28:06 Tianon: maybe define the created annotation as optional, but give it an explicit meaning so that if it is specified, clients and users can rely on what the value means? 00:28:53 Tianon: Replying to "maybe define the cre..." there's definitely value in both the timestamp that the registry (or this repo) first saw a digest and separately the time this tag was most recently updated, but maybe that's too much nuance 00:35:39 Sajay Antony: I need to drop. Will share this internally. 00:48:01 Ramkumar Chinchani: different upstreams, different images but same image/tags, avoid clobber? 00:50:20 Tianon: https://github.com/docker-library/meta-scripts/blob/fab86e62cb31ee1b2ee597399a16db6658897722/registry/docker-hub.go#L9-L16 🧌 00:51:50 Tianon: Replying to "https://github.com/d..." the whole point of this list is that I consolidate/canonicalize all these down to docker hub 😂 01:03:06 Ramkumar Chinchani: 0-0? 01:04:03 Ramkumar Chinchani: drop the Range Header in response? ## June 19, 2025 **Recording**: https://youtu.be/HZ33AkIQI2k ### Attendees: - Alice Sowerby - Carmi Weinzweig - Brandon Mitchell - Sajay Antony - Brian Goff ### Actionable Agenda Items: None. ### Presentation/Discussion Agenda Items: - Add FreeBSD as a supported platform <https://github.com/opencontainers/runtime-spec/pull/1286> - Let's come back when Tianon is here (and it's not Juneteenth) - Proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66> - Range header when 0 bytes transfered: <https://github.com/opencontainers/distribution-spec/issues/578> - Meeting shortened for Juneteenth ### Notes: Notes from the zoom chat: 00:13:06 Brian Goff (@cpuguy83): Hello 00:14:21 Brian Goff (@cpuguy83): Yeah no real experience there. 00:16:34 Sajay Antony: Sorry lost connection. 00:18:45 Brian Goff (@cpuguy83): Is this related? https://github.com/containerd/containerd/pull/11998 ## June 12, 2025 **Recording**: https://youtu.be/jUa2qwX66yM ### Attendees: - Brandon Mitchell - Brian Goff - Tianon - Sajay Antony - Ramkumar Chinchani ### Actionable Agenda Items: None. ### Presentation/Discussion Agenda Items: - Tag/Manifest listing improvements: <https://github.com/opencontainers/distribution-spec/issues/575> ### Notes: Notes from the zoom chat: 00:16:33 Sajay Antony: Happy to support the effort. Working group or otherwise. 00:21:11 Brandon Mitchell: Or write it up on hackmd 🙃 00:22:38 Sajay Antony: If WG is light then folks won’t have a concern. ## June 5, 2025 **Recording**: https://youtu.be/dDF152Lhkm4 ### Attendees: - Brandon Mitchell - Tianon - Harry Randazzo - Syed Ahmed - Jory Burson - Brian Goff - Mike Brown ### Actionable Agenda Items: None. ### Presentation/Discussion Agenda Items: - Container Plumbing Days - 3 hours to schedule - 19 talks, 7 talks scored at least 4 stars (out of 5) - Mounting artifacts as a volume that are not tar files - cri-o is pulling in the filename from the ORAS title annotation pattern - Tianon would like to add a tar header in front of the artifact to convert it to a tar file ### Notes: Notes from the zoom chat: 00:12:40 Tianon: "have y'all heard the good news of open containers?" 00:12:42 Brian Goff (@cpuguy83): I would love to go, but of course cannot make that. 00:13:07 Tianon: Replying to ""have y'all heard th..." the double entendre of our name makes this even funnier 00:13:37 Brian Goff (@cpuguy83): Replying to "I would love to go, ..." Travel is very difficult for me at this time. 00:14:07 Brandon Mitchell: Replying to "I would love to go, ..." And folks want to be sure they can return home. 00:14:38 Brian Goff (@cpuguy83): Replying to "I would love to go, ..." My family would all be happy to be stranded in Amsterdam, I think 🙂 00:16:25 Tianon: Replying to "I would love to go, ..." yeah, given *gestures wildly* I wouldn't feel totally safe flying within the US right now, let alone outside it 00:16:55 Brandon Mitchell: Replying to "I would love to go, ..." Knowing my luck, my connection would be through Newark. 00:18:35 Brian Goff (@cpuguy83): Replying to "I would love to go, ..." lol, yeah. 00:21:02 Tianon: Jory feeling bad that this is "all" she has and she's almost single-handedly carried the empty-agenda meeting for ~20 minutes with relevant content 💪 ❤️ 00:23:41 Brian Goff (@cpuguy83): Nothing like being in a talk and then all of sudden be like "wait... how did I get here? What have I already said?" 00:25:40 Brian Goff (@cpuguy83): Brain: "Sorry, 500ms of empty space is too much you need to add something else in there" 00:26:45 Brian Goff (@cpuguy83): Brian is GOMAXPROCS=1 but it sure does know how to make use of iowait 00:28:30 Brian Goff (@cpuguy83): Tianon in a wig: name of the next runc release. 00:29:19 Mike Brown: I’m here to fill in the elder category 00:29:53 Brian Goff (@cpuguy83): Oh I need to get some paper bills in so I can get my kids passports. 00:32:25 Tianon: what about UID, GID, permissions? 00:32:45 Tianon: Replying to "what about UID, GID,..." mtime? 00:33:01 Tianon: Replying to "what about UID, GID,..." (see what I mean about reimplementing the tar header?) 00:37:36 Harry Randazzo: magic strings prob? 00:38:13 Tianon: https://pkg.go.dev/archive/tar#Header 00:39:57 Tianon: Replying to "magic strings prob?" yeah, the only way you get "encoding" is by inferring meaning from the filename (extension, usually) or from magic bytes 😅 00:40:18 Harry Randazzo: a lot of tar upload implementations also strip the tar header info to make more reproducible tarballs, so some implementations may need to rework to not strip anymore, but that creates more storage overhead 00:40:37 Tianon: Replying to "magic strings prob?" utf-16 byte-order mark anyone? (thanks Microsoft! 😂) 00:41:34 Tianon: Replying to "a lot of tar upload ..." yeah, but by the nature of the tar format that'd have to be just zeroing header values, not actually removing the header (or it wouldn't be tar anymore) 🙈 00:42:40 Syed Ahmed: I build a kind node image with the OCI artifact mount support @ quay.io/syahmed/kindest/node:crio-v1.33 If you want to try it out locally 00:43:42 Tianon: Replying to "what about UID, GID,..." to convert a raw file into a tar file, all that's required is to append a suitable 512 byte header to the front and it's suddenly a tar file 😅 you can have a layer per file and still append 512 bytes at the front of each one so that you get the semantic data necessary too - a range request can easily start at 512 instead of 0 and the streaming use case is fine again 00:44:12 Tianon: Replying to "what about UID, GID,..." so "extracting the tar" is a heavy way to describe "read the 512 bytes to get filename, then dump the rest into the file" 00:44:22 Harry Randazzo: Replying to "a lot of tar uploa..." oh yea, by strip I meant zeroize not actually remove xD 00:47:10 Harry Randazzo: cant wait to mount a tar that was set to a user that doesnt exist 00:47:36 Brandon Mitchell: Replying to "cant wait to mount a..." It's just a uid/gid, so it doesn't matter when it doesn't exist. 00:47:54 Harry Randazzo: oras will auto tar if you specify a dir https://github.com/oras-project/oras-go/blob/main/content/file/utils.go#L36 00:47:54 Tianon: Replying to "cant wait to mount a..." yeah, as far as the kernel knows/cares, all users are just numbers so they all "exist" 😅 00:48:23 Brandon Mitchell: Replying to "cant wait to mount a..." But I'm not just a number! 00:49:55 Tianon: Replying to "cant wait to mount a..." to clarify further, /etc/passwd is a pure-userspace construction (the kernel never reads nor cares about it 👀) 00:51:16 Harry Randazzo: what is the media type on the config for a mountable artifact? 00:51:18 Tianon: yeah, it's less "artifacts are bad" and more "if you want filesystem content with filesystem semantics like filename, use the filesystem format" 00:51:37 Tianon: Replying to "yeah, it's less "art..." and in OCI, that's tar 00:52:52 Brandon Mitchell: Replying to "what is the media ty..." https://github.com/CloudNativeAI/model-spec/tree/main/specs-go/v1 00:54:15 Mike Brown: Replying to "yeah, it's less "art..." ^^ 00:56:32 Syed Ahmed: Replying to "yeah, it's less "art..." We can have opinions on how a “mounted” artifact can work it can be similar to how secrets and config maps are mounted inside a container 00:56:43 Syed Ahmed: Replying to "yeah, it's less "art..." You don’t necessarily need to wrap it in a tar ## May 29, 2025 **Recording**: https://youtu.be/js5vXeJ4jTM ### Attendees: - Tianon - Brandon Mitchell - Brian Goff - Syed Ahmed - Jory Burson - Sajay Antony - James Kolb - Ram Chinchani - Samuel Karp - Mike Brown ### Actionable Agenda Items: None. ### Presentation/Discussion Agenda Items: - Where does <certification@opencontainers.org> go? - <https://github.com/opencontainers/oci-conformance/blob/main/participation-form/OCI_Certified_Form.md> - <https://github.com/opencontainers/oci-conformance/pull/127> - umoci v0.5.0 released: - <https://github.com/opencontainers/umoci/releases/tag/v0.5.0> - <https://www.cyphar.com/blog/post/20250525-umoci-0.5> - Alternative OCI digest implementation: <https://github.com/sudo-bmitch/oci-digest/> - CNCF voting on ModelPack adoption as a sandbox project: <https://github.com/cncf/sandbox/issues/358> - Model-spec discussion on media types: <https://github.com/CloudNativeAI/model-spec/issues/54> - How does cri-o handle ownership/permissions/etc when mounting artifacts without tar packaging? <https://github.com/cri-o/cri-o/issues/8953> - Uploading large artifacts: <https://github.com/opencontainers/distribution-spec/issues/573> ### Notes: Notes from the zoom chat: 00:06:33 Sajay Antony: +1 @Tianon 00:08:34 Ramkumar Chinchani: where is Josh? 00:19:52 Ramkumar Chinchani: aptly "oci-digest"? 00:31:17 Tianon: "those who don't understand tar headers are doomed to reimplement them" (and probably in some cursed JSON) 00:33:45 Tianon: I'll go on the record again: such huge files are bad and we collectively should feel bad 00:35:23 Samuel Karp: registry operator can control the maximum layer size 00:35:53 Samuel Karp: ECR limit used to be 10GiB iirc. Sounds like you raised it since I left though. 00:36:51 Tianon: Replying to "ECR limit used to be..." this is literally exactly the number that came to mind for me as a sane limit when you suggested it was possible 00:40:53 Tianon: "panic at dis go" 00:41:37 Jory Burson: Replying to ""panic at dis go"" Panic, at the disc, Go! 00:41:53 Sajay Antony: Ntd folks. Thank you. 00:47:29 Tianon: https://github.com/opencontainers/go-digest/blob/master/MAINTAINERS 00:55:42 Tianon: An invalid digest string will case the marshaler to fail. I could see this being problematic for using this in the image-spec structs -- tools will have a hard time returning good structured errors if the unmarshal fails and they can't somehow delay validation (and provide more detail/structure to their errors) 00:57:36 Tianon: Replying to "An invalid digest st..." for example, something like https://github.com/opencontainers/distribution-spec/blob/v1.1.1/spec.md#error-codes (I guess this is notably missing a code for "unsupported digest algorithm" or "invalid digest string" but it is conceivable) 00:59:28 Ramkumar Chinchani: imo, validation and conformance should "belong" in the spec repo. 01:02:59 Samuel Karp: I think I win the "tab is open and it takes me a while to get to it" prize ## May 23, 2025 **Recording**: https://youtu.be/lyhLh_bgOO4 ### Attendees: - Tianon - Brandon Mitchell - Jory Burson - Jeff Carter - Ramkumar Chinchani - Brian Goff - Derek McGowan - Syed Ahmed - Sajay Antony ### Actionable Agenda Items: None. ### Presentation/Discussion Agenda Items: - Querying registry for updates: <https://github.com/opencontainers/distribution-spec/issues/575> - Splitting out image-spec json schema tests: <https://github.com/opencontainers/image-spec/pull/1253> - Cleanup GHA for image-spec: <https://github.com/opencontainers/image-spec/issues/1263> - Container plumbing days mini-summit - Attendance is looking good ### Notes: Notes from the zoom chat: 00:13:49 Ramkumar Chinchani: https://github.com/opencontainers/distribution-spec/issues/71 00:19:28 Tianon: https://oci.dag.dev/?repo=registry.k8s.io%2Fbusybox an example of someone who's already overloaded the "tag listing" API with more metadata 00:22:31 Tianon: Replying to "https://oci.dag.dev/..." https://oci.dag.dev/?repo=gcr.io/distroless/static 00:25:21 Sajay Antony: Replying to "https://oci.dag.dev/..." This is nice. 00:27:01 Ramkumar Chinchani: guidelines: 1. handle large scale 2. don't make more work for registry 00:27:10 Ramkumar Chinchani: ntd early today 00:29:40 Jeff Carter: could just do it as a GET /v2/<name>/manifests/?n=<integer>&sort=tktk&last=<last> fixes the issue with "list" being a possible reference 00:35:26 Tianon: https://pkg.go.dev/github.com/opencontainers/image-spec/schema?tab=importedby 00:36:45 Sajay Antony: NTD early for another meeting folks. Thank you. ## May 15, 2025 **Recording**: https://youtu.be/iPSRwC0dI-E ### Attendees: - Brandon Mitchell - Ramkumar Chinchani - Sajay Antony - Jeff Carter - Samuel Karp - Mike Brown - James Kolb ### Actionable Agenda Items: None ### Presentation/Discussion Agenda Items: - Progress on pushing manifest with alternate digest algorithms - Currently behind rewriting conformance tests - That's behind getting auth standardized (stalled WG) - Brandon is temporarily distracted working on a v2 proposal to go-digest - No other agenda items so the meeting ended early. ### Notes: Notes from the zoom chat: 00:03:42 Sajay Antony: Small group today. 00:07:00 Brandon Mitchell: https://github.com/sudo-bmitch/oci-digest/ 00:10:47 Samuel Karp: wrap up early is always a good option if we have no agenda ## May 8, 2025 **Recording**: https://youtu.be/LSEyukQX1Fw ### Attendees: - Brandon Mitchell - Jeff Carter - Ramkumar Chinchani - Harry Randazzo - James Kolb - Derek McGowan - Syed Ahmed - Samuel Karp - Sajay Antony ### Actionable Agenda Items: None ### Presentation/Discussion Agenda Items: - Is concurrent upload support needed? - <https://github.com/opencontainers/distribution-spec/issues/546> - <https://github.com/opencontainers/distribution-spec/issues/573> - <https://github.com/opencontainers/distribution-spec/issues/574> - How would we support digest encodings other than hex? - <https://github.com/opencontainers/image-spec/blob/v1.0.1/descriptor.md#digests> - <https://github.com/opencontainers/go-digest/blob/1e56c6daea3b29090ddd17e3e9d88196f0d8815b/algorithm.go#L249-L256> - Brandon demoing an alternative digest implementation <https://github.com/sudo-bmitch/oci-digest/> - Ram demoing blake3 with stacker - Harry asking about conditional manifest pushing - <https://github.com/opencontainers/distribution-spec/issues/250> ### Notes: Notes from the zoom chat: 00:23:07 Ramkumar Chinchani: push s3 blobs directly. push manifest referring to blobs to OCI reg backed by s3. OCI spec doesn't say I need to use the blob push API first to push the manifest 00:28:25 Sajay Antony: Feel free to let' Shiwei know. he's a crypto guy btw. 00:30:31 Sajay Antony: Replying to "push s3 blobs direct..." These scenarios would then need cloud specific tooling right? Also might be a comeback for remoteUrls which we tried to deprecate. 00:31:32 Ramkumar Chinchani: Replying to "push s3 blobs direct..." Still in the camp that this is a special use case ... until camps get switched 00:34:30 Sajay Antony: Need to drop for another appointment. 00:39:23 Ramkumar Chinchani: https://github.com/zeebo/blake3/issues/7 ## May 1, 2025 **Recording**: https://youtu.be/3BeERAs7n0k ### Attendees: - Tianon - Brandon Mitchell - Ramkumar Chinchani - Samuel Karp - Jeff Carter - Derek McGowan - Brandon Klein - James Kolb - Harry Randazzo - Brian Goff - Mike Brown ### Actionable Agenda Items: None. ### Presentation/Discussion Agenda Items: - Supporting push by tag with alternate digest algorithms: <https://github.com/opencontainers/distribution-spec/pull/543> - Promote blake3 in go-digest: <https://github.com/opencontainers/go-digest/pull/108>. - Parallel hashing proposal: <https://github.com/opencontainers/distribution-spec/issues/574>. - Invalid layer media types discussion from sig-node and ORAS. ### Notes: Notes from the zoom chat: 00:04:55 Ramkumar Chinchani: https://github.com/opencontainers/distribution-spec/pull/543 00:15:02 Ramkumar Chinchani: https://github.com/opencontainers/go-digest/pull/108 00:18:06 Brandon Mitchell: https://github.com/golang/go/issues/36632 00:22:31 Brandon Mitchell: https://github.com/golang/go/issues/70471 00:27:54 Brandon Mitchell: https://pkg.go.dev/hash 00:31:16 Brian Goff (@cpuguy83): You could implement v1 on v2 (in the case of removing panics in v2) 00:34:17 Brandon Mitchell: brb 00:34:37 Derek McGowan: https://pkg.go.dev/crypto#Hash 00:36:50 Derek McGowan: Vs https://pkg.go.dev/hash#Hash 00:37:14 Brian Goff (@cpuguy83): https://github.com/opencontainers/go-digest/commit/b9e02e015be61903bbee58e3fd349114fa28e0b4 00:41:49 Brian Goff (@cpuguy83): "The cryptoHash interface mimics crypto.Hash, but is a subset of the methods that we require. crypto.Hash is a concrete type that makes it hard to bring new hash function implementations in." 00:42:38 Brian Goff (@cpuguy83): panic at the digest 00:46:14 Derek McGowan: https://github.com/opencontainers/go-digest/blob/master/digest.go#L135 this will probably cause panics in some codebases 00:46:46 Brian Goff (@cpuguy83): `defer recover()` no problem. 00:46:59 Brian Goff (@cpuguy83): Woah zoom does code blocks now. 00:48:09 Brian Goff (@cpuguy83): Should do a named release like runc does "Don't panic!" 00:52:50 Ramkumar Chinchani: https://github.com/opencontainers/distribution-spec/issues/574 just landed 00:55:28 Brian Goff (@cpuguy83): NTD 00:56:34 Tianon: Replying to "https://github.com/o..." not sure I understand why this isn't a comment on #573 - because it's a concrete proposal? 00:58:57 Tianon: "put your file in a tar" sounds heavier than it is -- just generate a single simple binary tar header and prepend it on your file during upload (and use the uncompressed tar media type) 00:59:47 Tianon: Replying to ""put your file in a ..." then you get all the https://pkg.go.dev/archive/tar#Header fields for "free", and existing container image tooling "just works" (and an efficient packing format, to boot, unlike strings in a JSON object of annotations) 01:00:20 Brandon Mitchell: Replying to ""put your file in a ..." "free" as the consumer, but that metadata now needs to be generated by the producer 01:00:55 Tianon: Replying to ""put your file in a ..." but this is metadata they're already stuffing into annotations 01:01:01 Tianon: Replying to ""put your file in a ..." most of it's optional 01:02:33 Derek McGowan: https://github.com/containerd/containerd/pull/11744 01:03:51 Ramkumar Chinchani: IANA redux? 01:04:05 Tianon: Replying to "IANA redux?" IANA/v2 01:04:16 Brandon Mitchell: Replying to "IANA redux?" OCANA ## April 24, 2025 **Recording**: https://youtu.be/KHJKOSk48o0 ### Attendees: - Brandon Mitchell - Tianon - Derek McGowan - Ramkumar Chinchani - Brian Goff - Syed Ahmed - Jeff Carter - Mike Brown ### Actionable Agenda Items: None ### Presentation/Discussion Agenda Items: - blake3: <https://github.com/opencontainers/image-spec/pull/1240> - Parallel blob upload and large blob handling: <https://github.com/opencontainers/distribution-spec/issues/573> ### Notes: Notes from the zoom chat: 00:03:46 Brandon Mitchell: https://github.com/opencontainers/image-spec/pull/1240 00:05:30 Tianon: blake3 also supposedly makes it possible to do checksum verification on a partial pull, thanks to the merkle dag 00:06:37 Tianon: Replying to "blake3 also supposed..." https://en.wikipedia.org/wiki/BLAKE_(hash_function)#BLAKE3 00:07:05 Tianon: Replying to "blake3 also supposed..." "In addition to providing parallelism, the Merkle tree format also allows for verified streaming (on-the-fly verifying) and incremental updates." 00:10:54 Brandon Mitchell: Sounds like my suggestion on the parallel blob uploads, make a new hash algorithm definition: https://github.com/opencontainers/distribution-spec/issues/573#issuecomment-2815931325 00:11:16 Derek McGowan: Do we need a large artifacts working group? 00:11:45 Brandon Mitchell: Replying to "Do we need a large a..." If someone wants to run it, raise it with the TOB. 00:14:46 Brandon Mitchell: https://github.com/opencontainers/distribution-spec/issues/573 00:18:27 Tianon: "org.opencontainers.image.digest.sha256", "org.opencontainers.image.digest.blake3", etc etc as annotations? 👀 00:18:36 Brandon Mitchell: "400GB models": Hub maintainers crying in S3 bills. 00:18:50 Tianon: Replying to ""org.opencontainers...." similar to how the in-toto version of our "descriptor" object has digest as a map instead of just a string 00:20:56 Tianon: https://docs.kernel.org/admin-guide/device-mapper/verity.html#hash-tree 00:21:57 Ramkumar Chinchani: https://docs.kernel.org/admin-guide/device-mapper/verity.html devicemapper verity 00:21:59 Jeff Carter: Replying to ""400GB models": Hub ..." i should share my hack of building an S3 API on top of an OCI registry, where an OCI artifact = s3 bucket 00:22:04 Ramkumar Chinchani: block-based 00:28:35 Brandon Mitchell: Everything is a merkle tree of hashes :D 00:32:38 Jeff Carter: we've seen manifests with 25,000 layers. At 5gb chunks, that's space for a 125 TB model :D 00:33:39 Brian Goff: 200KB, guess I have to get off dial-up finally. 00:35:41 Tianon: https://github.com/opencontainers/distribution-spec/pull/293#issuecomment-1452780554 00:36:26 Tianon: Replying to "https://github.com/o..." if you copy https://oci.dag.dev/?image=tianon%2Ftest:eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee and try to make it even one single byte bigger, Hub will reject it 00:38:16 Tianon: Replying to "https://github.com/o..." https://iliana.fyi/blog/e98e/ for anyone who isn't familiar with the reference (it's a delightful story about GitHub) 00:51:39 Syed Ahmed: Windows containers 00:57:13 Brandon Mitchell: https://developers.cloudflare.com/workers/platform/limits/#response-limits 01:01:50 Ramkumar Chinchani: https://github.com/pytorch/pytorch/issues/141350 ## April 17, 2025 **Recording**: https://youtu.be/Vp8sfMPuqcA ### Attendees: - Brandon Mitchell - Jory Burson - Ramkumar Chinchani - Sajay Antony - Jeff Carter - Samuel Karp - Syed Ahmed ### Actionable Agenda Items: None ### Presentation/Discussion Agenda Items: - Support for other layer media types: <https://github.com/opencontainers/image-spec/pull/1191> - Rework the PR to focus on whether OCI should support new media types (`manifest.md`) - Discussion from there can look at how much this improves performance - More discussion on parallel blob uploads - Recommendation to open an issue in GitHub to consolidate the discussion - License annotation usage: <https://github.com/opencontainers/image-spec/issues/1257> - Reference spec working group: <https://github.com/opencontainers/tob/pull/114> ### Notes: Notes from the zoom chat: 00:05:53 Brandon Mitchell: https://groups.google.com/a/opencontainers.org/g/tob 00:16:52 Sajay Antony: Hey @Syed, Given the discussion of concurrent upload, there is some interest in folks i talked to in Azure as well. 00:24:09 Samuel Karp: yep, count me in 00:26:21 Syed Ahmed: So far I see LLMs, VM images, libs 00:27:14 Sajay Antony: Yep VM images are also in the mix here. 00:30:29 Syed Ahmed: Yes, agree with the compatibility aspect 00:31:18 Ramkumar Chinchani: overlap with CDN ideas 00:32:14 Syed Ahmed: I’ll create a channel in the dist slack for this ## April 10, 2025 **Recording**: https://youtu.be/SEih1RI7sFA ### Attendees: - Tianon - Syed Ahmed - Jory Burson - Brian Goff - Brandon Mitchell - Sajay Antony - Derek McGowan - Mike Brown - Michael Brown - Samuel Karp ### Actionable Agenda Items: - Container Plumbing Days CFP is open, promotions encouraged: <https://groups.google.com/a/opencontainers.org/g/dev/c/lWLddPSeyRU/m/w1KTQ-hLBAAJ> - _add your items_ ### Presentation/Discussion Agenda Items: - Fixing image-spec badge - Previous PR was closed: <https://github.com/opencontainers/image-spec/pull/1251> - Reference spec working group: <https://github.com/opencontainers/tob/pull/114> - Mailing list spam - <https://groups.google.com/a/opencontainers.org/g/dev> - <https://groups.google.com/a/opencontainers.org/g/tob> - parallel blob upload/download - Out of order push: <https://github.com/opencontainers/distribution-spec/issues/546> - Blake3: <https://github.com/opencontainers/image-spec/pull/1240> - erofs/squashfs: <https://github.com/opencontainers/image-spec/pull/1191> - dm-verity: <https://docs.kernel.org/admin-guide/device-mapper/verity.html> - ability to shard a blob into multiple chunks with multiple digests and a map of digests - Derek: spec should follow an implementation - Brandon: consider making the chunks into blobs/layers to avoid redesigning registries - Deferred: Support for other layer media types: <https://github.com/opencontainers/image-spec/pull/1191> ### Notes: Notes from the zoom chat: 00:18:54 Mike Brown: new KEP that may be semi related https://github.com/kubernetes/enhancements/pull/5097 00:19:41 Derek McGowan: I thought LF moved everything over to that other system 00:20:35 Mike Brown: kep ^ excerpt: “The proposal aims to address the challenge of verifying which registry an image is being pulled from when deploying applications in Kubernetes having multiple image mirrors configured. Currently, users have to manually check the runtime logs to determine which registry was being used, but this approach can be time-consuming and error-prone. The proposed solution seeks to provide transparency by adding a new field in the container status as well as in the image inspect section which provides the details of the registry from where the image is pulled. This would help users to better manage their applications' dependencies, troubleshoot issues related to image availability, and ensure compliance with organization security policies.” 00:20:43 Brian Goff (@cpuguy83): ❤️ the internet 00:38:31 Sajay Antony: @Syed Ahmed can we also call out why we need an API/spec here and why not go down something like QUIC 00:39:26 Tianon (he/him): +1 to Derek ❤️; at the very least, it would help to have a proof of concept that clearly shows the problem, the solution, and how much better, faster, stronger, etc the solution is (and concretely how hard it might be to change other clients/servers to support it) 00:42:06 Sajay Antony: Replying to "@Syed Ahmed can we a..." ok maybe this was a stupid question since multi stream for a single patch isn't in scope. 00:57:05 Tianon (he/him): "For uploads, your updated AWS client automatically calculates a checksum of the object and sends it to Amazon S3 along with the size of the object as a part of the request." 00:57:11 Tianon (he/him): Replying to ""For uploads, your u..." https://docs.aws.amazon.com/AmazonS3/latest/userguide/mpuoverview.html 00:58:42 Brandon Mitchell: "Amazon S3 automatically uses the CRC-64/NVME checksum algorithm." ## April 3, 2025 Canceled for KubeCon EU ## April 1, 2025 (KubeCon EU) **Recording**: https://youtu.be/FGjZvVR_N38 10am - 11am BST [convert to your timezone](https://dateful.com/time-zone-converter?t=10am&d=2025-04-01&tz2=British-Summer-Time-BST) Level 1, ICC Prince Regent Room 1 ### Attendees: - Mike Brown - Samuel Karp - Antoni Oeja - Alexander Kanevskiy - Arnaud Meukam - Toru Komatsu - Phil Estes - Giuseppe Scrivano - Akihiro Suda ### Actionable Agenda Items: None ### Presentation/Discussion Agenda Items: - (@aojea) [Linux Network Devices runtime-spec](https://github.com/opencontainers/runtime-spec/pull/1271) - Latest version with a more thoroughly explanation of all edge cases and internal details of the proposal - [runc implementation](https://github.com/opencontainers/runc/pull/4538) with end to end test cases covering the main user stories - [slides](https://docs.google.com/presentation/d/1Vdr7BhbYXeWjwmLjGmqnUkvJr_eOUdU0x-JxfXWxUT8/edit?slide=id.g2f0d2381f13_0_852#slide=id.g2f0d2381f13_0_852) - Next steps: introduce container edits in CDI spec and in NRI protocol - (@kad) Old PRs about RDT: - [Schemata in spec](https://github.com/opencontainers/runtime-spec/pull/1230) - [Docs clarification](https://github.com/opencontainers/runtime-spec/pull/1196) - (@kad) [Linux Memory Policy](https://github.com/opencontainers/runtime-spec/pull/1282) ### Notes: Notes from the zoom chat: 00:26:29 Arnaud Meukam: https://docs.google.com/presentation/d/1Vdr7BhbYXeWjwmLjGmqnUkvJr_eOUdU0x-JxfXWxUT8/edit#slide=id.g2f0d2381f13_0_852 00:30:48 Phil Estes: https://github.com/opencontainers/runtime-spec/pull/1271 ## Archived Meeting Notes - April 2024 - March 2025: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2024-apr-2025-mar.md> - April 2023 - March 2024: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2023-apr-2024-mar.md> - April 2022 - March 2023: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2022-apr-2023-mar.md> - April 2021 - March 2022: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2021-apr-2022-mar.md> - April 2020 - March 2021: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2020-apr-2021-mar.md> - March 2019 - March 2020: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2019-mar-2020-mar.md> ## Template ## Meeting Date ### Attendees: - _add yourself_ ### Actionable Agenda Items: - _add your items_ ### Presentation/Discussion Agenda Items: - _add your items_ ### Notes: - _add your notes_

Import from clipboard

Paste your markdown or webpage here...

Advanced permission required

Your current role can only read. Ask the system administrator to acquire write and comment permission.

This team is disabled

Sorry, this team is disabled. You can't edit this note.

This note is locked

Sorry, only owner can edit this note.

Reach the limit

Sorry, you've reached the max length this note can be.
Please reduce the content or divide it to more notes, thank you!

Import from Gist

Import from Snippet

or

Export to Snippet

Are you sure?

Do you really want to delete this note?
All users will lose their connection.

Create a note from template

Create a note from template

Oops...
This template has been removed or transferred.
Upgrade
All
  • All
  • Team
No template.

Create a template

Upgrade

Delete template

Do you really want to delete this template?
Turn this template into a regular note and keep its content, versions, and comments.

This page need refresh

You have an incompatible client version.
Refresh to update.
New version available!
See releases notes here
Refresh to enjoy new features.
Your user state has changed.
Refresh to load new user state.

Sign in

Forgot password

or

By clicking below, you agree to our terms of service.

Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in with Wallet
Wallet ( )
Connect another wallet

New to HackMD? Sign up

Help

  • English
  • 中文
  • Français
  • Deutsch
  • 日本語
  • Español
  • Català
  • Ελληνικά
  • Português
  • italiano
  • Türkçe
  • Русский
  • Nederlands
  • hrvatski jezik
  • język polski
  • Українська
  • हिन्दी
  • svenska
  • Esperanto
  • dansk

Documents

Help & Tutorial

How to use Book mode

Slide Example

API Docs

Edit in VSCode

Install browser extension

Contacts

Feedback

Discord

Send us email

Resources

Releases

Pricing

Blog

Policy

Terms

Privacy

Cheatsheet

Syntax Example Reference
# Header Header 基本排版
- Unordered List
  • Unordered List
1. Ordered List
  1. Ordered List
- [ ] Todo List
  • Todo List
> Blockquote
Blockquote
**Bold font** Bold font
*Italics font* Italics font
~~Strikethrough~~ Strikethrough
19^th^ 19th
H~2~O H2O
++Inserted text++ Inserted text
==Marked text== Marked text
[link text](https:// "title") Link
![image alt](https:// "title") Image
`Code` Code 在筆記中貼入程式碼
```javascript
var i = 0;
```
var i = 0;
:smile: :smile: Emoji list
{%youtube youtube_id %} Externals
$L^aT_eX$ LaTeX
:::info
This is a alert area.
:::

This is a alert area.

Versions and GitHub Sync
Get Full History Access

  • Edit version name
  • Delete

revision author avatar     named on  

More Less

Note content is identical to the latest version.
Compare
    Choose a version
    No search result
    Version not found
Sign in to link this note to GitHub
Learn more
This note is not linked with GitHub
 

Feedback

Submission failed, please try again

Thanks for your support.

On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

Please give us some advice and help us improve HackMD.

 

Thanks for your feedback

Remove version name

Do you want to remove this version name and description?

Transfer ownership

Transfer to
    Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

      Link with GitHub

      Please authorize HackMD on GitHub
      • Please sign in to GitHub and install the HackMD app on your GitHub repo.
      • HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.
      Learn more  Sign in to GitHub

      Push the note to GitHub Push to GitHub Pull a file from GitHub

        Authorize again
       

      Choose which file to push to

      Select repo
      Refresh Authorize more repos
      Select branch
      Select file
      Select branch
      Choose version(s) to push
      • Save a new version and push
      • Choose from existing versions
      Include title and tags
      Available push count

      Pull from GitHub

       
      File from GitHub
      File from HackMD

      GitHub Link Settings

      File linked

      Linked by
      File path
      Last synced branch
      Available push count

      Danger Zone

      Unlink
      You will no longer receive notification when GitHub file changes after unlink.

      Syncing

      Push failed

      Push successfully