owned this note
owned this note
Published
Linked with GitHub
# OCI Weekly Discussion
###### tags: `oci` `discussion`
Time: 1700 GMT (1300 EST; 1000 PST; 1900 CET; 0300 AEST; 0100 CST)
- [OCI Calendar](https://calendar.google.com/calendar/b/2/r?cid=bGludXhmb3VuZGF0aW9uLm9yZ19pMHNhZG8waTM3ZWtuYXI1MXZzdThtZDVoZ0Bncm91cC5jYWxlbmRhci5nb29nbGUuY29t)
- [Conference URL](https://zoom.us/j/6449415895?pwd=S2tJVGVra0dYdlZCRjJwdXdPdGRQQT09) with embedded passcode
- One tap mobile
[+16465588656,,6449415895#](+16465588656,,6449415895#) US (New York)
[+16699006833,,6449415895#](+16699006833,,6449415895#) US (San Jose)
Passcode: 77777 *(5 7's)*
Dial by your location
+1 646 558 8656 US (New York)
+1 669 900 6833 US (San Jose)
877 369 0926 US Toll-free
855 880 1246 US Toll-free
Meeting ID: 644 941 5895
Find your local number: https://zoom.us/u/aLDk4OXTu
Working groups:
- Auth: <https://hackmd.io/YyhWh7X_RuCod0i0mGxVLg>
- Image Compatibility: <https://hackmd.io/060HKC3DTV-NzzewNQbHCg>
- FreeBSD: <https://hackmd.io/hq_NOVL4RZS7xYYMqfJ6-A>
*template at the bottom*
## September 25, 2025
**Recording**: https://youtu.be/IpQrVMH4iNs
### Attendees:
- Tianon
- Brandon Mitchell
- Ramkumar Chinchani
### Actionable Agenda Items:
- Review needed:
- Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581>
- Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66>
- Security annotation: <https://github.com/opencontainers/image-spec/pull/1284>
### Presentation/Discussion Agenda Items:
- Progress with conformance redesign: <https://github.com/sudo-bmitch/distribution-spec/tree/pr-conformance-v2/conformance2>
### Notes:
Notes from the zoom chat:
00:08:44 Ramkumar Chinchani: GH copilot could expedite?
## September 18, 2025
**Recording**: https://youtu.be/wkZj4Uq7GC0
### Attendees:
- Brandon Mitchell
- Tianon
- Brian Goff
- Derek McGowan
- Jeff Carter
- Sajay Antony
- James Kolb
- Ramkumar Chinchani
- Jory Burson
### Actionable Agenda Items:
- Review needed:
- Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581>
- Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66>
- Security annotation: <https://github.com/opencontainers/image-spec/pull/1284>
- Okay to close?
- Search for blob: <https://github.com/opencontainers/distribution-spec/issues/585>
### Presentation/Discussion Agenda Items:
- Syntax on range headers: <https://github.com/opencontainers/distribution-spec/issues/586>
- Layers missing parent directories: <https://github.com/opencontainers/image-spec/pull/970>
- Any desire to take this PR over?
- Self validating blobs? <https://github.com/opencontainers/image-spec/issues/1275>
- Jory working on a Trademark Board meeting
### Notes:
Notes from the zoom chat:
00:08:01 Sajay Antony: That's kind of ambiguous
00:11:15 Sajay Antony: Sorry my voice is totally gone.
00:11:43 Ramkumar Chinchani: this is like "robots.txt"
00:17:20 Jory Burson: Hiiiiii sorry I yam late
00:28:01 Ramkumar Chinchani: This is a known breakage
00:37:40 Sajay Antony: Thanks all, late for another meeting. Need to drop. See you next week.
## September 11, 2025
**Recording**: https://youtu.be/697AXluvdBk
### Attendees:
- Brandon Mitchell
- Tianon
- Mike Brown
- Sajay Antony
- Michael Brown
### Actionable Agenda Items:
- Review needed:
- Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581>
- Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66>
### Presentation/Discussion Agenda Items:
- Security annotation: <https://github.com/opencontainers/image-spec/pull/1284>
- runtime-spec is planning a 1.3 release: <https://github.com/opencontainers/runtime-spec/issues/1295>
### Notes:
Notes from the zoom chat:
00:11:23 Sajay Antony: Do we need more maintainers in distribution?
00:18:01 Brandon Mitchell: <operations@opencontainers.org>
00:18:45 Sajay Antony: Artifact manifest 😂
## September 4, 2025
**Recording**: https://youtu.be/r4hhQCHHpqY
### Attendees:
- Brandon Mitchell
- Tianon
- Brian Goff
- Ramkumar Chinchani
- Jory Burson
### Actionable Agenda Items:
- Review needed:
- Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581>
- Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66>
### Presentation/Discussion Agenda Items:
- Security annotation: <https://github.com/opencontainers/image-spec/issues/1283>
- Container Plumbing Days retro from Jory
- About 30 attended
- Trademark Board is planning on a meeting
### Notes:
Notes from the zoom chat:
00:08:54 Tianon: "The URLs for accessing your security.txt file. It is important to include this if you are digitally signing the security.txt file, so that the location of the security.txt file can be digitally signed too. See the full description of Canonical"
00:09:19 Tianon: Replying to ""The URLs for access..." added justification for pointing to a URL instead of copying the data
00:10:40 Jory Burson: Hi hi
00:14:08 Ramkumar Chinchani: why not use referrer artifact for this?
00:14:28 Ramkumar Chinchani: seems like an attempt to standardize something
00:14:47 Tianon: Replying to "why not use referrer..." referrers are kind of heavy for something that's in most cases going to be just a URL
00:14:56 Tianon: Replying to "why not use referrer..." but there's nothing to stop anyone from using referrers
00:15:10 Tianon: Replying to "seems like an attemp..." this is the one - freeze the annotations spec 😈
## August 28, 2025
**Recording**: https://youtu.be/GssZ0FpeYJk
### Attendees:
- Kevin Li
- Efim Verzakov
- Brandon Mitchell
- Peter Treese
- Tianon
- Ram Chinchani
- Michael Brown
### Actionable Agenda Items:
- Review needed:
- Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581>
- Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66>
### Presentation/Discussion Agenda Items:
- vTPM: <https://github.com/opencontainers/runtime-spec/pull/1293>
- Distribution spec conformance progress. (Brandon)
- Pass through authentication with proxy namespaces. (Brandon)
### Notes:
Notes from the zoom chat:
00:11:23 Kevin Li: https://github.com/opencontainers/runtime-spec/pull/1293
00:17:34 Tianon: in the VM example, libvirt creates and manages the swtpm process, right? https://github.com/libvirt/libvirt/blob/75e6158a95167f7655879f232af44a3737d30eb0/src/util/virtpm.c
00:18:08 Tianon: Replying to "in the VM example, l..." in that example, the runc comparison is qemu, and qemu does not create TPM devices (or run swtpm)
00:18:50 Tianon: Replying to "https://github.com/o..." https://github.com/opencontainers/runc/pull/4855
00:27:32 Ramkumar Chinchani: ntd early today
00:34:31 Tianon: https://bmitch.net/blog/2025-08-22-ghrc-appears-malicious/
00:34:59 Tianon: Replying to "https://bmitch.net/b..." (now he gets to copy his personal blog link into the meeting notes, but not feel self-serving when he does so 😂)
## August 21, 2025
**Recording**: https://youtu.be/DaCyLP2hWdA
### Attendees:
- Brandon Mitchell
- Tianon
- Jory Burson
- Syed Ahmed
- Jeff Carter
- Sajay Antony
- Mike Brown
### Actionable Agenda Items:
None.
### Presentation/Discussion Agenda Items:
- Clarifying predefined annotations: <https://github.com/opencontainers/image-spec/issues/833>
### Notes:
Notes from the zoom chat:
00:12:23 Syed Ahmed: +1 for deprecating labels
00:14:19 Jory Burson: Oh no!
00:21:13 Sajay Antony: I’m out for the next 2 weeks.
## August 14, 2025
**Recording**: https://youtu.be/5v6eJrQWXdw
### Attendees:
- Brandon Mitchell
- Brian Goff
- Ramkumar Chanchani
- Tianon
- Michael Brown
- Jeff Carter
- Syed Ahmed
### Actionable Agenda Items:
None.
### Presentation/Discussion Agenda Items:
- Shortened meeting reviewing some of the in-progress PRs.
- Range header: <https://github.com/opencontainers/distribution-spec/pull/581>
- Tag listing: <https://github.com/opencontainers/distribution-spec/pull/579>
- Proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66>
### Notes:
Notes from the zoom chat:
00:13:37 Tianon: ringing the bell of shame for Michael 🔔
00:15:57 Brandon Mitchell: We only say "SHOULD NOT" error, not "MUST NOT", so it's still spec compliant.
## August 7, 2025
**Recording**: https://youtu.be/2-ylZqX9phI
### Attendees:
- Tianon
- Jeff Carter
- Mike Brown
- Isaev Isa
- Brandon Mitchell
- Brian Goff
- Jory Burson
- Efim Verzakov
- Ramkumar Chinchani
- Sajay Antony
### Actionable Agenda Items:
- Review needed:
- Range header in chunked response: <https://github.com/opencontainers/distribution-spec/pull/581>
- Mike asked for an example, and the GET response also needs to be updated.
- Conformance tag list order: <https://github.com/opencontainers/distribution-spec/pull/583>
- Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66>
### Presentation/Discussion Agenda Items:
- Isa asked about adding vtpm support in runc.
- Brandon suggested opening an issue in the runc and runtime-spec repos.
### Notes:
Notes from the zoom chat:
00:26:03 Tianon: https://developer.mozilla.org/en-US/docs/Web/HTTP/Reference/Headers/Range#requesting_multiple_ranges is really interesting (only barely related)
00:36:58 Sajay Antony: Folks NTD. Thank you.
00:45:48 Jory Burson: Bye q!
## July 31, 2025
**Recording**: https://youtu.be/HoNMtOJ1yV0
### Attendees:
- Brandon Mitchell
- Tianon
- Sajay Antony
- Syed Ahmed
- Derek McGowan
- Ramkumar Chinchani
- Jory Burson
### Actionable Agenda Items:
- Review needed:
- Conformance tag list order: <https://github.com/opencontainers/distribution-spec/pull/583>
- Proxy namespaces: <https://github.com/opencontainers/distribution-spec/pull/66>
### Presentation/Discussion Agenda Items:
- Tag listing: <https://github.com/opencontainers/distribution-spec/pull/579>
### Notes:
Notes from the zoom chat:
00:19:46 Ramkumar Chinchani: Status of multi-hash?
00:23:00 Tianon: vbatts response will probably be "OHMAN"
00:23:25 Brandon Mitchell: Time's fun when you're having flies
00:23:47 Derek McGowan: It seems a missed a conversation where there was agreement to create the word “ASCIIbetical”. While cute, can we just say “ascii order” in the spec and can explain that in the first use that is equivalent to case-sensitive or byte ordering.
00:24:05 Tianon: Replying to "It seems a missed a ..." I didn't create it, though 😅
00:24:11 Tianon: Replying to "It seems a missed a ..." it's a pre-existing word, although not a super popular one
00:24:23 Tianon: Replying to "It seems a missed a ..." feel free to suggest an alternative wording on the PR and I'm happy to adjust
00:24:39 Ramkumar Chinchani: https://en.wiktionary.org/wiki/ASCIIbetical
00:26:29 Ramkumar Chinchani: "informal" means trouble in a technical spec
00:34:52 Sajay Antony: Folks need to drop for another meeting. Thank you.
## July 24, 2025
**Recording**: https://youtu.be/XPfMIv6vsOA
### Attendees:
- Tianon
- Brandon Mitchell
- Sajay Antony
- Brian Goff
- Syed Ahmed
- Mike Brown
### Actionable Agenda Items:
- Review needed:
- schema/go.sum: <https://github.com/opencontainers/image-spec/pull/1274>
### Presentation/Discussion Agenda Items:
- Tag listing sort order: <https://github.com/opencontainers/distribution-spec/pull/583>
- Version and media type inside the image config: <https://github.com/opencontainers/image-spec/issues/1275>
### Notes:
Notes from the zoom chat:
00:02:57 Brandon Mitchell: https://github.com/opencontainers/image-spec/pull/1274
00:04:16 Tianon: Replying to "https://github.com/o..." git rm 😇
00:06:34 Brian Goff (@cpuguy83): https://en.wikipedia.org/?title=ASCIIbetical_order&redirect=no
00:10:16 Brian Goff (@cpuguy83): If we were all using Windows all these problems would just go away. Case sensitive filesystems, line endings.
00:11:59 Brian Goff (@cpuguy83): Jeez, should at least be using slices.Sort these days 🤣
00:12:23 Tianon: Syed had the perfect opportunity to say "the tag listing is supposed to be sorted??"
00:12:46 Tianon: Replying to "Jeez, should at leas..." Go too old, have to reload
00:13:54 Brian Goff (@cpuguy83): I can't have emoji in my tags?!
00:14:16 Tianon: Replying to "I can't have emoji i..." nope, but you sure can punycode them
00:14:29 Tianon: Replying to "I can't have emoji i..." https://oci.dag.dev/?image=tianon%2Ftest:xn--uo8h
00:14:39 Tianon: Replying to "I can't have emoji i..." https://oci.dag.dev/?image=tianon%2Ftest:xn--ls8h
00:16:00 Tianon: Replying to "I can't have emoji i..." https://bsky.app/profile/tianon.bsky.social/post/3lcmlcho5zs24 if you want the context for that 💩 one
## July 17, 2025
**Recording**: https://youtu.be/di21DKPFmNo
### Attendees:
- Brandon Mitchell
- Tianon
- Jory Burson
- Brian Goff
- Sajay Antony
### Actionable Agenda Items:
- Okay to merge schema go.mod changes? <https://github.com/opencontainers/image-spec/pull/1253>
- Review needed for pandoc: <https://github.com/opencontainers/image-spec/pull/1272>
- Review needed for proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66>
### Presentation/Discussion Agenda Items:
- Range header changes need CI updates: <https://github.com/opencontainers/distribution-spec/pull/581>
- Tag listing needs conformance tests: <https://github.com/opencontainers/distribution-spec/pull/579>
### Notes:
Notes from the zoom chat:
00:12:22 Tianon: yep, "looks like shell" (https://github.com/moby/moby/pull/9637#issuecomment-66822505 ❤️)
00:14:35 Brian Goff (@cpuguy83): Replying to "yep, "looks like she..." Funny thing is he said "Looks like Bash" but the PR is making it *not* look like bash 😂
00:14:52 Tianon: Replying to "yep, "looks like she..." it's all the same to him 😂
## July 10, 2025
**Recording**: https://youtu.be/_d8_IxMEMS0
### Attendees:
- Brian Goff
- Sajay Antony
- Mike Brown
- Derek McGowan
- Brandon Mitchell
- Joseph Ferguson
- Ramkumar Chinchani
- Xiang Gao
### Actionable Agenda Items:
- Review needed:
- Broken link: <https://github.com/opencontainers/image-spec/pull/1271>
- Broken link: <https://github.com/opencontainers/wg-auth/pull/14>
### Presentation/Discussion Agenda Items:
- pandoc fixes: <https://github.com/opencontainers/image-spec/pull/1272>
- alternative to linear layers: <https://github.com/opencontainers/image-spec/issues/1270>
- chunked upload `Range` value
### Notes:
Notes from the zoom chat:
00:14:05 Ramkumar Chinchani: https://github.com/google/go-containerregistry/blob/main/cmd/crane/rebase.md
00:31:49 Brian Goff (@cpuguy83): fs.FS makes this really nice.
00:36:06 Sajay Antony: Thanks all. Need to drop for another meeting.
00:42:45 Ramkumar Chinchani: https://datatracker.ietf.org/doc/html/rfc7233
## July 3, 2025
**Recording**: https://youtu.be/QEhSkvi8qdY
### Attendees:
- Tianon
- Carmi Weinzweig
- Brian Goff
- Jory Burson
- Brandon Mitchell
- Derek McGowan
### Actionable Agenda Items:
None.
### Presentation/Discussion Agenda Items:
- Proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66>
- Brandon will push a suggested phrasing for a header.
### Notes:
Notes from the zoom chat:
00:06:14 Brian Goff (@cpuguy83): OCI Cullinary Community
00:08:35 Jory Burson: Open Cookery Initiative
00:24:26 Derek McGowan: https://github.com/containerd/containerd/blob/main/docs/hosts.md#setup-default-mirror-for-all-registries
## June 26, 2025
**Recording**: https://youtu.be/YuktrplNtzQ
### Attendees:
- Jeff Carter
- James Kolb
- Carmi Weinzweig
- Tianon
- Derek McGowan
- Brandon Mitchell
- Brian Goff
- Sajay Antony
- Syed Ahmed
- Mike Brown (IBM)
- Ramkumar Chinchani
### Actionable Agenda Items:
- Reviews needed:
- FreeBSD: <https://github.com/opencontainers/runtime-spec/pull/1286>
- GHA Badge: <https://github.com/opencontainers/image-spec/pull/1256>
- GHA GOPATH: <https://github.com/opencontainers/image-spec/pull/1264>
- Okay to close:
- Streaming push: <https://github.com/opencontainers/distribution-spec/pull/576>
- Dependabot: <https://github.com/opencontainers/distribution-spec/pull/572>
### Presentation/Discussion Agenda Items:
- Tag Listing Proposal: <https://github.com/opencontainers/distribution-spec/pull/579>
- Proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66>
- Range header when 0 bytes transfered: <https://github.com/opencontainers/distribution-spec/issues/578>
### Notes:
Notes from the zoom chat:
00:14:12 Tianon: "thanks Gobama"
00:14:12 Carmi Weinzweig: Thanks all. I will pass your comments back and probably be back next week. Heading off to take my car to the dealer, unless there is some other question for me. :-)
00:23:25 Sajay Antony: This is really nice.
00:24:01 Sajay Antony: Ah we are back to search.
00:28:06 Tianon: maybe define the created annotation as optional, but give it an explicit meaning so that if it is specified, clients and users can rely on what the value means?
00:28:53 Tianon: Replying to "maybe define the cre..." there's definitely value in both the timestamp that the registry (or this repo) first saw a digest and separately the time this tag was most recently updated, but maybe that's too much nuance
00:35:39 Sajay Antony: I need to drop. Will share this internally.
00:48:01 Ramkumar Chinchani: different upstreams, different images but same image/tags, avoid clobber?
00:50:20 Tianon: https://github.com/docker-library/meta-scripts/blob/fab86e62cb31ee1b2ee597399a16db6658897722/registry/docker-hub.go#L9-L16 🧌
00:51:50 Tianon: Replying to "https://github.com/d..." the whole point of this list is that I consolidate/canonicalize all these down to docker hub 😂
01:03:06 Ramkumar Chinchani: 0-0?
01:04:03 Ramkumar Chinchani: drop the Range Header in response?
## June 19, 2025
**Recording**: https://youtu.be/HZ33AkIQI2k
### Attendees:
- Alice Sowerby
- Carmi Weinzweig
- Brandon Mitchell
- Sajay Antony
- Brian Goff
### Actionable Agenda Items:
None.
### Presentation/Discussion Agenda Items:
- Add FreeBSD as a supported platform
<https://github.com/opencontainers/runtime-spec/pull/1286>
- Let's come back when Tianon is here (and it's not Juneteenth)
- Proxy namespace: <https://github.com/opencontainers/distribution-spec/pull/66>
- Range header when 0 bytes transfered: <https://github.com/opencontainers/distribution-spec/issues/578>
- Meeting shortened for Juneteenth
### Notes:
Notes from the zoom chat:
00:13:06 Brian Goff (@cpuguy83): Hello
00:14:21 Brian Goff (@cpuguy83): Yeah no real experience there.
00:16:34 Sajay Antony: Sorry lost connection.
00:18:45 Brian Goff (@cpuguy83): Is this related? https://github.com/containerd/containerd/pull/11998
## June 12, 2025
**Recording**: https://youtu.be/jUa2qwX66yM
### Attendees:
- Brandon Mitchell
- Brian Goff
- Tianon
- Sajay Antony
- Ramkumar Chinchani
### Actionable Agenda Items:
None.
### Presentation/Discussion Agenda Items:
- Tag/Manifest listing improvements: <https://github.com/opencontainers/distribution-spec/issues/575>
### Notes:
Notes from the zoom chat:
00:16:33 Sajay Antony: Happy to support the effort. Working group or otherwise.
00:21:11 Brandon Mitchell: Or write it up on hackmd 🙃
00:22:38 Sajay Antony: If WG is light then folks won’t have a concern.
## June 5, 2025
**Recording**: https://youtu.be/dDF152Lhkm4
### Attendees:
- Brandon Mitchell
- Tianon
- Harry Randazzo
- Syed Ahmed
- Jory Burson
- Brian Goff
- Mike Brown
### Actionable Agenda Items:
None.
### Presentation/Discussion Agenda Items:
- Container Plumbing Days
- 3 hours to schedule
- 19 talks, 7 talks scored at least 4 stars (out of 5)
- Mounting artifacts as a volume that are not tar files
- cri-o is pulling in the filename from the ORAS title annotation pattern
- Tianon would like to add a tar header in front of the artifact to convert it to a tar file
### Notes:
Notes from the zoom chat:
00:12:40 Tianon: "have y'all heard the good news of open containers?"
00:12:42 Brian Goff (@cpuguy83): I would love to go, but of course cannot make that.
00:13:07 Tianon: Replying to ""have y'all heard th..." the double entendre of our name makes this even funnier
00:13:37 Brian Goff (@cpuguy83): Replying to "I would love to go, ..." Travel is very difficult for me at this time.
00:14:07 Brandon Mitchell: Replying to "I would love to go, ..." And folks want to be sure they can return home.
00:14:38 Brian Goff (@cpuguy83): Replying to "I would love to go, ..." My family would all be happy to be stranded in Amsterdam, I think 🙂
00:16:25 Tianon: Replying to "I would love to go, ..." yeah, given *gestures wildly* I wouldn't feel totally safe flying within the US right now, let alone outside it
00:16:55 Brandon Mitchell: Replying to "I would love to go, ..." Knowing my luck, my connection would be through Newark.
00:18:35 Brian Goff (@cpuguy83): Replying to "I would love to go, ..." lol, yeah.
00:21:02 Tianon: Jory feeling bad that this is "all" she has and she's almost single-handedly carried the empty-agenda meeting for ~20 minutes with relevant content 💪 ❤️
00:23:41 Brian Goff (@cpuguy83): Nothing like being in a talk and then all of sudden be like "wait... how did I get here? What have I already said?"
00:25:40 Brian Goff (@cpuguy83): Brain: "Sorry, 500ms of empty space is too much you need to add something else in there"
00:26:45 Brian Goff (@cpuguy83): Brian is GOMAXPROCS=1 but it sure does know how to make use of iowait
00:28:30 Brian Goff (@cpuguy83): Tianon in a wig: name of the next runc release.
00:29:19 Mike Brown: I’m here to fill in the elder category
00:29:53 Brian Goff (@cpuguy83): Oh I need to get some paper bills in so I can get my kids passports.
00:32:25 Tianon: what about UID, GID, permissions?
00:32:45 Tianon: Replying to "what about UID, GID,..." mtime?
00:33:01 Tianon: Replying to "what about UID, GID,..." (see what I mean about reimplementing the tar header?)
00:37:36 Harry Randazzo: magic strings prob?
00:38:13 Tianon: https://pkg.go.dev/archive/tar#Header
00:39:57 Tianon: Replying to "magic strings prob?" yeah, the only way you get "encoding" is by inferring meaning from the filename (extension, usually) or from magic bytes 😅
00:40:18 Harry Randazzo: a lot of tar upload implementations also strip the tar header info to make more reproducible tarballs, so some implementations may need to rework to not strip anymore, but that creates more storage overhead
00:40:37 Tianon: Replying to "magic strings prob?" utf-16 byte-order mark anyone? (thanks Microsoft! 😂)
00:41:34 Tianon: Replying to "a lot of tar upload ..." yeah, but by the nature of the tar format that'd have to be just zeroing header values, not actually removing the header (or it wouldn't be tar anymore) 🙈
00:42:40 Syed Ahmed: I build a kind node image with the OCI artifact mount support @ quay.io/syahmed/kindest/node:crio-v1.33 If you want to try it out locally
00:43:42 Tianon: Replying to "what about UID, GID,..." to convert a raw file into a tar file, all that's required is to append a suitable 512 byte header to the front and it's suddenly a tar file 😅 you can have a layer per file and still append 512 bytes at the front of each one so that you get the semantic data necessary too - a range request can easily start at 512 instead of 0 and the streaming use case is fine again
00:44:12 Tianon: Replying to "what about UID, GID,..." so "extracting the tar" is a heavy way to describe "read the 512 bytes to get filename, then dump the rest into the file"
00:44:22 Harry Randazzo: Replying to "a lot of tar uploa..." oh yea, by strip I meant zeroize not actually remove xD
00:47:10 Harry Randazzo: cant wait to mount a tar that was set to a user that doesnt exist
00:47:36 Brandon Mitchell: Replying to "cant wait to mount a..." It's just a uid/gid, so it doesn't matter when it doesn't exist.
00:47:54 Harry Randazzo: oras will auto tar if you specify a dir https://github.com/oras-project/oras-go/blob/main/content/file/utils.go#L36
00:47:54 Tianon: Replying to "cant wait to mount a..." yeah, as far as the kernel knows/cares, all users are just numbers so they all "exist" 😅
00:48:23 Brandon Mitchell: Replying to "cant wait to mount a..." But I'm not just a number!
00:49:55 Tianon: Replying to "cant wait to mount a..." to clarify further, /etc/passwd is a pure-userspace construction (the kernel never reads nor cares about it 👀)
00:51:16 Harry Randazzo: what is the media type on the config for a mountable artifact?
00:51:18 Tianon: yeah, it's less "artifacts are bad" and more "if you want filesystem content with filesystem semantics like filename, use the filesystem format"
00:51:37 Tianon: Replying to "yeah, it's less "art..." and in OCI, that's tar
00:52:52 Brandon Mitchell: Replying to "what is the media ty..." https://github.com/CloudNativeAI/model-spec/tree/main/specs-go/v1
00:54:15 Mike Brown: Replying to "yeah, it's less "art..." ^^
00:56:32 Syed Ahmed: Replying to "yeah, it's less "art..." We can have opinions on how a “mounted” artifact can work it can be similar to how secrets and config maps are mounted inside a container
00:56:43 Syed Ahmed: Replying to "yeah, it's less "art..." You don’t necessarily need to wrap it in a tar
## May 29, 2025
**Recording**: https://youtu.be/js5vXeJ4jTM
### Attendees:
- Tianon
- Brandon Mitchell
- Brian Goff
- Syed Ahmed
- Jory Burson
- Sajay Antony
- James Kolb
- Ram Chinchani
- Samuel Karp
- Mike Brown
### Actionable Agenda Items:
None.
### Presentation/Discussion Agenda Items:
- Where does <certification@opencontainers.org> go?
- <https://github.com/opencontainers/oci-conformance/blob/main/participation-form/OCI_Certified_Form.md>
- <https://github.com/opencontainers/oci-conformance/pull/127>
- umoci v0.5.0 released:
- <https://github.com/opencontainers/umoci/releases/tag/v0.5.0>
- <https://www.cyphar.com/blog/post/20250525-umoci-0.5>
- Alternative OCI digest implementation: <https://github.com/sudo-bmitch/oci-digest/>
- CNCF voting on ModelPack adoption as a sandbox project: <https://github.com/cncf/sandbox/issues/358>
- Model-spec discussion on media types: <https://github.com/CloudNativeAI/model-spec/issues/54>
- How does cri-o handle ownership/permissions/etc when mounting artifacts without tar packaging? <https://github.com/cri-o/cri-o/issues/8953>
- Uploading large artifacts: <https://github.com/opencontainers/distribution-spec/issues/573>
### Notes:
Notes from the zoom chat:
00:06:33 Sajay Antony: +1 @Tianon
00:08:34 Ramkumar Chinchani: where is Josh?
00:19:52 Ramkumar Chinchani: aptly "oci-digest"?
00:31:17 Tianon: "those who don't understand tar headers are doomed to reimplement them" (and probably in some cursed JSON)
00:33:45 Tianon: I'll go on the record again: such huge files are bad and we collectively should feel bad
00:35:23 Samuel Karp: registry operator can control the maximum layer size
00:35:53 Samuel Karp: ECR limit used to be 10GiB iirc. Sounds like you raised it since I left though.
00:36:51 Tianon: Replying to "ECR limit used to be..." this is literally exactly the number that came to mind for me as a sane limit when you suggested it was possible
00:40:53 Tianon: "panic at dis go"
00:41:37 Jory Burson: Replying to ""panic at dis go"" Panic, at the disc, Go!
00:41:53 Sajay Antony: Ntd folks. Thank you.
00:47:29 Tianon: https://github.com/opencontainers/go-digest/blob/master/MAINTAINERS
00:55:42 Tianon: An invalid digest string will case the marshaler to fail.
I could see this being problematic for using this in the image-spec structs -- tools will have a hard time returning good structured errors if the unmarshal fails and they can't somehow delay validation (and provide more detail/structure to their errors)
00:57:36 Tianon: Replying to "An invalid digest st..." for example, something like https://github.com/opencontainers/distribution-spec/blob/v1.1.1/spec.md#error-codes (I guess this is notably missing a code for "unsupported digest algorithm" or "invalid digest string" but it is conceivable)
00:59:28 Ramkumar Chinchani: imo, validation and conformance should "belong" in the spec repo.
01:02:59 Samuel Karp: I think I win the "tab is open and it takes me a while to get to it" prize
## May 23, 2025
**Recording**: https://youtu.be/lyhLh_bgOO4
### Attendees:
- Tianon
- Brandon Mitchell
- Jory Burson
- Jeff Carter
- Ramkumar Chinchani
- Brian Goff
- Derek McGowan
- Syed Ahmed
- Sajay Antony
### Actionable Agenda Items:
None.
### Presentation/Discussion Agenda Items:
- Querying registry for updates: <https://github.com/opencontainers/distribution-spec/issues/575>
- Splitting out image-spec json schema tests: <https://github.com/opencontainers/image-spec/pull/1253>
- Cleanup GHA for image-spec: <https://github.com/opencontainers/image-spec/issues/1263>
- Container plumbing days mini-summit
- Attendance is looking good
### Notes:
Notes from the zoom chat:
00:13:49 Ramkumar Chinchani: https://github.com/opencontainers/distribution-spec/issues/71
00:19:28 Tianon: https://oci.dag.dev/?repo=registry.k8s.io%2Fbusybox an example of someone who's already overloaded the "tag listing" API with more metadata
00:22:31 Tianon: Replying to "https://oci.dag.dev/..." https://oci.dag.dev/?repo=gcr.io/distroless/static
00:25:21 Sajay Antony: Replying to "https://oci.dag.dev/..." This is nice.
00:27:01 Ramkumar Chinchani: guidelines: 1. handle large scale 2. don't make more work for registry
00:27:10 Ramkumar Chinchani: ntd early today
00:29:40 Jeff Carter: could just do it as a GET /v2/<name>/manifests/?n=<integer>&sort=tktk&last=<last> fixes the issue with "list" being a possible reference
00:35:26 Tianon: https://pkg.go.dev/github.com/opencontainers/image-spec/schema?tab=importedby
00:36:45 Sajay Antony: NTD early for another meeting folks. Thank you.
## May 15, 2025
**Recording**: https://youtu.be/iPSRwC0dI-E
### Attendees:
- Brandon Mitchell
- Ramkumar Chinchani
- Sajay Antony
- Jeff Carter
- Samuel Karp
- Mike Brown
- James Kolb
### Actionable Agenda Items:
None
### Presentation/Discussion Agenda Items:
- Progress on pushing manifest with alternate digest algorithms
- Currently behind rewriting conformance tests
- That's behind getting auth standardized (stalled WG)
- Brandon is temporarily distracted working on a v2 proposal to go-digest
- No other agenda items so the meeting ended early.
### Notes:
Notes from the zoom chat:
00:03:42 Sajay Antony: Small group today.
00:07:00 Brandon Mitchell: https://github.com/sudo-bmitch/oci-digest/
00:10:47 Samuel Karp: wrap up early is always a good option if we have no agenda
## May 8, 2025
**Recording**: https://youtu.be/LSEyukQX1Fw
### Attendees:
- Brandon Mitchell
- Jeff Carter
- Ramkumar Chinchani
- Harry Randazzo
- James Kolb
- Derek McGowan
- Syed Ahmed
- Samuel Karp
- Sajay Antony
### Actionable Agenda Items:
None
### Presentation/Discussion Agenda Items:
- Is concurrent upload support needed?
- <https://github.com/opencontainers/distribution-spec/issues/546>
- <https://github.com/opencontainers/distribution-spec/issues/573>
- <https://github.com/opencontainers/distribution-spec/issues/574>
- How would we support digest encodings other than hex?
- <https://github.com/opencontainers/image-spec/blob/v1.0.1/descriptor.md#digests>
- <https://github.com/opencontainers/go-digest/blob/1e56c6daea3b29090ddd17e3e9d88196f0d8815b/algorithm.go#L249-L256>
- Brandon demoing an alternative digest implementation <https://github.com/sudo-bmitch/oci-digest/>
- Ram demoing blake3 with stacker
- Harry asking about conditional manifest pushing
- <https://github.com/opencontainers/distribution-spec/issues/250>
### Notes:
Notes from the zoom chat:
00:23:07 Ramkumar Chinchani: push s3 blobs directly. push manifest referring to blobs to OCI reg backed by s3. OCI spec doesn't say I need to use the blob push API first to push the manifest
00:28:25 Sajay Antony: Feel free to let' Shiwei know. he's a crypto guy btw.
00:30:31 Sajay Antony: Replying to "push s3 blobs direct..." These scenarios would then need cloud specific tooling right? Also might be a comeback for remoteUrls which we tried to deprecate.
00:31:32 Ramkumar Chinchani: Replying to "push s3 blobs direct..." Still in the camp that this is a special use case ... until camps get switched
00:34:30 Sajay Antony: Need to drop for another appointment.
00:39:23 Ramkumar Chinchani: https://github.com/zeebo/blake3/issues/7
## May 1, 2025
**Recording**: https://youtu.be/3BeERAs7n0k
### Attendees:
- Tianon
- Brandon Mitchell
- Ramkumar Chinchani
- Samuel Karp
- Jeff Carter
- Derek McGowan
- Brandon Klein
- James Kolb
- Harry Randazzo
- Brian Goff
- Mike Brown
### Actionable Agenda Items:
None.
### Presentation/Discussion Agenda Items:
- Supporting push by tag with alternate digest algorithms: <https://github.com/opencontainers/distribution-spec/pull/543>
- Promote blake3 in go-digest: <https://github.com/opencontainers/go-digest/pull/108>.
- Parallel hashing proposal: <https://github.com/opencontainers/distribution-spec/issues/574>.
- Invalid layer media types discussion from sig-node and ORAS.
### Notes:
Notes from the zoom chat:
00:04:55 Ramkumar Chinchani: https://github.com/opencontainers/distribution-spec/pull/543
00:15:02 Ramkumar Chinchani: https://github.com/opencontainers/go-digest/pull/108
00:18:06 Brandon Mitchell: https://github.com/golang/go/issues/36632
00:22:31 Brandon Mitchell: https://github.com/golang/go/issues/70471
00:27:54 Brandon Mitchell: https://pkg.go.dev/hash
00:31:16 Brian Goff (@cpuguy83): You could implement v1 on v2 (in the case of removing panics in v2)
00:34:17 Brandon Mitchell: brb
00:34:37 Derek McGowan: https://pkg.go.dev/crypto#Hash
00:36:50 Derek McGowan: Vs https://pkg.go.dev/hash#Hash
00:37:14 Brian Goff (@cpuguy83): https://github.com/opencontainers/go-digest/commit/b9e02e015be61903bbee58e3fd349114fa28e0b4
00:41:49 Brian Goff (@cpuguy83): "The cryptoHash interface mimics crypto.Hash, but is a subset of the methods that we require. crypto.Hash is a concrete type that makes it hard to bring new hash function implementations in."
00:42:38 Brian Goff (@cpuguy83): panic at the digest
00:46:14 Derek McGowan: https://github.com/opencontainers/go-digest/blob/master/digest.go#L135 this will probably cause panics in some codebases
00:46:46 Brian Goff (@cpuguy83): `defer recover()` no problem.
00:46:59 Brian Goff (@cpuguy83): Woah zoom does code blocks now.
00:48:09 Brian Goff (@cpuguy83): Should do a named release like runc does "Don't panic!"
00:52:50 Ramkumar Chinchani: https://github.com/opencontainers/distribution-spec/issues/574 just landed
00:55:28 Brian Goff (@cpuguy83): NTD
00:56:34 Tianon: Replying to "https://github.com/o..." not sure I understand why this isn't a comment on #573 - because it's a concrete proposal?
00:58:57 Tianon: "put your file in a tar" sounds heavier than it is -- just generate a single simple binary tar header and prepend it on your file during upload (and use the uncompressed tar media type)
00:59:47 Tianon: Replying to ""put your file in a ..." then you get all the https://pkg.go.dev/archive/tar#Header fields for "free", and existing container image tooling "just works" (and an efficient packing format, to boot, unlike strings in a JSON object of annotations)
01:00:20 Brandon Mitchell: Replying to ""put your file in a ..." "free" as the consumer, but that metadata now needs to be generated by the producer
01:00:55 Tianon: Replying to ""put your file in a ..." but this is metadata they're already stuffing into annotations
01:01:01 Tianon: Replying to ""put your file in a ..." most of it's optional
01:02:33 Derek McGowan: https://github.com/containerd/containerd/pull/11744
01:03:51 Ramkumar Chinchani: IANA redux?
01:04:05 Tianon: Replying to "IANA redux?" IANA/v2
01:04:16 Brandon Mitchell: Replying to "IANA redux?" OCANA
## April 24, 2025
**Recording**: https://youtu.be/KHJKOSk48o0
### Attendees:
- Brandon Mitchell
- Tianon
- Derek McGowan
- Ramkumar Chinchani
- Brian Goff
- Syed Ahmed
- Jeff Carter
- Mike Brown
### Actionable Agenda Items:
None
### Presentation/Discussion Agenda Items:
- blake3: <https://github.com/opencontainers/image-spec/pull/1240>
- Parallel blob upload and large blob handling: <https://github.com/opencontainers/distribution-spec/issues/573>
### Notes:
Notes from the zoom chat:
00:03:46 Brandon Mitchell: https://github.com/opencontainers/image-spec/pull/1240
00:05:30 Tianon: blake3 also supposedly makes it possible to do checksum verification on a partial pull, thanks to the merkle dag
00:06:37 Tianon: Replying to "blake3 also supposed..." https://en.wikipedia.org/wiki/BLAKE_(hash_function)#BLAKE3
00:07:05 Tianon: Replying to "blake3 also supposed..." "In addition to providing parallelism, the Merkle tree format also allows for verified streaming (on-the-fly verifying) and incremental updates."
00:10:54 Brandon Mitchell: Sounds like my suggestion on the parallel blob uploads, make a new hash algorithm definition: https://github.com/opencontainers/distribution-spec/issues/573#issuecomment-2815931325
00:11:16 Derek McGowan: Do we need a large artifacts working group?
00:11:45 Brandon Mitchell: Replying to "Do we need a large a..." If someone wants to run it, raise it with the TOB.
00:14:46 Brandon Mitchell: https://github.com/opencontainers/distribution-spec/issues/573
00:18:27 Tianon: "org.opencontainers.image.digest.sha256", "org.opencontainers.image.digest.blake3", etc etc as annotations? 👀
00:18:36 Brandon Mitchell: "400GB models": Hub maintainers crying in S3 bills.
00:18:50 Tianon: Replying to ""org.opencontainers...." similar to how the in-toto version of our "descriptor" object has digest as a map instead of just a string
00:20:56 Tianon: https://docs.kernel.org/admin-guide/device-mapper/verity.html#hash-tree
00:21:57 Ramkumar Chinchani: https://docs.kernel.org/admin-guide/device-mapper/verity.html devicemapper verity
00:21:59 Jeff Carter: Replying to ""400GB models": Hub ..." i should share my hack of building an S3 API on top of an OCI registry, where an OCI artifact = s3 bucket
00:22:04 Ramkumar Chinchani: block-based
00:28:35 Brandon Mitchell: Everything is a merkle tree of hashes :D
00:32:38 Jeff Carter: we've seen manifests with 25,000 layers. At 5gb chunks, that's space for a 125 TB model :D
00:33:39 Brian Goff: 200KB, guess I have to get off dial-up finally.
00:35:41 Tianon: https://github.com/opencontainers/distribution-spec/pull/293#issuecomment-1452780554
00:36:26 Tianon: Replying to "https://github.com/o..." if you copy https://oci.dag.dev/?image=tianon%2Ftest:eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee and try to make it even one single byte bigger, Hub will reject it
00:38:16 Tianon: Replying to "https://github.com/o..." https://iliana.fyi/blog/e98e/ for anyone who isn't familiar with the reference (it's a delightful story about GitHub)
00:51:39 Syed Ahmed: Windows containers
00:57:13 Brandon Mitchell: https://developers.cloudflare.com/workers/platform/limits/#response-limits
01:01:50 Ramkumar Chinchani: https://github.com/pytorch/pytorch/issues/141350
## April 17, 2025
**Recording**: https://youtu.be/Vp8sfMPuqcA
### Attendees:
- Brandon Mitchell
- Jory Burson
- Ramkumar Chinchani
- Sajay Antony
- Jeff Carter
- Samuel Karp
- Syed Ahmed
### Actionable Agenda Items:
None
### Presentation/Discussion Agenda Items:
- Support for other layer media types: <https://github.com/opencontainers/image-spec/pull/1191>
- Rework the PR to focus on whether OCI should support new media types (`manifest.md`)
- Discussion from there can look at how much this improves performance
- More discussion on parallel blob uploads
- Recommendation to open an issue in GitHub to consolidate the discussion
- License annotation usage: <https://github.com/opencontainers/image-spec/issues/1257>
- Reference spec working group: <https://github.com/opencontainers/tob/pull/114>
### Notes:
Notes from the zoom chat:
00:05:53 Brandon Mitchell: https://groups.google.com/a/opencontainers.org/g/tob
00:16:52 Sajay Antony: Hey @Syed, Given the discussion of concurrent upload, there is some interest in folks i talked to in Azure as well.
00:24:09 Samuel Karp: yep, count me in
00:26:21 Syed Ahmed: So far I see LLMs, VM images, libs
00:27:14 Sajay Antony: Yep VM images are also in the mix here.
00:30:29 Syed Ahmed: Yes, agree with the compatibility aspect
00:31:18 Ramkumar Chinchani: overlap with CDN ideas
00:32:14 Syed Ahmed: I’ll create a channel in the dist slack for this
## April 10, 2025
**Recording**: https://youtu.be/SEih1RI7sFA
### Attendees:
- Tianon
- Syed Ahmed
- Jory Burson
- Brian Goff
- Brandon Mitchell
- Sajay Antony
- Derek McGowan
- Mike Brown
- Michael Brown
- Samuel Karp
### Actionable Agenda Items:
- Container Plumbing Days CFP is open, promotions encouraged: <https://groups.google.com/a/opencontainers.org/g/dev/c/lWLddPSeyRU/m/w1KTQ-hLBAAJ>
- _add your items_
### Presentation/Discussion Agenda Items:
- Fixing image-spec badge
- Previous PR was closed: <https://github.com/opencontainers/image-spec/pull/1251>
- Reference spec working group: <https://github.com/opencontainers/tob/pull/114>
- Mailing list spam
- <https://groups.google.com/a/opencontainers.org/g/dev>
- <https://groups.google.com/a/opencontainers.org/g/tob>
- parallel blob upload/download
- Out of order push: <https://github.com/opencontainers/distribution-spec/issues/546>
- Blake3: <https://github.com/opencontainers/image-spec/pull/1240>
- erofs/squashfs: <https://github.com/opencontainers/image-spec/pull/1191>
- dm-verity: <https://docs.kernel.org/admin-guide/device-mapper/verity.html>
- ability to shard a blob into multiple chunks with multiple digests and a map of digests
- Derek: spec should follow an implementation
- Brandon: consider making the chunks into blobs/layers to avoid redesigning registries
- Deferred: Support for other layer media types: <https://github.com/opencontainers/image-spec/pull/1191>
### Notes:
Notes from the zoom chat:
00:18:54 Mike Brown: new KEP that may be semi related https://github.com/kubernetes/enhancements/pull/5097
00:19:41 Derek McGowan: I thought LF moved everything over to that other system
00:20:35 Mike Brown: kep ^ excerpt: “The proposal aims to address the challenge of verifying which registry an image is being pulled from when deploying applications in Kubernetes having multiple image mirrors configured. Currently, users have to manually check the runtime logs to determine which registry was being used, but this approach can be time-consuming and error-prone. The proposed solution seeks to provide transparency by adding a new field in the container status as well as in the image inspect section which provides the details of the registry from where the image is pulled. This would help users to better manage their applications' dependencies, troubleshoot issues related to image availability, and ensure compliance with organization security policies.”
00:20:43 Brian Goff (@cpuguy83): ❤️ the internet
00:38:31 Sajay Antony: @Syed Ahmed can we also call out why we need an API/spec here and why not go down something like QUIC
00:39:26 Tianon (he/him): +1 to Derek ❤️; at the very least, it would help to have a proof of concept that clearly shows the problem, the solution, and how much better, faster, stronger, etc the solution is (and concretely how hard it might be to change other clients/servers to support it)
00:42:06 Sajay Antony: Replying to "@Syed Ahmed can we a..." ok maybe this was a stupid question since multi stream for a single patch isn't in scope.
00:57:05 Tianon (he/him): "For uploads, your updated AWS client automatically calculates a checksum of the object and sends it to Amazon S3 along with the size of the object as a part of the request."
00:57:11 Tianon (he/him): Replying to ""For uploads, your u..." https://docs.aws.amazon.com/AmazonS3/latest/userguide/mpuoverview.html
00:58:42 Brandon Mitchell: "Amazon S3 automatically uses the CRC-64/NVME checksum algorithm."
## April 3, 2025
Canceled for KubeCon EU
## April 1, 2025 (KubeCon EU)
**Recording**: https://youtu.be/FGjZvVR_N38
10am - 11am BST [convert to your timezone](https://dateful.com/time-zone-converter?t=10am&d=2025-04-01&tz2=British-Summer-Time-BST)
Level 1, ICC Prince Regent Room 1
### Attendees:
- Mike Brown
- Samuel Karp
- Antoni Oeja
- Alexander Kanevskiy
- Arnaud Meukam
- Toru Komatsu
- Phil Estes
- Giuseppe Scrivano
- Akihiro Suda
### Actionable Agenda Items:
None
### Presentation/Discussion Agenda Items:
- (@aojea) [Linux Network Devices runtime-spec](https://github.com/opencontainers/runtime-spec/pull/1271)
- Latest version with a more thoroughly explanation of all edge cases and internal details of the proposal
- [runc implementation](https://github.com/opencontainers/runc/pull/4538) with end to end test cases covering the main user stories
- [slides](https://docs.google.com/presentation/d/1Vdr7BhbYXeWjwmLjGmqnUkvJr_eOUdU0x-JxfXWxUT8/edit?slide=id.g2f0d2381f13_0_852#slide=id.g2f0d2381f13_0_852)
- Next steps: introduce container edits in CDI spec and in NRI protocol
- (@kad) Old PRs about RDT:
- [Schemata in spec](https://github.com/opencontainers/runtime-spec/pull/1230)
- [Docs clarification](https://github.com/opencontainers/runtime-spec/pull/1196)
- (@kad) [Linux Memory Policy](https://github.com/opencontainers/runtime-spec/pull/1282)
### Notes:
Notes from the zoom chat:
00:26:29 Arnaud Meukam: https://docs.google.com/presentation/d/1Vdr7BhbYXeWjwmLjGmqnUkvJr_eOUdU0x-JxfXWxUT8/edit#slide=id.g2f0d2381f13_0_852
00:30:48 Phil Estes: https://github.com/opencontainers/runtime-spec/pull/1271
## Archived Meeting Notes
- April 2024 - March 2025: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2024-apr-2025-mar.md>
- April 2023 - March 2024: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2023-apr-2024-mar.md>
- April 2022 - March 2023: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2022-apr-2023-mar.md>
- April 2021 - March 2022: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2021-apr-2022-mar.md>
- April 2020 - March 2021: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2020-apr-2021-mar.md>
- March 2019 - March 2020: <https://github.com/opencontainers/.github/blob/main/meeting-notes/oci-weekly-notes-2019-mar-2020-mar.md>
## Template
## Meeting Date
### Attendees:
- _add yourself_
### Actionable Agenda Items:
- _add your items_
### Presentation/Discussion Agenda Items:
- _add your items_
### Notes:
- _add your notes_