HackMD
  • Prime
    Prime  Full-text search on all paid plans
    Search anywhere and reach everything in a Workspace with Prime plan.
    Got it
      • Create new note
      • Create a note from template
    • Prime  Full-text search on all paid plans
      Prime  Full-text search on all paid plans
      Search anywhere and reach everything in a Workspace with Prime plan.
      Got it
      • Options
      • Versions and GitHub Sync
      • Transfer ownership
      • Delete this note
      • Template
      • Save as template
      • Insert from template
      • Export
      • Dropbox
      • Google Drive
      • Gist
      • Import
      • Dropbox
      • Google Drive
      • Gist
      • Clipboard
      • Download
      • Markdown
      • HTML
      • Raw HTML
      • Sharing Link copied
      • /edit
      • View mode
        • Edit mode
        • View mode
        • Book mode
        • Slide mode
        Edit mode View mode Book mode Slide mode
      • Note Permission
      • Read
        • Owners
        • Signed-in users
        • Everyone
        Owners Signed-in users Everyone
      • Write
        • Owners
        • Signed-in users
        • Everyone
        Owners Signed-in users Everyone
      • More (Comment, Invitee)
      • Publishing
        Everyone on the web can find and read all notes of this public team.
        After the note is published, everyone on the web can find and read this note.
        See all published notes on profile page.
      • Commenting Enable
        Disabled Forbidden Owners Signed-in users Everyone
      • Permission
        • Forbidden
        • Owners
        • Signed-in users
        • Everyone
      • Invitee
      • No invitee
    Menu Sharing Create Help
    Create Create new note Create a note from template
    Menu
    Options
    Versions and GitHub Sync Transfer ownership Delete this note
    Export
    Dropbox Google Drive Gist
    Import
    Dropbox Google Drive Gist Clipboard
    Download
    Markdown HTML Raw HTML
    Back
    Sharing
    Sharing Link copied
    /edit
    View mode
    • Edit mode
    • View mode
    • Book mode
    • Slide mode
    Edit mode View mode Book mode Slide mode
    Note Permission
    Read
    Owners
    • Owners
    • Signed-in users
    • Everyone
    Owners Signed-in users Everyone
    Write
    Owners
    • Owners
    • Signed-in users
    • Everyone
    Owners Signed-in users Everyone
    More (Comment, Invitee)
    Publishing
    Everyone on the web can find and read all notes of this public team.
    After the note is published, everyone on the web can find and read this note.
    See all published notes on profile page.
    More (Comment, Invitee)
    Commenting Enable
    Disabled Forbidden Owners Signed-in users Everyone
    Permission
    Owners
    • Forbidden
    • Owners
    • Signed-in users
    • Everyone
    Invitee
    No invitee
       owned this note    owned this note      
    Published Linked with GitHub
    Like BookmarkBookmarked
    Subscribed
    • Any changes
      Be notified of any changes
    • Mention me
      Be notified of mention me
    • Unsubscribe
    Subscribe
    # Open Container Initative Summit 2021 September 30, 2021 **Recordings:** - https://www.youtube.com/watch?v=loTeOR1mUWg - https://www.youtube.com/watch?v=H03Dtjbmq0k ## REGISTER: https://events.linuxfoundation.org/open-source-summit-north-america/features/co-located-events/#open-container-summit Hybrid event: in person and on Zoom! Zoom link provided at registration Good news, Zoom has a built-in whiteboard Onsite leads: * Sargun Dhillon * Josh Dolitsky * Phil Estes * Samuel Karp * Steve Lasker Onsite Attendance: * Josh Dolitsky * Phil Estes * Samuel Karp * Steve Lasker * Sargun Dhillon Remote Attendance: * Mike Brown (IBM) * Tianon * ASP * Rose Judge * Nisha Kumar * Vincent Batts * Nate Rini (SchedMD) * Aidan Delaney * Giuseppe Scrivano * Mark Peek * Jon Johnson * Kohei Tokunaga * Tomas Aliaga * Michael Brown (AWS) * Brandon Mitchell * Jason Hall (Red Hat) * Samuel Ortiz (Apple) ## Agenda Topics/Agenda for OCI Summit (Thursday, September 30 | 9:00 AM – 5:00 PM Pacific) | Time | Topic | Facilitator | Length (mins) | Slides Link | | - | - | - | - | - | | 9am-9:30am | Kickoff | Phil Estes | 30 | n/a | | 9:30am - 10:30am | Image vNext | Jason Hall | 60 | [slides](https://docs.google.com/presentation/d/1cNlcRingDmBIEIUCc-G5kLq3aPm9UccJCWf0y7bquDY/edit)| | 10:30am - 11:00am | break | | 30 | n/a | | 11:00am - 12:00pm | Confidential Computing | Bursell and Samuel Ortiz | 60 | [Mike Bursell presentation](https://groups.google.com/a/opencontainers.org/g/dev/c/tqNmwGLJfDE) | | 12:00pm - 01:30pm | Lunch | | 90 | n/a | | 01:30pm - 03:00pm | [Artifacts spec](https://github.com/oras-project/artifacts-spec/releases/tag/1.0.0-draft.1) | Steve Lasker | 90 | | | 03:00pm - 03:30pm | break | | 30 | n/a | | 03:30pm - 04:00pm | Overview of SBOMs | Rose Judge | 30 | | | 04:00pm - 04:30pm | [Alternative Filesystem Representations](https://hackmd.io/J6OgGUQLQs2pesQYbeDumA) | Sargun Dhillon | 30| See HackMD | | 04:30pm - 05:00pm | Open Discussion | ? | 30 | n/a | ## Minutes of the day 1220ET - JasonH starting on image-spec vNext (notes taken by Mike and.. ) * three spec (tango) interop.. image,runtime(and runc), distribution * mondays!(for all the commits) * image spec manifesto (stability, compatibility, interop, secure..) * reports of image-spec being frozen are greatly exagerated * new fields/types (outside OCI reserved types?) are not restricted by the spec * deck includes types of changes that could be made, such as further tightenging / loosening of MUST/SHOULD type edicts * request to think about v1.1.0 (non-breaking) discussion about conformance make sure 1.1 does not break 1.0 compliance * for consideration, which oci (and other projects) distribution, runc, runtime, container runtimes, and other oss projects need to move in lockstep with v1.1 image spec * oci artifacts: extending oci image to support "anything?" new types entirely (which may use exixting oci types), and new types that refer to oci types generally as, for example, and exended attribute / artifact of an image 1235ET - discusion/questions * (vb) feature flags, and past conversation on whether SemVer was good for the spec * (nisha) - json blob as a first class citizen * dealing with gross (horizontal) patterns * OCI has avoiding _leading_ the design, and instead _trailing_, but now some changes need the API/semantics to allow for this * * (nate) feature flags were a wreck in OpenGL. SemVer gives a good baseline. * "this is the baseline for compatibility, and everything else is OPTIONAL" * (jason) dist endpoint would/could get features avail but would be unreliable? (Mike: this as opposed to version semantics for a known type) * (josh) and conformance (distribution conformance) needs a feature to make plugable the build tooling used and to enable versioning for which image spec * https://github.com/opencontainers/oci-conformance * https://github.com/opencontainers/distribution-spec/tree/main/conformance * (steve) discovering restrictions to types at/in a registry, and identifing versions of types supported by the registry.. this should be supported at some level by the API.. (jason) perhaps new conformance tests are the way to resolve.. (steve) that might not be a high bar due to unspecified integration points.. (brandon) discovery should be part of each API added if it's needed 1305ET - wrap topic and next steps * (vb) actionable items * disentangle distribution spec from image spec * open milestone for v1.1 versions of the spec(s) * currently just have a "post-v1.0.0" (https://github.com/opencontainers/image-spec/issues?q=is%3Aopen+is%3Aissue+milestone%3Apost-v1.0.0) * identify subjective circular discussions and do our best to close them. * exercise the versioning muscle, prototype the process/practice * (jason) changing the media type from v1 to some other string segment v1.1 or v2 is something in the toolbox (tbd) see types here https://github.com/opencontainers/image-spec/blob/main/media-types.md .. we should be cautious when specifying new types esp. manifest types * (steve) possible new types and other topics to also be discussed later today * (jason) concerning, it is, that we have not yet exercised the versioning muscle (added to actionable items) example change that would hurt: moving from sha256 to 512 or other disgest encoding * (vb) this sounds like an _ideal_ use-case for a working-group to walk through this example, its impact, and changes/solutions needed 1400ET - Condidential Computing Presentation * encrypted memory pages (hardware/bios/system host level impls) * Attestation (hard issues, who attests, where is it managed (local/remote), where do the images come from, who loads them, are they encrypted, signed) * Trusted Execution Environments (TEE) * What are the units of isolation.. pod/container (or tenant?) * (samuel ortiz) Goal.. don't trust the host at "any" level * Challenges include Container Images, vsock, and Guest Agent and Kernel * Remove container host from TCB, encrypted images directly to guest * restrictions * (side-car containers on a pod (and epherimal debug)) * workloads and k8s apis that will not work (mounts) * crd/operators * layer duplication * (Mike) kubernetes resource and container image cache model will need significant scrubbing for CC * Confidential Containers slides: https://docs.google.com/presentation/d/1xKHsYA8mSRAo-MgWFh8MGW2K80ZcpRWYBeAURA9nLG8/edit?usp=sharing 1630ET - Artifacts Spec * Showing need for artifacts for SBoMs and Signatures (as a general refers pattern for adding metadata in a new artifact that refers to a container image, or possibly other artifact media type) * (Jason) Could an improved tag list help with tag polution? (Steve) Hopefully * (Michael AWS) is there concensus/momentum to do an updated oci image/dist spec to add some new artifacts manifest type(s) and refers api.. only positive responses were made toward solving these desires * Question how do I know the metadata associated with an image hasn't been modified (signature meta, digest, other solns could be used against the metadata/manifest) * (Brandon) Is there a preference from OCI on either adding a new type vs extending the OCI image-spec? * (Phil) Ask the OCI TOB to vote on the working group. * With CAS today, people cannot easily modify an existing object referenced by a digest, but reference types would allow anyone with repo write access to modify the data associated with anyone else's manifest. Perhaps that use case could be handled by creating an index that includes the manifest and associated artifacts. ### Parking Lot Topics for discussion, without interupting the current discussion - Annotations - should there be a lenght limit, to be able to index at a later time? Is this the time to do it, as annotaitons aren't used much today. Likely not used because there's no index/use cases across implementations - Capabilities APIs - good/bad indifferent - suggesting registries impose limits on manifest sizes ([#260](https://github.com/opencontainers/distribution-spec/issues/260)) - Should there be an ability to namespace the tag listing to the media type? ## Proposals (Archived) Please add a row below if you have a topic to cover. Once we have a complete list, we'l slot things in the schedule above. Please state any time constraints (for example, *I'm in UK, don't schedule me a 2am*) Please add :+1: (name) to a topic youd like to discuss, even if there's no facilitator. | Topic | Facilitator | Length (mins) | Votes/Interests| | - | - | - | - | | Runtime | ? | ? | | | Use Cases of OCI | ? | ? | | | Artifacts Grooming | ? | ? | | | Distribution Issue/PR Grooming | ? | ? | | | Image Issue/PR Grooming | ? | ? | | | Moving Foreign Layers to _reserved for backwards compat_ | Steve | 15 | | | Entitlement & IP for containers | Steve | 15 | | | [Decoupling location from the artifact](https://stevelasker.blog/2020/10/21/is-it-time-to-change-default-registry-references/) & <br> more info: [Enabling Artifact CLIs to Reference Environment Specific Registries Through Configuration](https://github.com/SteveLasker/drafts/blob/main/registry-repo-config.md) | Steve | 30 | | Show & Tell | ? | ? | |

    Import from clipboard

    Advanced permission required

    Your current role can only read. Ask the system administrator to acquire write and comment permission.

    This team is disabled

    Sorry, this team is disabled. You can't edit this note.

    This note is locked

    Sorry, only owner can edit this note.

    Reach the limit

    Sorry, you've reached the max length this note can be.
    Please reduce the content or divide it to more notes, thank you!

    Import from Gist

    Import from Snippet

    or

    Export to Snippet

    Are you sure?

    Do you really want to delete this note?
    All users will lost their connection.

    Create a note from template

    Create a note from template

    Oops...
    This template is not available.


    Upgrade

    All
    • All
    • Team
    No template found.

    Create custom template


    Upgrade

    Delete template

    Do you really want to delete this template?

    This page need refresh

    You have an incompatible client version.
    Refresh to update.
    New version available!
    See releases notes here
    Refresh to enjoy new features.
    Your user state has changed.
    Refresh to load new user state.

    Sign in

    Forgot password

    or

    By clicking below, you agree to our terms of service.

    Sign in via Facebook Sign in via Twitter Sign in via GitHub Sign in via Dropbox Sign in via Google

    New to HackMD? Sign up

    Help

    • English
    • 中文
    • Français
    • Deutsch
    • 日本語
    • Español
    • Català
    • Ελληνικά
    • Português
    • italiano
    • Türkçe
    • Русский
    • Nederlands
    • hrvatski jezik
    • język polski
    • Українська
    • हिन्दी
    • svenska
    • Esperanto
    • dansk

    Documents

    Tutorials

    Book Mode Tutorial

    Slide Mode Tutorial

    YAML Metadata

    Contacts

    Facebook

    Twitter

    Feedback

    Send us email

    Resources

    Releases

    Pricing

    Blog

    Policy

    Terms

    Privacy

    Cheatsheet

    Syntax Example Reference
    # Header Header 基本排版
    - Unordered List
    • Unordered List
    1. Ordered List
    1. Ordered List
    - [ ] Todo List
    • Todo List
    > Blockquote
    Blockquote
    **Bold font** Bold font
    *Italics font* Italics font
    ~~Strikethrough~~ Strikethrough
    19^th^ 19th
    H~2~O H2O
    ++Inserted text++ Inserted text
    ==Marked text== Marked text
    [link text](https:// "title") Link
    ![image alt](https:// "title") Image
    `Code` Code 在筆記中貼入程式碼
    ```javascript
    var i = 0;
    ```
    var i = 0;
    :smile: :smile: Emoji list
    {%youtube youtube_id %} Externals
    $L^aT_eX$ LaTeX
    :::info
    This is a alert area.
    :::

    This is a alert area.

    Versions

    Versions and GitHub Sync

    Sign in to link this note to GitHub Learn more
    This note is not linked with GitHub Learn more
     
    Add badge Pull Push GitHub Link Settings
    Upgrade now

    Version named by    

    More Less
    • Edit
    • Delete

    Note content is identical to the latest version.
    Compare with
      Choose a version
      No search result
      Version not found

    Feedback

    Submission failed, please try again

    Thanks for your support.

    On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?

    Please give us some advice and help us improve HackMD.

     

    Thanks for your feedback

    Remove version name

    Do you want to remove this version name and description?

    Transfer ownership

    Transfer to
      Warning: is a public team. If you transfer note to this team, everyone on the web can find and read this note.

        Link with GitHub

        Please authorize HackMD on GitHub

        Please sign in to GitHub and install the HackMD app on your GitHub repo. Learn more

         Sign in to GitHub

        HackMD links with GitHub through a GitHub App. You can choose which repo to install our App.

        Push the note to GitHub Push to GitHub Pull a file from GitHub

          Authorize again
         

        Choose which file to push to

        Select repo
        Refresh Authorize more repos
        Select branch
        Select file
        Select branch
        Choose version(s) to push
        • Save a new version and push
        • Choose from existing versions
        Available push count

        Upgrade

        Pull from GitHub

         
        File from GitHub
        File from HackMD

        GitHub Link Settings

        File linked

        Linked by
        File path
        Last synced branch
        Available push count

        Upgrade

        Danger Zone

        Unlink
        You will no longer receive notification when GitHub file changes after unlink.

        Syncing

        Push failed

        Push successfully