►
From YouTube: Implementations Sync: 2020-09-10
Description
* Release Planning
* Image name defaults
B
C
A
Are
we
expecting
anyone
else
we're
ready
to
get
started?
I
know
of
the
people
usually
come.
Natalie
is
out
today.
B
A
All
right,
let's
get
started,
then
is
everyone
mostly
signed
in
no
new
faces
status
updates?
A
I
can
go
first
because
it'll
be
very
short,
because
I
really
haven't
done
much
on
the
life
cycle
since
the
last
time
I
talked
to
you
all,
because
I
was
spring
one
last
week,
I'm
also
going
to
be
mostly
busy
with
non-direct
cnb
project
work
this
week,
just
to
give
everyone
a
heads
up.
C
I
guess
I
can
go
next,
I'm
working
with
joe
on
kind
of
getting
a
rough
implementation
of
stack,
build
packs,
so
moving
that
along
fixing
some
windows,
things
here
and
there
and
so
continue
pushing
forward
on
that
really.
At
this
point,
I
think
we're
going
to
try
to
do
the
build
plan,
stuff
and
kind
of
scope
that
out
and
see
how
that
feels
after
the
discussions
yesterday.
B
A
Cool
anyone
else.
B
A
That's
a
nice
segue,
I
think,
directly
into
release
planning,
because,
thanks
to
everyone's
hard
work
and
our
willingness
to
kick
stuff
out
to
future
releases,
I
think
we're
ready
to
ship
up
patch
as
soon
as
we
finish
up
moving
over
the
release,
automation
that
yeah
I
was
just
talking
about-
so
I
haven't
gotten
a
lot
of
no
one's
really
clamoring
for
this
one,
but
I
think
we
should
ship
it
as
soon
as
the
new
automation
is.
A
Ready
into
future
topics,
I've
copied
down
this
lifecycle
topic,
so
I
was
assuming
this
was
intended
for
the
implementation
meeting
rather
than
the
platform
meeting,
but
I
didn't
necessarily
put
it
here.
Does
anyone
in
this
meeting
want
to
talk
to
this.
D
Yeah,
I
I
put
it
there
and
you
are
correct
that
it
is
for
implementation.
This
came
up
today
within
our
vmware
stand
up
in
regards
to
the
pr
that
is
linked
there
and
it
talks
about
how
the
user
and
pack
have
like
this
kind
of
you
know
preconceived
notion
of
assumptions
of
defaults.
That
should
be
there
and
in
part
of
that
discussion,
I
think
one
of
the
things
that
came
up
to
light
was
the
fact
that
these
defaults
there's
no
like
real
contract
around
them.
D
So
when
we
send
out,
you
know,
like
a
very
simplified
image
name
like
my
app,
there
are
a
couple
things
that
ggcr
is
doing
for
us,
which
is
adding
the
default
domain,
a
library
I
believe
in
some
cases,
and
then
the
latest
tag,
but
I
do
know
that
there's
other
tooling
in
the
ecosystem,
like
container
d
and
some
other
platforms
that
do
not
do
this
automated
defaulting
to
docker
hub
specific
stuff.
D
On
the
lifecycle
side
of
things
as
one
of
the
long-term
solutions,
or
do
we
want
to
like
codify
this
default,
behavior
that
we're
inheriting
from
ggcr
in
a
spec,
because
I
think,
when
I
think
about
like
you,
know
this
interface
between
the
platform
and
the
lifecycle.
A
It's
an
interesting
question.
I
feel
like
the
reason
2gcr
does.
It
is
because
docker
demon
does
it
right.
So
if
you're
building,
if
like
one
of
our
build
targets,
is
a
docker
demon.
A
And
then
you
docker
pull
or
push
those
images.
Those
defaults
are
getting
applied,
so
in
some
ways
it
makes
sense
to
treat.
I
think
either
treat
remote
images
the
same
way
the
demon
will.
So
it's
consistent
or
I
guess
the
other
option
is
make
people
be
completely
explicit,
all
the
time
and
always
include
a
registry,
but
that
might
throw
some
docker
users
off
right.
D
Right-
and
I
think
that's
where
the
the
question
comes
in
of
maybe
the
difference
between
the
life
cycle
as
like
an
internal
component,
that
platforms
talk
to
and
then
platforms
that
then
provide
a
you
know
nicer
experience
in
a
way
right.
I
guess
very
similar
to
you
know
how
the
docker
for
mac
or
the
dr
daemon
would
create
some
sort
of
assumptions,
but
container
d,
which
is
used
underneath
it
doesn't
have
those
assumptions
right
and
then
to
speak
to
gtcr.
D
I
also
linked
it
on
there.
The
there
is
a
setting
when
we
do
the
parse
reference,
where
right
now
we're
using
the
weak.
D
So
I
think
ggcr
enables
both
you
know
to
be
supported,
so
I
don't
know
speaking
to
like
why
they
did
it.
You
know,
but,
but
there
is,
that
option
there
as
well.
D
So
I
think,
to
reiterate,
the
ask
is
one
of
two
things
that
we'd
like
to
see
the
contract
between
platform
and
lifecycle,
to
explicitly
say
that
these
defaults
are
going
to
be
taken
into
effect.
A
From
a
cleanliness
perspective,
I,
like
the
latter,
I
don't
love
these
docker
hub,
specific
defaults,
but
I
do
wonder
if
it's
you
know,
for
the
sake
of
intellectual
consistency,
we'll
be
abusing
our
users
if
we
got
rid
of
them,
because
most
people
are
used
to
being
able
to
say
their
docker
hub
like
I'll,
say,
ekc
my
run
image
and
expect
it
to
work,
and
if
we
force
people
to
put
index
that
docker
io
in
there
when
they
don't
have
to
do
that
in
kubernetes.
D
So
within
the
kate's
ecosystem,
given
that
a
lot
of
these
tools
don't
default,
do
they
actually
default
if
you're
trying
to
run
an
image.
C
Yeah,
I
think
defaulting
it
and
documenting.
It
seems
like
that
yeah.
I,
like
the
cleanliness
of
passing
full
reference
all
the
time,
but
I
feel
like
that's
sort
of
a
yeah.
I
don't
know
I
stepped
too
far
for
folks
who
are
getting
used
to
it
and
used
to
kubernetes.
B
D
You
know
the
fact
that
it
just
always
defaulting
to
drug,
but
but
I
see
the
the
usefulness
from
my
user's
perspective,
but
I
think
that's
why
I
would
ultimately
like
a
very
small
inclination,
is
to
just
rely
on
the
platforms
to
create
that
default.
D
A
Other
other
platforms,
like
I
know
right
now,
pack
actually
does
explicitly
expand
the
reference
ramp
before
passing
it
in
I
know
kpec
doesn't,
but
the
results
are
the
same
because,
as
you
said,
lifecycle
has
the
defaults
built
in.
D
Yeah
and
that's
ultimately,
what
we
were
trying
to
resolve
here-
and
this
is
where
we
landed
on
this-
you
know
preconceived
notion
or
assumption
that
we're
both
making
is
that
ggcr
is
doing
this
for
us
or
being
used
in
both
places.
A
D
Yep,
okay,
that
sounds
good.
I
guess
what
are
the
next
steps?
Are
we
just
creating
a
pr
to
define
the
world
that
that
exists
right
now
without
having
to
go
through
the
rfc
process?.
A
D
Cool,
maybe
we
could
get
the
spec
thing
out
there
and
then,
if
core
team
pushes
back,
we
could
go
to
the
rfc.
D
Yeah,
I
could
do
that
and
then
I'll
see
if
anybody
on
the
vmware
side
of
things
wants
to
pick
it
up.
Take
it
on.
A
A
C
Yeah,
I'm
still
trying
to
catch
up
with
joe
here
a
bit.
I
think
he's
going
to
kind
of
describe
what
he
thinks
he
wants
to
do
with
the
build
plan.
I
think
he
was
he
was
running
into.
I
think
his
current
path
forward
is
to
kind
of
pre-pin
the
stack
packs
into
all
the
different
groups
before
running
it.
Instead
of
sort
of
treating
it
like
its
own
step,
and
then
I
guess
remove
those
at
the
end,
I
think
he
might
have
been
running
some
currency
things
and
so
I'm
sure
there'll
be
some.
C
There
may
be
some
questions
around
how
to
get
this
done
in
a
easy
to
maintain
manner,
but
we'll
we'll
see
how
it's
going.
It's
a
bit
early,
I
think,
to
to
call
out
for
help
make
sense.
A
I
want
to
read,
through
those
updated
rc's,
a
very
practical
question
sort
of
about
the
experimental
work
on
stackpacks.
What
do
we
think
is
the
plan
for
seems
like
there's
a
desire
to
merge
it.
Let
people
use
it
experimentally,
maybe
even
before
we've
defined
it
all
in
the
spec.
A
C
Yeah,
I
I
don't
know
what
joe's
plan
is,
but
I
thought
the
assumption
was
we're
just
sort
of
getting
a
head
start
and
kind
of
conforming
to
the
rc's
as
they
change
and
if
any
of
the
rfcs
kind
of
land,
then
we
would
merge
that
piece
of
it
potentially
right.
A
C
Stuff
in
in
this
current
pr,
so
there's
a
chance
that,
like
as
long
as
the
people
are
generally
kind
of
happy
with
the
mix
and
stuff,
then
maybe
stack
build
packs
as
a
feature
without
the
mix
in
would
be
merged
in
and
and
once
the
once
the
rfc
for
that
is
particularly
improved.
C
Don't
think
so
because
I
think
the
main
the
main
use
case
for
using
this
is
sort
of
the
certificate
stuff
right
now
like
we
don't
actually
have
an
internal
use
for
stack,
build
packs
right
now
and
so
like
our
desire
to
get
this
through,
is
mostly
just
for
like
the
project
itself,
and
so
I
think,
obviously
I
know
ben
and
others
have.
C
A
I
do
wonder
if
I'm
like
worried
about
right
now.
We
haven't
made
a
lot
of
other
large
changes
since
this
work
started
and
worried
about
selling
you
guys
with
a
really
gnarly
emerge
conflict.
If
something
larger
came
up,
this
could
be
an
opportunity
to
like,
even
though
we're
not
going
to
expose
this
to
users,
merge
it
in
behind
a
feature
flag.
So
no
one
can
use
it
just
to
make
your
lives
easier,
but
maybe
we're
not
at
that
point
yet
because
it's
not.
C
A
C
Yeah
emerging
sounds
like
a
huge
pain
just
keeping
up
with
it
already
is
already
sort
of
painful,
and
we
haven't
really
tried
to
merge
from
from
maine.
I
don't
think,
especially
when
you're
messing
with
concurrency
code,
potentially
yeah
yeah,
maybe
I'll
bring
that
up
with
joe
today
and
see
if
he
wants
to.
If
we
want
to
kind
of
gate
gate
all
this
work
behind
a
feature
flag
and
see
where
that
gets
us.
Maybe.