►
From YouTube: Implementations Sync: 2021-05-06
Description
Meeting notes: https://bit.ly/38pal2Z
A
Okay,
so
recording
the
meeting,
let's
go
ahead
and
give
status
updates.
I
can
start.
I
did
not
write
any
code
for
the
life
cycle
or
image
until
this
week,
but
I've
been
keeping
my
eye
on
some
stuff
that
came
in.
We
participated
in
the
bug
bash
for
this
q.
Con
this
week
got
a
few
prs
to
image,
util
from
that
which,
like
in
process
of
being
reviewed
and
hopefully
merged,
not
too
much
else
exciting.
To
share
from
my
side.
B
C
D
Because
we
were
seeing
some
of
those
registry
failures,
I
was
looking
at
the
replacing
the
registry
with
something
that
wasn't
docker
network
dependent,
as
somebody
saw
to
you
over
in
image
detail,
there's
a
pr
up
for
it,
but
it
does
seem
like
that.
Alternative
registry
is
behaving
all
differently,
so
still
still
turning
away
at
that,
I
can
put
that
on
the
agenda
as
a
discussion
topic.
If
y'all
have
any
more
thoughts
about.
C
A
If
not,
we
can
move
on
to
release
planning.
I
don't
know
if
anybody
saw
the
pr
to
you
image
util,
but
juan
bustamante,
who
is
a
new
member
of
the
cnb
contrib
team
at
vmware,
put
up
a
pr
in
image
util
to
fix
a
bug
with
our
retry
logic.
When
we
get
an
eof
error,
we're
always
retrying,
even
when
the
error
is
nil,
so
the
the
consequence
of
that
is
adding
300
milliseconds
to
every
successful
pull,
which
seems
bad,
and
I
think
we
should
cut
a
patch
for
that.
A
Actually,
when
we
can
just
share,
we
have
something
common
to
look
at.
You
can
all
see
this
right.
A
I
think
dan
correct
me
if
I'm
wrong,
but
I
think
pack
is
like
almost
ready
to
ship
in
a
new
release.
Is
that
correct.
F
A
So
I
guess
that
that
was
the
only
thing
that
came
to
my
mind.
That
would
would
go
in
this
patch
unless
anybody
else
has
an
idea.
Look
at
the.
C
A
All
right
so
we're
in
agreement
that
we
should
fix.
We
should
we
should
ship
a
patch
release.
I
guess
maybe
it
makes
sense
to
also
talk
about
the
next
milestone,
which
I
guess
is
covered
by
this
stackpacks
phase.
One
issues
I
think,
as
jesse
said,
we
have
a
pr
up
for
this
one
and
mark
t
from
red
hat
said:
he'd
be
looking
at
this
one.
B
C
B
Yeah,
you
can
send
me
whichever
one
as
well
one
of
the
last
two
that
don't
have
a
face
on
it.
I
may
not
be
able
to
get
to
it
next
week,
just
fyi,
but
if
I
can
I'll
do
it.
A
Dan,
I
feel,
like
you,
have
some
like
good
knowledge
of
mix-ins.
Is
that
would
you
be
up
for
this
one.
F
I
don't
know
about
good
knowledge,
but
I'm
happy
to
learn.
Give
it
to
me
all
right
I'll,
be
happy
to.
F
A
The
only
other
comment
that
I'll
make
about
these
issues.
I
let
me
know
if
you
disagree,
but
for
this
one
validating
the
registry
credentials,
we
we
had
reports
from
from
from
users
of
tecton,
and
I
saw
in
my
own
experience
that
the
current
way
that
the
life
cycle
is
checking
to
see
if
it
has
an
off
is
very
brittle.
A
So
if
you
forget
the
trailing
slash
at
the
end
of
your
registry
url,
it
all
breaks-
and
I
wonder
if
it's
worth
like
you
know-
maybe
sneaking
in
a
fix
possible
fix
for
that
with
this
issue,
I
don't
want
to
delay
again.
Stackpacks
is
our
top
priority,
but
while
we're,
while
we've
got
that
code,
you
know
all
in
our
context.
C
B
C
A
All
right,
so
this
this
is
nice.
We
have
faces
on
every
issue
which
is
exciting.
A
There
are,
there
is
one
actually
we
should
probably
address
this
there's
one
spectax
issue
that
has
a
needs
discussion
tag
on
it,
given
that
rt
is
looking
at
it.
Maybe
we
should
just
try
to
resolve
whatever
uncertainty
might
be
there,
and
I
think,
if
I'm
not
mistaken,
the
question
was
the
format
of
analyzed
pommel,
but
I
think
that's
been
resolved
by
the
spec
pr.
So.
B
A
Yeah
jesse,
do
you
mind
taking
this
one
like
commenting?
Okay,
awesome,
thank
you
and
I
think
if
we
just
ignore
the
other
stackpack
ones,
for
now,
we
were
kind
of
leaving
this
one
open
because
of
the
ongoing
exploration
around
build
kit.
A
I
don't
know
if
everyone
saw
eric's
presentation
last
was
it
last
thursday,
thursday,
before
it
was
great?
I
personally
am
now
finding
it
difficult
to
keep
in
my
head
all
of
the
open
questions
and
possible
enhancements
to
the
poc
that
we
identified.
A
So
we
were
thinking
about
reaching
out
to
eric
and
asking
him
if
he'd
be
open
to
like
opening
a
few
issues
on
his
repo
to
keep
track
of
them,
so
that,
like
discussion,
more
targeted
discussion
around
specific
things
could
be
had.
You
know
versus
like
this
very,
very
long
single
issue
in
pack.
E
A
C
E
B
Yes,
I
know
that
was
the
build
kit
example
was
really
good.
The
demo
of
that.
I
really
look
forward
to
doing
that.
I
think
we've
got
some
challenges
to
solve
like
around
caching
and
stuff,
but
the
it
was
super
exciting
to
see
how
easy
that
could.
A
Be
I
don't
mind,
adding
a
comment
to
the
last
response
from
eric
on
that
pac
issue
like
you
know,
inviting
him
to
write
an
rfc,
and
this
is
something
that
we
talk
about.
You
know
maybe
in
like
a
small,
I
don't
know,
we've
had
conversations
side
conversations
on
our
team,
but.
A
E
I
think
there's
like
two
ways:
we
could
approach
this
in
my
mind,
just
footballing
here
like
we
either
written
rfc
that
sort
of
describes
what
we
want.
The
whole
bill
k
thing
to
look
like
in
the
end
right
and
then
either
re-implement
it
basically
or
take
his
implementation
and
change
it
and
then
contribute
it.
E
I
think
the
other
thing
would
be
now
that
we've
approved
the
rfc
for
component
level
contributions
like
maybe
we
want
to
talk
with
him,
but
whether
he
wants
to
contribute
what
he
has,
and
you
know
we
can
throw
a
big
disclaimer
at
the
top.
That's
like
this
is
a
work
in
progress,
and
then
we
could
write
an
rfc
with
him
for
how
to
evolve
it
to
do
all
the
things
in
the
spec.
B
Third
approach
we
could
take
is
because
this
already
exists.
He
could
we,
we
could
create
library
methods
only
for
this
without
changing
the
spec
or
the
rfcs,
like
lifecycle
doesn't
have
to
like
he's,
not
calling
the
lifecycle
binaries
to
do
the
export.
B
So
we
could
make
helper
methods
that,
like
wrap
up
some
of
the
functionality
that
he's
having
to
duplicate
and
and
the
only
consumer
would
be
this
build
kits
project
for
now,
like
you
know,
just
start
supporting,
you
know
integration
through
the
through
the
library
itself
that
isn't
spec
in
rfc
or
anything.
It
might
allow
us
to
kind
of
experiment
with
with
this,
and
he
could
put
submit
pull
request
against
it
to
change
behavior
or
whatever.
If
we
need
to
be.
E
E
A
E
B
I
liked
the
idea
of
starting
to
fail
aggressively
here
so
that
we
could
come
to
a
solution,
because
I
also
I
my
instinct
tells
me
to
build
right
is
not
what
we
would
pick
if
we
were
designing
it
from
the
ground
up,
and
so,
if
we
were
already
disallowing
this,
then
I
think
we
would
have
already
come.
B
You
know
like
we
could
add
a
flag
in
to
allow
that
behavior,
like
the
old
legacy
behavior
or
something
like
that,
but
start
aggressively
disallowing
it
by
default.
Regarding
to
other
layers.
E
That
makes
sense
to
me.
I
know
joe,
is
concerned
about
breaking
build
packs,
but
I
think
we
could
aggressively
disallow
it
for
build
packs
that
implement
a
new
api
like
we
can
make
some
sort
of
cut
off,
so
we're
not
breaking
old,
build
packs,
but
there's
no
upgrade
path
anymore,
and
then
you
have
to
adapt
to
the
new.
E
I
think
that
would
cause
problems
that
we
probably
don't
want
to
do
and
also,
I
think,
the
way
the
spec
is
written
right
now,
it'd
be
impossible
to
just
start
enforcing
it,
like
you'd
need
to
do
something
like
what's
laid
out
here,
where
you
basically
tar
up
the
layers
during
the
build
phase
and
then
pass
them
to
the
exporter.
That
would
require
some
reimagining
of.
B
I
can't
say
that
I've
had
a
lot
of
experience,
building,
build
packs
that
write
to
other
build
packs
layers.
It's
not
something
that
I've
myself
had
to
do,
but
the
use
case,
I
guess,
makes
sense
from
like
a
micro,
build
pack
perspective
of
things
that
like
to
be
co-located
or
have
to
be
co-located.
I
guess
because
yeah
the
invars,
like
solve
most
of
the
problems
for
anything
that
I've
dealt
with
like
you,
could
just
sort
of
keep
passing
that
along
and
append
it
and
do
what
you
need
to
do.
B
A
E
Yeah,
not
every
set
of
build
bags,
takes
the
responsibility
of
making
a
100
accurate
bomb
seriously,
and
that's
fine,
because
I
it's
an
optional
part
of
the
spec
right,
but
I
do
think
we
should
set
up
the
api
such
that
a
bill
pack
that
wanted
to
take
that
seriously
had
the
hooks
that
it
needed
to
do
it
right.
B
Yeah,
I
don't
think
any
of
our
bill
packs
even
produce
a
bomb
right
now,
at
least
not
a
lot
of
them
yeah
I
mean
that
the
one
thing
that
worries
me
about
the
build
right
flag
is
that
it.
It
basically
has
to
be
your
like
android
sdk,
build
pack.
That
does
that,
so
it
sort
of
stifles
integration
for
like
a
bill
pack
that
maybe
doesn't
even
know
that
that's
a
flag
that
they
could
set
to.
Let
other
bill
packs
do
it.
B
E
The
reason
I
sort
of
brought
this
one
up
as
the
rfc
I
want
to
talk
about
because
well
personally,
I
haven't
run
into
this
problem
in
the
bill.
Packs
I've
written,
but
the
examples
do
make
sense
to
me,
but
I
think
the
solution
here,
I
don't
don't
love.
B
B
I
want
that
particular
you
know
kanako
snapshot
of
like
the
layer
when
it's
done
with
the
yeah,
when
the
first
build
pack's
done
so
that
you
could
apply
it
over
and
then
you
know,
maybe
there
needs
to
be
the
ability
so
that
that
bill
pack
knows
that
someone
modified
something
for
cash
busting
reasons,
but
that
sounds
super
complicated.
I'm
not
really
sure
how
you
can
reliably
deal
with
cache.
If
someone
else
is
right
into
your
layer,
you
won't
have
all
the
information.
B
Yeah,
that's
the
only
safe
way
I
see
like
actually
doing
the
overlay
stuff
is
like
one
of
the
only
ways
to
like
completely
safely.
Do
it,
or
at
least
take
a
snapshot
before
still
leave
the
code
there
and
then
like
snapshot
again
and
then
like
diff
them
like
with
just
tarball
diffs
or
something,
but.
E
I
think
I
also
feel
like
they
need
to
go
in
a
different
place
like
I
don't
like
the
idea
of
them
being
the
normal
build
packs
layer
which
really
isn't
supposed
to
be
a
workspace
that
downstream
build
packs,
know
about
and
like
yes,
environment
variables
can
make
it.
So
you
don't
need
to
know,
but
if
you
want
downstream
build
packs
to
then
like
contribute
metadata
for
their
diff
or
something
like
that,
they
they
will
need
to
know
some
things
about.
The
fact
that
this
is
a
layer
that
they're
contributing
to
an
insured
environment
right.
A
I
think
I
found
steven's
suggestion
for
preventing
the
shared
layers
from
being
exported
to
be
compelling.
A
B
It
seems
from
an
audit
perspective.
It
seems
really
odd
to
like
allow
someone
to
modify
someone
else's
layers
right
because
you
just
won't
know
like
you
know,
you
look
at
the
image
and
it
looks
like
it's
just
by
android,
sdk
and
you're
like
oh.
They
committed
this
really
suspicious
file
and
really
it's
like
build
pack
x
from
like
10
bill
packs.
B
A
E
E
A
You
know
kind
of,
like
is
sort
of
a
like.
I
almost
want
us
to
align
these
two
right.
If
we
like
end
up
adding
shared
layers
directory
or
something
like
that
that
changes
you
know
it,
they
should
be
compatible.
E
Yeah,
I
sort
of
started
writing
up
that
comment
just
to
think
through
it
myself
to
see
if
it
was
possible
to
still
support
all
the
api
combinations
we
do
now,
because
another
option
is
just
like
we
say:
no,
we
won't
run
this
combination
vps,
but
that's
really
hard
on
end
users,
but
in
writing
it
up.
It
did
seem
like
it
was
all
possible.
A
A
All
right,
if
there
are
no
more
comments
on
rc's,
we
reached
the
end
of
our
standing
agenda.
Like
I
know
you
mentioned
the
image
you
tilt
things.
Do
you
want
to
talk
about
that.
D
D
The
preface
or
I
guess
the
one
liner
is
that
oh
yeah,
let
me
get
that
sorry,
pull
it
up.
First,
okay,
here
we
go
the
way
that
imageuto
deletes
from
registries
behaves
differently
on
different
registries.
C
D
And
I'll
jump
over
to
this,
so
I
put
together
a
very
poor
approximation
of
what
imageytil
does
for
image
remote
delete
just
doing
ggcr
libraries.
This
is
obviously
not
a
complete
main
go,
but
it
basically
takes
a
name.
Reference
result
takes
the
digest
and
then
makes
a
new
reference
for
it
and
then
tries
to
delete
it
based
off
of
the
repo
name
in
the
digest,
ignoring
the
tag
and
the
response
from
each
registry
is
different.
D
So
I
just
just
doing
a
go
around
of
this
main:
go
with
some
more
harness
around
it,
making
a
brand
new
image
on
gcr
and
then
deleting
it
by
digest,
at
least
for
gcr.
D
It
leaves
the
image
manifest
there,
as
the
hypothesis,
at
least
for
me,
there
is
that
I
guess
that
it
does
return
a
dangling,
manifest
tag
response,
but
yeah
the
manifest
is
still
there,
which
is
weird
when
you
try
to
query
it
by
the
name
again,
the
ggcr,
the
test
registry,
the
thing
that
we
I'm
experimenting
with
on
that
pr
does
the
same
thing
as
gcr.
D
Harbor
does
actually
delete
the
image
and
returns
no
response,
except
it
gives
you
back
a
not
found.
Docker
distribution
just
running
a
local
one,
not
the
docker
hub,
because
it
doesn't
allow
any
deletions.
D
So
all
this
is
a
little
perplexing
to
me
wondering
if
y'all
spot
anything
strange,
I
might
be
doing
maybe
missed
copying
the
implementation
or,
if,
if
y'all
yeah,
I
don't
know,
I'm
also
happy
to
just
keep
digging
into
it.
This
is
just
interesting
stuff.
I
stumbled
on
so
far
may.
C
I
ask
a
quick
question:
how
did
you
figure
out
that
this
is
the
I
mean?
How
do
you
start
working
on?
This
did
something
happen,
and
then
you
saw.
D
Yeah
well,
I'm!
Well
I'm
grateful
for
jesse.
He
was
doing
a
review
of
the
image
util
pr
that
I
put
up
there
and
he
spotted
that
it
was
actually
meaningful,
and
this
was
the
pr
to
change
from
docker
distribution
to
the
gcr
registry
for
our
tests.
Motivation
for
that
has
been
really
work
around
all
the
docker
networking
problems.
We've
had
so
there's
one
thing
that
I
ended
up
changing
that
test
that
actually
was
significant.
D
The
response,
their
response,
when
you
there's
absolutely
nothing
in
the
registry,
the
air
response
from
the
different
registries.
When
you
try
to
delete
something,
is
different.
It
says
name
unknown
from
gcr
and
manifest
unknown
from
docker
distributions
like.
D
E
D
B
E
So
I
think,
deleting
by
tag
should
be
supported
by
most
repos.
It
may
not
lead
to
you
deleting
the
underlying
image
or
just
deleting
the
tag
that
points
at
it
and
some
registries
don't
support
deleting
the
underlying
image,
but
instead
rely
sort
of
on
like
garbage
collection
policies.
So
registry
is
like
artifactory,
like
you're,
never
going
to
go,
delete
an
image
instead,
you're
just
going
to
delete
tags
and
periodically
it's
going
to
clean
up
dangling
images.
E
So
I
wonder
if
we
should
be
what's
interesting,
is
I
think,
the
way
we
use
this
in
a
live
cycle
like
just
very
specific
to
our
use
case,
not
like
image
util
as
a
whole
concept
is
that
we
use
it
for
the
cash
image
like
we
create
a
new
one,
and
then
we
delete
the
old
one,
but
when
we
create
the
new
one,
we
move
the
tag
that
was
on
the
old
one.
B
Is
that
is
that
really
a
life
cycle
problem,
like
I
kind
of
feel
like
that's?
That's
your
registry
choice
problem.
If
deleting
a
tag-
and
I
don't
eventually
clean
it
up
that
seems
like
I
mean
I
guess
it
would
be
a
good
citizen
move
to
do
it
the
way
we're
doing
it,
but
I'm
not
really
yeah.
I
don't
feel
too
strongly
that
we
should
be
doing
that
anyway.
E
Like
we
could
just
stop,
it
gets
kind
of
annoying
in
docker
with
pack-
I
guess
like
if
you're
using
a
local
registry
or
something
right,
but
I
guess
most
people
using
the
demon
in
that
case.
B
E
D
C
B
Tag
or
deleting
a
tag,
if
it's,
if
it's
consistent,
because
if
it.
C
E
D
It's
worth
noting
docker
distribution
does
throw
an
air.
If
you
try
to
delete
by
tag,
I
believe
so
I
wonder
if
we
should
just
ignore
both
errors.
C
D
This,
at
least
according
to
the
talker's
version
of
the
bridge.
I
think
this
is
oh
yeah
v2.
It
says
reference
must
be
a
digest
or
the
little
fail,
and
then
I
don't
know
yeah,
maybe
moving.
Maybe
there's
another
way
to
delete
it
like
moving
the
tag
to
some
sort
of
delete
mode
or
something
would
work,
but.
D
E
Sub
sub-team
specific
rfcs,
we
could
do
like
a
smaller
target
drivers.
Okay,
I
guess
my
only
thought
is.
I
feel
like
within
this
group.
We
could
make
this
decision.
I
don't
know
that
anyone
else
cares
about
this
little
detail.
E
D
Okay
and
kevin,
I
haven't
done
an
rfc
I
would
like
to.
I
can
at
least
give
it
give
it
a
shot
and
get
used
to
the
process
and
then,
but
if
yeah.
Obviously,
if
the
result
of
that
is
making
a
pr
and
get
more
discussion
on
there,
too,
though
fine
with
that,
does,
it
also
feel
like
this
is
worth
blocking.
We
should
figure
this
part
out
before
we
change
to
the
in
memory
registry
or
before
we
can
answer
whether
we
want
the
memory
registry
or.
B
Not
definitely
want
the
in
the
in
memory
registry,
the
speed
performance
should
be
substantial,
and
I
think
if
we
just
make
our
test
handle
both
like
that
would
I
would
be
fine
with
that,
like
personally,
I
think
it
makes
it
easier
for
users
to
set
up
and
it
makes
it
less
docker
dependent
for
some
of
this
stuff.
D
Awesome:
okay,
I'll
proceed
with
that.
I'll,
add
a
add
some
extra
tests
to
the
to
the
current
pr
and
then
open
up
the
rfc
for
aerospam
rfc
for
changing
the
behavior
of
delete.
Thank.