►
From YouTube: Working Group: 2020-0701
Description
* Inline Buildpacks: https://github.com/buildpacks/rfcs/pull/86
* Application Mixins: https://github.com/buildpacks/rfcs/pull/87
A
A
A
A
B
A
Let's
kick
things
off
then
so
first
thing
on
the
list
is
standing
item,
introductions
and
new
faces.
Do
we
have
anybody?
I
think
I
see
josh
lewis.
Do
you
want
to
introduce
yourself?
I
don't
think
I
can
see
you
in
a
past
meetings.
B
Yeah
I
work
on
the
same
team
as
a
lot
of
the
other
heroku
folks
here
with
joe
and
terence
and
jessie.
It's
just
been
a
few
weeks.
I've
been
here
a
couple
times,
but
it's
really
been
quite
a
while
anyway
made
time
for
today.
B
A
All
right,
I
don't
think
we
have
any
other
new
faces.
So
next
thing
on
the
list
is
release
planning
and
updates,
that's
usually
emily
and
javier
javier.
You
want
to
take
it.
C
Next
tuesday
is
kind
of
the
the
goal
and
yeah.
I
think
that
should
be
out
there
willing
to
take
anybody
that
could
test
it
through
their
systems.
But
hopefully
everything
goes
well.
A
Sounds
good,
so
the
next
thing
in
the
list
is
reviewing
outstanding
rfcs,
so
I'm
gonna
share
my
screen
and
we'll
just
go
through
them
really
quickly.
I'm
gonna
skip
anything.
It's
a
draft
or
that
is
already
on
the
list
for
today.
A
So
give
me
a
second
to
figure
out
zoom
here
everybody
see
that
cool,
so
cache
types
and
application
mixes
are
both
giraffes
and
we're
talking
about
application
mixes
today,
inline
build
taxes
on
the
list
for
today.
Also
so
next
thing
is
read:
write
platform
volume
out.
Is
there
any
progress
on
this?
C
Ben
reached
out
kind
of
looking
for
some
feedback.
I
did
post
some
feedback
on
there.
I
don't
think
I've
gotten
any
reply
to
it.
There
is
a
separate
rfc
that
I
proposed
and
still
in
draft,
which
is
cash
types,
that
kind
of
answers
to
some
of
the
primary
goals
of
this
one.
A
So
it
seems
like
still
a
lot
of
active
discussion
here.
Maybe
it's
worth
putting
on
the
list
for
some
week
to
keep
talking
about
it.
Yeah.
E
B
Week
I
I
can't
more
strongly
you
know
sort
of
describe
my
belief
that
we
should
have
a
very,
very
flexible
thing
here,
and
alternatives
are
coming
up.
E
A
A
I
can
I
can
organize
that
if
I
think
it's
a
good
idea
all
right
next
thing:
offline,
build
packages,
dan
is
planning
to
present
this
next
wednesday
and
he
apologizes
he
had
got
pulled
on
to
working
on
something
else
for
an
extra
week
or
two,
but
I
should
be
able
to
pick
it
back
up
soon.
I've
been
I've
been
talking
about
them.
I
know
that's
a
one
that
we
want
to
get
through
soon,
image,
pull
policy,
javier.
A
E
So
this
I'm
sorry,
I
missed
that
that
had
happened.
So
you
were
going
to
split
out
the
default
change
and
just
make
this
about
the
flag.
Is
that
basically,
what
happened.
C
Yes
and
adding
a
new
pull
policy,
which
is,
if
not
present,
yeah.
E
A
Cool
this
is
a
platform
specific
one
where
only
platform
containers
are
going
to
approve
or
do
a
other
people
need
to
approve
as
well
or
is
it
do
we
need
a
core
team
vote.
A
E
A
Next,
on
the
list
add
rfc
for
stack
metadata.
I
think
this
is.
I
thought
this
was
approved
a
while
ago
or
something
changed
again.
B
Yeah,
I
guess
the
only
question
I
had
on
it
was
the
open
question
that
I
think
kevin
put
in
the
original
rfc
of
just
like.
If
you're
putting
stack
stuff
in
the
label
in
your
rebase
does
rebase
now
update
the
labels
for
you
or
how
does
that
work?.
A
Rebase
would
rewrite
the
cool
config
blob
to
be
whatever
it's
just
rebasing
the
fs
layers
that
matter
and
so
changing
labels
on
a
rebase
shouldn't
be
a
problem
or
they
don't
there's
no
extra
implication
to
that
in
terms
of
like
having
a
consistent
digest
for
some
aspects
of
the
image,
because
the
config
blob
is
going
to
change
anyways.
D
A
With
calling
out
explicitly
for
sure
seems
like
action
here
is
drive
the
rfc
to
call
that
out
specifically
and
then
ask
for
approvals
again.
B
Yeah
other
than
that,
like,
I
think,
it's
a
good
open
question
and
it
seems
good.
A
Root
bill
packs
says:
I
think
this
is
kind
of
on
hold
judge.
Did
you
want
to
no
just
defer
on
that?
Ca
starts
to
draft
exposing
metadata
any
any
word
from.
I
guess
we
don't.
B
I
talked
to
paul
and
he
says
he's
looking
at
it
now
he's
coming
back
to
it.
Finally,
I
think
he
may
talk
about
it
next
time
he's
here
next
week.
A
Cool
and
then
have
image
extensions
is
superseded
by
applications.
A
I'm
sharing
my
screen
and
moving
back
to
doc.
Next
thing
in
the
list
is
rfc
inline
build
packs
joe.
You
want
to
take
this.
E
Sure
I
think,
there's
just
I
know
emily
had
fee.
E
The
two
things
I
think
are
outstanding
on
this
are
the
use
of
the
shell
field.
I
don't
know
if
maybe
emily
had
another
comment
on
there.
A
I
was
gonna
talk
to
emily
at
some
point
this
week
about
why
I
think
the
shell
field
is
important
and
that
there
are
no
other
there's
no
good
solution.
That
involves
a
shebang
instead
of
the
shell
field,.
E
Cool
and
then
the
other
one
was
terence's
comment
about
an
inline
table
or
yeah,
an
inline
table
which,
when
I
started
playing
around
with
got
pretty
gross
so
terence
you're
gonna,
have
to
fight
me
on
that
one.
If
you
still
think
that's
important.
A
C
B
E
E
Yeah,
how
would
that
work
with
like
the
multi-line,
the
here
dock?
I
don't
know
if
that
I
have
to
play
around
with
it.
A
I,
like
the
word
inline
for
the
actual
inline
script
definition
and
like
script,
seems
generic.
It
could
be
online
or
it
could
refer
to
a
file
in
the
app
directory.
That's
the
inline
build
pack
script
right.
A
E
Yeah,
that
makes
sense,
I
think
it's
a
structure.
I
don't
like,
though,
like
this
is
one
of
these
things.
In
fact,
I
think
it
is
the
thing
that
I
dislike
about
tamil
is
when
you
end
up
in
this
situation,
where
you
have
a
table
inside
of
an
array,
and
it
it's
not.
I
think
it's
the
thing
that
most
people
when
they
encounter
tamil
struggle
with,
so
to
make
it
this
way
for
the
sort
of
minimal
case
I
just
I
don't
know
I
I
would
need
some
convincing.
A
A
So
imagine
you
remove
the
second
line
of
the
snippet
right.
So
now
you
have
in
the
build.buildpax
object,
you
have
an
api
and
a
script
and
then
could
you
have
an
inline
definition
there
and
then
vary
on.
B
Initial
con,
it's
not
like
a
hard
concern
like
I'm,
not
gonna
die
as
hell,
but
the
I
guess
I
was
just
pointing
out
like
I
feel
like
this
goes
down
a
path
of
kind
of
like
a
lot
of
things
in
programming.
Well,
if
you
just
add
one
more
option,
eventually,
you
like
two
years
from
now,
it
ends
up
being
this
like
thing
that
has
like
20
options
on
it
right.
B
E
Yes
agree,
but
we
already
do
have
a
good
bit
of
that
with
version
uri
like
I
think
the
difference
now
is
that
it
says
it's.
You
know
not
just
version
and
uri
and
one
other
thing
being
mutually
exclusive,
but
like
a
set
of
things
being
mutually
exclusive
from
another
set
of
things,
or
something
like
that.
B
E
Well
I'll
I'll
play
around
with
it,
some
more
come
up
with
some
other
options,
maybe
yeah,
but
that's
all
there
is
for
that
one.
Unless
anybody
else
said
something
anything
else
talk
about
it.
D
D
E
Right
so
this
would
not
be
in
the
spec.
This
would
be
a
platform
feature
of
pac
and
the
question
about
buildpak
tommel,
I
think,
is
a
bigger
question
and
yeah.
Eventually,
I
would
like
to
have
lifecycle
have
a
another
binary
or
something
that
sort
of
pre-processes
a
project
tomml,
and
this
again
this
doesn't
have
to
be
a
spec
thing.
It
could
just
be
a
tool
that
comes
with
life
cycle,
that
processes
a
problem,
project
tamil
and
emits
whatever
the
other
phases
of
life
of
lifecycle
need,
so
that
might
be
machine,
readable,
json
files.
E
It
might
be
a
build
pack
on
the
file
system.
Does
that
answer
your
question.
D
D
D
Without
the
existence
of
a
lifecycle
prepare,
we
would
actually
read
the
project
tamil
and
then
construct
ephemeral
book
pack
on
the
fly
yeah.
If
you
wanted
to.
E
Support
it,
that's
what
you'd
have
to
do.
I
think
another
thing
that's
kind
of
brewing
because
of
at
salesforce
we
are
using
project
tamil
is.
What
does
it
mean
to
support
part
of
project?
Tommel
is:
are
we
actually
winning
with
project
tommel?
There's?
I
have
a
bunch
of
questions
about
that
and
I'm
hoping
I'm
hoping
to
bring
those
to
ahead.
Sooner
than
later,.
E
Yeah
I
haven't,
I
don't
actually
have
a
good
proposal
yet,
but
I'm
trying
to
come
up
with
something
that
might
lead
to
just
better
options
for
getting
support
into
into
platforms
without
having
to
now,
I
have
to
repeat
everything
that
pack's
doing.
A
I
like
the
idea
of
introducing
that
optional
life
cycle
binary,
it's
like
pac,
might
not
use
it
because
a
lot
of
project
tumble
is
parsing.
You
know
what
not
to
upload
into
the
container
right,
which
can't
be
a
life
cycle
concern,
but
there
are
other
parts
of
it
that
need
to
get
processed
into
data
that
the
life
cycle
should
parse
too.
It's
a
hard
problem.
E
E
E
One
of
the
questions
was
how
to
specify
this
in
the
builder
tunnel
or
an
order,
so
I've
introduced
stack.buildpacks
there's
no
order.
They're
just
all
run
until
you
meet
the
project's
mix-in
requirements.
E
E
I
did
keep
a
type
in
the
plan
for
provides
and
requires
again
happy
to
go
back
and
forth
on
this,
but
something
about
the
implicit
like
a
regular
build
pack
always
requires,
and
a
stack
pack
always
provides
just
didn't
sit
super
well
with
me.
So
I
was
trying
to
think
of
alternatives
for
that
yeah.
We
can
discuss
that.
I
know
we
weren't
happy
with
privileged
as
a
key
that
as
a
way
of
indicating
or
distinguishing
a
build
pack
from
a
stack
pack,
but
I
didn't
come
up
with
anything
better.
E
E
E
I
had
a
little
discomfort
with
a
stack
pack
that
executes
on
the
build
image.
Writing
a
launch
tomml,
but
I
I
can
still
think
of
a
case
for
process
types
from
a
stack
pack.
So
it's
kind
of
interesting
yeah
happy
to
discuss
that
and
then
the
last
one
was
oh
ben
detect.
A
You'd
assume
that
the
initial
invocation
of
the
text,
output
against
you'd
have
just
like
store
the
initial
output
of
detect
from
the
build
somewhere
and
then
replay
that
on
rebase,
making
the
assumption
that
the
application
directory
didn't
change.
I
think.
A
E
A
E
A
E
A
E
You're
right,
I'm
I'm
sort
of
abusing
the
term,
but
no
yeah.
I
thought
we
were
saying
that
that
the
file
system,
whatever
changes
that
that
stack
pack
made,
would
accommodate
or
you're
just
accepting
that
you're
not
going
to
get
get
it
to
rerun.
But
if
that's
not
the
case,
that's
fine
because
I
actually
had
it
that
way.
Originally.
E
So,
if
so,
and
if
that's
the
case,
I
think
we
should
like
you,
were
sort
of
starting
to
describe
store
the
output
of
been
detect
and
just
pass
it
into
build
or
do
what
you
need
to
do.
So
you
don't
run
detect.
A
A
A
A
If
stack
packs
can
dynamically
say
what
what
mixes
they
provide
at
build
time?
You
can
no
longer
do
that
static
validation
to
match
build
packages
with
the
correct
stack
images
you
have
to
try
a
build
and
see
if
it
fails,
so
you
need
a
in
the
case
that
the
stack
has
stack.
Packs
you'd
need
to
put
some
metadata
on
it.
That
says
hey
this
has
a
stack
pack
and
all
bets
are
off
with
mix
and
validation.
A
A
You
know
the
package.
That's
set
up
front.
These
are
the
mixins
I
need
you.
You'd
have
to
allow
that
to
be
used
with
the
the
stack,
but
you
could
provide
less
you
could
have
it
say
these
are
all
the
things.
This
is
the
range
of
things
I
can
provide,
and
then
it
provides
more
specific
lists
during
the
text
that
would
be
okay,.
E
Oh
in
the
where's
that.
C
E
I
don't
have
a
specific
use
case.
I
thought
it
would
be
a
capability
that
would
be
valuable,
I'm
happy
to
think
through
it
a
little
bit
more
to
see.
If
it
really
is,
I
think
part
of
it
is
also
if
we
do
eventually
have
a
real
root,
build
pack
kind
of
concept.
That
is
a
little
bit
more.
E
You
know
powerful
and
maybe
forces
you
to
give
up
some
things.
I
would
like
it
to
work
the
same
way.
You
know
where,
like
a
root,
build
pack
is
just
a
build
pack
that
runs
on
your
app
code,
and
you
would
expect
then
detect
to
have
access
to
your
app
code.
E
A
I
mean,
I
think
it
is.
It
is
dynamic
without
the
stack
pack
having
been
detected
because
the
requesting
build
packs
can
dynamically
decide
what
build
packs
they
need
right
and
then
those
those
get
sent
to
it
without
needing
the
bin
detect
of
the
stack
pack
to
be
dynamic,
because
the
the
list
of
mixins
that
gets
installed
is
actually
the
app
built
back
case
is
actually
coming
from
the
other
build
packs
that
do
get
to
dynamically
decide
what
they
need.
A
A
A
I
think
I
could
see
two
implementations,
one
where,
like
in
build
pack
toml
of
the
stack
pack,
it
says
this
is
what
I
can
contribute
in
terms
of
mix-ins
right
that,
like
what
the
app
build
pack,
there
would
be
with
that
right,
jax
right
and
then
the
other
build
packs.
The
tax
scripts
can
output.
You
know,
mix
and
re
requirements,
then
get
fed
to
that
build
pack
and
are
passed
through
that
filter
right
automatically
and
that
filter
being
a
static
thing.
Would
let
you
do
pre-validation
like
oh
yeah.
A
This
can
supply
anything
I
can
put
whatever
build
packages
on.
If
I
want
or
or
not
it
has,
that
that
benefit.
If
it's
static,
if
it's
not
static
and
bin
detect
can
output
it,
then
it
seems
like
the
app
build
pack
would
always
output
the
same
thing,
anyways
right.
Yes,
I
can
provide
whatever
and
or
like.
I
can't
think
of
a
situation
where
you'd
make
a
stack
pack
that
dynamically
determines
the
filter.
A
E
D
I
don't
know
if
it's
probably
performance,
because
I
imagine
the
detects
would
happen
very
quickly.
It
just
seems,
like
stack
packs,
are
trying
to
solve
a
very
thin
use
case
and
it
might
actually
simplify
the
creation
of
them
if
they're
just
statically
defined
what
they
can
provide.
D
Additionally,
it
helps
with
that
problem.
I
think
we
talked
about
a
little
bit
ago,
which
is
a
stack
back
statically
describe
what
they
can
provide.
We
can
figure
out
ahead
of
time
is
ever
a
chance.
A
build
would
ever
successfully
execute
with
the
build
pack
to
like
give
the
user
some
heads
up
before
exceeding
the
build,
so.
C
A
good
example
could
be
in
pack
if
you
create
a
builder
right.
If
I'm
not
mistaken,
we
would
go
through
the
create
builder
process
and
you
could
potentially
create
a
builder
that
doesn't
work
together.
The
way
that
you
expect
it
to,
because
you
don't
know
that
the
basically
there's
there
would
be
no
way
to
know
that
the
stack
pack
doesn't
necessarily
actually
work
with
any
or
this
build
pack
right.
That
you're
also
bundling
in
this
builder
yeah
yeah.
That
makes.
E
E
Yeah
well,
okay,
so
I'm
I'm.
I
think,
I'm
pretty
convinced
that,
like
we
need
the
static
mixins,
probably
in
buildback
tommel.
The
question
then,
is:
if
we
need
been
detected
all
like,
I
almost
feel
like.
We
should
do
nothing
with
it
so
that
we
could
potentially
reserve
it
for
in
the
future
if
we
decide.
Oh,
there
is
this
case
where
you
want
to
dynamically,
just
provide
a
regular
provides
or
we
do
want
to
introduce
and
to
provide
mix-ins
into
the
build
plan.
C
Yeah
see
the
way
I
thought
I
understood.
This
was
like
the
pattern
for
the
bullpec
tamil
works
so
that
we
know
what
build
packs
are
compatible
with
the
stack
pack,
but
then
the
detect
phase,
the
way
it
provides
mix-ins
is
maybe
not
so
much
by
patterns
but
very
specific
mix-ins.
That
then
says:
oh
the
app
needed
this
one.
So
yes,
I'm
able
to
provide
that
one,
and
that
would
be
essentially
a
subset
of
what
the
static
pattern
was.
E
Yeah
yeah,
that's
actually
the
way
I
thought
about
it
at
first
too,
but
I
don't
know
if
been
to
tech
can
do
that
without
the
like
the
processed
build
plan,
or
I
guess
I
mean
yeah
like
what's
it
gonna
do,
is
it
just
gonna?
It's
like
it's
gonna,
be
like
life
cycle,
be
like
here's,
the
mix-ins
I
need
and
it
will
be
like
okay,
I
will
give
you
those
mix-ins
like
I
don't
know
if
they'd
ever
be
any
different.
E
A
I
mean
it.
The
dynamic
part
is
the
other,
build
packs
figuring
out
what
accents
they
need
right
and
then
you
could
have
nothing
for
the
stack
packs
for
detect,
just
not
not
implement,
detect
for
stack
packs
and
then
always
feed
those
mix-ins
through
and
fail
milliseconds
later
in
the
build
during
the
build
phase,
when
the
stack
pack
says,
oh,
I
can't
provide
those
mix-ins
right
or
you
could
have
a
static
declaration
up
front
on
the
part
of
the
stack
pack.
That
says
this
is
the
range
of
nixon's.
A
I
have
right
that
you
could
pre-validate,
even
even
before
detection,
if
it's
truly
static
right
or
you
could
have
something
in
the
middle
where
during
detect
it
outputs
the
nixon's.
You
know
like
filter
with
mix-ins
that
it's
allowed
to
implement,
so
we
could
fail
during
the
detect
phase
and
the
thing
in
the
middle.
A
E
A
D
E
D
A
A
E
What
about
the
so?
I
can
work
through
that.
What
about
the
privileged
thing,
oh
by
the
way
non-item
potent,
is
used
in
an
http
spec
rfc,
so
deal
with
it,
I'm
happy
to
change
that,
but
I've
got
nothing
the
privileged.
I
can't
remember
your
reasoning
for
not
liking
that
I
think
it
had
to
do
with
the
fact
that
it
doesn't
do
like
what
you
would
expect
from
docker
like
if
you
patched
privileged
or
something
like
that.
A
Privilege
sounds
right
for
root,
build
packs
like
that.
That
seems
like
it's
a
really
good
way
to
describe
that
really
technically
accurate
way
to
describe
that
and
what
other
people
use,
but
we
have
to
distinguish
a
stack
pack
from
a
root,
build
pack
also
right.
E
A
About
what
it
would
look
like
for
a
root
build
pack
to
be
used
as
a
stack
pack
or
it
seems
like
it's,
it's
like
a
confusing
pre-optimization.
E
Well
guess,
you'd
still,
I
don't
know
all
the
cases.
All
the
cases
that
quickly
came
to
mind.
You'd
still
probably
provide
a
mix-in,
even
if
it
was
just
like
set
equals
or
something.
A
No,
I
I
think
I
see
what
you're
saying
you're
saying
like
you're
trying
to
make
it
so
that
stackpack,
the
stackpack
interface
matches
their
buildpack
interface
and
that
the
context
for
which
the
root
build
pack
is
used
determines
whether
someone's
making
the
commitment
that
it
follows
the
api
compatibility
constraints
and
can
be
used
in
a
rebasable
way
of
the
stack
pack
right
and
so
privileged
would
be
the
way
you
indicated
as
root
build
pack
and
then
deciding
where
you
use.
It
is
how
you
indicate
it
as
a
stack
pack.
A
That
makes
sense,
I'm
just
if
you
could
put
that
in
the
rfc
and
then
like.
A
C
Can
we
maybe
be
more
specific
or
explicit
with
the
types
I
think
we
mentioned
that
earlier?
We
already
have
two
different
types,
which
is
the
standard
concrete,
build
pack
and
the
order
build
pack,
and
now
we're
going
to
introduce
the
stack
build
pack.
So,
instead
of
you
know,
assuming
based
on
the
information
that
you
input,
we
could
use
something
like
a
type
field,
that's
very
explicit
to
say
what
it
should
be
and
then
could
maybe
potentially
even
give
more
guidance
that
way.
A
E
Yeah,
I
think
yeah,
that's
exactly
it
like.
I'm
hoping
and
I
could
be
wrong
just
in
the
way
I'm
seeing
into
the
future,
but
like
I
was
hoping
that
if
we
had
a
type
field,
it
would
not
be
type
equals
stack
that
it
would
be
type
equals
root.
You
know
what
I
mean
and
I
I
could
be
wrong
about
that
goal,
but.
A
E
A
E
Oh
yeah,
I
was
wondering
about
that
too.
This
reminds.
B
Me
of
like
the
when
we
did
the
kim
khan
one
year
when
we
talked
about
those
like
cash
flags
from
back.
E
B
E
E
B
A
E
Well,
I
guess:
no,
because
it
could
you
could
contribute
something
to
the
run
image
or
the
launch
image
that
you
don't
want
to
get
back
right.
But
I
guess
you
could
just
like
blow
it
away.
It
would
be
like
it'd
be
a
way
to
like
not
put
that
rmrf
line
in
your
build
pack
or
something.
A
Is
nothing
gets
recovered
until
the
build
pack
explicitly
opts
into
it?
So
that's
that's
an
interplay.
I
I
gotta
drop
off
a
little
bit
early,
but
I
had
one
question
around
ca
certs.
So
we
said
this
model
works
really
well
for
ca
certs,
but
we
haven't
talked
about
that
in
the
context
of
mixins,
because
I
feel
like
they're
not
mixing
right.
So
you
kind
of
stack
pack
that
guarantees
the
base
ability.
Name.
A
Sorry,
the
guarantees,
the
ebi
compatibility
right
and
would
reapply
like
when
the
upstream
ca
starts
change
because
one
of
them
is
removed
because
it's
no
longer
trusted
because
you
know
they
got
hacked
or
whatever,
and
you
don't
want
to
lose
that
removal
right.
That
seems
like
a
really
good
use
for
stack,
packs
and
ca
certs.
But
if
they're
tied
into
the
mixins
api
like
is
there
a
workflow
where
you
have
a
stack
pack
specified,
it
says?
A
No,
I
don't
provide
any
mix
ends,
but
it
still
runs
every
time
right
or
or
or
should
c
asserts.
Should
we
define
this
by
saying
the
bionic
stack
defines
a
special
news.
You
know
thing
like
set
equals.
That's
like
cert
equals
right
or
something
that
means
I
provide
some
ca
certs
or
I
require
some
ca
certs,
but
it
doesn't.
A
A
way
to
think
about
that,
maybe
in
this
context
is
maybe
this
is
the
thing
that
drives
out
having
separate,
requires
and
provides
for
the
stackpack
as
part
of
the
build
plan,
because
then
the
stackpack
could
require
and
provide
a
mix-in,
and
then
that's
how
you
achieve.
Yes,
it
runs
every
time
and
then
then
that
drives
out
the
other
change
you
mentioned,
which
is
like,
maybe,
instead
of
mix-ins,
what
type
requires
and
type
provides.
A
A
A
Sorry
they
could
still
be
static.
E
B
D
D
A
A
stack
pack
that
provided
a
case
would
it
no
longer
run
detect
it's
like
imagine,
I'm
not
saying
we
should
do
this,
but
imagine
that
the
build
plan
contributions
from
stack
packs
are
static
and
defined
in
the
pectomil
right
to
do
ca
starts.
You
do
something
like
require.
A
We'd
say:
cert
equals
yes,
as
the
mixer
name
using
that
set
equals
notation
right
and
then
you
can
also
control
like
build
and
run
to
determine
where
you
want
them
and
then
you'd
also
say
provides
mixing
equals
true
name
equals
search
equals
yes,
and
then
you
know
something
like
that.
You
do
maybe
not.
Yes,
there
may
be
the
name
of
the
certificate
that
this
you
know
ca
cert.
A
Installing
stack
pack
is
going
to
provide
right
or
my
company
ca
certs,
something
like
that
and
then
because
they're
they're
matched
up
they're
statically
defined
initially
in
the
build
plan
format
it
doesn't
need
to
be
resolved
by
another
build
pack
and
always
happens
and
fits
into
the
thing.
Does
that
answer
your
question.
D
A
D
D
B
A
Cool
I
get
to
drop
off
a
little
early
thanks,
so
much
someone
else
can
pick
up
and
they're
more
things.
E
B
Sounds
good
ben
won't
be
here
tomorrow,
right.
C
I
wasn't
aware
of
that,
but
I
think
nonetheless,
some
of
the
things
that
I
want
to
add.
Probably
to
the
volume
which
is
what
he's
proposing
is
at
minimum
and
it's
you
know
for
it
to
be
behind
experimental,
which
I
think
has
already
been
discussed.
B
Sure
yeah,
let's
talk
about
tomorrow
and
then
cool
we
can
follow
book.
Then,
if
there's
other.
B
Stuff
well
wow.
It
sounds
like
that's
it
for
today
so
see
everyone
tomorrow,
who's
coming
tomorrow,
thanks
everybody
thanks.
Everyone.