►
From YouTube: OCI Weekly Discussion - 2020-07-15
Description
Weekly developer discussion for the OCI from 15 July 2020; Notes/Agenda here: https://hackmd.io/El8Dd2xrTlCaCG59ns5cwg#July-15-2020---6pm-Pacific
A
B
Well,
so
there's
there's
verifiability
and
repairability
which
still
wanted
to
talk
about,
but
I
guess
he's
not
here
because
he's
europe
and
then
the
last
two
reduced
uploading
and
untrusted
storage.
I
know
the
guy
who
suggested
these
and
I
don't
think
he's
has
been
on
any
of
these
calls
reduced
up.
Well,
I
don't
know
my
summary
of
reduced
uploading.
Is
it
should
in
principle
be
free
with
all
the
other
innovations.
A
Yeah,
I
think
I
commented
on
that
one
because
I
think
there's
the
way.
It's
not
it's
something,
I'm
relatively
yeah,
nothing
simple
when
you've
got
a
community
thing,
but
a
relatively
similar
thing,
where
it's
like
hey
this
digest
already
exists,
don't
send
it
to
me
for
the
figured
out
there's
some
trust
boundaries.
C
A
B
Yeah,
I
agree,
or
you
know
maybe
there's
some
challenge
off
model
where
the
registry
asks
for
hey.
What's
the
hash
of
this
section
of
the
file
or
whatever
you
know,
I'm
sure,
there's
cryptographers,
who
have
figured
out
the
most
secure
way
to
do
this,
somebody
that
has.
B
B
Yeah
and
then
also
I
you
know,
I-
I
don't
know
that
that's
necessarily
image
specs
thing
and
the
content
of
the
image
is
going
to
be
the
same.
It's
really
a
disspec
thing.
Is
there
a
dispect
extension
for
whatever
this
challenge
off
crypto
protocol
is
or
whatever.
A
Yeah,
that's
true.
I
mean
it's
funny
because
when
I
first
looked
at
this
I
just
assumed
it
was
both
and
then
I
realized
that
alex
is
kind
of
more
focused
on
the
image
spec,
but
I
kind
of
think
of
them
together.
So
I
don't
not
really
obviously.
A
C
B
C
C
No,
I
was,
I
was
bringing
up
the
docs
and
then
also
so
the
weekly
discussion,
doc
and
then
also
the
brainstorm
use
that
you
all
kind
of
dove
into
there.
B
So
I
you
know
till
is
the
person
who
added
this.
So
I
I
don't
know
that
I
can
do
it
justice,
but
one
thing
that
so
you
know
like
the
blob
themselves.
I
guess
you
can
verify
them
because
they're
content
addressed-
and
I
assume
we're
mostly
interested
in
keeping
that
same
format.
B
C
B
So
the
the
place
I
first
ran
into
this
is
there's
the
the
binary
trading
of
binary
files
on
using
that
usenet
messages
used
to
get
corrupted,
and
so
they
would
transmit
this
extra.
Like
20
percent
block
of
data,
and
this
read
solomon
encoding.
Basically,
you
know
you
can
you
can
kind
of
tune?
It
there's
parameters,
but
basically
you
can
decide
hey.
I
want
to
include
this
much
data
like
20
extra,
which
means,
if
there's
a
five
percent
corruption
in
the
archive
with
this
extra
20
data.
B
If
it
doesn't
matter
where
the
five
percent
corruption
is,
I
can
repair
it
and
that's
kind
of
it's
kind
of
cool,
because
you
know
this
could
split
bits
or
whatever,
so
it's
stronger
than
a
checksum,
because
you
can
actually
get
back
the
original.
The
thing
that
you
wanted
in
the
face
of
you
know
you
know
whatever
bad
discs
or
bad
networks
or
whatever.
D
B
B
B
B
So
you
could
download
this
thing
and
then
try
and
open
it
or
render
it
or
whatever
it
was,
and
then,
if
it
didn't
work
because
it
was
corrupted,
then
you
could
download
the
read
solomon
stuff
and
try
and
fix
it,
and
I
wonder
if
there's
not,
because
the
thing
is
too
you
could.
This
is
another
thing
where,
depending
on
how
interested
you
were
in
this,
you
could
also
have
the
repo
server
generate
this.
So
you
can
also
say,
like
I
have
you
know,
98
of
the
data
it's
corrupted
in
various
chunks.
B
B
Is
missing
absolutely
yeah,
I
mean
it's,
it's
exactly
that
kind
of
thing,
and
you
know
when,
like
the
last
time
I
used
it
was
20
years
ago.
So
I
don't
know
if
that's
what
he
means
here
by
repairability,
but
that
would
be
a
cool
feature
to
include
you
know
I
don't
I
don't
know
where
exactly
because
again
in
siri,
you
don't
really
need
it.
It
sort
of
lives
alongside
the
image
spec
or
you
know,
I
don't
know
if
you
would
distribute
some
read
solomon
encoding.
C
It'd
be
good
to
make
that
com
comment
that
or
at
least
otherwise
haven't
annotated
there.
C
C
C
C
The
only
other
place
that
repairability
to
me
really
would
apply
is
for
the
clients
that
are
trying
to
push
or
save
or
export
or
not
in
the
docker
sense,
not
export,
but
still
get
the
same
object
back
off
of
the
local
graph
and
arrive
back
at
the
same
original
and
we've
we've
we've
done
stuff
in
the
past
to
to
work
around
that,
and
that
would
be
kind
of
a
clever,
interesting
different
approach.
C
But
it
really
only
applies
to
the
client
and
if
the
client
ever
had
issues
with
the
image
it
has
on
disk,
I
would
imagine
it
would
just
throw
it
out
and
refresh
refresh
it
re-fetch
it
from
the
server.
So
I'm
not
I'm
not
really
sure
where,
apart
from
the
academic
side
of
it,
that
we'd
actually
get
into
the
repair
ability,
but
it
is
really
neat
to
know
about.
B
Yeah,
I
I
I
hadn't,
really
considered
it
before
jill-
put
this
in
here
that
maybe
we
should
do
the
old
school
lead.
Solomon
thing
so
anyway,.
C
All
right,
so
what
I
have
I
managed
to
make
it
last
week,
but
not
for
a
while.
So
the
current
format
here
lately
has
been
working
through
the
the
oci
v2
brainstorm.
C
B
Of
yeah,
I
think
basically,
I
think,
last
time
we
got
all
the
way
through
lazy
fetch
support,
then
there's
so
that
means
there's
four
left:
extensibility
verifiability
reproducing
repairability,
reduced
uploading
and
untrusted
storage,
and
so
I
think
we
just
sort
of
talked
about
the
verifiability
and
repairability
in
my
mind,
so
the
other.
I
guess
we
can
talk
through
the
other
three
and
then
that's
sort
of
the
end
of
this.
I
did
not.
B
B
C
Before
that
slightly
touched
on
that
one,
the
only
other
piece
on
verifiability
that-
and
I
see
that
derek's
on
the
call,
but
is-
is
figuring
out
how
to
check
on
a
profile
basis
versus
like
with
what
we've
done
currently
versus
any
other
approaches
that
we
might
want
to
do
or
have
already
in
place.
Like.
C
E
C
E
C
You
know
that
that's
what
I
was
thinking
continuity,
the
entry
work,
the
existing
and
then
the
stuff
that
I
was
a
part
of
and
then
also
to
some
extent,
this
profile
there's
a
light,
a
very
light
amount
of
that
that's
done
in
the
tar
split
that
is
in
docker
and
other
places
to
check
on
a
profile
basis.
C
D
It's
written
here
for
verifiability,
I
I
think
one
one
drawbank
in
the
chronic
v1
implementation
is
that
they
and
it
cannot
be
verified
after
the
image
is
unpacked.
So
you,
you
feel
example
under
the
host
and
someone
helped
in
and
changed
their
the
files.
Then
users
cannot
understand
how
cannot
see
it
and
it
can
be
a
security
issue
for
some
use
cases.
B
Right-
and
this
is
sort
of
why
I'm
interested
in
doing
the
direct
bounce
stuff,
because
then
there
is
no
unpacking
to
destroy
that
metadata,
but
I
I
don't
so
I
mean
he
mentions
that
he's
splitting
out
the
particular
requirements
separately
from
direct
mount
here.
But
in
my
mind,
the
way
to
solve
this
is
to
just
have
a
mountable
format.
In
the
first
place.
C
C
And
then
you
get
into
whether
things
are
like
active
versus
passively
checking.
So
that's
why
several
of
the
solutions
like
entry,
entry
and
continuity
both
do
kind
of
the
view
after
the
fact
or
what
it
should
look
like,
at
least
when
the
when
the
tar
archive
itself
was
packed
up.
C
Since
some
of
those
things
go
out
with
file
systems.
Tar
split
actually
ignores
some
of
those
things
to
repack
it.
It
just
uses
the
pure
content
of
the
file
if
it
passes
a
basic
checksum,
I
mean
the
other
side
of
this
is
like
composing
stuff,
like
whatever
ima
evm
stuff,
to
make
sure
that
a
disk
hasn't
corrupted
or
something
malicious
happened.
E
Yeah,
like
the
the
point
of
continuity,
was
yeah
first,
it
was,
we
knew
we
could
do
the
verifiability,
but
the
idea
was
that
we
use
we
reference
everything
in
a
strong
enough
hash,
where
you
could
recreate
the
file
system.
If
you
had
a
blob
store
referencing
all
of
that
stuff,
so
I
think
whatever
format
we
come
up
with
as
long
as
it
has
some
sort
of
manifest
that
it
can
keep
around
with
the
files,
and
you
can
use
that
to
verify.
C
E
A
A
B
So
then,
let's
then,
I
think
we
can
drop
the
verifiability,
repair
ability
and
actually
the
last
two,
because
I
don't
see
sargon
on
the
call
and
then
so
then
it's
just
extensibility
are
either
of
these
two
folks
on
the
call.
I
do
not
see
them.
D
And
yeah
I
am
here,
we
I
think.
B
D
B
A
D
A
G
Sorry
I
had
to
unmute
all
the
things
yeah
so
just
wanted
to
provide
a
kind
of
high
level
overview
of
where
the
distribution
spec
1.0
stuff
is
I'm
going
to
try
to
share
my
screen.
G
All
right
so
so
today,
basically.
G
You
know
no
one.
No
one
asked
to
do
this,
but
cloned
down
the
the
new
open
container
site
and
added
a
menu
item
here
for
specs.
So
I
don't
know
if
this
is
something
we
actually
want,
but
I
thought
that
this
would
be
an
easier
way
to
display
this
information
besides
in
the
pull
requests.
G
So
this
is
live
here
at
oci
blood,
orange
dot,
io
this
new,
this
whole
site
and
then,
if
you
go
to
specs
distribution,
spec
and
then
here,
I
realized
that
this
that
hugo
or
or
this
site
provides
actually
a
table
of
contents
itself.
So
I've
actually
removed
the
table
of
contents
from
the
new
the
in
progress
spectac.
G
But
this
is
a
combination
of
all
of
the
prs
that
we
have
open
and
really
just
for
people
who
have
not
been
involved
in
the
distribution
spec
stuff.
What
we're
trying
to
do
is
simplify
the
spec
and
kind
of
finalize
it
so
that
it's
ready
to
release
the
finally
a
v
1.0-
and
this
is
you
know,
after
months
and
months
of
conversation,
but
essentially
to
to
kind
of
go
over
what's
going
on
here
is
we
have
an
overview
section
with
definitions
and
these
these
are
still
up
for
debate.
G
So
I
I
encourage
you
to
look
at
these
and
challenge
that
this
is.
These
are
good
definitions
for
these
things,
but
just
defining
what
push
and
pull
means.
What
a
blob
is
we
keep
talking
about
artifacts,
but
what
what
does
that
mean?
And
then
it
goes
into
kind
of
the
the
meat
of
this
is
the
workflow
categories,
and
this
breaks
down
everything
that
was
in
the
original
dock
into
four
distinct
categories,
which
has
also
been
reflected
in
the
conformance
testing.
So
the
conformance
testing
is
broken
down
like
this
exactly.
G
H
G
G
So
if
you
go
to
the
distribution
spec,
we
have
all
of
the
all
of
the
updates
to
the
spec,
because
it's
such
a
large
change.
What
what?
What
we're
doing
is
opening
tiny,
what
we're
calling
mini
updates,
which
are
just
kind
of
small
things
stacked
on
top
of
each
other
to
be
reviewed
in
order
so
number
five
we've
already
had
four
come
in,
which
are,
I
believe,
all
the
way
up
to
this
section.
So
definitions
and
up
have
all
been
merged.
G
I
guess
that's
a
lot
less
than
the
table
of
contents
was
part
of
that,
and
now
I've
removed
it.
But
this
is
a
pretty
straightforward
one,
that's
just
kind
of
like
overview
of
this
section,
but
once
this
one
is
merged
the
we
really
need
a
lot
of
help,
reviewing
numbers,
six,
seven,
eight
and
nine,
and
so
I'm
hoping
five
can
get
in
within
the
next
few
days.
I
don't
think
it's
there's
a
lot
of
questionable
content
in
there.
Six,
seven
or
eight
are
really
what's
going
to
define
the
spec
and
then
so.
G
G
G
H
H
H
C
C
That
was
literally
the
reason
that
we
had
some
folks
in
the
early
days
ask
for
html,
not
even
they
didn't
not
even
caring
if
it
was
on
a
website,
but
an
html
and
a
pdf
output
of
it,
which
was
a
pain
in
all
of
my
butt
but
the
having
a
live
website,
especially
if
it
was
had
any
notion
of
versioning,
which
might
be
asking
a
lot
right
now,
as
this
is
all
in
the
works,
but
basically
anything
that
gets
tagged
would
could
be
its
own
path
would
be
particularly
great.
C
G
Yeah
and
what
like,
on
that
point,
what
I
just
shared
in
the
chat
is
the
way
that
we
did.
This
was
putting
a
make
target
that
actually
sourced
it
from
a
specific
branch
or
tag
from
distribution
spec.
So
we
could
lock
that
to
1.0,
and
so
the
website
would
always
show
the
1.0
and
not
the
latest,.
H
G
Yeah
I
mean
it
was
just
I
was
just
playing
around
it.
I
just
felt
like
it
was
really
hard
to
show
the
full
end
results
of
these
mini
updates,
so
it
was
either.
G
G
C
G
Well,
yeah,
I
mean
I
think,
a
while
ago
we
were
talking
about
like
distribution
spec
having
its
own
site,
and
then
I
think
it
was
actually
jimmy
that
mentioned
that
oh,
the
open
containers
or
just
when
open
source
should
be
built
on
that.
So
I
really
don't.
I
really
don't
have
strong
opinions,
I'm
just
trying
to
express
the
end
results
more
clearly
to
people
who
are
reviewing.
A
G
C
C
Okay
well,
well,
it's
I'm
not
open
tab
to
review
that,
along
with
a
couple
other
things
so.
H
D
H
G
Like
totally
totally,
I
think
it
should
have
all
of
them
and
it,
but
what's
cool
about
hugo,
which
is
the
that's
the
static
site
generator
for
that
for
the
for
that
site.
It
just
takes
mark
down,
so
we
can
actually,
if
the
other
specs
are
in
markdown,
which
I
think
they
are
you
just
throw
them.
C
C
H
H
C
H
F
G
C
It
would
be
worth
a
try
because
we
did
try
a
few
different
things
and
even
the
even
the
pdfs
and
things
that
we
outputted
still
broke
all
the
links.
It
only
works
on
github
correctly,
so
it's
it's
something
to
pay
attention
to.
If
this
becomes
like
the
canonical,
like
way
that
we
view
which
you
know
this
looks
fine
and
great,
and
I
would
be
fine
with
it
like
things,
look
broken
on
github,
but
they
render
to
the
final
place
correctly.
Then
that's
just
like
a
big
big
like
touch-up
job,
which
is
fine.
C
It's
it's
something
we
iterated
through.
We
ended
up
deciding
that
github
was
the
canonical
like
links,
should
work
correctly
on
github,
even
if
the
rendered
dock
rendered
outputs-
don't
have
you
know
if
they
all
have
broken
links.
That
was
what
we
agreed
to
pretty
much.
So
that
was
just
the
the
decision
point.
That's
all
no
problem.
A
Was
made
on
hugo,
so
I
mean,
if
hugo
doesn't
convert
it
properly,
couldn't
we
just
change
hugo
to
understand
how
to
convert
the
link
to
whatever
it's
output?
Is
this
way
to
get
up
once
when
you
maintain
that
github
and
when
it's
generated
under
you
go
for
a
website,
it
just
generates
the
appropriately.
A
G
D
G
The
takeaway
from
this
is
help
with
the
1.0
prs,
but
also
hugo
is
cool.
So
that's
we
can
talk
about
the
hugo
later.
C
C
F
A
On
normal
schedule-
and
we
will
discuss
if
how
we
want
to
handle
a
european
better
time
or
what's
the
other
reason
of
india
better
time
india
appear,
which
was
time
zones
with
7
a.m,
was
better
than
the
2
p.m.
Pacific.
But
let's
go
back
to
normal
time
for
next
week
and
we
can
from
a
stability
plate
there
decide
what
we
want
to
do.