►
Description
wasmCloud is a platform for writing portable business logic that can run anywhere from the edge to the cloud, that boasts a secure-by-default, boilerplate-free developer experience with rapid feedback loop.
A
Welcome
to
awesome
cloud
one
day,
wednesday
for
september,
the
8th,
we're
going
to
start
with
a
a
quick
review
on
the
new
ci
pipeline
and
then
review
on
watsonflood.50
status,
5.0,
and
then
we're
going
to
go
into
some
discussion
around
an
operator
brooks
turn
it
over
to
you.
B
All
right,
hopefully,
should
be
looking
at
a
bunch
of
just
ci
looking
stuff.
A
github
action
is
that
right,
yep,
okay,
cool!
So
over
the
past,
maybe
a
week
week
and
a
half
I've
been
kind
of
overhauling
our
github
actions.
B
All
of
our
ci
cd
is
hosting
github
actions
for
for
what
it's
worth,
and
I
just
wanted
to
show
off
some
of
the
new
architecture
like
some
of
the
new
things
that
I
added
overall,
it
made
rci
a
lot
simpler
and
and
there's
very
little
that
you
have
to
change
going
from
repository
to
repository
to
like
publish
a
crate
or
even
to
publish
like
a
provider
archive
or
an
actor,
so
I'll
just
show
off
a
couple
of
things.
B
They
a
lot
of
the
actions
are
largely
you
know,
kind
of
cut
and
paste
moving
between
repositories
and
I'll
also
talk
about
how
we're
like
reducing
that
cut
and
paste
too.
So
to
start
this
is
the
control
interface,
github
action,
it's
in
the
control
interface
repository
and
it's
essentially
what
publishes
this.
This
is
a
rust
crate.
B
It's
what
publishes
this
to
and
there's
there's
two
parts
of
this
there's
the
jobs
that
we
run
when
you
pr
or
on
any
new,
commit
to
main
and
then
there's
the
there's,
the
actions
that
you
run
when
you
push
a
tag-
and
those
are
two
you
know-
create
a
release
and
then
release
to
create.io.
B
So
the
only
thing
that
runs
when
you
create
a
pr
or
sorry
that
if
you,
if
you
push
a
commit
to
main,
which
we
have
branch
protection
on,
so
everything
happens
through
prs
anyways.
So
if
you
pr
into
main,
then
it
runs.
This
rust
check
action
runs
on
ubuntu.
All
it
does,
is
it
checks
out
the
repository
and
then
runs
the
wasmcloud
common
action
for
rust
check.
So
this
is
the
first
thing
that
we
kind
of
overhauled
for
our
ci.
B
This
is
public.
You
all
are
welcome
to
like
reuse
any
of
them.
I
haven't
actually
versioned
it.
I'll.
B
Probably
publish
a
version
one
once
I've
done,
like
you
know,
running
through
all
of
the
all
the
different
repositories
make
sure
I
don't
have
to
change
anything,
but
all
of
these
actions
are
essentially
reused
throughout
our
github
org
and
I
wrote
some
documentation
here,
but
if
you
look
at
like
the
rust
check
action
that
takes
just
a
single
input
where
the
crate
is
located
in
the
repository
and
then
it
will
check
your
formatting,
for
you
run
cargo
build,
run,
clippy
and
run
cargo
tests
kind
of
just
what
I
talked
about
before,
but
instead
of
copy
and
pasting,
this
entire
thing
everywhere
and
I
get
hoborg.
B
We
just
say
that
we
use
this
action
and
so
that
way
in
the
future.
If
we
wanted
to
change
anything
about
this
specific
action,
we
can
change
it
here
and
it'll
change
it
throughout
our
whole
org
and
as
soon
as
we're
not
like
right
now,
I'm
doing
it
just
off
the
main
branch.
B
We
can
also
do
that
off
of
like
a
version
tag,
so
we
don't
actually
accidentally,
you
know,
create
incompatibilities.
B
What
it
does
is
as
soon
as
the
as
soon
as
the
cargo
build
cargo
test
passes,
it'll
create
a
release
in
github,
so
that
you
can,
you
can
actually
go
and
navigate
to
that
release
with
any
notes
that
we
publish
and
then
it'll
run
the
common
action
for
releasing
to
creates.I
o.
B
That
one
takes,
like
your
crates,
published
token,
that
you
can
use
to
authenticate
and
then
logs
in
for
you
and
then
publishes
your
crate
so
across
this
repository
that
we
have
here
now,
there's
common
things
that
we're
just
copy
pasting
across
like
multiple
github
actions,
and
this
really
helps
with
with
not
repeating
ourselves
in
a
lot
of
different
places
somewhere
else
that
this
really
helps.
Well,
I
mean
still
in
other
github
actions,
but
for
like
publishing
a
capability
provider.
Here,
let
me
go
into
my
pr.
B
Actually
that's
where
the
most
recent
stuff
is
so
for
publishing
a
provider
archive.
We
can
reuse
a
lot
of
these
common
actions
like
we
run
gnats
and
then
run
our
integration
tests,
for
example,
because
we
need
nats
for
the
provider
archives
and
then
we
can
greatly
simplify
the
process
to
like
build
a
provider
archive
by
saying
just
a
just
a
one-liner
to
install
wash
or
a
one-liner
to
install
the
cross
tool
that
we
use
to
like
cross-compile
for
different
architectures.
B
Things
like
that
makes
it
so
much
easier
and
for
these
actions,
where
we
actually
have
these
artifacts,
whether
it's
like
a
provider
archive
or
eventually
for
the
otp
release,
where
we're
going
to
have
the
gzipped
tar
balls
for
your
architecture
and
your
operating
system.
What
we
do
is
we
I'm
sorry,
I'm
losing
my
stuff.
We
we
attach
that
to
the
github
release.
B
So
if
I
look
at
the
this
is
just
like
a
test
release
to
show
you
what
this
looks
like.
But
when
we
release
the
wasn't
cloud:
http
server
provider,
that's
going
to
go
into
our
azure
container
registry,
but
it's
also
going
to
be
present
here
on
the
github
release,
and
so
that
gives
another
option
if
you
want
to
not
exactly
sure
the
exact
scenario
where
you
like,
wouldn't
have
wash
or
wouldn't
want
to
download
it
from
the
azure
container
registry.
B
So
I
think
that's
most
of
what
I
wanted
to
talk
about
in
terms
of
github
actions.
Our
otp
actions
are
probably
some
of
the
most
complex
just
because
there's
lots
of
steps
for
elixir
for
for
building,
and
you
know
the
the
cargo
clippy
equivalent
like
credo
or
credo.
I
don't
know
and
dialyzer
for
elixir,
so
I
think
there's
some
opportunities
to
move
these
into
the
common
action
repository
and
largely
across
the
github
org.
We
have
ci
with
github
actions
in
place
to
like
publish
our
crates
and
publish
our
artifacts.
B
So
it's
been
a
lot
of
work
up
front
to
get
this
all
working
well,
but
now
you
know
once
it's
tried
and
true
and
we
release
using
automation.
We
can
just
build
off
of
that
forever.
B
Anybody
have
any
questions
or
want
me
to
go
talk
about
any
specific
step.
Hopefully
I
didn't
gloss
over
any
any.
You
know
cool
things
about
the
common
actions
or
anything,
but
I'm
pretty
proud
of
how
this
turned
out.
C
Yeah,
that's
pretty
sweet
yeah,
I
didn't
know.
I
didn't
know
that
the
common
actions
could
be
so
simple.
I
thought
that
you
I
mean,
I
think
I
wrote
or
debugged
at
least
an
action
that
was
written
in
typescript.
I
didn't
know
that
you
could
just
do
them
so
easily
and
yeah.
It's
pretty
nice.
A
Yeah
great
tour
brooks
thank
you
so
much.
I
really
appreciate
you
taking
the
time
to
do
that.
A
real,
quick
david.
I
know
you
have
a
bunch
of
stuff
you
want
to
talk
about
today.
Steve
you
mind,
giving
us
a
quick
update
on
the
0.5
release
of
losing
cloud.
Yes,.
D
Sure
and
just
wanted
to
say,
I
think
it's
really
awesome
this.
The
automation
that
brooks
is
doing.
We
have
over
30,
probably
closer
to
40,
rust
crates,
and
so
any
code
savings
we
can
do
is
a
big
is
a
big
win.
Any
avoiding
duplication
is
a
big
win,
so
I'm
going
to
share
screen
with
the
zenhub
board.
D
All
right,
you're,
seeing
my
browser
that
says,
wasn't
cloud
0.50
right,
yep,
okay,
this
is
a
release
report
that
shows
a
sort
of
a
burn
up
chart
and
we're
still
as
an
organization
getting
used
to
these
things.
There
are
some
stories
that
had
a
large
number
of
points
that
we
did
in
the
end,
so
that
this
slope
of
our
velocity
is
increased,
but
we're
tracking
this
we're
tracking
this
towards
completion,
we're
primarily
working
on
documentation
and
examples.
D
Here's
a
stuff
stuff
we're
working
on
now
includes
the
the
github
actions
that
brooks
working
on
tutorials
and
demos
and
so
we're
getting
closer
and
closer.
I
I
put
a
screenshot
of
the
of
this
graph
in
the
slack
chat
yesterday.
If
people
are
really
interested,
I
could
do
that
more
often,
just
let
me
know
send
a
message
in
slack.
D
Zoom
is
blocking
you
from
yeah.
Zoom
is
blocking
me
well,
let's
here
so
here's
here's
one
example
of
the
run.
We
started
start
an
actor,
so
this
is
what's
going
to
show
up
on
wisdomcloud.dev
walking
through.
How
do
you
set
up
link
definitions?
How
do
you
get
started?
We
have
you
through
the
code.
Generator
there's
also
walk
you
through
the
update
process.
So
if
you
update
your
code,
then
you
need
to
push
the
result
and
update
and
test
it.
So
all
of
that's
in
there
as
well.
D
A
A
So
we
still,
I
think,
have
some
more
work
to
do
on
being
more
transparent
on
this
or
find
a
system
that
lets
us
accomplish
the
organization
of
releases
across
a
wide
variety
of
repositories
like
what
we're
doing
now,
so
we're
still
maybe
on
the
hunt
for
that
and
screenshot
to
print
yeah
yeah,
we'll
we'll
see
how
we
can
get
that
out
a
little
further
here
and
I
think,
there's
also
actually
on
the
red
badger
side.
A
Now
that
you
guys
you
guys,
are
all
added
to
the
repo
on
on
the
next
topic
here.
So
I
think
you
guys
actually
would
should
be
able
to
see
this
now.
Is
that
right,
steve
like
if
you're
in
the
org
it
shows
up
for
you.
D
A
Okay,
well
we'll
see
if
we
can
maybe
just
circulate
that
link
a
little
bit
and
see
if
it
works
for
you
as
we
move
in
david.
I
know.
Oh
sorry,.
D
Can
I
can
I
follow
up
on
on
liam's
point
more
specifically.
We
we
do
want
to
be
transparent
about
this,
and
I
don't
get
too
many
responses
to
the
weekly
updates.
So
if,
if
you
feel
like
you
have
a
way
to
describe
the
information
that
you'd
like
or
a
form,
that
would
be
helpful
for
you
to
follow
along.
Please,
please.
Let
me
know
because
I
don't
want
to
keep.
I
don't
want
to
keep
doing
something.
That's
not
useful.
A
Thanks,
thank
you.
So
much
steve
awesome
work.
I
really
appreciate
all
the
facilitation
you're
doing
and
the
organization
there.
I
think
it's
super
helpful
david.
I
think
we're
back
to
the
discussion
you
guys
were
having
when
we
when
we
I
kicked
off
here,
I
don't
know,
does
it
make
sense
for
you
or
kevin,
maybe
to
do
a
quick,
high-level
overview
for
what
the
discussion
was
about
and
then
you
guys
can
dive
right
back
into
it.
C
So
the
dream,
the
dream
dream
goal,
I
guess
is
for
you
to
say,
keep
control
apply.
You
put.
This
is
my
dream
goal
it
might
not
align
with
anyone
else's.
You
put
your
application
like
a
single
resource
that
describes
your
application,
that
something
like
kuvela
can
read
and
also
some
theoretical
welcome
cloud
operator
can
read
and
then
kuvela
will
set
up
like
pods
like
if
you
need
to
actually
do
the
top
level.
C
Like
wasn't
cloud
pods
and
like
scale
the
wasn't
cloud
pods
horizontally,
then
you
would
like
you
could
get
cubella
to
do
that.
Maybe
and
then
and
then
question
mark
question
what
question
mark
and
then
profit.
C
No
sorry
so
and
then
so
we
feed
like
the
intention
to
the
last
controller,
this
theoretical
license
controller,
which
sits
like
talking
over
gnats,
with,
like
a
recording
of
what
the
intention
is
and
also
the
ability
to
query
the
hosts
for
what
reality
is,
and
the
intention
like
the
lattice
controller's
job
is
to
make
reality
like
reflect
the
intentions
that
you
have
and
then
and
then
I'm
not
actually
sure,
like
I'm,
not
actually
sure
what
this
path
looks
like.
C
But
then
I've
never
actually
written
a
kubernetes
operator.
So
I'm
like
the
least
qualified
person
to
talk
about
this,
which
is
why
I'm
picking
janitor's
brain
and
desperately
trying
to
depict
anything,
I
think,
has
written
one.
E
E
I
think
it
it's
quite
a
nice
idea
to
visualize
like
an
argo
cd
browser
ui
with
the
tree
of
all
the
kubernetes
resources
and
the
status
of
those
and-
and
you
know,
an
operator
will
pick
one
of
those
up
and
potentially
picks
up
a
parent
resource,
creates
child
resources
etc,
which
either
do
something
or
don't
do
something,
and
those
child
resources
are
often
just
used
to
store
the
status
of
those
resources,
whether
they're,
real
or
not,
because
at
the
end
of
the
day,
they're
just
records
in
etcd,
I
mean
it's
just
just
a
custom
resource
so
think
about
the
way
cert
manager
works.
E
E
So
I
don't
think
it's
uncommon
for
an
operator
to
create
child
custom
resources
and
kubernetes,
regardless
of
whether
they
refer
to
any
physical
thing
or
not,
and
so
well.
Cooper
is
a
is
an
operator
for
kubernetes
that
works
with
oam
and
it
I
thought
I'd
look
into
it
more
because
you
know
I
don't
particularly
think
we
should
necessarily
spend
a
lot
of
effort
writing
an
operator
if
this
one
already
exists.
It
works
with
the
file
type
that
we're.
E
You
know
with
this
crd
that
we're
going
to
use-
and
I
also
think,
there's
some
benefit
in
having
an
oam
custom
resource
application,
resource
that
contains
potentially
a
mix
of
actors
and
capability
providers
for
wasn't
cloud
and
kubernetes,
pods
or
deployments
or
whatever
that
what
serve
microservices,
that
you
know
talk
to
each
other
like
a
redis
database
or
an
ingo
skate,
where,
whatever
whatever
it
is,
so
I
think
something
quite
nice
about
having
an
oam
resource
that
contains
the
whole
description
of
your
application.
E
Regardless
of
whether
it's
you
know
bits,
the
actors
and
the
capability
providers
are
working
running
in
wasn't
cloud
everything
else
running
in
kubernetes,
and
so,
if
we
follow
that
model
further,
then
the
operator
would
also
create
custom
resources
for
actors
and
capability
providers
that
were
just
dummy
placeholders
effectively
for
the
real
things
running,
wasn't
cloud,
and
then
they
become
a
receptacle
for
status.
E
Information
coming
back
from
what's
cloud
so,
for
instance,
if
you
were
looking
at
your
whole
application
as
a
tree
in
an
argo
cd
web
browser,
you
would
see
the
actors
and
capabilities
capability
providers
named
and
containing
information
which
you
can
use,
including
the
status
like
whether
they're,
healthy
and
not
and
they'd,
be
linked
back
to
their
parent,
which
would
be
the
oem
application
resource.
E
So
that
could
work
quite
nicely
so
you'd
have
you
could
almost
potentially
have
cuvela
at
the
front
doing
the
operator
bit
producing
and
I've
already
got
this
working
as
a
sort
of
like
a
stunt
hack,
creating
application,
sorry,
creating
actor
and
capability
provider.
It's
just
dummy
ones
doesn't
do
anything
else.
Just
creates
those
resources,
and
then
couple
also
has
this
new
new
new
functionality
called
workflows,
which
you
can
use
to
sort
of
orchestrate
how
those
resources
are
actually
created.
Maybe
there's
an
order
to
them.
E
Maybe
you
want
to
do
something
at
the
end
or
at
the
beginning,
or
you
know
like
a
bit
a
bit
like
helm
hawks,
I
guess,
but
on
steroids,
and
it
looks
really
cool.
So
you
can
use
the
q
templating
language
to
write
these
workflows
and
they
can
call
out
to
do
things,
and
so
I
actually
got
a
cube
bella
watching
an
app
application
resource,
creating
access
and
capability
custom
resources
and
then
once
it
had
done,
though,
that
it
then
posted
the
parent
oam
application
resource
to
an
http
endpoint.
E
My
online
macbook,
which
I
just
used
to
demonstrate
the
principle.
Basically
so
it
I
guess
what
I'm
saying
is:
cool
vala
could
create
the
resources
that
just
act
as
receptacles
for
status,
and
once
it's
done
once
it's
done
those
on
every
change
to
the
oem.
It
would
basically
make
sure
that
everything
was
in
sync
and
post
it
somewhere
and
that
could
be
pushing
it
to
an
outstanding
topic,
so
we
could
actually
have
with
cooper.
We
could
have
that
goodness
operator
without
doing
very
much
at
all,
but
it's
just
an
idea.
F
So
I'm
curious,
I'm
curious
to
see
how
that
works
out,
because
when
at
least
from
my
poking
around
with
cabela
the
it's
mostly
like
a
templating
engine,
where
you
know
you,
you
define
what
you
want
in
terms
of
oam
primitives
and
then
you
know,
based
on
the
type
of
thing
that
you've
got
loaded
in
cabela.
F
It's
then
able
to
produce
text
files,
gamma
files
and
things
like
that
based
on
parsing
through
that
oem
file,
and
so
it
may
be
too
generic
in
some
sense,
in
that
the
the
lattice
controller
is
designed
to
operate
on
an
entire
oem,
app
spec
model,
and
so
whether
or
not
cubella
is
involved,
the
lattice
controller
doesn't
really
care.
Although
all
it's
really
using
is
oam.
And
so
you
know,
people
with
more
experience
can
certainly
decide.
F
As
reported
by
the
lattice
controller,
because
the
the
plan
there
is
that,
in
addition
to
the
lattice
controller,
managing
the
the
deployment
on
the
lattice,
it's
also
going
to
expose
query
functions
that
you
can
use
to
query
the
status
of
the
deployment
and
potentially
do
things
like
get.
You
know
an
event
stream
so
that
you
can
hook
into
things
like
the
change
event
on
a
crd
and
kubernetes.
E
I
like
that,
I
like
that
idea,
even
more
actually,
because
you
know
what's
implied,
has
it
has
its
has
the
wash
board,
and
you
know
its
own
set
of
tools
for
reporting
all
the
status
of
everything,
and
you
really
don't
want
to
necessarily
replicate
that
in
kubernetes.
So
I
I
like
the
idea
of
having
a
less
granular
model.
So
in
other
words,
you
wouldn't
rep,
you
wouldn't
model
the
wasn't
cloud
environment
in
kubernetes
at
all,
yeah
right.
F
Yes,
that
was
the
thing.
Is
I
worried
that
attempting
to
create
crds
for
that
have
parity
with
low
level
wisdom
cloud
primitives
might.
F
Adding
more
work
than
you
need
yeah,
because
the
lattice
controller
is
already
keeping
track
of
all
the
low-level
primitives
and
bubbling
up
high-level
events,
so
it
might
be
worth
it
to
just
create.
You
know
a
crd
that
represents
a
single
wasm
cloud
deployment
and
you
know,
then
all
you
have
to
do
is
ask
the
lattice
controller,
hey.
What's
the
status
of
deployment
with
this
name
and
and
now
your
operator
is
complete.
H
Because
for
the
status
you
can
have
and
put
whatever
you
actually
want
in
there,
because
it's
actually
its
own
structure,
as
I'm
sure,
and
everybody
else
is
aware
of
and
yeah.
If
you
just
have
one-
and
I
guess
so,
it
sounds
really
like
the
intent
here
is.
The
operator
is
just
a
way
to
report
status
back
use,
so
you
can
view
it
through
keep
cuddle
or
whatever
else,
actually
interfaces
with
cube
cuddle
or
that
api.
Otherwise,
it's
actually
it's
basically
a
dumb
listener
right.
You
don't
want
any
actions
to
go
through.
F
Right,
I
mean,
I
think
the
only
thing
you'd
want
to
do
is
keep
cuddle
apply,
which
would
then
you
know
downstream
produce
the
lattice
controller's
oam
file
and
send
that
to
the
lattice
controller.
And
then
you
theoretically
have
a
one-to-one
correlation
between
the
crd
and
the
wireless
controllers.
Manage
deployment.
H
C
F
F
F
C
Right,
okay,
you
wouldn't
trying
to
interleave
it
with
like,
like
a
cabela,
I
am
you'd,
have
you'd
have
a
couple
of
oem
for
like
the
like
infrastructure
app.
If
you
want,
you
want
to
call
it
like
the
framework
and
then
in
then
then
a
separate
swarm
aside
for
the
wasn't
that
I
guess
that
makes
sense.
E
E
Tricky,
though,
because
because
oem
has
specific
groups
and
kinds
right,
api.
F
The
one
for
the
wasm
cloud
app
spec,
the
the
group
on
it,
is
different,
so
you
can
use
that
to
differentiate
between,
like,
like
say,
a
a
super
or
a
higher
level,
app
spec
and
then
within
that
you
could
have
as
one
of
those
components
maybe
a
wise
and
cloud
aspect.
F
F
Yeah
you,
you
wanna,
you
wanna,
set
the
the
kubernetes
controller
up
so
that
it
works
just
on
stand
on.
You
know,
standard
operator,
primitives
and
wouldn't
require
interrupt
with
cabela.
G
F
Because,
if
cabela's
doing
its
job,
then
it
can
pretend
to
it's:
it's
essentially
just
a
source
of
additional
text
files
right,
so
it
can
it
can
shove,
yaml
files
or
whatever
kind
of
files
you
want
into
any
target.
You
want.
H
F
Construction,
the
there
is
a
there
is
a
spec
for
the
oam
file
or
the
oam
object
that
it
accepts
for
for
putting
a
a
new
management
cloud
deployment.
So
that
part
is
at
least
done.
So
you
know
creating
a
new
deployment
should
be
fairly
straightforward.
The
other
stuff
like
querying
the
status
and
things
like
that,
those
those
data
structures
will
have
to
discover
as
stuff
gets
built,
but
I'll
post
straight
to
the
wisem
cloud,
slack
channel
a
copy
of
the
the
latest
oem
file
or
a
sample
oam
file.
A
It's
a
really
robust
discussion
kevin.
I
know
if
you're
sharing
those
do
we
need
to,
and
I
think
I
really
appreciate-
we've
actually
learned
a
lot
by
trying
some
quick
pocs
around
this.
Does
it
make
sense
for
us
to
put
our
collective
heads
together
and
capture
this
as
a
as
an
rfc
or
an
rfp?
Maybe
the
lattice
controller
started
out
as
an
rfc.
It's
already
there
absolutely,
but
to
connect
the
rest
of
the
stack
up
here.
I
think
that
there
is
some
pretty
significant
alignment.
A
Do
we
do
a
operator
rfc
so
that
we
get
a
line
there
and
then
we
can
maybe
plan.
You
know
execution
yeah.
That
sounds
like
a
good
idea.
I
not
sure
that
I
could
capture
the
rfc
here.
Did
somebody
feel
like
they
were
following
along?
Could
get
this
sketched
out
in
a
way
that
in
a
into
a
ticket
up
on
github,
so
we
can
get
this
rfc
crafted?
Did
anybody
want
to
take
the
lead
on
that.
C
Flinching
you
david
you're,
looking
at
me,
okay!
Well,
if
it's
happening
it's
happening
next
week,
okay,
yeah.
A
C
A
Yeah,
this
is
important,
not
urgent.
Thank
you
david.
I
really
appreciate
that
that'd
be
awesome,
I'm
quite
happy
to
help
with
it
as
well,
david
just.
C
C
Okay,
we'll
work
out
like
so
in
terms,
I
feel,
like
we've
got
in
our
heads
like
a
reasonable
idea
of
like
what
the
minimal
like
operator
actually
looks
like
in
terms
of
its
traffic
flow
in
both
directions.
That
sounds
good
and
you've
got
a
skeleton.
C
F
Go
has
the
the
first
class
they
they
get
all
the
goodies
before
everybody
else
does
for
nasa.
C
If
we
jump,
if
we're
jumping
onto
like
implementation,
not
just
specification
like
an
implementation,
is
based
off
that
that
go
based
like
skeleton
like
it
probably
is
a
reasonable
start.
So
yeah.
C
Okay
right
we're
writing
things
up,
but
yeah
like
let's
get
demo
working
for
coupon
this
week
and
all
right
I'll
finish
it.
Unless
someone
else
jumps
in
and
starts
a
pr
like
we
make
vr
for
the
rfc
and
like
have
multiple
people
make
sub
pr's
to
modify
it.
If
you
want
yeah.
E
A
A
Everybody
feels
positively
about
kubernetes,
so
I
just
wanted
to
maybe
socialize
my
perspective
on
it
and
see
if
there
was
some
alignment
you
know
I
have
really
advocated
for
us
investing
here
and
building
tooling
and
connecting
to
where
people
are
today,
because
I
want
to
be
able
to
take
them
to
a
different
place
and
if
you
in
big
enterprises,
my
perspective
is
that
it
takes
so
long
for
them
to
build
up
the
infrastructure
and
get
all
their
boxes,
checked
and
aligned
with
policy
and
procedure
and
have
security
and
scanning
and
governance
and
legal
and
compliance
and
all
the
other
orgs
there
that
we
can
dramatically
accelerate
the
adoption
of
wasn't
cloud
by
investing
a
little
bit
of
time
now
in
order
to
be
compatible
with
their
community
and
the
ecosystem.
A
And
obviously
my
hope
would
be
is:
is
that
as
we
mature,
our
ecosystem
and
other
options
emerge
or
other
design
patterns
and
other
architecture
evolves
that
we
could
bridge
them
out
there?
Does
anybody
have
a
different
perspective
that
they
want
to
share
or
feel
strongly
against?
That,
or
for
that.
F
Sorry
kevin
go
ahead.
Yeah,
you
know
you
can
deploy
the
wasm
cloud
host
in
kubernetes
pods
just
as
easily
as
you
can
on
bare
metal
and
on
raspberry
pi's
and
so
on
so
they're
the
we
continue
to
have,
as
we
you
know,
add
features.
Our
roadmap
essentially
requires
that
you
know
we.
We
maintain
a
a
firm
stance
that
our
stuff
is
compatible
with,
but
not
dependent
upon.
A
Yeah
I
mean
this:
is
you
know
the
world
the
world
kind
of
changes?
You
know,
as
we
kind
of
think
about
these.
You
know
epics
of
computing
here
you
know
with
a
web
assembly,
because
the
fundamental
nature
of
the
unit
of
compute
is
kind
of
changing.
Here
right,
you
know
we're
not
moving
from
a
abstraction
of
a
virtual
machine,
an
abstraction
of
a
linux
environment,
we're
now
to
we're
back
to
an
abstraction
of
a
cpu.
You
know
it's
almost
like
recursive
when
you
think
about
it.
A
That
way,
except
there's,
you
know
no
operating
system
in
here.
We've
just
got
our
wasn't
cloud
shim
that
pulls
us
up
into
the
future
in
the
future.
We
will
have.
You
know,
wazi
sitting
on
top
of
this
stuff,
to
give
us
some.
You
know
some
operating
system
type
primitives,
but
the
way
that
we've
always
built
wasmcloud
is
so
that
it's
completely
compatible
with
and
those
features
would
just
flow
right
into
either
a
capability
provider
or
just
naturally
into
the
project
there.
But
that's
that's
where
I've
done
this.
A
I
had
a
couple
of
people.
Ask
me
to
do
a
version
of
this,
but
to
put
the
orchestrator
technologies
in
here
so
to
you
know,
put
a
cloud
in
the
stack.
You
know
to
put
a
kubernetes
in
the
stack
here,
so
I
may
take
another
pass
at
these.
A
If
folks
have
thoughts
on
trying
to
figure
out
how
we
can
surface
those,
but
again,
this
is
the
world
that
I
feel
like
we're
really
building
for
with
a
huge
emphasis
down
at
this
end,
where
I
mean
we
run
everywhere,
webassembly
does,
and
that
includes
you
know,
native
silicon
without
kubernetes.
Maybe
I
should
illustrate
that
on
here,
pull
kubernetes
back
a
bit
on
kubernetes
directly
in
the
web
browser
or
directly
on
the
devices
themselves
with
the
sort
of
cross
connections
there
strategically.
A
Yep
yep,
I
I
mean
the
the
investment
that
the
the
years
it
takes
for
an
enterprise
to
support
this,
which
is
what
they've
spent
the
last
seven
years
building
is
not
easily
turned
over.
You
know
it
involves.
You
know
in
large,
highly
regulated,
orgs
policies
and
procedures
going
to
the
board
of
directors
being
approved.
You
know
and
then
coming
back
down.
You
know
at
least
the
the
policies
and
then
the
procedures
you
know,
like
the
actual.
How
do
we
do
this?
A
You
know
getting
implemented
here,
so
it's
going
to
take
the
enterprise
a
while
to
catch
up
with
you
know
in
a
world
where
you
know
you
execute
in
other
people's
environments.
A
How
do
you
think
about
writing
policy
and
procedure
for
that
and
they're
already
doing
it
now
with
stuff
like
web
browsers,
but
it
just
becomes
more
real
to
them
when
they're
thinking
about
executing
on
like
an
alexa
or
refrigerator,
or
you
know
something
down
at
this
end
where
we
may
not
have
kubernetes,
you
know,
there's
some
lower
bound
where
we
stop
kubernetes
or
we
or
we
don't
run
this
in
the
browser
so
I'll.
A
I
think
it's
just
really
helpful
for
us
all
to
kind
of
understand
that
why
we're
you
know
doing
these
investments
in
and
being
compatible
with,
where
the
enterprise
is
today,
so
that
we
all
make
sense
strategically
there
open
floor.
Any
other
comments
on
that
before
we
just
move
on
to
another
topic.
A
All
right
super,
a
quick
community
updates.
We've
got
the
watsoncloud.50
release
party
being
planned
right
now,
so
we'll
do
a
try
to
do
an
evening
with
suburban
and
a
one-hour
demo
sponsored
by
cosmonic.
We
have
a
wasm
day
coming
up
on
october.
12Th
schedule
was
been
published,
it's
about
to
be
rearranged,
and
we've
done
a
draft
of
that.
We'll
publish
that
next
week,
where
we
call
out
who's
remote
and
virtual,
and
then
who
is
in
theory
in
person
right
now.
A
I
still
am
skeptical
personally
that
that's
going
to
happen,
but
I
do
plan
on
being
there
and
out
at
the
booth
and
then,
of
course,
we've
got
kubecon
eu
there's
another
community
event
that
was
announced
on
september.
The
22nd
wasn't
three
something
or
other
I'll
link
it
in
the
notes.
It's
a
walk
through
and
make
sure
we
put
it
on
slack
in
case
anybody
wants
to
attend.
There
will
be
a
discount
coupon
put
in
this
week
for
anyone
that
still
needs
to
register
for
kubecon
or
wasmday.
A
I
will
likely
have
some
additional
free
passes
this
year.
If
you're
waiting
to
the
last
minute,
you
can
ask
me
for
those.
If
I
have
any
left,
but
we're
gonna
put
a
20
discount
code
in
through
the
wasm
weekly
newsletter
this
week
and
I'll
drop
it
into
our
slack
as
well
in
case
anybody
wants
to
grab
it
any
other
community
news
or
activity
folks
have
anything
going
on.
They'd
want
to
highlight.
A
All
right
open
floor,
any
rfc
rfcs
to
circulate-
or
I
think
we're
all
you
know,
hustling
on
our
kubecon
deliverables
and
the
50
release
anything
else.