-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Convert a serialization config JSON to a OCI runtime configuration. #25
Comments
From @wking on May 25, 2016 3:17 On Tue, May 24, 2016 at 06:44:43PM -0700, Sergiusz Urbaniak wrote:
I don't think this is possible. For example, the image-spec schema Stepping back, I see no reason for the image-spec repo to care about If the “we don't care what's inside the directory” approach from my
|
@wking exposed ports is useful metadata from the image. I think it needs to exist to retain useful UX from builder to runner. I am really really unclear on what you want to see here. Furthermore, retaining the UX of container runtimes is a desirable part of the spec and explicitly called out in the README and image format spec project proposal:
|
From @wking on May 25, 2016 15:44 On Wed, May 25, 2016 at 08:22:16AM -0700, Brandon Philips wrote:
Then I think you want to file a PR against runtime-spec (or a
As I understand it, #82 handles unpacking a local directory from layer Teaching image-spec about what's inside the distributed directory |
@wking the runtime can IGNORE this information and it can be used by a higher level system. I will file an issue about how to convert it but I don't think dropping it makes sense. |
@wking I disagree with your suggestion of the split. The image format needs a way of expressing runtime defaults that aren't host specific which the runtime spec has not tackled and made difficult by recombining everything into a single config.json. |
From @wking on May 25, 2016 20:21 On Wed, May 25, 2016 at 09:11:49AM -0700, Brandon Philips wrote:
And I'm fine with that, although I think we want to be careful about
I think that such a narrowly-scoped image-spec would be easier to
With the narrowly-scoped image-spec, you can add as many localization On Wed, May 25, 2016 at 09:13:45AM -0700, Brandon Philips wrote:
The orchestration layer needs to do that sort of thing, but I don't |
I think what we should do is just have an annotation on the runtime spec config that lists the exposed ports. Something like:
Then that can be consumed by whatever tool is setting up the networking. |
From @wking on June 7, 2016 16:57 On Mon, Jun 06, 2016 at 10:50:41PM -0700, Brandon Philips wrote:
This approach doesn't work as well for more complex values like the |
To what end do we add stuff to the runtime config.json though? We could simply say that the original manifest sits inside the bundle instead. The reason this annotation is needed in the container runtime is because presumably an OCI network plugin would need to read this to setup forwarding firewalls or something. cc @opencontainers/runtime-spec-maintainers to discuss. @mrunalp lets put this on the agenda tomorrow on how these things interoperate. |
From @wking on June 7, 2016 23:45 On Tue, Jun 07, 2016 at 04:40:25PM -0700, Brandon Philips wrote:
“copy the full serialization config to separate file” was one of my
And they can access that information in the bundle directory without |
@wking fair point. I think the runtime spec maintainers should chime in on this point of external files vs serialized metadata into the config.json. |
From @wking on June 8, 2016 4:17 On Tue, Jun 07, 2016 at 04:50:56PM -0700, Brandon Philips wrote:
I've filed opencontainers/runtime-spec#492 to see if they have any |
From @wking on June 14, 2016 16:20 On Wed, May 25, 2016 at 01:21:39PM -0700, W. Trevor King wrote 1:
Trying another angle at this… If the mapping from RunConfig 2 to runtime-spec's config.json 3 is
The only possible benefit I see to funneling through RunConfig is that |
@wking the main reason for keeping the config format as-is: 7.g "The first version of the OCI Specification should strive to be backwards compatible with the initial container image format..." We might add a new media-type to the image spec to allow folks to provide a runtime spec directly but in its current form this spec only requires users to change the media-types in the manifest with a |
From @wking on June 14, 2016 18:56 On Tue, Jun 14, 2016 at 10:17:46AM -0700, Brandon Philips wrote:
I'm not clear on spec entries for backwards compat vs. tooling support |
@wking There is a cost to throwing out backwards compatibility at the format level: large numbers of objects in a registry CAS need to be re-interpreted. Because only the manifest and manifest list change with the |
From @wking on June 15, 2016 15:49 On Wed, Jun 15, 2016 at 07:59:45AM -0700, Brandon Philips wrote:
That's only true if you want the registry to translate versions on the |
From @s-urbaniak on May 25, 2016 1:44
As per opencontainers/image-spec#82 (comment): Currently, the
oci-image-tool
supports a simple unpacking mechanism to inspect deflated images and validation.More concretely the config/image JSON https://github.com/opencontainers/image-spec/blob/master/serialization.md#image-json-description has to be converted to a https://github.com/opencontainers/runtime-spec/blob/master/config.md#container-configuration-file.
Copied from original issue: opencontainers/image-spec#87
The text was updated successfully, but these errors were encountered: