-
Notifications
You must be signed in to change notification settings - Fork 550
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
performance: how can runtime-spec incorporate non container image OCI artifacts lifecycle? #1254
Comments
https://docs.google.com/document/d/1Bs4fnP8rhPMaoPoLSYVvuRq-z9vkGPQ0rKbmfH4I7js/edit#heading=h.xw1gqgyqs5b |
What should we do from the runtime spec side?
In my opinion, it's tough to cover all non-container image types in OCI Runtime Spec. |
runtime spec already assumes a bundle to pivot_root to, so maybe there is nothing to do here. However, perhaps to be aware (currently ideas/possibilities) https://github.com/containerd/runwasi |
If you want us to do it, please update the issue or send out the PR. |
I agree this is probably out of scope here; Docker, containerd, and even k8s fall somewhere between image and runtime/outside runtime. Image is mostly about how to represent the bits/what they mean and runtime assumes they're unpacked and layered already in a fully opaque way (as noted above). On that note though, I believe that containerd already has the primitives necessary for this, and for Docker we've got a proposal at moby/moby#30449 that I haven't seen any active maintainers opposed to -- it just needs an implementation (contributions very welcome). I believe it's even already implemented in BuildKit. |
Requirements from various communities:
The text was updated successfully, but these errors were encountered: