-
Notifications
You must be signed in to change notification settings - Fork 549
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
performance: how can runtime-spec incorporate non container image OCI artifacts lifecycle? #1254
Comments
https://docs.google.com/document/d/1Bs4fnP8rhPMaoPoLSYVvuRq-z9vkGPQ0rKbmfH4I7js/edit#heading=h.xw1gqgyqs5b |
What should we do from the runtime spec side?
In my opinion, it's tough to cover all non-container image types in OCI Runtime Spec. |
runtime spec already assumes a bundle to pivot_root to, so maybe there is nothing to do here. However, perhaps to be aware (currently ideas/possibilities) https://github.com/containerd/runwasi |
If you want us to do it, please update the issue or send out the PR. |
I agree this is probably out of scope here; Docker, containerd, and even k8s fall somewhere between image and runtime/outside runtime. Image is mostly about how to represent the bits/what they mean and runtime assumes they're unpacked and layered already in a fully opaque way (as noted above). On that note though, I believe that containerd already has the primitives necessary for this, and for Docker we've got a proposal at moby/moby#30449 that I haven't seen any active maintainers opposed to -- it just needs an implementation (contributions very welcome). I believe it's even already implemented in BuildKit. |
Requirements from various communities:
The text was updated successfully, but these errors were encountered: