-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update version #121
Update version #121
Conversation
3a1d6d9
to
0dd7975
Compare
Signed-off-by: zhouhao <[email protected]>
0dd7975
to
5e2f789
Compare
@q384566678 There is a huge change on v1.0.0-rc5 opencontainers/image-spec#533 . This changes the layout, would you mind to change image-tool correspond to the image-spec v1.0.0-rc5? |
@coolljt0725 I am making these corresponding changes, and I think it would be better to submit another change after this PR merge. |
@coolljt0725 I would like to ask, now in the absence of |
On Wed, Feb 22, 2017 at 11:10:05PM -0800, Zhou Hao wrote:
@coolljt0725 I would like to ask, now in the absence of `ref`, how
to use `index.json`to identify `manifest`? Is it by `digest` or
something else?
|
@wking But |
On Thu, Feb 23, 2017 at 05:51:16PM -0800, Zhou Hao wrote:
@wking But `annotation` is optional field, and `ref.name` may also
not exist with annotation. If there is no how to use it?
A name-based API would not be able to access index entries which did
not set org.opencontainers.ref.name. You could define any number of
alternative APIs to access those entries (e.g. by offset in the index
array), but I don't know if image-tools needs to bother with those.
|
@q384566678 I am working on implementing it in |
On |
@q384566678 You cannot "just update the version" -- the specification is not the Go structures included in So, "just updating the version" of the Go structures is actually making So, NACK. I'm also considering closing this because this code will come from |
btw, tests in skopeo are broken and we cannot update to RC5 https://travis-ci.org/projectatomic/skopeo/builds/205841968#L1476 I'm going to comment that test out @cyphar ....this can't just work |
@runcom I was planning on switching the OCI implementation in I'm working on fixing up this project, but it's quite taxing because of the large amounts of things that now need to be spun out of But yeah, sorry about this project being broken for |
LGTM @runcom That doesn't look like a failed test. It looks like a build error. |
@stevvooe This PR does not correctly implement Closing because it's not correct, should not be merged in its current state, and as far as I can tell @q384566678 doesn't appear to want to make it correct. |
@cyphar He is updating a dependency of this project. What is not correct? |
@cyphar we haven't yet merged the RC5 update and we likely won't for now, was just pointing out I found that and I'm commenting some tests in my PR. BTW, the docker/docker PR is updated to use RC5. |
These changes are required, whether there are subsequent required changes or not. I don't see why this is closed. |
The dependency he is updating is
As far as I can tell @q384566678 is not interested in implementing the required I closed it so it doesn't get merged in its current state. |
I think this PR can be shelved first (no need to close). We can wait until |
I'm going to reiterate that this code is going to be replaced with the |
I am waiting for your results. |
LGTM @cyphar There is no mandate for |
@coolljt0725 @xiekeyang PTAL |
sigh Okay. I'm a bit frustrated that we are happy about breaking compat with the spec -- especially since one of the jobs of this project is to validate images. Depending on this project is currently the only way of being somewhat confident that you are on the right track of implementing a valid OCI image handler. |
On Sat, Mar 04, 2017 at 06:41:10AM -0800, Aleksa Sarai wrote:
I'm a bit frustrated that we are happy about breaking compat with
the spec -- especially since one of the jobs of this project is to
**validate** images.
A middle ground between master always targeting a released spec
version [1] and master chasing the spec's master while allowing for
(hopefully temporary) inconsistencies [2] is let these inconsistencies
into master (e.g. by merging this PR as it stands), but then cleaning
up those inconsistencies before you cut the next image-tools release.
Maintaining a corpus of (in)valid images for the target spec
version(s) [3] and marking broken tests would be an easy way to track
outstanding inconsistencies to avoid cutting a release without
addressing them.
[1]: #121 (comment)
[2]: #121 (comment)
[3]: https://groups.google.com/a/opencontainers.org/d/msg/dev/GZ2q3jGlI0w/AUna584QCwAJ
Subject: Re: Merging umoci and image-tools
Date: Fri, 17 Feb 2017 10:15:01 -0800
Message-ID: <[email protected]>
|
ping @opencontainers/image-tools-maintainers I think we need more LGTMs on this one |
@coolljt0725 No we don't, it has enough (2). I've not given this an LGTM for the reasons outlined above, so I'm personally against this being merged (it doesn't accomplish anything meaningful aside from making |
posthumous -1 on this, +1 to cyphar's take. Why can't we just fix up the tooling as we bump the spec? |
I was trying to do this before, but there are some specific problems can not be solved, I am going to solve these problems, I will fix image-tools as soon as possible. |
Ping, any update on this? image-tools has been in this state half-way between -rc4 and -rc5 since this PR landed one month ago; perhaps it is worthy to revert this PR while -rc5 is under work? |
@jonboulle @lucab What is missing here? Could you file an issue identifying the gap? Let's move forward rather than holding things back. |
@q384566678 hi, are you still working on make the image-tool work with |
@coolljt0725 I'm doing it. I've been late for some time. |
Update the image-spec version and fix the relevant code.
Signed-off-by: zhouhao [email protected]