You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
This issue is more of a discussion type, than a concreate feature request.
This issue was prompted by a discussion on the wasmcloud slack.
When pushing an OCI image with wash, how do we want build provenance to be propagated?
The OCI spec contains quite a few pre-defined annotation keys for embedding provenance in the image (org.opencontainers.image.[authors,url,source,documentation,version,etc]).
Some registry implementations like GitHub Packages uses the org.opencontainers.image.source information to connect the pushed image to the specific repository. If the information is missing you will have to manually link them.
Having provenance information embedded in the image is a good thing for inspecting origin or opening up the provider or component image to platform policies.
When and how?
wash push supports adding annotations today with the -a flag and is opt-in. Which is a good thing.
At what level should convenience helpers be implemented?:
Closer to the project native tooling?
Upstream work?
Closer to the product/ecosystem adopted? (example: github action)
A component or provider image without any metadata feels rather suspect and not something I personally would run in any important environment.
Of the pre-defined annotations in OCI spec, which of this should be subject to information leakage scrutiny?
Describe the solution you'd like
I would like to see some alignment with upstream wasi work and oci annotation intent. It can be opt-in, but images without atlest some provenance feels wrong.
Describe alternatives you've considered
Using the "-a" flag in wash push in our own ci/cd and try to follow the oci spec intentions.
Affected project(s)
Is your feature request related to a problem? Please describe.
When pushing an OCI image with
wash
, how do we want build provenance to be propagated?The OCI spec contains quite a few pre-defined annotation keys for embedding provenance in the image (org.opencontainers.image.[authors,url,source,documentation,version,etc]).
Some registry implementations like GitHub Packages uses the
org.opencontainers.image.source
information to connect the pushed image to the specific repository. If the information is missing you will have to manually link them.Having provenance information embedded in the image is a good thing for inspecting origin or opening up the provider or component image to platform policies.
When and how?
wash push
supports adding annotations today with the-a
flag and is opt-in. Which is a good thing.At what level should convenience helpers be implemented?:
A component or provider image without any metadata feels rather suspect and not something I personally would run in any important environment.
Of the pre-defined annotations in OCI spec, which of this should be subject to information leakage scrutiny?
Describe the solution you'd like
I would like to see some alignment with upstream wasi work and oci annotation intent. It can be opt-in, but images without atlest some provenance feels wrong.
Describe alternatives you've considered
Using the "-a" flag in wash push in our own ci/cd and try to follow the oci spec intentions.
Additional context
Other somewhat related issues in wasmcloud project:
The text was updated successfully, but these errors were encountered: