-
Notifications
You must be signed in to change notification settings - Fork 141
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Suggestion: Add a Getting Started #69
Comments
Why gccgo? We should probably use the "real" Go. |
Yeah, we should use the go package. That's what we use for development/testing, etc. The gcc-go package will be lagging in features/library support. |
Thanks @crosbymichael and @mrunalp. Then should line #3 above be replaced with |
FWIW, I think linking to the guide on golang.org may be a better idea for two reasons:
|
Note: some architectures still aren't supported by the standard |
@cyphar yes, but supporting the "real" Go in the install docs is better, if they need another arch then they will find gccgo and all that it entails. |
How about add a Dockerfile to the 'contrib' directory? |
It is quite easy to test if a runtime passes oci runtime validation by using travis service. |
On Fri, Jun 03, 2016 at 04:51:57AM -0700, 梁辰晔 (Liang Chenye) wrote:
Heh, I think that means we have some holes in our tests ;). For Stepping back and assuming a perfect implementation, I think this is So I think we want to make it easy to validate a runtime with |
I hope every runtime could follow oci spec and use ocitools to verify that. I was thinking of how to 'certify' a runtime, travis is not suitable. In https://github.com/kubernetes/kubernetes, there are some widgets, |
On Mon, Jun 06, 2016 at 12:04:45AM -0700, 梁辰晔 (Liang Chenye) wrote:
I think pushing this off to the runtimes is the wrong approach. For Once you have an OCI-run certification program, they just need a way |
@wking, thanks, I'm reading openbadges.org now. |
As @wking pointed out, the OCI Certification program falls under the purview of the OCI Trademark Board (https://www.opencontainers.org/about/governance)
Initial discussions are around having three levels of certification:
It's still up in the air in terms of how the certification program will be fully defined and administered. It's something we hope to tackle very soon after v1.0 However, I encourage people to improve the tooling as I'm pretty sure we will be using the tooling out of the ocitools and image-spec repos (assuming ocitools isn't merged into runtime-spec) |
On Mon, Jun 06, 2016 at 08:08:16AM -0700, Chris Aniszczyk wrote:
The per-spec certs should probably be broken down further into “is a
+1. |
@wking can you expand a bit on, not sure what you mean by "valid consumer"
|
On Mon, Jun 06, 2016 at 09:11:56AM -0700, Chris Aniszczyk wrote:
‘ocitools validate’ 1 tests the stuff supplied by these people 2 |
@RobDolinMS 8. should be sudo apt-get install go-md2man. |
It may be useful to add a how-to / getting started doc for people who may want to run the OCI Tools on a new, clean VM. (Such a process may also be useful for replicable certification results.)
Please comment and tag me back if it would be helpful for me to create a PR.
With help from @mrunalp, below are instructions that worked for me:
The text was updated successfully, but these errors were encountered: