Skip to content

Conversation

@wking
Copy link
Contributor

@wking wking commented Feb 28, 2017

Before this commit, there wasn't something obvious to point to if you wanted to explain the sha256 identifier.

The “SHOULD be submitted” wording follows runtime-spec's example.

Before this commit, there wasn't something obvious to point to if you
wanted to explain the sha256 identifier.

The "SHOULD be submitted" wording follows runtime-spec's example [1].

[1]: https://github.com/opencontainers/runtime-spec/blob/v1.0.0-rc4/config.md#platform

Signed-off-by: W. Trevor King <[email protected]>
@stevvooe
Copy link
Contributor

stevvooe commented Mar 1, 2017

The spec has left the algorithm undefined, purposefully. Defining disallows implementations from choosing other hashes.

Is there anywhere else where we make this distinction?

@wking
Copy link
Contributor Author

wking commented Mar 1, 2017 via email

@jonboulle
Copy link
Contributor

jonboulle commented Mar 1, 2017

LGTM
I also don't see how it disallows/limits anything.

Approved with PullApprove

@stevvooe
Copy link
Contributor

stevvooe commented Mar 1, 2017

I also don't see how it disallows/limits anything.

Saying one thing exists creates the presumption that unmentioned things don't exist.

The format is already defined and documented here. While I wasn't quite accurate above, we already call out a whole section on sha256. This PR just adds more unnecessary indirection. If this actually added value or context, I would be in favor. As it stands, it just plops another table in a confusing spot.

I think the same effect can be had by simply adding a sentence after the following:

While the _algorithm_ component of the digest does allow one to utilize a wide variety of algorithms, compliant implementations SHOULD use [SHA-256](#sha-256).
Digests using this algorithm are identified by a prefix of `sha256`.

If you think a table with one item is great, then fine but this seems better.

@wking
Copy link
Contributor Author

wking commented Mar 1, 2017 via email

@stevvooe
Copy link
Contributor

stevvooe commented Mar 1, 2017

LGTM

@wking Fair enough. I think we can maintain this as a restricted set, but we need to be careful about adding new algorithms. While there are hooks for making it happen, adding support for a new algorithm should not be casual. What sha256 is broken, it will be a once in a decade event.

Approved with PullApprove

@stevvooe stevvooe merged commit 53831a6 into opencontainers:master Mar 1, 2017
@wking wking mentioned this pull request Mar 7, 2017
@wking wking deleted the sha256-algo branch March 7, 2017 21:15
@vbatts vbatts mentioned this pull request May 19, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants