Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

descriptor: Define the 'sha256' algo identifier #587

Merged
merged 1 commit into from
Mar 1, 2017

Conversation

wking
Copy link
Contributor

@wking wking commented Feb 28, 2017

Before this commit, there wasn't something obvious to point to if you wanted to explain the sha256 identifier.

The “SHOULD be submitted” wording follows runtime-spec's example.

Before this commit, there wasn't something obvious to point to if you
wanted to explain the sha256 identifier.

The "SHOULD be submitted" wording follows runtime-spec's example [1].

[1]: https://github.com/opencontainers/runtime-spec/blob/v1.0.0-rc4/config.md#platform

Signed-off-by: W. Trevor King <wking@tremily.us>
@stevvooe
Copy link
Contributor

stevvooe commented Mar 1, 2017

The spec has left the algorithm undefined, purposefully. Defining disallows implementations from choosing other hashes.

Is there anywhere else where we make this distinction?

@wking
Copy link
Contributor Author

wking commented Mar 1, 2017 via email

@jonboulle
Copy link
Contributor

jonboulle commented Mar 1, 2017

LGTM
I also don't see how it disallows/limits anything.

Approved with PullApprove

@stevvooe
Copy link
Contributor

stevvooe commented Mar 1, 2017

I also don't see how it disallows/limits anything.

Saying one thing exists creates the presumption that unmentioned things don't exist.

The format is already defined and documented here. While I wasn't quite accurate above, we already call out a whole section on sha256. This PR just adds more unnecessary indirection. If this actually added value or context, I would be in favor. As it stands, it just plops another table in a confusing spot.

I think the same effect can be had by simply adding a sentence after the following:

While the _algorithm_ component of the digest does allow one to utilize a wide variety of algorithms, compliant implementations SHOULD use [SHA-256](#sha-256).
Digests using this algorithm are identified by a prefix of `sha256`.

If you think a table with one item is great, then fine but this seems better.

@wking
Copy link
Contributor Author

wking commented Mar 1, 2017 via email

@stevvooe
Copy link
Contributor

stevvooe commented Mar 1, 2017

LGTM

@wking Fair enough. I think we can maintain this as a restricted set, but we need to be careful about adding new algorithms. While there are hooks for making it happen, adding support for a new algorithm should not be casual. What sha256 is broken, it will be a once in a decade event.

Approved with PullApprove

@stevvooe stevvooe merged commit 53831a6 into opencontainers:master Mar 1, 2017
@wking wking mentioned this pull request Mar 7, 2017
@wking wking deleted the sha256-algo branch March 7, 2017 21:15
@vbatts vbatts mentioned this pull request May 19, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants