Skip to content

Commit 03bf64f

Browse files
committed
Merge pull request #176 from vbatts/docs-overhaul
Docs overhaul
2 parents 83e5943 + 2d3065b commit 03bf64f

File tree

10 files changed

+132
-109
lines changed

10 files changed

+132
-109
lines changed

README.md

Lines changed: 10 additions & 57 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,22 @@
11
# Open Container Specifications
22

3-
This project is where the [Open Container Initiative](http://www.opencontainers.org/) Specifications are written.
4-
This is a work in progress.
3+
[Open Container Initiative](http://www.opencontainers.org/) Specifications for standards on Operating System process and application containers.
4+
55

66
Table of Contents
77

8+
- [Container Principles](principles.md)
89
- [Filesystem Bundle](bundle.md)
9-
- [Container Configuration](config.md)
10-
- [Linux Specific Configuration](config-linux.md)
10+
- Configuration
11+
- [Container Configuration](config.md)
12+
- [Container Configuration (Linux-specific)](config-linux.md)
13+
- [Runtime Configuration](runtime-config.md)
14+
- [Runtime Configuration (Linux-specific)](runtime-config-linux.md)
1115
- [Runtime and Lifecycle](runtime.md)
16+
- [Linux Specific Runtime](runtime-linux.md)
1217
- [Implementations](implementations.md)
1318

14-
## Use Cases
19+
# Use Cases
1520

1621
To provide context for users the following section gives example use cases for each part of the spec.
1722

@@ -24,58 +29,6 @@ To provide context for users the following section gives example use cases for e
2429
There is a loose [Road Map](https://github.com/opencontainers/specs/wiki/RoadMap:) on the wiki.
2530
During the `0.x` series of OCI releases we make no backwards compatibility guarantees and intend to break the schema during this series.
2631

27-
# The 5 principles of Standard Containers
28-
29-
Define a unit of software delivery called a Standard Container.
30-
The goal of a Standard Container is to encapsulate a software component and all its dependencies in a format that is self-describing and portable, so that any compliant runtime can run it without extra dependencies, regardless of the underlying machine and the contents of the container.
31-
32-
The specification for Standard Containers is straightforward.
33-
It mostly defines 1) a file format, 2) a set of standard operations, and 3) an execution environment.
34-
35-
A great analogy for this is the shipping container.
36-
Just like how Standard Containers are a fundamental unit of software delivery, shipping containers are a fundamental unit of physical delivery.
37-
38-
## 1. Standard operations
39-
40-
Just like shipping containers, Standard Containers define a set of STANDARD OPERATIONS.
41-
Shipping containers can be lifted, stacked, locked, loaded, unloaded and labelled.
42-
Similarly, Standard Containers can be created, started, and stopped using standard container tools (what this spec is about); copied and snapshotted using standard filesystem tools; and downloaded and uploaded using standard network tools.
43-
44-
## 2. Content-agnostic
45-
46-
Just like shipping containers, Standard Containers are CONTENT-AGNOSTIC: all standard operations have the same effect regardless of the contents.
47-
A shipping container will be stacked in exactly the same way whether it contains Vietnamese powder coffee or spare Maserati parts.
48-
Similarly, Standard Containers are started or uploaded in the same way whether they contain a postgres database, a php application with its dependencies and application server, or Java build artifacts.
49-
50-
## 3. Infrastructure-agnostic
51-
52-
Both types of containers are INFRASTRUCTURE-AGNOSTIC: they can be transported to thousands of facilities around the world, and manipulated by a wide variety of equipment.
53-
A shipping container can be packed in a factory in Ukraine, transported by truck to the nearest routing center, stacked onto a train, loaded into a German boat by an Australian-built crane, stored in a warehouse at a US facility, etc.
54-
Similarly, a standard container can be bundled on my laptop, uploaded to S3, downloaded, run and snapshotted by a build server at Equinix in Virginia, uploaded to 10 staging servers in a home-made Openstack cluster, then sent to 30 production instances across 3 EC2 regions.
55-
56-
## 4. Designed for automation
57-
58-
Because they offer the same standard operations regardless of content and infrastructure, Standard Containers, just like their physical counterparts, are extremely well-suited for automation.
59-
In fact, you could say automation is their secret weapon.
60-
61-
Many things that once required time-consuming and error-prone human effort can now be programmed.
62-
Before shipping containers, a bag of powder coffee was hauled, dragged, dropped, rolled and stacked by 10 different people in 10 different locations by the time it reached its destination.
63-
1 out of 50 disappeared.
64-
1 out of 20 was damaged.
65-
The process was slow, inefficient and cost a fortune - and was entirely different depending on the facility and the type of goods.
66-
67-
Similarly, before Standard Containers, by the time a software component ran in production, it had been individually built, configured, bundled, documented, patched, vendored, templated, tweaked and instrumented by 10 different people on 10 different computers.
68-
Builds failed, libraries conflicted, mirrors crashed, post-it notes were lost, logs were misplaced, cluster updates were half-broken.
69-
The process was slow, inefficient and cost a fortune - and was entirely different depending on the language and infrastructure provider.
70-
71-
## 5. Industrial-grade delivery
72-
73-
There are 17 million shipping containers in existence, packed with every physical good imaginable.
74-
Every single one of them can be loaded onto the same boats, by the same cranes, in the same facilities, and sent anywhere in the World with incredible efficiency.
75-
It is embarrassing to think that a 30 ton shipment of coffee can safely travel half-way across the World in *less time* than it takes a software team to deliver its code from one datacenter to another sitting 10 miles away.
76-
77-
With Standard Containers we can put an end to that embarrassment, by making INDUSTRIAL-GRADE DELIVERY of software a reality.
78-
7932
# Contributing
8033

8134
Development happens on GitHub for the spec.

bundle.md

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
1-
# Bundle Container Format
1+
# Bundle
2+
3+
## Container Format
24

35
This section defines a format for encoding a container as a *bundle* - a directory organized in a certain way, and containing all the necessary data and metadata for any compliant runtime to perform all standard operations against it.
46
See also [OS X application bundles](http://en.wikipedia.org/wiki/Bundle_%28OS_X%29) for a similar use of the term *bundle*.
@@ -14,15 +16,18 @@ A standard container bundle is made of the following 3 parts:
1416
- One or more content directories
1517
- A configuration file
1618

17-
# Directory layout
19+
## Directory layout
1820

1921
A Standard Container bundle is a directory containing all the content needed to load and run a container.
2022
This includes two configuration files `config.json` and `runtime.json`, and a rootfs directory.
2123
The `config.json` file contains settings that are host independent and application specific such as security permissions, environment variables and arguments.
2224
The `runtime.json` file contains settings that are host specific such as memory limits, local device access and mount points.
2325
The goal is that the bundle can be moved as a unit to another machine and run the same application if `runtime.json` is removed or reconfigured.
2426

25-
The syntax and semantics for `config.json` are described in [this specification](config.md).
27+
Configuration file syntax and semantics:
28+
29+
* [`config.json`](config.md) (immutable, host independent configuration)
30+
* [`runtime.json`](runtime-config.md) (mutable, host dependent configuration)
2631

2732
A single `rootfs` directory MUST be in the same directory as the `config.json`.
2833
The names of the directories may be arbitrary, but users should consider using conventional names as in the example below.

code-of-conduct.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,6 @@
22

33
Behave as a community member, follow the code of conduct.
44

5-
65
## Code of Conduct
76

87
The OpenContainers community is made up of a mixture of professionals and volunteers from all over the world.
@@ -36,4 +35,3 @@ By adopting this Code of Conduct, project maintainers commit themselves to fairl
3635
Thanks to the [Fedora Code of Conduct](https://getfedora.org/code-of-conduct) and [Contributor Covenant](http://contributor-covenant.org) for inspiration and ideas.
3736

3837
Portions of this Code of Conduct are adapted from the Contributor Covenant, version 1.2.0, available at http://contributor-covenant.org/version/1/2/0/
39-

config-linux.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Linux-specific configuration
1+
# Linux-specific Container Configuration
22

33
The Linux container specification uses various kernel features like namespaces, cgroups, capabilities, LSM, and file system jails to fulfill the spec.
44
Additional information is needed for Linux over the [default spec configuration](config.md) in order to configure these various kernel features.

config.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Configuration file
1+
# Container Configuration file
22

33
The container's top-level directory MUST contain a configuration file called `config.json`.
44
For now the canonical schema is defined in [config.go](config.go) and [config_linux.go](config_linux.go), but this will be moved to a formal JSON schema over time.

principles.md

Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
# The 5 principles of Standard Containers
2+
3+
Define a unit of software delivery called a Standard Container.
4+
The goal of a Standard Container is to encapsulate a software component and all its dependencies in a format that is self-describing and portable, so that any compliant runtime can run it without extra dependencies, regardless of the underlying machine and the contents of the container.
5+
6+
The specification for Standard Containers is straightforward.
7+
It mostly defines 1) a file format, 2) a set of standard operations, and 3) an execution environment.
8+
9+
A great analogy for this is the shipping container.
10+
Just like how Standard Containers are a fundamental unit of software delivery, shipping containers are a fundamental unit of physical delivery.
11+
12+
## 1. Standard operations
13+
14+
Just like shipping containers, Standard Containers define a set of STANDARD OPERATIONS.
15+
Shipping containers can be lifted, stacked, locked, loaded, unloaded and labelled.
16+
Similarly, Standard Containers can be created, started, and stopped using standard container tools (what this spec is about); copied and snapshotted using standard filesystem tools; and downloaded and uploaded using standard network tools.
17+
18+
## 2. Content-agnostic
19+
20+
Just like shipping containers, Standard Containers are CONTENT-AGNOSTIC: all standard operations have the same effect regardless of the contents.
21+
A shipping container will be stacked in exactly the same way whether it contains Vietnamese powder coffee or spare Maserati parts.
22+
Similarly, Standard Containers are started or uploaded in the same way whether they contain a postgres database, a php application with its dependencies and application server, or Java build artifacts.
23+
24+
## 3. Infrastructure-agnostic
25+
26+
Both types of containers are INFRASTRUCTURE-AGNOSTIC: they can be transported to thousands of facilities around the world, and manipulated by a wide variety of equipment.
27+
A shipping container can be packed in a factory in Ukraine, transported by truck to the nearest routing center, stacked onto a train, loaded into a German boat by an Australian-built crane, stored in a warehouse at a US facility, etc.
28+
Similarly, a standard container can be bundled on my laptop, uploaded to S3, downloaded, run and snapshotted by a build server at Equinix in Virginia, uploaded to 10 staging servers in a home-made Openstack cluster, then sent to 30 production instances across 3 EC2 regions.
29+
30+
## 4. Designed for automation
31+
32+
Because they offer the same standard operations regardless of content and infrastructure, Standard Containers, just like their physical counterparts, are extremely well-suited for automation.
33+
In fact, you could say automation is their secret weapon.
34+
35+
Many things that once required time-consuming and error-prone human effort can now be programmed.
36+
Before shipping containers, a bag of powder coffee was hauled, dragged, dropped, rolled and stacked by 10 different people in 10 different locations by the time it reached its destination.
37+
1 out of 50 disappeared.
38+
1 out of 20 was damaged.
39+
The process was slow, inefficient and cost a fortune - and was entirely different depending on the facility and the type of goods.
40+
41+
Similarly, before Standard Containers, by the time a software component ran in production, it had been individually built, configured, bundled, documented, patched, vendored, templated, tweaked and instrumented by 10 different people on 10 different computers.
42+
Builds failed, libraries conflicted, mirrors crashed, post-it notes were lost, logs were misplaced, cluster updates were half-broken.
43+
The process was slow, inefficient and cost a fortune - and was entirely different depending on the language and infrastructure provider.
44+
45+
## 5. Industrial-grade delivery
46+
47+
There are 17 million shipping containers in existence, packed with every physical good imaginable.
48+
Every single one of them can be loaded onto the same boats, by the same cranes, in the same facilities, and sent anywhere in the World with incredible efficiency.
49+
It is embarrassing to think that a 30 ton shipment of coffee can safely travel half-way across the World in *less time* than it takes a software team to deliver its code from one datacenter to another sitting 10 miles away.
50+
51+
With Standard Containers we can put an end to that embarrassment, by making INDUSTRIAL-GRADE DELIVERY of software a reality.

runtime-config-linux.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
# Linux-specific Runtime Configuration
2+
13
## Namespaces
24

35
A namespace wraps a global system resource in an abstraction that makes it appear to the processes within the namespace that they have their own isolated instance of the global resource.

runtime-config.md

Lines changed: 56 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,59 @@
1+
# Runtime Configuration
2+
3+
## Hooks
4+
5+
Lifecycle hooks allow custom events for different points in a container's runtime.
6+
Presently there are `Prestart` and `Poststop`.
7+
8+
* [`Prestart`](#pre-start) is a list of hooks to be run before the container process is executed
9+
* [`Poststop`](#post-stop)is a list of hooks to be run after the container process exits
10+
11+
Hooks allow one to run code before/after various lifecycle events of the container.
12+
Hooks MUST be called in the listed order.
13+
The state of the container is passed to the hooks over stdin, so the hooks could get the information they need to do their work.
14+
15+
Hook paths are absolute and are executed from the host's filesystem.
16+
17+
### Pre-start
18+
19+
The pre-start hooks are called after the container process is spawned, but before the user supplied command is executed.
20+
They are called after the container namespaces are created on Linux, so they provide an opportunity to customize the container.
21+
In Linux, for e.g., the network namespace could be configured in this hook.
22+
23+
If a hook returns a non-zero exit code, then an error including the exit code and the stderr is returned to the caller and the container is torn down.
24+
25+
### Post-stop
26+
27+
The post-stop hooks are called after the container process is stopped.
28+
Cleanup or debugging could be performed in such a hook.
29+
If a hook returns a non-zero exit code, then an error is logged and the remaining hooks are executed.
30+
31+
*Example*
32+
33+
```json
34+
"hooks" : {
35+
"prestart": [
36+
{
37+
"path": "/usr/bin/fix-mounts",
38+
"args": ["arg1", "arg2"],
39+
"env": [ "key1=value1"]
40+
},
41+
{
42+
"path": "/usr/bin/setup-network"
43+
}
44+
],
45+
"poststop": [
46+
{
47+
"path": "/usr/sbin/cleanup.sh",
48+
"args": ["-f"]
49+
}
50+
]
51+
}
52+
```
53+
54+
`path` is required for a hook.
55+
`args` and `env` are optional.
56+
157
## Mount Configuration
258

359
Additional filesystems can be declared as "mounts", specified in the *mounts* object.

runtime-linux.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
# Linux Runtime
2+
13
## File descriptors
24
By default, only the `stdin`, `stdout` and `stderr` file descriptors are kept open for the application by the runtime.
35

runtime.md

Lines changed: 1 addition & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -49,48 +49,4 @@ This event needs to be captured by runc to run onstop event handlers.
4949

5050
## Hooks
5151

52-
Hooks allow one to run code before/after various lifecycle events of the container.
53-
Hooks MUST be called in the listed order.
54-
The state of the container is passed to the hooks over stdin, so the hooks could get the information they need to do their work.
55-
56-
Hook paths are absolute and are executed from the host's filesystem.
57-
58-
### Pre-start
59-
60-
The pre-start hooks are called after the container process is spawned, but before the user supplied command is executed.
61-
They are called after the container namespaces are created on Linux, so they provide an opportunity to customize the container.
62-
In Linux, for e.g., the network namespace could be configured in this hook.
63-
64-
If a hook returns a non-zero exit code, then an error including the exit code and the stderr is returned to the caller and the container is torn down.
65-
66-
### Post-stop
67-
68-
The post-stop hooks are called after the container process is stopped.
69-
Cleanup or debugging could be performed in such a hook.
70-
If a hook returns a non-zero exit code, then an error is logged and the remaining hooks are executed.
71-
72-
*Example*
73-
74-
```json
75-
"hooks" : {
76-
"prestart": [
77-
{
78-
"path": "/usr/bin/fix-mounts",
79-
"args": ["arg1", "arg2"],
80-
"env": [ "key1=value1"]
81-
},
82-
{
83-
"path": "/usr/bin/setup-network"
84-
}
85-
],
86-
"poststop": [
87-
{
88-
"path": "/usr/sbin/cleanup.sh",
89-
"args": ["-f"]
90-
}
91-
]
92-
}
93-
```
94-
95-
`path` is required for a hook.
96-
`args` and `env` are optional.
52+
See [runtime configuration for hooks](./runtime-config.md)

0 commit comments

Comments
 (0)