Getting Started With Ore-Ore Swift Standard Library +Tomohiro Kumagai
?
Swift Open Source を徭蛍でビルドするとっかかり議なところをざっくりまとめたY創です。h廠づくり┘愁侫筏庁と、ビルド圭隈と、ちょっと[んでみる圭隈と、そして壅びh廠づくり┘路`ド議、そんなお。
2017/04/22 の及72指 Cocoa 茶氏v廉と 2017.04.28 の Swift 杠短 Vol8 でk燕したものになります。
Getting Started With Ore-Ore Swift Standard Library +Tomohiro Kumagai
?
Swift Open Source を徭蛍でビルドするとっかかり議なところをざっくりまとめたY創です。h廠づくり┘愁侫筏庁と、ビルド圭隈と、ちょっと[んでみる圭隈と、そして壅びh廠づくり┘路`ド議、そんなお。
2017/04/22 の及72指 Cocoa 茶氏v廉と 2017.04.28 の Swift 杠短 Vol8 でk燕したものになります。
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
?
Rootless mode is a technique to harden containers by running the container engine as a non-root user. The support for rootless mode has been merged into Docker since v19.03 (2019) and in Kubernetes since v1.22 (2021). However, setting up Rootless Kubernetes has been more challenging than setting up Rootless Docker due to its complexity. This session presents Usernetes Generation 2, a Kubernetes distribution that wraps Kubernetes in Rootless Docker for ease of setting up multi-node Rootless Kubernetes clusters. Unlike the original Usernetes (Generation 1) that was based on "Kubernetes The Hard Way", Usernetes Generation 2 supports kubeadm. Usernetes Generation 2 is similar to `kind` and `minikube`, however, unlike them Usernetes Generation 2 supports forming real multi-node clusters using Flannel (VXLAN) and it can be potentially used for production clusters. https://github.com/rootless-containers/usernetes
20240321 [KubeCon EU Pavilion] Lima.pdf_Akihiro Suda
?
Lima is a tool for running Linux virtual machines and containers on macOS. It provides automatic host filesystem sharing, port forwarding, and integration with container runtimes like Docker and Kubernetes. Users can launch preconfigured Linux distro and container engine templates with a single command.
20240320 [KubeCon EU Pavilion] containerd.pdfAkihiro Suda
?
An industry-standard container runtime that is graduated by the CNCF and adopted by major Kubernetes services and distributions. It is designed to be pluggable and support new features through plugins like remote snapshotters and WASM runtimes. It provides plugins for runtimes like runc and runhcs, snapshotters like overlayfs and btrfs, and tools like nerdctl and containerd v2.0 which focus on cleaning up deprecated features and improving user namespace support.
20240201 [HPC Containers] Rootless Containers.pdfAkihiro Suda
?
Rootless containers put the container runtime in a user namespace to limit privileges. This improves security by preventing access to other users' files, ability to modify the kernel or firmware. Rootless containers have been supported by container runtimes since 2014 and are useful for shared computing environments. Key aspects include user namespaces remap UIDs to limit privileges to inside namespaces, and networking solutions like slirp4netns or bypass4netns to provide networking without privileges. Rootless Kubernetes called Usernetes allows running Kubernetes without root privileges and supports multi-node clusters.
[Podman Special Event] Kubernetes in Rootless PodmanAkihiro Suda
?
- Kubernetes can run in rootless containers using techniques like Podman, Docker, and containerd which map the root user inside containers to a non-root user on the host for improved security.
- Popular ways to run rootless Kubernetes include kind, minikube wrapped in Podman containers, and Usernetes which supports real multi-node clusters across multiple hosts using networking like Flannel.
- Future work includes promoting the "KubeletInUserNamespace" feature flag and eliminating overhead of user-mode TCP/IP for containers to improve the rootless Kubernetes experience.
Lima is a tool for running Linux virtual machines on macOS to run containers. It provides automatic host filesystem sharing, port forwarding, and integration with container runtimes like Docker and Kubernetes. It uses QEMU or macOS's Virtualization.framework as the hypervisor and supports networking and filesystem options like sshfs, virtio-9p-pci, and virtiofs. It includes templates for common Linux distros and container engines that can be launched with a single command.
Containerd is a CNCF graduated, open source container runtime with many enterprise users. It uses plugins to support features like remote images, WASM runtimes, and different OSes. The runtime provides snapshotters for storage like overlayfs and btrfs, and runtime plugins for Linux, Windows, FreeBSD and WASM. Nerdctl is a container CLI similar to Docker but optimized for Containerd experiments. Recent updates include sandboxing for "pauseless" pods and image transfer APIs, with a focus on cleaning deprecated features and improving user namespaces in upcoming versions.
https://github.com/rootless-containers/usernetes
Usernetes (Gen2) deploys a Kubernetes cluster inside Rootless Docker, so as to mitigate potential container-breakout vulnerabilities.
Usernetes (Gen2) is similar to Rootless kind and Rootless minikube, but Usernetes (Gen 2) supports creating a cluster with multiple hosts.
[DockerCon 2023] Reproducible builds with BuildKit for software supply chain ...Akihiro Suda
?
Images maintained by a reputable organization or an individual are often considered to be trustworthy; however, it is hard to deny the possibility that they might have silently injected malicious codes that are not present in the source repo. Also, even if they have no malicious intent, their images can still be compromised on an accidental leakage of registry credentials.
The latest release of BuildKit solves this supply chain security concern with reproducible builds. Reproducible builds is a technique to ensure that a bit-for-bit identical image can be reproduced from its source code, by anybody, at any time. When multiple actors can attest to an image's reproducibility, it signifies that the image contains no code of a secret origin.
Audiences of this talk will learn how they can and how sometimes they cannot make their images reproducible to improve their trust.
The internals and the latest trends of container runtimesAkihiro Suda
?
The document discusses the internals and latest trends of container runtimes. It describes how container runtimes like Docker use kernel features like namespaces and cgroups to isolate containers. It explains how containerd and runc work together to manage the lifecycles of container processes. It also covers security measures like capabilities, AppArmor, and SELinux that container runtimes employ to safeguard the host system.
This document summarizes Lima, an open-source tool for running Linux virtual machines and containers on macOS. Lima provides automatic host filesystem sharing and port forwarding, and integrates with container engines like Docker and container orchestrators like Kubernetes. It uses QEMU or macOS's Virtualization.framework as the hypervisor and supports networking and storage drivers. Templates are provided for common Linux distributions and container tools.
An industry-standard container runtime that is graduated by the CNCF since 2019 and adopted by major Kubernetes services and distributions. It is designed to be pluggable to support new features like remote snapshotting and WASM runtimes. Containerd provides plugins for snapshotting storage backends, runtimes for different operating systems, and tools like nerdctl for experimenting with new containerd capabilities. Upcoming versions will focus on cleaning deprecated features and improving APIs for image transfer and user namespaces.
[Container Plumbing Days 2023] Why was nerdctl made?Akihiro Suda
?
nerdctl (contaiNERD CTL) was made to facilitate development of new technologies in the containerd platform.
Such technologies include:
- Lazy-pulling with Stargz/Nydus/OverlayBD
- P2P image distribution with IPFS
- Image encryption with OCIcrypt
- Image signing with Cosign
- ^Real ̄ read-only mounts with mount_setattr
- Slirp-less rootless containers with bypass4netns
- Interactive debugging of Dockerfiles, with buildg
nerdctl is also useful for debugging Kubernetes nodes that are running containerd.
Through this session, the audiences will learn these functionalities of nerdctl, relevant projects, and the roadmap for the future.
https://containerplumbing.org/sessions/2023/why_was_nerdctl_
[FOSDEM2023] Bit-for-bit reproducible builds with DockerfileAkihiro Suda
?
This document discusses techniques for making container builds reproducible, including:
- Using BuildKit v0.11 which supports deterministic timestamps through SOURCE_DATE_EPOCH
- Using repro-get to cryptographically lock package versions to ensure reproducible package installation
- Future work including simplifying Dockerfiles, caching packages locally, and integrating with provenance standards
Lima is a Linux virtual machine for macOS that allows running container workloads like containerd and k3s. It provides automatic host filesystem sharing and port forwarding between the Linux VM and macOS host. Lima uses QEMU virtualization and virtio-9p-pci for filesystem sharing. It supports building and running containers without requiring root on the host. Lima aims to provide an easy way to run containers on macOS for development and testing purposes.
[KubeCon EU 2022] Running containerd and k3s on macOSAkihiro Suda
?
https://sched.co/ytpi
It has been very hard to use Mac for developing containerized apps. A typical way is to use Docker for Mac, but it is not FLOSS. Another option is to install Docker and/or Kubernetes into VirtualBox, often via minikube, but it doesn't propagate localhost ports, and VirtualBox also doesn't support the ARM architecture. This session will show how to run containerd and k3s on macOS, using Lima and Rancher Desktop. Lima wraps QEMU in a simple CLI, with neat features for container users, such as filesystem sharing and automatic localhost port forwarding, as well as DNS and proxy propagation for enterprise networks. Rancher Desktop wraps Lima with k3s integration and GUI.
ChatGPTを聞うと、プログラミングを方rgで誼することができます
云周のウエブサイト
https://powergpt.info/python%E3%83%97%E3%83%AD%E3%82%B0%E3%83%A9%E3%83%9F%E3%83%B3%E3%82%B0%E5%85%A5%E9%96%80
FUSIONDRIVER, INC.
ホ`ムペ`ジ https://www.fusiondriver.biz/index.html
致忽オフィス
830 Stewart Drive, Suite 277, Sunnyvale, CA 94085, USA
毅輝; 縳 再望
晩云 050-5534-1114 (忽坪で宥じます)
E-mail: info@fusiondriver.biz
3. ? 2023/10/4: Demystify Secure Supply Chain Metadata
C Christian Dupuis, Sr Principal Engineer, Docker
? 2023/10/5: Building the Software Supply Chain on Docker
Official Images
C Ethan Heilman, CTO & Co-Founder, BastionZero
James Carnegie, Computer Programmer, Docker
? https://www.dockercon.com/ からまだ辛嬬
3
DockerCon での OpenPubKey vBセッション