Skip to content

Latest commit

 

History

History
104 lines (66 loc) · 8.83 KB

100-CNAB.md

File metadata and controls

104 lines (66 loc) · 8.83 KB
title weight
CNAB Core
100

Cloud Native Application Bundle Core 1.1.0 (CNAB1)

Final Approval, Published, Sept. 2019

The Cloud Native Application Bundle (CNAB) is a standard packaging format for multi-component distributed applications. It allows packages to target different runtimes and architectures. It empowers application distributors to package applications for deployment on a wide variety of cloud platforms, providers, and services. Furthermore, it provides necessary capabilities for delivering multi-container applications in disconnected (airgapped) environments.

CNAB is not a platform-specific tool. While it uses containers for encapsulating installation logic, it remains un-opinionated about what cloud environment it runs in. CNAB developers can bundle applications targeting environments spanning IaaS (like OpenStack or Azure), container orchestrators (like Kubernetes or Nomad), container runtimes (like local Docker or ACI), and cloud platform services (like object storage or Database as a Service).

CNAB can also be used for packaging other distributed applications, such as IoT or edge computing.

Summary

The CNAB format is a packaging format for a broad range of distributed applications. It specifies a pairing of a bundle definition (bundle.json) to define the app, and an invocation image to install the app.

The bundle definition is a single file that contains the following information:

  • Information about the bundle, such as name, bundle version, description, and keywords
  • Information about locating and running the invocation image (the installer program)
  • A list of user-overridable parameters that this package recognizes
  • The list of executable images that this bundle will install
  • A list of credential paths or environment variables that this bundle requires to execute

The canonical encoding of a bundle definition is a JSON-formatted file, which MUST be encoded as a Canonical JSON object stored in a bundle.json file, as defined in the bundle file definition.

However, as a signed bundle definition represents an immutable bundle, all invocation images and images references must have a content digest.

The bundle definition is mounted as a file within the image's runtime filesystem. Additionally, it can be stored on its own, or as part of a packaged archive, which is a CNAB bundle that includes the JSON file and exported images (including the invocation image).

  • A thin bundle consists of just a bundle definition.
  • A thick bundle consists of a packaged archive that contains both the bundle definition and an encoded representation of all of the invocation images and images.

In either case, CNAB has the same schema, and this spec refers to this file as the "bundle definition" (or occasionally "bundle file").

When thin bundles are processed, the referenced content (such as invocation images and other images) are retrieved from their respective storage repositories and registries. A bundle is considered to be well formed if its definition follows the CNAB schema and the images are in the correct formats. A bundle is considered complete if it is packaged as a thick bundle, and all the components are present OR if it is packaged as a thin bundle and all of the references are resolvable. Completeness is thus in some cases contingent upon external factors such as network access.

Bundles use cryptographic verification on multiple levels. Images (Docker, OCI, VM) are digested, and their cryptographic digest is then embedded into the bundle.json. The bundle.json is then signed using a public/private key system to ensure that it has not been tampered with. A bundle is considered secure if the bundle definition contains the correct content digests for all images, and the bundle definition is cryptographically signed.

Finally, this document describes a format for invocation images, including file system layout and a functional description of how an invocation image is installed.

Approach

The current distributed computing landscape involves a combination of executable units and supporting API-based services. Executable units include Virtual Machines (VMs), Containers (e.g. Docker and OCI) and Functions-as-a-Service (FaaS), as well as higher-level PaaS services. Along with these executable units, many managed cloud services (from load balancers to databases) are provisioned and interconnected via REST (and similar network-accessible) APIs. Our goal is to provide a packaging format that can enable application providers and developers with a way of installing a multi-component application into a distributed computing environment, supporting all of the above types.

A bundle is comprised of a bundle definition and at least one invocation image. The invocation image's job is to install zero or more components into the host environment. Such components MAY include (but are not limited to) containers, functions, VMs, IaaS and PaaS layers, and service frameworks.

At run time, the invocation image contains a standardized filesystem layout where metadata, installation data, and the bundle definition are stored in predictable places. A run tool is the executable entry point into a CNAB bundle. Parameterization and credentialing allow injection of configuration data into the invocation image. The invocation image is described in detail in the invocation image definition.

Actions are sent to the run command via environment variables. Actions determine whether a bundle is to be installed, upgraded, downgraded, or uninstalled.

Invocation images allow limited configuration, as defined in two places in the bundle definition:

  • A bundle definition MAY declare zero or more configurable parameters. User-supplied parameters are injected into the invocation image. Parameters MAY be stored.
  • A bundle definition MAY declare zero or more credential requirements. This indicates which credentials MUST be passed into the invocation image in order for the invocation image to correctly authenticate to the services used by the bundle. Credentials are injected into the invocation image, but they MUST NOT be stored.

Key Terms

  • Application: The functional unit composed by the components described in a bundle. This MAY be comprised of a mixture of containers, VMs, IaaS and PaaS definitions, and other services, as well as instructions for orchestrators and service frameworks.
  • Bundle: the collection of CNAB data and metadata necessary for installing an application on the designated cloud services.
  • Bundle definition: The information about a bundle, its parameters, credentials, images, and usage
  • bundle.json: The unsigned JSON-encoded representation of a bundle definition.
  • Image: Used generically, a container image (e.g. OCI images) or a VM image.
  • Invocation Image: The image that contains the bootstrapping and installation logic for the bundle
  • Registry: A storage and retrieval service for CNAB objects.

Also, when referencing tooling, the following terms are used:

  • CNAB runtime or runtime: A program capable of reading a CNAB bundle and executing it
  • CNAB builder or builder: A program that can assemble a CNAB bundle
  • bundle tooling: Programs or tooling that generate CNAB bundle contents

Individual tools may meet more than one of the definitions above, they have been separated in order to offer guidance such as:

A runtime MUST support the 'install', 'upgrade', and 'uninstall' actions, while bundle tooling MAY choose not to implement 'upgrade'.

The Definitions

The following subsections define the components of CNAB:

The process for standardization is described in an appendix:

History

  • The bundle.cnab is now the name of a signed bundle.json.
  • The bundle.json is now a stand-alone artifact, not part of the invocation image.
  • The initial draft of the spec included a manifest.json, a ui.json and a parameters.json. The bundle.json is now the only metadata file, containing what was formerly spread across those three.
  • The top-level /cnab directory was added to the bundle format due to conflicts with file hierarchy.
  • The signal handling method was discarded after early research showed its limitations. The replacement uses environment variables to trigger actions.
  • The bundle.json is now mounted in the invocation image at /cnab/bundle.json.
  • The generic action run has been replaced by specific actions: install, uninstall, upgrade.
  • The status action has been removed.
  • Registries, security, and claims have all be moved to separate specifications.

Next section: The bundle.json definition