Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discussion: Rethinking notebook cell types #95

Open
fcollonval opened this issue Mar 6, 2023 · 4 comments
Open

Discussion: Rethinking notebook cell types #95

fcollonval opened this issue Mar 6, 2023 · 4 comments

Comments

@fcollonval
Copy link
Contributor

fcollonval commented Mar 6, 2023

This topic is one of the output from the Jupyter Community Workshop on the notebook file format.

This is an issue to synchronize and invite any interested body to take part to the discussion of the major new file format structure.

A weekly call has been set up for Tuesday 8:00 AM Pacific Time - Zoom meeting.
The meeting notes are available: https://hackmd.io/hHW8k7mKS5qFBhxnFtVTCw

The notes from the workshop are available at https://docs.google.com/document/d/1DMMUOYEhFxoAEKITOrCUK9x0vkTy68mfZ9clof3UrMc

@fcollonval fcollonval changed the title Rethinking notebook cell types Discussion: Rethinking notebook cell types Mar 6, 2023
@willingc
Copy link
Member

Thanks for posting @fcollonval. FYI @MSeal @rgbkrk.

@agoose77
Copy link
Contributor

I won't be able to make this week's meeting! I hope it proves fruitful :)

@krassowski
Copy link
Member

krassowski commented Apr 9, 2023

I just wanted to highlight that any changes here would ideally consider what should happen to trust. Currently nbformat only allows for transient trusted metadata to be declared on code cells which means that:

  • markdown cells are never trusted and always sanitised (which is part of current Notebook security model)
  • new interfaces like JupyterLab for a long time had trouble producing a JSON dump satisfying nbformat, which lead to trust being wrongly lost as signatures were changing upon reformatting by nbformat (that was done in the background)

Two previously proposed ideas on improving trust/signature mechanism are:

@echarles
Copy link
Member

echarles commented Apr 9, 2023

markdown cells are never trusted and always sanitised (which is part of current Notebook security model)

jupyterlab-myst has now the ability to evaluate python/kernel code inserted into markdown cells, and overrides the default notary handler to deal with that. The evolution should imho add trust notion to any cell (code, markdown or any type that would come)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants