16:30:25 #startmeeting fedora_coreos_meeting 16:30:25 Meeting started Wed Oct 2 16:30:25 2019 UTC. 16:30:25 This meeting is logged and archived in a public location. 16:30:25 The chair is dustymabe. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:30:25 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:30:25 The meeting name has been set to 'fedora_coreos_meeting' 16:30:34 #topic roll call 16:30:58 .hello2 16:30:59 slowrie: slowrie 'Stephen Lowrie' 16:31:16 .hello2 16:31:17 ajeddeloh: ajeddeloh 'Andrew Jeddeloh' 16:31:19 .hello2 16:31:20 darkmuggle: darkmuggle 'None' 16:31:55 .hello2 16:31:56 strigazi: strigazi 'Spyros Trigazis' 16:32:05 .hello2 16:32:07 jlebon: jlebon 'None' 16:32:24 #chair ajeddeloh darkmuggle strigazi slowrie jlebon walters jbrooks 16:32:24 Current chairs: ajeddeloh darkmuggle dustymabe jbrooks jlebon slowrie strigazi walters 16:32:55 .hello2 16:32:56 bgilbert: Something blew up, please try again 16:33:01 lol 16:33:04 .fas jasonbrooks 16:33:04 jbrooks: jasonbrooks 'Jason Brooks' 16:33:06 .hello2 16:33:07 huh 16:33:08 .hello lucab 16:33:10 walters: walters 'Colin Walters' 16:33:11 .hello2 16:33:13 kaeso[m]: lucab 'Luca Bruno' 16:33:16 bgilbert: bgilbert 'Benjamin Gilbert' 16:33:21 #chair bgilbert kaeso[m] 16:33:21 Current chairs: ajeddeloh bgilbert darkmuggle dustymabe jbrooks jlebon kaeso[m] slowrie strigazi walters 16:33:28 bgilbert: haha, zodbot must have had an issue 16:33:38 .hire bgilbert 16:33:38 adamw hires bgilbert 16:34:25 #topic Action items from last meeting 16:34:25 .chair bgilbert 16:34:25 bgilbert is seated in a chair with a nice view of a placid lake, unsuspecting that another chair is about to be slammed into them. 16:34:49 * ajeddeloh to investigate the addition of python in update-crypto-policies #280 16:35:00 ajeddeloh: I know there were some updates in the ticket.. want to give a summary? 16:35:04 sure 16:35:30 The things the python script does are all things that don't really make sense on FCOS 16:35:43 i.e. doing configuration 16:36:01 under the hood it's just writing out a bunch of symlinks 16:36:27 I asked if we could split that scripts out from the config and the packagers were open to that 16:36:51 then we can just ship the configs and add some FCCT sugar to do the same thing the script did 16:37:22 (i.e. generating an ign config with those same symlinks) 16:37:57 next step is just breaking out the package and PRing that 16:39:06 thanks ajeddeloh 16:39:08 moving on 16:39:27 #topic FCOS as Kubernetes / OKD node 16:39:32 #link https://github.com/coreos/fedora-coreos-tracker/issues/93 16:39:41 I believe strigazi has an update for us here 16:40:24 In out deployment we were using the atomic cli 16:41:13 replacing all "atomic install" systemd services running podman, I was able to create conformant k8s clusters 16:41:19 with v1.16.0 16:41:47 I took the kubelet unit shamelessly from posseidon 16:42:31 despite the --containerized being dropped, kubelet works fine with selinux enforcing 16:43:04 strigazi: that's great news 16:43:08 sweet 16:43:23 woo \o/ 16:43:31 the same units worked for us in F29AH and FCOS 16:43:32 strigazi: does this investigation help OpenStack Magnum move to FCOS sooner? 16:43:49 soon as in this month 16:44:21 I saw something go by re: ignition and heat, but we can save that for open floor 16:44:38 strigazi: that's great news 16:44:47 anything else on this topic before we move to the next topic ? 16:44:56 ajeddeloh: I'll be here for open floor 16:45:12 +1 16:45:59 dustymabe: i'm good 16:48:16 #topic Encryption: All disks are belong to us 16:48:21 #link https://github.com/coreos/fedora-coreos-tracker/issues/287 16:48:27 * dustymabe waves at darkmuggle 16:48:41 Howdy :) 16:49:11 so disk encryption :) 16:49:23 do you want to give us some context for the discussion? 16:49:30 the history on this issue is that walters and I have been working on a downstream issue in Red Hat CoreOS 16:49:39 Specifically: https://github.com/openshift/enhancements/blob/master/enhancements/automated-policy-based-disencryption.md 16:50:04 The core idea is that Red Hat CoreOS in the Openshift context will support encrypted disks. 16:50:38 Since the goal is to make FCOS the upstream to RHCOS, there's a lot of dependencies and features that we would like to land in FCOS. 16:51:28 For example, walters, has been working on a dracut module copying ostrees into the initrd to allow for a re-formating of the rootfs 16:51:53 And in order to offer flexible disk solutions, we're going to need to add support for Ignitiion setting up LUKS volumes. 16:52:12 (like https://github.com/coreos/ignition/pull/515 ) 16:52:19 The purpose of that tracker item was to provide a public place to reference the work. 16:52:43 TL;DR: we'd like encrypted disks in RHCOS, so there will be some supporting work in FCOS. FCOS could consider adopting encrypted disks support as well 16:52:57 ^^ accurate ? 16:53:05 Indeed, that's accurate. 16:53:18 #info TL;DR: we'd like encrypted disks in RHCOS, so there will be some supporting work in FCOS. FCOS could consider adopting encrypted disks support as well 16:53:40 has anybody had a chance to consider encrypted disk support for FCOS ? 16:53:44 I think everyone wants encrypted disk support for FCOS 16:53:52 there's basically three parts 16:54:09 I think the MVP is add `root: tpm: true` to FCCT and have that expand into clevis pinning requiring a tpm2 device 16:54:22 1) LUKS support in ignition 2) being able to move root 3) being able to find root on subsequent boots 16:54:44 I've done the work on 3. 16:54:46 note my proposed MVP does not require official LUKS in Ignition 16:54:57 darkmuggle: how so? 16:54:58 ajeddeloh: would we need changes to our existing parition layout to support this ? 16:54:59 though it'd be good 16:55:04 * ajeddeloh is out of the loop on that 16:55:10 no 16:55:36 darkmuggle: are there proposed changes to the partition layout on the RHCOS end ? 16:55:41 AIUI the goal is to support it via ignition but not have it encrypted by default 16:55:51 dustymabe: yeah they are 16:55:55 dustymabe: wasn't proposed, it was merged https://github.com/coreos/coreos-assembler/pull/785 16:56:05 wasn't *just* proposed I mean 16:56:21 To ajeddeloh's question, its fairly simple. Dracut has support to automatically find the LUKS container. 16:56:34 the proposal is also in the openshift enhancement link above 16:56:36 ah, 3 for FCOS is more general 16:57:05 isn't 3) just requiring the new filesystem have the label "root" ? 16:57:13 walters: no 16:57:16 https://github.com/coreos/fedora-coreos-tracker/issues/94#issuecomment-517045698 16:57:36 since we need to know which LUKS/RAID/etc devices to start and which not to start 16:57:43 oh right, ok 16:57:48 and we really shouldn't go around starting things trying to find it 16:58:02 ajeddeloh: I don't want to waylay this conversation, but the tl;dr is that if that auto-activation of LUKS is can happen. 16:58:21 darkmuggle: yeah, but we don't want to do that to !root 16:58:27 today anaconda mostly sets kargs which dracut reads AFAIK 16:58:43 though there are special things like iSCSI authentication which end up as config files that go in the initramfs 16:59:08 xref https://github.com/fedora-silverblue/issue-tracker/issues/3 16:59:27 walters: that requires generating a new initramfs, yes? 16:59:29 (and https://lists.freedesktop.org/archives/systemd-devel/2019-September/043486.html ) 17:00:37 * ajeddeloh isn't sure how deep into this rabbit hole we want to go right now 17:00:42 there's a couple ways to do this. In the LUKS case we could bind a token in the LUKS header named `activateme` and then use systemd generator that adds the udev rule for cryptsetup 17:00:48 yeah let's come back up for air 17:00:55 +1 17:01:06 so IIUC - there are two ways to go forward 17:01:31 in trying to achieve disk encryption for FCOS (which I believe we want to support) we have 17:01:40 1. leave the current filesystem partition structure in place 17:01:57 2. adopt a empty luks container for root using --luks-rootfs to create_disk 17:02:10 i don't know any of the details of which one of those two options are better 17:02:25 but as FCOS we should probably hash that out at some point and come up with a plan 17:02:31 1. is more "lay groundwork for general rootfs changes, including LUKS but also switching filesystems" 17:02:54 I _strongly_ prefer 1 17:03:00 see https://github.com/coreos/fedora-coreos-tracker/issues/94#issuecomment-535042020 17:03:13 ajeddeloh: +1 17:03:19 ajeddeloh: where should we capture future discussion on this? 17:03:21 The cost of 2 is that is adds a layer of abstraction that makes it more difficult for the end user. 17:03:28 but, it does require jlebon's kernel patch, plus probably systemd patches that have landed around the relabeling, etc. 17:03:29 I strongly perfer 1 as well. 17:03:33 #94 I assume 17:03:36 should it be in https://github.com/coreos/fedora-coreos-tracker/issues/287 or in a new issue ? 17:04:22 ajeddeloh: ok #94 then? 17:04:23 I think #287 should reference #94 and the Ignition encryption ticket 17:05:00 ok cool. I'll try to add some context to each of the issues 17:05:01 287 is more of a game plan. I like what ajeddeloh is suggesting. 17:05:47 darkmuggle: IOW 1. is a good longer term plan, but RHCOS needs something shorter term for now so are going with 2. ? 17:06:10 That is correct. 17:06:21 cool. my understanding has been massively improved on this topic :) 17:06:26 high 287 Can be a tracker for LUKS specifically, but thats actually a combination of smaller pieces that are somewhat independent of each other 17:06:49 ajeddeloh: if we could make a checklist in #287 of the smaller pieces - that would be nice 17:06:55 +1 17:07:02 WFM 17:07:09 bonus points if each checkmark is related to another ticket/work item 17:07:50 #info for FCOS we want disk encryption. There are a few ways to achieve that goal and we prefer leaving the existing partition structure in place and replacing it on boot if the users asks for encryption 17:08:04 any objections ^^ 17:08:37 #topic CI: Prow integration 17:08:38 +1 17:08:44 #link https://github.com/coreos/fedora-coreos-tracker/issues/263 17:08:52 jlebon: walters: care to set the stage for this one ? 17:09:41 i'm a bit tempted to close the issue and try a new one that better captures the multiple CI system angle 17:09:48 but eh 17:10:35 we could start with what is prow? how does it help us? are there examples where we can use it ? 17:10:52 i can take a stab if you'd like? 17:11:23 there's a whole lot of angles to this but basically we're trying to close down the homu/papr project which rpm-ostree (and ostree) use. The issue talks about moving to a combination of Prow and CentOS CI (but of these, the idea is to use Prow as "merge policy bot" in particular) 17:11:49 basically, right now we're "spiking" on different CI approaches 17:11:51 one nice thing about Github though is that CI is like an app; none of this is exclusive with using other CI services 17:12:24 +1 17:12:37 so the two options are prow or CentOS CI ? 17:12:50 no 17:13:29 re. the ticket, i think it's good. it's a good place to ask for feedback before rolling out to more repos 17:13:31 I guess implicit in this is that it's sort of up to the "owners" of a particular project to decide on this, now "owners" here becomes nebulous of course 17:13:57 i think having a merge bot in cosa would really help us 17:14:03 what are we deciding on though? which CI strategy to use? 17:14:09 what are the options? 17:14:30 dustymabe: like we said, we're still exploring :) 17:14:32 i don't this IRC meeting is about coming to any kind of final conclusions 17:14:47 it might be a combination of multiple services 17:15:20 rpm-ostree is a good test bed because of its testing requirements 17:15:22 walters: yeah no need for any conclusions. I think it would help a lot to bring some of the rest of us up to speed on those options when they are ready though 17:15:46 personally while there are actually a lot of things I don't like about Prow (and some things I think are super cool), the ultimate fact is it's maintained by people paid to do so and who will listen to our concerns means I personally am aiming to invest some in it, and it will help us in terms of aligning with the larger OpenShift build system for RHCOS 17:16:02 so maybe once we're done investigating we add a nice summary to the ticket ? 17:17:12 dustymabe: yeah, i think that makes sense 17:17:29 regarding other CI systems for example, one thing Github recently introduced is the new "checks" API which allows a CI system to annotate individual lines in a PR; good for "style checkers" and the like, can't do it with a Prow job, so individual repo owners could choose to do that for theirs 17:17:36 but "done investigating" might actually just be "ready to try out things in more repos" 17:18:08 +1 it'll help when we're ready to try out some things to have a discussion about it. we'll get more input that way 17:18:19 walters: +1 on style checker 17:18:31 ready for open floor ? 17:18:39 +1 17:18:43 walters: i wouldn't be surprised if prow eventually grows support for that (or does it have to be a registered "app" ?) 17:18:57 yeah I think so https://github.com/kubernetes/test-infra/issues/10423 17:19:12 #topic open floor 17:19:28 anyone with a topic for open floor? 17:20:21 #info we added architecture information into our image filenames that are output by our build system https://github.com/coreos/fedora-coreos-tracker/issues/264 17:20:21 o/ 17:20:32 the next Fedora CoreOS release will include that chage 17:20:35 change* 17:20:39 ajeddeloh: go for it 17:20:52 strigazi: what's the status on ignition + heat? 17:21:21 i.e. is https://github.com/coreos/ignition/pull/862 necessary still 17:21:38 ajeddeloh: Feilong that opened the issue patched heat to append the creds we need in ignition format. 17:22:23 so does heat still serve a multipart thing or just an Ignition config? 17:22:28 ajeddeloh: for the upcoming openstack release it is not needed. for older releases would be useful 17:23:20 So for new releases heat will just serve an Ignition config over http normally, no multipart? 17:23:28 ajeddeloh: yes 17:23:32 \o/ 17:23:47 so.. what do we do in the interim ? 17:23:52 thoughts on supporting this for older releases? 17:24:00 it will detect that the user passed data are an ingntion config and append a file there. 17:24:05 * ajeddeloh also doesn't have a way to test that PR right now 17:24:28 ajeddeloh: if you have a binary I can test it and let you know 17:24:33 strigazi: awesome! 17:24:50 strigazi: Yeah I can build you a binary and ship it off to you 17:24:51 or I can just build it 17:24:57 that too 17:25:12 lets sync after this meeting? 17:25:17 +1 17:25:37 so what do we do about older releases of openstack ? 17:25:52 i'd love to never support this, but you know environments stay around forever 17:26:13 ^ I feel the same 17:26:41 let's try this: 17:26:51 1. ajeddeloh and strigazi test the proposed patch(PR) 17:27:00 2. confirm it is working as expected 17:27:08 3. leave PR open until users come asking for it 17:27:13 let's see how it goes? For us (CERN + magnum users I know )it is fine, we keep up with the latest release or cherry-pick aggressively 17:27:21 dustymabe: +1 17:27:29 +1 17:27:41 +1 17:27:41 cool 17:27:50 thanks for that ajeddeloh and strigazi 17:27:54 o/ 17:27:55 any other items for open floor ? 17:28:41 #info jlebon got a kernel patch accepted upstream to help us support selinux with ignition/dracut: https://lore.kernel.org/selinux/20190912133007.27545-1-jlebon@redhat.com/T/#m5f950ca9fc3ed374cb793fc9aed0435602b1b6ad 17:28:46 jlebon++ 17:28:52 jlebon++ 17:29:01 jlebon++ 17:29:01 bgilbert: Karma for jlebon changed to 6 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 17:29:17 will end meeting in 30s 17:29:20 :) so excited for all the cleanups that will follow from this 17:29:51 #endmeeting