16:30:33 <dustymabe> #startmeeting fedora_coreos_meeting
16:30:33 <zodbot> Meeting started Wed Apr  1 16:30:33 2020 UTC.
16:30:33 <zodbot> This meeting is logged and archived in a public location.
16:30:33 <zodbot> The chair is dustymabe. Information about MeetBot at http://wiki.debian.org/MeetBot.
16:30:33 <zodbot> Useful Commands: #action #agreed #halp #info #idea #link #topic.
16:30:33 <zodbot> The meeting name has been set to 'fedora_coreos_meeting'
16:30:38 <dustymabe> #topic roll call
16:30:42 <dustymabe> .hello2
16:30:45 <zodbot> dustymabe: dustymabe 'Dusty Mabe' <dusty@dustymabe.com>
16:31:05 <cyberpear> .hello2
16:31:06 <zodbot> cyberpear: cyberpear 'James Cassell' <fedoraproject@cyberpear.com>
16:31:29 <jlebon> .hello2
16:31:30 <zodbot> jlebon: jlebon 'None' <jonathan@jlebon.com>
16:31:32 <jdoss> .hello2
16:31:34 <zodbot> jdoss: jdoss 'Joe Doss' <joe@solidadmin.com>
16:33:00 <dustymabe> #chair cyberpear jlebon jdoss skunkerk
16:33:00 <zodbot> Current chairs: cyberpear dustymabe jdoss jlebon skunkerk
16:33:26 * dustymabe thinks we're missing quite a few people today
16:34:07 <jlebon> yeah, looks like :|
16:34:09 <dustymabe> kaeso[m]: bgilbert: around today?
16:34:09 <kaeso[m]> .hello lucab
16:34:10 <zodbot> kaeso[m]: lucab 'Luca Bruno' <lucab@redhat.com>
16:34:17 <dustymabe> \o/ - yay
16:34:29 <jlebon> (i almost didn't make it myself; just had a super long meeting right before this :) )
16:34:31 <dustymabe> welcome back kaeso[m] ! you've been missed
16:34:45 <dustymabe> #chair kaeso[m]
16:34:45 <zodbot> Current chairs: cyberpear dustymabe jdoss jlebon kaeso[m] skunkerk
16:35:05 <dustymabe> #topic Action items from last meeting
16:35:26 <dustymabe> no action items from last meeting - woot!
16:35:36 <dustymabe> #topic news
16:36:01 <dustymabe> #info we came out with a testing release last week that moved us to using networkmanager in the initrd
16:36:28 <dustymabe> #link https://github.com/coreos/fedora-coreos-tracker/issues/394
16:36:41 <lorbus> .hello2
16:36:42 <zodbot> lorbus: lorbus 'Christian Glombek' <cglombek@redhat.com>
16:36:43 <dustymabe> that build introduced a regression on some cloud platforms
16:36:59 <dustymabe> #link https://github.com/coreos/fedora-coreos-tracker/issues/440
16:37:30 <skunkerk> .hello sohank2602
16:37:31 <zodbot> skunkerk: sohank2602 'Sohan Kunkerkar' <skunkerk@redhat.com>
16:37:34 <jlebon> dustymabe: nice work on pushing the NM work all the way through!
16:37:38 <dustymabe> #info we put out another testing release yesterday (31.20200323.2.1) that fixed the regression
16:37:46 <dustymabe> thanks jlebon
16:37:52 <dustymabe> #chair lorbus
16:37:52 <zodbot> Current chairs: cyberpear dustymabe jdoss jlebon kaeso[m] lorbus skunkerk
16:38:14 <dustymabe> the NM in initrd work should land in next week's stable release
16:38:39 <dustymabe> #info please test out the latest testing release to test NM in the initrd well before we release it to stable in one week
16:38:58 <dustymabe> ok i'll move on to meeting itmes
16:39:05 * dustymabe can't spell today
16:39:07 <dustymabe> #topic
16:39:11 <dustymabe> #undo
16:39:11 <zodbot> Removing item from minutes: <MeetBot.items.Topic object at 0x7fe002258a10>
16:39:39 <dustymabe> #topic Missing libsss_sudo
16:39:45 <dustymabe> #link https://github.com/coreos/fedora-coreos-tracker/issues/445
16:40:06 <dustymabe> this one was just opened today but it seems like it's worth a quick look
16:40:41 <dustymabe> jlebon: do you know if the user's proposed solution is the right thing to do (i.e. is just including that package sufficient) ?
16:41:04 <jlebon> it seems reasonable, yes
16:41:28 <dustymabe> ok, the other question is - is this something we'd want to do in the base ?
16:41:44 <jlebon> we already ship sssd. i would've expected that plugin to already be there
16:41:50 <dustymabe> or relegate to https://github.com/coreos/fedora-coreos-tracker/issues/401
16:42:32 <dustymabe> ok, so this is more along the lines of "oops, that should have been included already" ?
16:43:16 <jlebon> i think so, but interested in other opinions
16:43:31 <jlebon> i haven't used sssd much myself
16:44:04 <dustymabe> anyone else have an opinion here?
16:44:07 <bgilbert> .hello2
16:44:08 <zodbot> bgilbert: bgilbert 'Benjamin Gilbert' <bgilbert@backtick.net>
16:44:12 <dustymabe> #chair bgilbert
16:44:12 <zodbot> Current chairs: bgilbert cyberpear dustymabe jdoss jlebon kaeso[m] lorbus skunkerk
16:44:28 <dustymabe> or "no opinion" :)
16:45:19 <kaeso[m]> I was checking the package content earlier today, and I think it's just a small .so which we could ship
16:45:39 <jlebon> FWIW, it's on silverblue at least by default :)
16:46:04 <dustymabe> it sounds like it was also in CL
16:46:18 <cyberpear> I haven't used that plugin, but it seems reasonable to include, assuming not many deps
16:46:19 <lorbus> size is ~40kB, voting to include :)
16:46:36 <cyberpear> +1 from me for including
16:47:15 <dustymabe> #proposed This fucntionality provided by libsss_sudo is missing functionality that we should include by default. The fact that it is currently missing was an oversight.
16:47:34 <dustymabe> i'm lukewarm on that second sentence
16:48:05 <jlebon> yeah, i think i'm more "lean towards including it, but defer to sssd SMEs"
16:48:05 <dustymabe> and I'll spell better in the #agreed
16:48:47 <dustymabe> jlebon: that implies we would need to ask another team?
16:49:04 <dustymabe> or just wait for somebody who knows better to come along?
16:49:11 <kaeso[m]> I'd ask for a sample fcct snippet in exchange, as I have no idea how it can be configured via Ignition
16:49:12 <jlebon> dustymabe: i meant more the latter, but the former works too
16:49:40 <dustymabe> jlebon: is it a strong enough reason to include it if CL had it?
16:49:50 <dustymabe> anybody have CL booted up right now?
16:50:20 <jlebon> IOW, it *seems* like obvious missing functionality we want
16:50:26 <jlebon> dustymabe: probably, yeah
16:51:27 <dustymabe> #proposed The functionality provided by libsss_sudo appears to be missing functionality that we want in FCOS. We are leaning towards including it in the base unless good reasoning for not doing so surfaces.
16:51:45 <jlebon> +1
16:51:49 <dustymabe> ack/nack?
16:52:18 <dustymabe> kaeso[m]: we can also ask for the sample fcct
16:52:21 <bgilbert> +1
16:52:37 <cyberpear> I use sssd, but not this plugin. +1 to #proposed, +1 to asking for snippet.
16:53:35 <kaeso[m]> +1
16:53:44 <cyberpear> I think it'd be good to collect use cases and fcct samples whenever we add a package
16:53:54 <dustymabe> #agreed The functionality provided by libsss_sudo appears to be missing functionality that we want in FCOS. We are leaning towards including it in the base unless good reasoning for not doing so surfaces.
16:54:08 <dustymabe> ok I'll update the ticket with this after the meeting
16:54:28 <dustymabe> #topic Don't bring up networking in the initramfs on first boot by default
16:54:36 <dustymabe> #link https://github.com/coreos/fedora-coreos-tracker/issues/443
16:55:14 <jlebon> ahh yup, i can expand on this
16:55:35 <jlebon> (libsss_sudo.so is 24kb btw, no other deps)
16:56:12 <jlebon> so, now we have the live ISO and promoting it one of the primary paths for doing bare metal installs
16:57:10 <jlebon> it works great, but it doesn't mesh well with the network configuration UX we want
16:57:53 <jlebon> right now the live ISO matches all the other FCOS deliverables and try to bring up networking during the initrd
16:58:16 <jlebon> this is an issue if part of your install process *is* to set up networking on the bare metal machine
16:58:50 <jlebon> so we have a primary goal to break that cycle
16:59:01 <jlebon> however, there's a higher-level issue here
16:59:21 <jlebon> which is that the only reason we bring up networking in the initrd is because ignition *may* require it to fetch resources
16:59:56 <dustymabe> jlebon: right. so we have a more narrowly scoped issue about not requiring network to boot the Live ISO (presumably for an install): https://github.com/coreos/fedora-coreos-tracker/issues/349
17:00:00 <jlebon> so a bigger win is to fix that instead by only bringing up networking when it's required
17:00:28 <dustymabe> what you're talking about is to solve this problem more generically, not just for the live ISO
17:00:44 <dustymabe> and have network only be brought up in the initramfs if it's needed?
17:00:54 <jlebon> this is not really a big difference really for most cloud images, since they majority of them definitely always need networking for ignition to even fetch its config
17:01:45 <jlebon> but e.g. qemu, vmware, s390x, and of course the live ISO for example don't inherently need networking
17:02:29 <jlebon> so the approach we're suggesting is to (1) provide an easy fix to get the live ISO working offline, and (2) fix the general problem long-term
17:03:24 <dustymabe> +1
17:03:44 <dustymabe> I have a short term fix for the live ISO in https://github.com/coreos/fedora-coreos-config/pull/326
17:04:38 <jlebon> one might say "meh, who cares about qemu always needing networking", but i for one think it'd be really nice to be able to take FCOS for a spin entirely offline
17:05:18 <jlebon> it also fixes the live ISO path more correctly, since one actually *may need* networking if the embedded ignition config has remote resources
17:06:04 <dustymabe> anyone have any qeustions/concerns for jlebon?
17:06:15 <cyberpear> (on subsequent boots, does initrd do net?)
17:06:27 <jlebon> (no, that doesn't change)
17:06:40 <dustymabe> (hehe)
17:07:09 <bgilbert> cyberpear: not currently.  but there are cases in the future where it might need to
17:07:16 <bgilbert> e.g. cryptroot
17:07:39 <dustymabe> bgilbert: right, that would probably be case by case, though, right?
17:07:42 <bgilbert> yup
17:07:46 <dustymabe> +1
17:07:47 <jlebon> right.  essentially, whatever needs networking needs to declare it
17:07:54 <cyberpear> right, clevis etc
17:08:12 <jlebon> this issue is specifically about ignition only declaring it when it needs it
17:09:25 <dustymabe> thanks jlebon for bringing this up. seems like a reasonable idea and a good thing to do long term. maybe let's carry on the discussion in the ticket?
17:09:33 <jlebon> yup, +1
17:09:51 <dustymabe> #topic Publish the initrd and rootfs images separately for PXE booting
17:09:58 <dustymabe> #link https://github.com/coreos/fedora-coreos-tracker/issues/390
17:10:49 <bgilbert> so we talked about this a few weeks ago
17:10:57 <jlebon> bgilbert: re. https://github.com/coreos/fedora-coreos-tracker/issues/390#issuecomment-605370179 is this something about iPXE itself, or the link was just bad?
17:11:01 <jlebon> ahh sorry
17:11:15 <bgilbert> dustymabe asked me to bring it up again, because of one new data point:
17:11:59 <bgilbert> I did some work on iPXE-booting FCOS on Packet, and indeed, iPXE takes takes ~5 minutes to fetch the initrd over HTTPS from our release bucket
17:12:12 <bgilbert> I did not try HTTP, though I wonder whether that would help
17:12:23 <bgilbert> depending how bad the iPXE crypto implementation is
17:13:02 <bgilbert> I don't think it changes my view on the problem, but FWIW.  /shrug
17:13:02 <dustymabe> i'm not going to lie it's taking me several minutes to download a qcow from our bucket before (just curl on my laptop) - is this iPXE or is it the remote ?
17:13:06 <jlebon> asking the same question again: to sanity-check, we're sure this is about iPXE sucking at HTTPS and not just the connection being slow, right?
17:13:25 <bgilbert> we are not
17:13:30 <jlebon> there's also cloudfront
17:13:42 <bgilbert> if we want to run more comprehensive tests, we certainly can
17:13:47 <bgilbert> but in any event it's not a one-off
17:14:03 <dustymabe> +1 for more testing
17:14:16 <dustymabe> if it's the remote then it won't matter what we do
17:14:54 <dustymabe> maybe we could work with the packet people to place a file in their infra and see how long it takes then
17:16:06 <dustymabe> anyone opposed to asking for more testing on this?
17:16:21 <jlebon> so essentially: (1) do more testing to sanity check the current approach is viable, then (2) if it's viable, go ahead with splitter tool
17:16:50 <dustymabe> (1) do more testing to make sure it's not the remote server that is causing the slowdown
17:17:01 <dustymabe> (2) we'd need to re-evaluate probably
17:17:13 <bgilbert> dustymabe: +1
17:17:22 <dustymabe> because we'd kind of want iPXE from packet to just work against our published artifacts
17:17:23 <jlebon> i think we're saying the same thing :)
17:17:35 <dustymabe> +1
17:18:02 <dustymabe> #info we'll do more testing for #390 to see if it's the remote server causing the slowdown or actually a slowdown in iPXE
17:18:31 <dustymabe> #topic Booting on OpenStack does not retrieve SSH keys from MD service
17:18:36 <dustymabe> #link https://github.com/coreos/fedora-coreos-tracker/issues/422
17:18:45 <dustymabe> cyberpear: I think you opened this issue
17:18:57 <cyberpear> yes
17:19:22 * dustymabe will let cyberpear frame the topic
17:20:32 <cyberpear> every "cloud image" for other OSes I've found supports the MD service on OpenStack, same as on ec2, etc
17:20:50 <cyberpear> FCOS image does not, unless you pass special cmdline options
17:21:25 <cyberpear> ubuntu, fedora, RHEL, CentOS, and probably CL, but I didn't actually test CL on OpenStack
17:21:50 <cyberpear> "how hard would it be to automatically detect the MD service?"
17:22:06 <jlebon> hmm, i wonder if https://github.com/coreos/ignition/issues/903 could help here
17:22:08 <dustymabe> is the problem that we have a single openstack image but two possibly places where metadata could come from?
17:22:35 <dustymabe> cc kaeso[m]
17:22:49 <jlebon> basically instead of doing the same hack as ignition to opportunistically try, have afterburn key off of what ignition found out
17:22:49 <cyberpear> I don't know how non-MD supporting OpenStack installs otherwise provide MD, but maybe someone here knows?
17:23:14 <jlebon> via a config drive
17:23:22 <jlebon> for ignition user-data
17:23:26 <bgilbert> it's not a question of whether it's hard, it's a question of whether it's safe
17:23:41 <cyberpear> why is it safe for Fedora to do it, but not for us?
17:23:54 <cyberpear> and RHEL?
17:24:03 <kaeso[m]> CL has the same behavior as FCOS. The user flow would be to write (via Ignition) a systemd dropin  to specify the openstack-flavor.
17:24:04 <bgilbert> just because other people are doing it doesn't mean that it's safe :-)
17:24:19 <bgilbert> it's harder to justify different behavior between Ignition and Afterburn though
17:24:35 <jlebon> bgilbert: ignition goes against that argument too though
17:24:40 <bgilbert> jlebon: yup
17:24:55 <jlebon> WDYT about keying off of ignition here?
17:24:56 <dustymabe> so does ignition try to fetch from either source today?
17:25:07 <dustymabe> but afterburn doesn't ?
17:25:33 <jlebon> that way, the discovery is centralized in ignition and it and afterburn are consistent between each other
17:25:45 <kaeso[m]> Afterburn updates ssh keys on each boot though
17:25:47 <bgilbert> last time we discussed this internally, we were going to talk to OpenStack folks about whether in 2020 we can just assume a metadata service exists
17:26:48 <kaeso[m]> I would be in favor of updating the baseline so that platform `openstack` actually means "an openstack platform with a metadata endpoint"
17:26:49 <jlebon> bgilbert: is the metadata service part of swift?
17:27:15 <cyberpear> I don't think it is
17:27:16 <kaeso[m]> that means dropping some code from Ignition though, I guess
17:27:17 <jlebon> because we did recently have an ask to be able to support swiftless openstack :)
17:27:37 <dustymabe> kaeso[m]: right, it might be more approprate to flip the default to metadata and have users who want to use the configdrive source to add the configuration?
17:27:37 <bgilbert> nova-api or nova-api-metadata
17:27:41 <cyberpear> (my OpenStack doesn't have swift, but does have Ceph which might be providing something similar)
17:27:50 <jlebon> ok, ack
17:28:12 <jlebon> when was the metadata service introduced?
17:28:28 <jlebon> i'd definitely be in favour of shedding the config drive code if feasible
17:28:44 <dustymabe> jlebon: one step in that direction is to change the default
17:28:58 <bgilbert> from looking at the docs real quick, it appears that the service is still optional
17:29:34 <jlebon> dustymabe: there is no default today though :)
17:29:47 <dustymabe> jlebon: oh? you have to configure afterburn either way?
17:30:06 <bgilbert> dustymabe: that's what we're discussing
17:30:09 * cyberpear is +1 for swiftless OpenStack support (it's my current blocker for OKD on OpenStack)
17:30:15 <bgilbert> afterburn doesn't support config-drive and needs to be told to use metadata
17:30:26 <dustymabe> hmm ok
17:30:45 <dustymabe> so the "harm" here is that afterburn would run and not reach the metadata service?
17:31:02 <jlebon> or reach some other node on the network
17:31:25 <dustymabe> where that node happened to be using the same network that the metadata service usually ran as
17:31:26 <jlebon> which can provide whatever metadata it wants, even though it's not "the" metadata server
17:31:31 <bgilbert> pull SSH keys from some node that acquired that particular link-local IP
17:31:49 <dustymabe> but that is a problem for every other cloud distro already
17:31:56 <dustymabe> as cyberpear mentioned
17:32:27 <kaeso[m]> wait, but OKD/OCP anyway are not supposed to pull SSH keys from the cloud
17:32:30 <dustymabe> IOW, yes that's a problem but is it one we really need to worry about
17:32:48 <bgilbert> dustymabe: I'd be in favor of making good decisions, not typical ones :-)  but I agree that the current situation isn't really tenable
17:32:49 <cyberpear> (If some node has address, such network is broken IMO)
17:32:59 <bgilbert> cyberpear: why?
17:33:12 <bgilbert> nodes can pick their own link-local addresses
17:33:57 <jlebon> right.  so my suggestion is make afterburn key off of ignition, so at least we're consistent.  but also ask the openstack devs if it's unreasonable nowadays to not support config drive anymore
17:34:24 <dustymabe> jlebon: so we'd need to find some way for ignition to write out a file that afterburn can then key off of on every boot
17:34:33 <dustymabe> since it runs on every boot
17:34:33 <cyberpear> bgilbert: it'd only be a problem in the case w/ MD but w/o DHCP
17:34:53 <cyberpear> w/ DHCP, the link-local address wouldn't be routabel
17:35:00 <kaeso[m]> jlebon: something like `/var/lib/ignition/providers/openstack/metadata` and `/config-drive`?
17:35:27 <bgilbert> cyberpear: it's not a question of routability.  it's a security vulnerability to allow a random node on the same network segment to inject SSH keys into instances.
17:35:46 * dustymabe notes we're running over time, but do think this discussion is currently productive
17:36:12 <jlebon> dustymabe, kaeso[m]: i linked to https://github.com/coreos/fedora-coreos-tracker/issues/390 earlier since it might help, but maybe not either since we want something more permanent
17:36:24 <cyberpear> bgilbert: is there a better solution? -- Do we convince the OpenStack folks to support the qemu way of passing ign?
17:36:40 <cyberpear> via firmware_cfg?
17:36:55 <bgilbert> heh, well, fw_cfg is itself controversial
17:37:07 <cyberpear> (since most non-VMware OpenStack is just qemu-kvm in the end)
17:37:32 <bgilbert> I'd personally prefer the metadata service to be mandatory but I get why that may not be possible
17:37:35 <dustymabe> do we want to end the discussion here and investigate the "queue off of ignition" route ?
17:37:35 <jlebon> i think introducing another way to get metadata is counter productive :)
17:38:09 <dustymabe> sigh - i think I used the wrong word
17:38:13 <bgilbert> jlebon dustymabe: FWIW I don't think keying off Ignition is useful
17:38:20 <cyberpear> Maybe someone can ask Red Hat security folks to evaluate it for the RHEL case, and we can inherit their solution?
17:38:28 <dustymabe> s/queue/cue/
17:38:36 <bgilbert> as long as Ignition unconditionally tries metadata, the horse has left the barn
17:38:46 <bgilbert> and IMO Afterburn might as well do the same thing
17:39:02 <dustymabe> bgilbert: so you think we should change Ignition to not do that?
17:39:10 <kaeso[m]> cyberpear: RHEL (RHCOS really) does no use cloud ssh keys at all, this is for FCOS really
17:39:10 * dustymabe assumes Ignition currently does that
17:39:28 <cyberpear> kaeso[m]: it does use MD for ign, doesn't it?
17:39:34 <dustymabe> RHEL does, RHCOS doesn't
17:39:37 <jlebon> bgilbert: that's my point though. if we're going to auto-discover, at least we should auto-discover once only
17:39:57 <jlebon> so we're sure whatever we settled on is what we roll with
17:40:27 <jlebon> that's entirely separate from whether we should auto-discover in the first place, which i agree we shouldn't
17:40:34 <bgilbert> jlebon: sigh.  yes... but also it's another piece of state we're talking about having Ignition write out
17:40:34 <kaeso[m]> I think jlebon's one is a reasonable improvement
17:41:27 <kaeso[m]> bgilbert: are you thinking about re-running Ignition cases?
17:42:07 <bgilbert> kaeso[m]: no, I'm just worried about the pressure on Ignition to write out all sorts of flags and internal state.  it's growing tendrils into all parts of the system
17:42:09 <jlebon> bgilbert: yeah... that's why i alluded to https://github.com/coreos/ignition/issues/903 earlier
17:42:57 <jlebon> i.e. let's not have ignition write 10 separate state files
17:43:08 <bgilbert> well, sure
17:43:19 <kaeso[m]> the least resistance path is to write FCOS docs / fcct sugar to write the systemd dropin
17:43:20 <bgilbert> it's becoming too tightly coupled, is my point
17:43:40 <jlebon> bgilbert: yeah, i don't disagree :(
17:44:18 <dustymabe> i'm going to try a proposal
17:44:29 <jlebon> FWIW, git master cloud-init still has the configdrive code btw
17:44:31 <dustymabe> i'm not going to get offended if it gets shot down
17:44:39 <dustymabe> #proposed we'd like to solve this itch. Ignition already does auto-discovery of the metadata service. We should investigate the feasibility of having Afterburn key off of Ignition's discovery
17:45:08 * dustymabe should mention openstack somewhere in there
17:45:28 <cyberpear> +1
17:45:34 <dustymabe> if this is not what we want we can punt to next meeting or whatever, I know some of us probably need to leave soon
17:45:42 <cyberpear> "OpenStack metadata service"?
17:45:47 <bgilbert> #proposed Modify Afterburn to read from the metadata service by default.  Document that Afterburn requires the metadata service (or implement config-drive support).
17:46:08 <bgilbert> ...since Ignition already gives a chance for to compromise the system
17:46:24 <dustymabe> I'm fine with that bgilbert
17:46:37 <bgilbert> dustymabe: I think it's feasible, I just think we shouldn't keep adding flags'n'such to Ignition
17:46:53 <jlebon> how hard would it be to add config-drive support?
17:47:07 <jlebon> i suspect not very
17:47:28 <dustymabe> to afterburn?
17:47:34 <jlebon> yeah
17:47:36 <bgilbert> I think not very
17:47:44 <bgilbert> kaeso[m]: thoughts on the proposals?
17:47:49 <jlebon> basically, if we're doomed to support both, then let's support both
17:47:52 <dustymabe> if it was go then we could just copy the ignition code probably
17:48:13 <kaeso[m]> it depends on the format, ibmcloud has 3x similar "ssh keys on config drive" and they go from "very simple" to "who came up with this"
17:48:32 <jlebon> hehe
17:48:44 <kaeso[m]> bgilbert: so basically aliasing openstack-metadata to openstack in afterburn?
17:48:48 <bgilbert> yeah
17:49:02 <jlebon> ohhhh there's one key difference btw between ignition and afterburn
17:49:30 <jlebon> if it's config-drive, then afterburn can assume that it's already ready and available because ignition must've gotten it from there too
17:49:48 <bgilbert> not on subsequent boots
17:49:51 <jlebon> so afterburn would be more of a "check config-drive first, then fall back to metadata server"
17:49:51 <bgilbert> but it does run much later, so
17:50:01 <bgilbert> more time for the config-drive to settle
17:50:22 <jlebon> hmmm, true. but right, yeah
17:50:27 <kaeso[m]> jlebon: it can still do even without Ignition, yes
17:50:50 <jlebon> ok, that makes me feel better
17:51:02 <jlebon> (re. not hard binding the two)
17:51:05 <dustymabe> #proposed Modify Afterburn to read from the metadata service by default.  Document that Afterburn requires the  metadata service. Later possibly add support for config drive and update documentation
17:51:22 <kaeso[m]> so basically 1) wire the `openstack` platform id 2) if no config-drive found, fetch from metadata
17:51:45 <dustymabe> ack/nack?
17:51:54 <jlebon> dustymabe: i think i want something more like kaeso[m]'s proposal :)
17:52:07 <dustymabe> where is that proposal?
17:52:48 <jlebon> #proposed modify afterburn to only know about `openstack` and in that mode, read from the config drive first then fallback to fetch from metadata server
17:53:37 <cyberpear> +1
17:53:42 <dustymabe> right, that's pretty much what i was proposing but doesn't require config drive support to exist before we fix the problem
17:53:53 <kaeso[m]> ack
17:53:55 <dustymabe> +1
17:54:00 <cyberpear> seems like the best long-term solution
17:54:03 <bgilbert> +1
17:54:19 <dustymabe> #agreed modify afterburn to only know about `openstack` and in that mode, read from the config drive first then fallback to fetch from metadata server
17:54:24 <jlebon> dustymabe: the config-drive bit is key though because it helps ensure it matches ignition
17:54:28 <kaeso[m]> it's more like "use metadata if there is no config-drive though"
17:54:33 <dustymabe> +1
17:54:38 <dustymabe> #topic open floor
17:54:42 <kaeso[m]> *" though
17:54:45 <dustymabe> I really apologize if anyone has been waiting for this
17:54:52 <dustymabe> anything for open floor?
17:55:00 <bgilbert> the latest release of the testing stream now has a DigitalOcean image
17:55:07 <bgilbert> and the next stable release will have one also
17:55:12 <dustymabe> #info the latest release of the testing stream now has a DigitalOcean image
17:55:22 <bgilbert> this is suitable for the DigitalOcean "custom image" flow
17:55:26 <dustymabe> bgilbert: we should probably add a docs page to show people how to use it
17:55:27 <bgilbert> i.e. users will need to upload it themselves
17:55:30 <bgilbert> dustymabe: +1
17:55:46 <jlebon> nice!
17:55:46 <bgilbert> DigitalOcean can't ship FCOS directly to users yet because that requires more technical work on our end
17:55:54 <bgilbert> (custom images get DHCP, standard images don't)
17:56:00 <dustymabe> #undo
17:56:00 <zodbot> Removing item from minutes: INFO by dustymabe at 17:55:12 : the latest release of the testing stream now has a DigitalOcean image
17:56:07 <dustymabe> #info the latest release of the testing stream now has a DigitalOcean "custom image"
17:56:12 <jlebon> (i find that different intriguing)
17:56:18 <jlebon> s/different/difference/
17:56:51 <dustymabe> will close out meeting in 60 seconds
17:56:54 <jlebon> bgilbert++
17:56:54 <zodbot> jlebon: Karma for bgilbert changed to 4 (for the current release cycle):  https://badges.fedoraproject.org/tags/cookie/any
17:57:57 <dustymabe> #endmeeting