16:30:32 #startmeeting fedora_coreos_meeting 16:30:33 Meeting started Wed Jun 17 16:30:32 2020 UTC. 16:30:33 This meeting is logged and archived in a public location. 16:30:33 The chair is jlebon. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:30:33 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:30:33 The meeting name has been set to 'fedora_coreos_meeting' 16:30:42 #topic roll call 16:30:44 .hello2 16:30:45 .hello2 16:30:45 lucab: lucab 'Luca Bruno' 16:30:48 jlebon: jlebon 'None' 16:30:50 .hello2 16:30:51 bgilbert: bgilbert 'Benjamin Gilbert' 16:30:58 .hello sohank2602 16:30:59 skunkerk: sohank2602 'Sohan Kunkerkar' 16:31:01 .hello2 16:31:02 darkmuggle: darkmuggle 'None' 16:31:08 .hello2 16:31:09 dustymabe: dustymabe 'Dusty Mabe' 16:31:15 #chair skunkerk lucab bgilbert darkmuggle dustymabe 16:31:15 Current chairs: bgilbert darkmuggle dustymabe jlebon lucab skunkerk 16:31:41 .hello2 16:31:42 cyberpear: cyberpear 'James Cassell' 16:32:00 will give 1m08s for people to join in 16:32:12 #chair cyberpear 16:32:12 Current chairs: bgilbert cyberpear darkmuggle dustymabe jlebon lucab skunkerk 16:32:28 * dustymabe notes he needs to update https://github.com/coreos/fedora-coreos-tracker/issues/519 with the discussion from last week 16:32:42 will do that as soon as the meeting is over today, removed the meeting label from that one for now 16:33:10 alrighty, let's begin 16:33:11 and I should probably followup with the ticket upstream too 16:33:14 #topic Action items from last meeting 16:33:25 None! 16:33:49 anything anyone wants to bring up before we jump into the one issue with a meeting label? 16:34:05 should we talk about the lua script issue, or do we have that under control? 16:34:19 +1 for lua script issue 16:34:22 i'm testing a patch right now :) 16:34:40 jlebon: general, or specific? :-) 16:34:41 well, there's a micro fix and a macro fix :) 16:34:43 right 16:34:47 right 16:34:54 added meeting label 16:34:54 short-term hack 16:35:21 ok, let's start with that one then 16:35:26 there is some longer term work that we should discuss if we have free time today 16:35:31 release notes and metrics 16:35:36 +1 16:35:38 there are* 16:35:48 #topic crypto-policies pinned to avoid Lua script 16:35:58 #link https://github.com/coreos/fedora-coreos-tracker/issues/540 16:36:20 the TL;DR is that crypto-policies changed recently from baking in a DEFAULT config, to dynamically setting it at install time 16:36:35 to do this, it uses lua to avoid a dependency cycle 16:37:01 the magic of lua scripts was that you didn't need lua actually installed on the target system since it'd used RPMs internal parser 16:37:01 we've pinned it in FCOS for now, but it's blocking other work 16:37:09 right 16:37:24 there are two issues here: 16:37:29 1. rpm-ostree doesn't implement lua 16:37:44 2. the crypto-policies script doesn't make sense for us 16:38:02 why doesn't lua work w/ rpm-ostree? -- (isn't it using rpm itself?) 16:38:07 so even if we did support lua, we would want to tweak things 16:38:22 cyberpear: https://github.com/coreos/rpm-ostree/issues/749 16:38:26 jlebon: number 2 is good info 16:38:56 the patch i'm working on is to hack around this for now by simply re-setting the backend to DEFAULT at compose time 16:39:05 and to ignore the lua script 16:39:57 thanks jlebon for working on that. 16:40:09 +1 16:40:09 could we solve this more generically in the future? 16:40:14 not sure if there's more to say here other than working around it for now, and continuing discussions upstream re. (1) lua support and (2) adapting crypto-policies 16:40:33 #2 is specific to this particular script, but I wanted to bring this up because of #1 16:40:44 this has happened twice recently 16:40:45 will this workaround allow us to still see each lua scriptlet that comes up? 16:41:27 cyberpear: yes, it's just special-cased for crypto-policies 16:42:05 the core issue IIRC is that there's no easy way to hand librpm a lua scriptlet to run 16:42:13 jlebon: what happens if the crypto-policies lua script changes and it does something we do need ? 16:42:29 maybe that's unlikely 16:43:06 dustymabe: that's a gap in all our "replacement" hacks right now. we should indeed address that (or just work on supporting lua) 16:43:39 yeah. do we know how hard supporting lua would be 16:43:39 can you elaborate a bit on the underlying per script sandbox that is causing the issue? or docs link? 16:44:53 cyberpear: https://src.fedoraproject.org/rpms/crypto-policies/c/9b9c9f7378c3fd375b9a08d5283c530a51a5de34?branch=master 16:44:56 i know asking rpm maintainers to remove lua support from their scriptlets, when they were encouraged to go there in the first place (by rpm) is a bit of a bad experience as a packager 16:46:12 dustymabe: +1 16:46:33 yeah, we'll have to address it sooner or later 16:47:14 I meant " The reason we don't implement Lua is it directly conflicts with our per-script sandboxing (using bwrap)." from https://github.com/coreos/rpm-ostree/issues/749 -- what's the sandbox? (sorry, novice question) 16:47:40 and why is the sandbox needed -- is it to rewrite the paths so everything is under /usr in the end or something else? 16:48:00 all the scriptlets are run in a bwrap container 16:48:12 with no network, right? 16:48:13 and we don't want to run rpm directly on the compose server 16:48:34 but there's no way yet to pass rpm in the container the lua script 16:48:38 right 16:49:43 running the scripts in bwrap enforces a separation between the compose server and the rootfs 16:49:49 ahh, so we need some way to call rpm and just give it a lua script to run ? 16:49:54 and there is no way to do that ? 16:50:49 and actually this is a great example. crypto-policies wants to set the FIPS backend if fips_enabled=1. but that doesn't make sense for us at compose time 16:51:05 dustymabe: no supported way yeah 16:51:40 Colin had an idea synthesizing RPMs: https://github.com/coreos/rpm-ostree/issues/749#issuecomment-644751946 16:51:50 jlebon: my understanding is that the main blocker is librpm which should start exposing an API to receive and execute a lua scriptlet, right? 16:52:00 have we even proposed with rpm upstream to support that ? 16:52:04 (so is rpm-ostree re-implementing the rpm install process, then? not using rpm itself to do it?) 16:52:39 dustymabe: i think that's part of what the rpm-ostree upstream issue is about: https://github.com/coreos/rpm-ostree/issues/749#issuecomment-616732128 16:52:50 we should renew/formalize that request 16:53:28 +1000 16:53:42 at least if we get an answer there we can know which way we need to go 16:54:07 lucab: kinda, but i'm not sure if we would hand it to librpm outside the chroot anyway. i think walters was saying that having rpm support a separate installroot would be a lot of work 16:54:32 this is not very different from `dnf install --installroot`, though that actually does use rpm itself, so it doesn't hit this 16:55:38 cyberpear: yes, it's re-implementing parts of it 16:55:44 so a next step would be formalizing a request for `rpm run -p` upstream 16:55:47 IIUC 16:56:07 +1 16:56:17 there is a separate topic of "does the lua script in package xyz make sense for us" 16:56:56 yup, exactly 16:56:57 so even if we do support lua, should we be evaluating each one? 16:57:02 that's more of a case by case basis 16:57:08 jlebon: ah gotcha, so librpm is too low-level and missing other primitives too, so a better target is likely to bwrap rpm or some other real command anyway 16:57:10 that would be relevant for any such script, though 16:57:18 cyberpear: +1 16:57:27 jlebon: any reason to think lua scripts will be worse than shell in that regard? 16:57:31 so basically take them all and fix things when they break? 16:57:42 yes, exactly 16:57:46 makes sense 16:58:25 lucab: well i guess it could be a librpm binding if that's easier for upstream, and we call into it from a helper running in the container 16:59:20 #proposed we will work around the crypto-policies issue for now in rpm-ostree. meanwhile, we will also pursue a path forward with upstream rpm on supporting running lua scriptlets 17:00:00 can we change the wording slightly 17:00:16 supporting running lua scriptlets pass in at runtime 17:00:24 or something to that effect 17:00:33 since rpm already supports lua scriptlets 17:00:54 #proposed we will work around the crypto-policies issue for now in rpm-ostree. meanwhile, we will also pursue a path forward with upstream rpm to support passing lua scriptlets at runtime 17:01:02 ack 17:02:11 anyone else? 17:02:26 +1 17:02:42 ack! 17:02:49 +1 17:02:51 #agreed we will work around the crypto-policies issue for now in rpm-ostree. meanwhile, we will also pursue a path forward with upstream rpm to support passing lua scriptlets at runtime 17:02:57 ok, let's move on 17:03:07 #topic F32 rebase tracker for changes discussion 17:03:10 #link https://github.com/coreos/fedora-coreos-tracker/issues/372 17:03:27 so we're currently rolling out f32 on stable 17:03:46 🥳 17:03:47 which concludes the saga 17:04:10 AFAIK, no major issues reported so far 17:04:30 i'm crossing my fingers and hoping all goes well 17:05:04 it's set to roll out over three days, so it should be almost halfway rolled out around now 17:05:15 thanks ksinny for doing the releases! 17:05:31 ksinny++ 17:05:31 dustymabe: Karma for sinnykumari changed to 1 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 17:05:47 anyone had any other comments about this? 17:05:49 ksinny++ 17:05:49 jlebon: Karma for sinnykumari changed to 2 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 17:06:05 jlebon: not stable stream related but it might be worth discussing 17:06:12 https://github.com/coreos/fedora-coreos-config/pull/481#issuecomment-645038000 17:06:33 dustymabe: let's discuss that next? 17:06:37 +1 17:06:50 I'm surprised nobody complained yet about anything broken in the new docker 17:07:21 lucab: i.e., the bump from 18.09 to 19.03 17:07:31 heh, maybe it's a sign lots of people are using podman? 17:08:00 or maybe it went off without a hitch 17:08:04 or maybe no one is using FCOS :) 17:08:07 or that docker is finally stable across major versions! 17:08:20 metrics++ 17:08:20 🎉 17:08:51 lucab: it's been better in recent times, no? 17:09:25 I think it didn't get worse, yes 17:09:41 heh 17:09:49 ok, cool. will move on to next topic if that's all 17:10:20 #topic potential issues with microcode_ctl rolling out in testing/next 17:10:26 #link https://github.com/coreos/fedora-coreos-config/pull/481#issuecomment-645038000 17:11:11 to answer that question: i think it depends how severe and how widespread it is? 17:11:18 right, so the microcode_ctl we shipped to testing/next might have some issues booting (should only affect bare metal machines) 17:11:41 here are some reported issues: https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/31 17:11:47 https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/33 17:12:28 I wouldn't have shipped the new microcode_ctl update, but I did chat with the maintainer on monday and they seemed to indicate they thought they were going to be pushing the update to stable 17:12:31 so I pressed ahead 17:12:54 but apparently intel released a new update since users were reporting issues 17:13:02 so there is a new microcode_ctl out 17:13:43 we should probably push out a new `testing`/`next` at least to make sure this microcode_ctl doesn't hit stable 17:14:00 but when do we do that is up for some debate 17:14:27 do we wait for the new update to hit bodhi stable and then do it 17:14:52 do we pause the rollouts of testing/next and do new builds now 17:15:16 I don't think we're compelled to wait for bodhi stable 17:15:20 well, hangs are not great :( 17:15:49 bgilbert: right, we aren't, but that might give us a better feeling about this new update not introducing new problems 17:16:03 yeah that's true 17:16:15 i.e. what I didn't do last time 17:16:22 faifr 17:16:23 fair 17:16:51 I think we either stop the rollouts and spin now - OR we wait until it hits bodhi stable (presumably later this week) and do it then 17:17:02 IIUC, affected machines can just reboot and rollback right? 17:17:11 jlebon: correct - manual intervention 17:17:23 let's wait unless people start reporting hangs too? 17:17:39 i'm ok either way I think 17:17:42 yeah, i think i agree 17:18:29 are the rollouts already at 100%? 17:18:48 (or close) 17:18:51 I think they were set for 2 days and they started like 22 hours ago 17:19:05 or something like that 17:19:10 should be around half done 17:19:39 oh yes, you're right. and stable is about a third done, not half (i said half earlier) 17:19:47 stable is not affected 17:19:59 which is good! 17:20:00 right, just correcting my earlier statement in the previous topic 17:20:03 +1 17:20:24 I'd say let them finish and start preparing for a next round soon 17:20:36 ack 17:21:03 +1 17:21:09 pending the update hitting stable 17:21:10 +1 17:21:33 if we start to get user reports of issues we can pull the trigger sooner 17:21:45 shall we move to open floor? 17:22:08 WFM 17:22:11 #topic Open Floor 17:22:32 anyone has anything? 17:22:38 jlebon: did we want to find someone to take an action to open a feature request for LUA upstream? 17:23:29 sorry for LUA in RPM upstream 17:23:29 #action jlebon to open an RFE in upstream RPM for supporting runtime Lua scriptlets 17:24:03 we can talk about release notes and metrics next time probably 17:24:14 upstream RPM is just github for issues and PRs, right? 17:24:21 in short.. i think we're getting to a point where we can start to flesh out those pieces of our story 17:24:33 * cyberpear excited about metrics 17:24:48 for next time: i had a simple proposal to start with re. release notes in https://github.com/coreos/fedora-coreos-tracker/issues/194#issuecomment-606687194 17:24:52 cyberpear: is that sarcasm? :) 17:24:58 dustymabe: metrics == telemetry from pinger? 17:25:00 not at all 17:25:18 release notes are also very important 17:25:20 lucab: right - some way to know if our users are keeping up with updates and how many exist 17:25:49 IIUC right now we'd be able to see if the transition to F32 is going smooth on the stable stream 17:26:06 cyberpear++ 17:26:23 lucab: is my understanding accurate? 17:26:35 dustymabe: ack. let's try to avoid calling those metrics has it's an already overloaded term 17:26:52 dustymabe: yes it is 17:26:54 ok, so s/metrics/telemetry data/ ? 17:27:02 Thanks dustymabe lucab jlebon for the help with F32 release :) 17:27:18 a bit of a bummer is that communishift is temporarily offline 17:27:23 👏👏👏 17:27:50 i feel like it should be coming back soon - /me would need to dig in email to find out 17:27:51 dustymabe: population statistics? 17:28:28 wfm - i'll just have to try to remember what to call it :) 17:28:42 I don't think we've ever really come up with a good name 17:29:12 "pinger data" :) 17:29:14 indeed 17:29:17 metrics seemed most appropriate in my mind, but I agree it's an overloaded term 17:29:45 speaking of metrics though, I was hacking around this for Zincati https://github.com/coreos/zincati/pull/312 17:30:21 "pinger data" is what I had assumed was referred to by "metrics" in this context 17:31:09 lucab: neat stuff 17:31:28 oh hey, looks like we're past the time already 17:31:49 will end meeting in 30s unless anyone wants to bring up anything else 17:32:22 #endmeeting