16:31:01 #startmeeting fedora_coreos_meeting 16:31:01 Meeting started Wed Aug 18 16:31:01 2021 UTC. 16:31:01 This meeting is logged and archived in a public location. 16:31:01 The chair is dustymabe. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:31:01 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:31:01 The meeting name has been set to 'fedora_coreos_meeting' 16:31:05 #topic roll call 16:31:08 .hi 16:31:09 dustymabe: dustymabe 'Dusty Mabe' 16:31:32 .hello 16:31:32 travier: (hello ) -- Alias for "hellomynameis $1". 16:31:35 .hello siosm 16:31:38 travier: siosm 'TimothΓ©e Ravier' 16:32:06 #chair travier 16:32:06 Current chairs: dustymabe travier 16:32:33 .hello2 16:32:34 jaimelm: jaimelm 'Jaime Magiera' 16:32:52 .hello2 16:32:53 jlebon: jlebon 'None' 16:33:02 #chair jaimelm jlebon 16:33:03 Current chairs: dustymabe jaimelm jlebon travier 16:33:42 #chair bgilbert 16:33:42 Current chairs: bgilbert dustymabe jaimelm jlebon travier 16:34:14 .hello 16:34:15 copperi: (hello ) -- Alias for "hellomynameis $1". 16:34:29 copperi: try `.hi` 16:34:36 .hi 16:34:37 copperi: copperi 'Jan Kuparinen' 16:35:37 #chair copperi 16:35:37 Current chairs: bgilbert copperi dustymabe jaimelm jlebon travier 16:35:39 #topic Action items from last meeting 16:35:49 There were surpisingly no action items from last meeting 16:35:54 .hi 16:35:55 bgilbert: bgilbert 'Benjamin Gilbert' 16:36:09 #topic Differing behavior for aarch64 vs x86_64 disk images 16:36:15 #link https://github.com/coreos/fedora-coreos-tracker/issues/855 16:36:37 it took me way too long to give an update in the ticket with a summary of the discussion last week (and I probably missed some things) 16:37:13 jlebon: I think we were interested in your take on the "new" problem and proposed solutions 16:37:17 sorry to put the spotlight on you :) 16:38:06 dustymabe: i'll have to read up and circle back :) 16:38:25 no worries, that wasn't fair of me 16:38:41 bgilbert: anything to state before we take a detour to another issue ? 16:38:46 nope, let's move on for now 16:38:53 #topic NetworkManager: consider defaulting to EUI-64 for IPv6 SLAAC (at least on OpenStack) 16:38:57 #link https://github.com/coreos/fedora-coreos-tracker/issues/907 16:39:22 .hi 16:39:23 I took an action two meetings ago to find out how fedora cloud base handles this issue 16:39:23 lucab: lucab 'Luca Bruno' 16:39:26 #chair lucab 16:39:26 Current chairs: bgilbert copperi dustymabe jaimelm jlebon lucab travier 16:39:43 I updated the issue with that information in https://github.com/coreos/fedora-coreos-tracker/issues/907#issuecomment-895455009 16:40:16 more or less cloud base has cloud-init which writes out an ifcfg file 16:41:06 the ifconfig doesn't mention anything about addr-gen-mode but because the file exists and the way NM handles configuration read in from files, it ends up effectively using ipv6.addr-gen-mode=eui64 16:41:34 This came in to OKD yesterday... https://github.com/openshift/okd/issues/817 16:42:00 if I remove the ifcfg file and reboot the machine (i.e. to get the default config from NM just like is done in FCOS by default) then Fedora Cloud Base shows the same issue 16:42:04 jaimelm: yep 16:42:57 Also some chatter in https://bugzilla.redhat.com/show_bug.cgi?id=1743161#c14 and https://github.com/coreos/fedora-coreos-tracker/issues/907#issuecomment-899717858 16:43:02 same guy I think 16:43:26 ok, now that we know how cloud base deals with it (mostly by getting lucky) how do we want to proceed? 16:43:30 Ahhh, yeah, looks like it 16:43:44 my proposal is short medium and long term 16:44:22 1. short term, we try to figure out some what to get this working on openstack images without requiring changes in NM 16:45:17 2. medium term, NM implements a default config setting for this value that we can take advantage of with a dropin 16:45:50 3. long term, we try to get Fedora to change to it as the default for all server like variants (i.e. stable-privacy makes most sense in a workstation/laptop scenario) 16:46:13 What are the chances of 3? 16:46:14 dustymabe: +1 for that plan 16:46:29 the 1. could also be modified to not be openstack specific, but apply globally to FCOS 16:46:42 jaimelm: not sure, haven't tried that path before 16:46:42 ^^ 16:46:50 +1 for all FCOS too 16:46:53 yeah 16:46:58 general is better here 16:47:23 the short term fix is probably to tell users to setup their own connection profile via Ignition instead of using the default one. 16:47:57 Sounds like a good plan. It would probably be good to start 3 coinciding with 1 to get the ball rolling, given it's an unkown. 16:48:51 jaimelm: +1 16:48:57 lucab: yeah, there might be other options 16:49:08 would have to explore a bit 16:49:11 hmm, in the propagate path where we copy keyfiles from the initrd to the real root, we could inject it then 16:49:37 but that doesn't cover all cases, notably openstack via configdrive 16:50:20 yeah 16:50:41 by default right now we don't write any keyfiles 16:50:51 and NM generates them on the fly 16:50:54 lucab: +1 i'm not sure it's worth trying to have a super sophisticated short-term hack for this 16:51:10 these generated NM keyfiles have ipv6.addr-gen-mode=stable-privacy and thats the crux of the problem here 16:51:12 lucab: that would be good if an example was provided in the docs so people know how to roll their own via ignition. 16:51:32 the fact that NM generates it on the fly is a long-term friction I fear, it would be good if we could move out of that 16:51:33 ok let me try with a proposal 16:51:48 #proposal We will work with the NetworkManager team to get in place a configuration setting for a default value for ipv6.addr-gen-mode and apply that to all of FCOS when it's ready. In the shorter term we may try to find some other way to set it without requiring the NetworkManager feature to be implemented. We'll also reach out to FESCO and try to convince the rest of Fedora that 16:51:50 `stable-privacy` makes most sense in a workstation/laptop setting and we should apply eui64 as the default for all server like variants. 16:52:32 yes. 16:52:32 +1 16:52:34 hmm is there a limit to the character count on a single line in IRC? 16:52:46 also, is https://gitlab.freedesktop.org/NetworkManager/NetworkManager/-/merge_requests/962 going to break cloud-init too? 16:52:48 +1 16:53:18 Not by the standard I don't think. What client are you using? 16:53:29 weechat 16:53:50 any more votes? 16:54:01 lucab: i'll probably have to look at that separately 16:54:26 dustymabe: nevermind, I think I misread the code there 16:54:45 +1 16:55:09 bgilbert: any thoughts? 16:55:48 nope, sgtm 16:56:13 ok i'll split this out so maybe we don't have the text wrapping issue 16:56:15 #agreed We will work with the NetworkManager team to get in place a configuration setting for a default value for ipv6.addr-gen-mode and apply that to all of FCOS when it's ready. 16:56:16 dustymabe: irc has 510 character limit / message 16:56:17 #agreed In the shorter term we may try to find some other way to set it without requiring the NetworkManager feature to be implemented. 16:56:19 #agreed We'll also reach out to FESCO and try to convince the rest of Fedora that `stable-privacy` makes most sense in a workstation/laptop setting and we should apply eui64 as the default for all server like variants. 16:56:23 copperi: good to know 16:56:56 jlebon: ready yet, or should we go to the f35 changes ticket? 16:57:19 dustymabe: f35 changes 16:57:25 #topic tracker: Fedora 35 changes considerations 16:57:29 #link https://github.com/coreos/fedora-coreos-tracker/issues/856 16:57:50 ok we started this last week 16:58:03 we'll pick it up again today 16:58:27 all the issues in the description that have a ❌ have not been considered yet 16:58:48 we need to go through them and decide if we can skip, or if they need more investigation, in which case we'll split out a ticket for that investigation 16:58:56 we'll start with 16:59:06 item; 1.16 x TRIAGE GNU Toolchain update 16:59:08 copperi: wow. that seems small. but you're right, I see now in the RFC 16:59:22 skip? or investigate? 16:59:43 skip means we think with high confidence this won't affect FCOS 17:00:35 so this is just a point release update 17:00:46 gcc 11 was already in f34 17:01:09 so it will be 11.1 or 11.2 17:01:33 i think just the last three X of the 1.* items probably need more investigation 17:01:50 jlebon: what about the current one :) 17:02:07 just those, so everything else skip IMO :) 17:02:33 #info we think we can skip GNU Toolchain update 17:03:02 anybody else want to agree/disagree with jlebon? 17:03:05 an rhbz related to the third-party one showed up already againt rpm-ostree 17:03:26 so walters has already dug into that one 17:03:46 πŸ•³ 17:04:21 dustymabe: skimming the list, I'd agree that nothing else stands up 17:04:26 #info Golang 1.17: we don't anticipate any issues skipping 17:04:28 #info IBus 1.5.25: we don't anticipate any issues skipping 17:04:30 #info LLVM 13: we don't anticipate any issues skipping 17:04:36 what about 1.21 x TRIAGE Memory Constraints macros for RPM 17:04:54 anything in there? any interaction with rpm-ostree compose we need to consider? 17:05:00 skip 17:05:26 for authselect, there's a lot of history there, but today we don't ship neither it nor the compat, so we can probably skip that one too 17:05:45 compose has nothing to do with builds, so no 17:05:47 i think it's just related to RPM building 17:06:26 #info Memory Constraints macros for RPM: we don't anticipate any issues skipping 17:06:30 #info Python Packaging Guidelines overhaul: we don't anticipate any issues skipping 17:06:40 #info Remove authselect-compat package: today we don't ship authselect or the compat, skipping 17:06:41 for the yescrypt one, we should sanity-check our docs use that already, which i think it does 17:06:58 ok hold one sec 17:07:05 13:01:33 jlebon | i think just the last three X of the 1.* items probably need more investigation 17:07:13 so 1.32 1.33 1.34 ? 17:07:49 jlebon: the docs already use yescrypt 17:07:50 i mean 1.29 1.33 1.34 17:07:53 ahh ok 17:08:02 oh :) 17:08:06 #undo 17:08:06 Removing item from minutes: INFO by dustymabe at 17:06:40 : Remove authselect-compat package: today we don't ship authselect or the compat, skipping 17:08:27 jlebon: in other words.. we're probably OK, but let's make sure about authselect ? 17:08:57 bgilbert: indeed, looks like it. nice 17:09:10 #action dustymabe will open a ticket and look for volunteers to investigate 17:09:13 #undo 17:09:13 Removing item from minutes: ACTION by dustymabe at 17:09:10 : dustymabe will open a ticket and look for volunteers to investigate 17:09:26 #action dustymabe will open a ticket and look for volunteers to investigate "Third-party Software Mechanism" 17:09:45 walters: seems like a captive audience already for ^^ 17:10:19 dustymabe: re. authselect, sure yeah. just e.g. making sure it's not getting pulled in now or something due to spec file changes 17:10:20 yeah I think it's on track to be fixed but I will watch and assist 17:10:47 #action dustymabe will open a ticket and look for volunteers to investigate "Remove authselect-compat package" 17:10:58 i can take that one 17:11:05 item: 1.34 x TRIAGE Use yescrypt as default hashing method for shadow passwords 17:11:19 ok skip or no based on new information from bgilbert ? 17:11:27 skip 17:11:30 +1 17:11:32 may make sense to add a kola test for it 17:11:41 walters: for what? 17:11:44 yescrypt 17:11:52 that it exists? 17:12:01 yes ;) 17:12:39 i could see a kola test that tests password based authentication (i.e. what we put in our docs) as useful 17:12:45 ^^ 17:13:06 IOW, provision with a yescrypt hash, and sanity-check it works? 17:13:18 yeah, though that wouldn't actually test this change 17:13:36 i imagine this change is more.. when someone runs `passwd` use yescrypt 17:13:58 so automating a `useradd foo && echo "bar" | passwd foo` or something 17:14:10 which I don't really think we need to do 17:14:17 that's kinda an anti-pattern for us :) 17:14:42 yeah.. but a test that automates what we have in our docs, would be useful IMO, but not required for this 17:14:51 #info Use yescrypt as default hashing method for shadow passwords: we don't anticipate any issues skipping 17:15:04 yeah, looks like we don't actually test pw right now 17:15:21 bgilbert: want to open an issue for that and find a volunteer? 17:15:25 :) 17:15:29 i think it'd make sense to add a non-exclusive test which provisions the VM with a yescrypt hash and tests it 17:15:38 dustymabe: I'll split the difference and open an issue :-) 17:15:57 πŸ‘ 17:16:03 ok - time check 17:16:41 we'll do self contained changes next week 17:16:54 #topic Differing behavior for aarch64 vs x86_64 disk images 17:16:58 #link https://github.com/coreos/fedora-coreos-tracker/issues/855 17:17:28 only reason I'm pushing this topic is because we're getting close to shipping aarch64 images 17:17:55 and there are probably implications for RHCOS which we need to consider 17:18:13 hmmm....what are you thinking of wrt RHCOS? 17:18:24 we quashed the devmapper variance 17:18:36 (I haven't reached out to arm folks yet. Will try to do that asap) 17:18:45 (we're actually already shipipng aarch64 RHCOS) 17:18:58 walters: building, or shipping? 17:19:02 ((as preview)) (((also man I sure overuse parentheticals))) 17:19:12 walters: I overuse them and "" 17:19:14 walters is a LISP machine 17:19:29 is the argument now that if we don't do something, then as it stands Butane-generated raid1 setups will be using different partition numbers as vanilla systems? 17:19:39 jlebon: yes 17:20:00 and this is purely cosmetic, right? 17:20:03 which defeats a design goal 17:20:15 there were other arguments for symmetry (i.e. why the ticket was opened to begin with) 17:20:47 jlebon: well, I'm sure there's some script somewhere that assumes partition 4 17:20:51 in theory we can change this after aarch64 goes stable, right? 17:20:59 but in general the Butane template is supposed to match the disk image 17:21:30 walters: yes, but would prefer to change it before to reduce mismatch in the wild 17:21:37 bgilbert: makes sense 17:21:42 walters: depends on how we fix it, to some degree 17:21:48 agree it's clearly better to fix it before the first stable release 17:21:55 correct - to restate the options 17:22:05 I just don't have a good sense of the potential fallout of changing it later 17:22:20 1. break existing RAID template overrides (probably needs a Butane spec bump?) 17:22:22 2. change the Ignition matching behavior (needs Ignition spec 4 AFAICT) 17:22:24 3. ship empty partitions on aarch64/ppc64le so we don't skip any partition numbers 17:22:26 4. live with the inconsistency and update kola tests 17:22:43 is 1. saying we would hardcode partition numbers in the template? 17:22:52 jlebon: yes 17:23:32 ahh ok, but if we did have the ignition RFE, then it could not have to do that, right? 17:23:59 if we want to skip partition numbers, we'd still have to hardcode them in the Butane template 17:24:04 but doing so wouldn't affect user configs 17:24:42 ack, i think i follow 17:25:19 I'm leaning 3. the hack is ugly but it avoids spec bumps 17:25:25 long-term, i think what we should strive for is have users never need to write partition numbers 17:25:31 3. also has other benefits https://github.com/coreos/fedora-coreos-tracker/issues/855#issuecomment-858026743 17:25:35 jlebon: agreed 17:25:39 jlebon++ 17:25:39 jaimelm: Karma for jlebon changed to 4 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 17:25:53 but under the hood, we really have to do so, and in that respect it makes sense to ship empty partitions if it makes *our* lives easier 17:26:12 πŸŽ‰ πŸŽ‚ 🌞 17:26:44 +1 for 3 17:27:05 3 seems the most reasonable. Avoids spec bumps and shifts the issues away fomr the users. 17:27:16 agreed 17:27:57 #proposed we will ship empty partitions to help gain symmetry between the x86_64 aarch64 and ppc64le disk images in order to workaround/fix other bugs and help mitigate user confusion 17:28:10 yes. 17:28:18 bgilbert: wording check ^^ 17:28:22 dustymabe: let's add wording that they won't necessarily match the corresponding partition sizes on x86_64 17:29:00 bgilbert: yes. that's a subtopic I mentioned in https://github.com/coreos/fedora-coreos-tracker/issues/855#issuecomment-867131221 17:29:07 should we discuss that now ? 17:29:13 1 minutes 17:29:17 :) 17:29:21 s/minutes/minute 17:29:35 basically is there an argument for matching them or an argument for not matching them (sizes) 17:29:51 ok you said necessarily 17:30:11 #proposed we will ship empty partitions to help gain symmetry between the x86_64 aarch64 and ppc64le disk images in order to workaround/fix other bugs and help mitigate user confusion. The partition sizes won't necessarily be the same on all arches. 17:30:13 they're not matched now and I wasn't planning to harmonize them 17:30:14 better ? 17:30:28 +1 17:30:30 +1 17:30:41 +1 17:30:47 +1 17:30:49 +1 17:30:59 yes. 17:31:07 and for the record: 17:31:09 #link https://github.com/coreos/fedora-coreos-tracker/issues/855#issuecomment-896387343 17:31:32 #agreed we will ship empty partitions to help gain symmetry between the x86_64 aarch64 and ppc64le disk images in order to workaround/fix other bugs and help mitigate user confusion. The partition sizes won't necessarily be the same on all arches. 17:31:48 bgilbert: anything in particular in that link you wanted to highlight? 17:32:42 "other bugs" isn't super-specific so I wanted to have it next to a problem description in the minutes 17:32:43 that's all 17:32:48 +1 17:33:07 bgilbert: did you want to execute on that outcome (and re-enable the raid tests)? 17:33:12 if not we'll try to find someone else 17:33:22 yeah, makes sense 17:33:25 #topic open floor 17:33:41 #action bgilbert to add empty partitions, update Butane, re-enable tests 17:33:42 #info the multi-arch-pipeline is outputting aarch64 artifacts now 17:34:13 i'm working through an issue with the aarch64 AMI images https://github.com/coreos/fedora-coreos-tracker/issues/920 17:34:14 woohoo! nice work on this dustymabe! 17:34:14 * jaimelm moonwalks across the open floor. 17:34:23 I think we're good. 17:34:30 jlebon: do you mind updating the unofficial builds browser? 17:34:34 Only 5 minutes over :) 17:34:48 dustymabe: yup, makes sense 17:34:48 yep - anyone with anything else for open floor? 17:35:03 dustymabe: mind adding a comment to https://github.com/coreos/fedora-coreos-tracker/issues/13 ? 17:35:03 * dustymabe will have to see if we can update the official page too 17:35:19 walters: yep will do soon! 17:35:40 * dustymabe closes meeting in 30 s unless conversation continues 17:36:00 dustymabe: let's chat after re. prod/official 17:36:03 Thanks dustymabe 17:36:16 #endmeeting