16:30:51 #startmeeting fedora_coreos_meeting 16:30:51 Meeting started Wed Aug 1 16:30:51 2018 UTC. 16:30:51 This meeting is logged and archived in a public location. 16:30:51 The chair is dustymabe. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:30:51 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:30:51 The meeting name has been set to 'fedora_coreos_meeting' 16:30:55 #topic roll call 16:30:58 .hello2 16:30:59 ajeddeloh: ajeddeloh 'Andrew Jeddeloh' 16:31:09 .fas jasonbrooks 16:31:10 jbrooks: jasonbrooks 'Jason Brooks' 16:31:17 .hello2 16:31:18 bgilbert: bgilbert 'Benjamin Gilbert' 16:31:33 .hello rfairleyredhat 16:31:34 rfairley: rfairleyredhat 'Robert Fairley' 16:31:44 Geoff Levand 16:32:00 .hello lorbus 16:32:03 lorbus[m]: lorbus 'Christian Glombek' 16:32:28 !hello2 16:32:34 .hello2 16:32:35 slowrie: slowrie 'Stephen Lowrie' 16:32:48 .hello sinnykumari 16:32:49 ksinny: sinnykumari 'Sinny Kumari' 16:34:24 #chair ajeddeloh jbrooks rfairley lorbus[m] slowrie ksinny 16:34:24 Current chairs: ajeddeloh dustymabe jbrooks ksinny lorbus[m] rfairley slowrie 16:34:40 hope everyone is having a great wednesday! 16:34:53 welcome jbrooks 16:34:55 jberkus: 16:35:02 .hello jberkus 16:35:05 jberkus: jberkus 'Josh Berkus' 16:35:07 o/ 16:35:09 #chair geoff- jberkus 16:35:09 Current chairs: ajeddeloh dustymabe geoff- jberkus jbrooks ksinny lorbus[m] rfairley slowrie 16:35:31 ok we'll get started here with previous meeting action items 16:35:55 .hello jdoss 16:35:56 jdoss: jdoss 'Joe Doss' 16:36:06 #chair jdoss 16:36:06 Current chairs: ajeddeloh dustymabe geoff- jberkus jbrooks jdoss ksinny lorbus[m] rfairley slowrie 16:36:14 #topic Action items from last meeting 16:36:31 only had one from last meeting 16:36:36 * dustymabe update the issue/PRD with distinctions for the different 16:36:37 categories 16:37:15 #info dusty added results from last meeting about use case distinctions to #7 16:37:19 #link https://github.com/coreos/fedora-coreos-tracker/issues/7#issuecomment-408454966 16:37:47 which means we can dig into the issues now 16:38:08 #topic Partition Layout 16:38:15 #link https://github.com/coreos/fedora-coreos-tracker/issues/18 16:39:09 * dustymabe waits while people read - also walters and ajeddeloh feel free to drive the discussion 16:40:06 I don't have much to add beyond what has been said so far 16:41:10 walters: I know there are some security hardening specs that want /var, /var/log, and /var/log/audit all on separate partitions. is that case handled at all in Atomic now? 16:41:11 I think I missed #chair on bgilbert 16:41:18 #chair bgilbert 16:41:18 Current chairs: ajeddeloh bgilbert dustymabe geoff- jberkus jbrooks jdoss ksinny lorbus[m] rfairley slowrie 16:41:23 .chair bgilbert 16:41:23 bgilbert is seated in a chair with a nice view of a placid lake, unsuspecting that another chair is about to be slammed into them. 16:41:44 damn zodbot 16:41:47 #chair bgilbert 16:41:47 Current chairs: ajeddeloh bgilbert dustymabe geoff- jberkus jbrooks jdoss ksinny lorbus[m] rfairley slowrie 16:41:50 chair as a service 16:42:20 So one new thing to consider: 4k sectors 16:42:30 bgilbert: yeah, was the rationale behind https://bugzilla.redhat.com/show_bug.cgi?id=1459623 AKA https://github.com/ostreedev/ostree/issues/855 16:42:52 CL cannot install on disks with 4k sectors since the GPT partition layout is different. 16:43:02 ajeddeloh: yeah I'm curious about that...I think `mkfs` will try to detect and optimize these things too right? 16:43:07 https://github.com/coreos/bugs/issues/2109 for a bit more context on the 4k issue 16:43:35 ah, `-global virtio-blk-device.logical_block_size=4096` is nice and easy 16:43:44 bgilbert: ajeddeloh: so that is an argument for *not* shipping a dd-able disk image ? 16:43:53 when I looked at that issue before, I had the impression that it was fixable 16:44:00 the partitions themselves are already aligned properly 16:44:06 and we just need to rewrite the GPT. 16:44:11 not necesarily, but its something that needs some work to support 16:44:20 yeah 16:44:30 would that be a lot of work? 16:44:46 coreos-install is in bash so it wasn't obvious how to do it there 16:44:51 rewriting gpt: probably not 16:45:13 if we had some slightly better tool than bash to handle it 16:45:18 at this point IMO rewriting coreos-install in not-bash is a good idea, but we could also keep a separate 4K GPT somewhere that it dd's down 16:45:50 I'm not aware that CL ever had a user complain about it. it only affects the boot drive 16:46:03 and probably servers are all SSD-root by now 16:46:13 ok so let me make a statement and see if anyone disagrees 16:46:40 1. we'd like to strive for a fixed partition layout for our shipped image artifacts 16:46:44 one thing that isn't clear to me; e.g. `mkfs.xfs` defaults to a sector size of 512, but clearly on a 4k disk one would want that to be 4k right? is that normally the responsibility of a higher level tool? would nee 16:46:58 * walters glances through google results for "xfs 4k sector" 16:46:59 2. the goal here is to have an image that is dd-able to any harddrive and can be booted 16:47:38 3. other mounts (like /var/) can be added at runtime on first boot 16:48:20 There's really two issues: gpt and whatever the root fs is 16:48:33 gpt is easy: just blat downt the correct table 16:48:54 assuming we can support root deployed between ignition stages, we could fix the fs issue too 16:49:37 anyone want to comment on 1/2/3 above ? 16:50:09 agreed on those 16:50:21 +1 16:50:55 worth noting #2 is the sole advantage of a dd'able image, but yeah +1 16:51:15 walters: looks like the default XFS block size is 4KB 16:51:43 bgilbert: yeah, block size vs sector size: https://www.spinics.net/lists/linux-xfs/msg10526.html 16:52:00 ok I'll update the issue with the results of this conversation 16:52:10 we ready to move to next topic ? 16:52:31 walters: not immediately obvious from that thread why XFS cares about sector size once the block size is set 16:53:16 #topic arm64 / aarch64 support for Fedora CoreOS 16:53:22 #link https://github.com/coreos/fedora-coreos-tracker/issues/13 16:53:26 yeah let's file this as "to determine later", I think we can plow forward with a dd-able image and deal with the 4k drive later 16:53:31 +1 16:53:38 ed-packet: around today ? 16:54:02 ed-packet: is traveling 16:54:08 geoff-: +1 16:54:16 geoff-: do you have anything for this topic ? 16:54:24 will the build system do cross compiles? 16:54:40 or will it only be 'self-hosted'? 16:54:44 how does this relate to the Fedora IoT edition? 16:54:47 cross compile.. meaning compiling for aarch64 on an x86_64 host ? 16:54:57 dustymabe: yes 16:55:01 lorbus[m]: it doesn't (this is mostly aarch64 servers) 16:55:22 geoff-: no I don't believe so. we typically build aarch64 pieces on aarch64 hosts in Fedora 16:55:36 walters: ksinny correct me if I'm wrong 16:55:54 https://blog.verbum.org/2012/10/13/building-everything-from-source-vs-self-hosting/ 16:56:00 dustymabe: yes, we build on aarch64 16:56:29 No cross compilation 16:56:54 that was one nice feature of CL, I didn't need to port the build system to arm64 16:56:56 walters: was there anything in particular you wanted us to glean from that link without reading the whole thing right now in this meeting ? 16:57:08 fedora is defined to be a self-hosted system (today) 16:57:16 hence that's how the build system works 16:57:27 walters: +1 16:57:41 but that doesn't mean we can't define our own subset that isn't required to be self hosting 16:58:09 obviously doing so has a whole lot of implications for how much code/infrastructure such a subset would share with current fedora 16:58:21 walters: true. geoff- this is something we' 16:58:26 we'll have to address as we go along 16:58:47 (I personally a m a fan of https://github.com/openembedded/openembedded-core ) 16:58:59 ultimate goal is to have build tools that work on the subset of platforms we support and that each artifact is built in that environment 16:59:56 geoff-: WDYT? 17:00:21 geoff-: In Fedora build infrastucture, compose process for all architetcures started by pungi and depending upon on what articture we are going to build an artifatcs(image,iso,etc), we send jobs to architecture specific builders 17:00:49 This is my understanding 17:01:10 ksinny: yep. that's how it is done today. We will probably evaluate what tools we use along this journey 17:01:12 I guess my main concern is a bunch of work is done, only tested on x86, then when I pull that in it breaks horribly on arm64 17:01:26 dustymabe: right 17:01:40 geoff-: ksinny has helped us enable aarch64 for atomic host in the past 17:02:14 can we establish you and her as a point team for helping make sure we consider aarch64 when making decisions ? 17:03:07 For interested folks, we can work on providing access to community aarch64 hardware in order to work on adding support/debugging things 17:03:59 dustymabe: OK, that sounds good, I guess ed-packet would be interested also 17:04:47 indeed. ksinny can you update the ticket to state we established you 3 as the point team for aarch64 considerations during design decisions ? we won't close the ticket yet because we still want to hear from ed-packet 17:05:13 dustymabe: will update 17:05:20 #action dustymabe to update #18 with results of partition layout discussion and close ticket 17:05:44 #action ksinny to update #13 to reflect her, ed, geoff are point team for aarch64 17:06:02 ok will move to next topic in 30 seconds 17:06:31 #topic flesh out use cases for Fedora CoreOS 17:06:39 #link https://github.com/coreos/fedora-coreos-tracker/issues/7 17:07:05 ok so last meeting we established some more definitions around what each category means 17:07:13 see https://github.com/coreos/fedora-coreos-tracker/issues/7#issuecomment-408454966 17:07:26 do we now want to revisit what use cases we have in each category ? 17:07:34 https://github.com/coreos/fedora-coreos-tracker/issues/7#issuecomment-407532435 17:09:39 * dustymabe checks net connection 17:09:43 under those definitions, I'm okay with the use cases as defined 17:10:07 it looks fine to me. 17:10:26 +1 17:10:37 \o/ 17:11:07 It looks good to me 17:11:09 I know there was at least one person commenting in the ticket about desire for stronger wording around security being a focus 17:11:27 that seems reasonable to me 17:11:52 To play devils advocate for that one: what actions can we (reasonably) take for security 17:12:18 moreso than Fedora already does 17:12:36 ajeddeloh: i think maybe the stated goal of having a reasonable small base 17:12:51 what wording did container linux use to that effect ? 17:12:53 "Fedora" doesn't ship with auto-updates on by default today 17:13:01 * ajeddeloh is all for as minimal a distro as possible 17:13:17 I think CL's wording changed over time 17:13:31 SELinux was never really done right in CL. I don't want to see that happen again... 17:13:52 geoff-: i think there is 0 chance of us shipping FCOS without SELinux enabled by default 17:14:16 the original goal for CL was to not leave people's servers vulnerable. That was goal #1. Auto updates + containers allowed that since the containerization meant your host didn't matter as much 17:14:19 geoff-: https://github.com/coreos/ignition/pull/569 17:14:24 geoff-: ++ 17:14:29 the security point does seem relevant wrt prioritizing out-of-cycle releases 17:14:52 the naive approach for e.g. stable is to snapshot Fedora updates at regular intervals 17:15:02 but we also need to pay attention to CVEs and roll out-of-cycle updates 17:15:05 then docker and k8s started having all sorts of weird compat contrainsts for the host and mucked with that vision 17:15:50 not sure how aggressively Atomic does that now, but we should probably at least make it an explicit FCOS goal 17:16:07 s/Atomic/AH/ 17:16:48 ok so from what I'm hearing we can probably add some wording to the PRD (or identify wording that already exists) to state that we consider security important and a few things that we do with FCOS (SELinux enabled, reasonably small base, automatic updates) 17:17:17 +1 17:17:35 +1 17:18:02 +1 17:18:31 +1, out-of-cycle updates are a necessity 17:18:46 what is the AH policy onw? 17:18:49 now 17:19:14 out-of-cycle meaning what? 17:19:30 outside of the set release cadence 17:19:37 we currently ship every two weeks. If a heartbleed comes out we'll respin as soon as the update is available 17:20:10 is there a (rough) sense of the threshold for doing so? 17:20:22 heartbleed is a pretty high bar :-) 17:20:32 i.e. what level of security vuln prompts an impromptu release ? 17:20:37 right 17:21:09 so far we've mostly gone by judgement.. ratings and such help 17:21:23 i'd say it hasn't happened often enough to have any kind of true policy 17:21:25 if we want to establish some metric we can try to do that 17:22:21 CL doesn't have a crisply defined threshold either 17:22:42 but it happens a nontrivial number of times per year 17:23:05 which is mostly what I was wondering about 17:23:48 +1 either by judgement or established metric work for me 17:24:07 we can decide going when we start having those problems 17:24:24 I think it will also depend upon how frequently FCOS will recieve automatic updates? 17:24:44 ok bgilbert jbrooks ajeddeloh jbrooks all: can we get some in-ticket votes for the use cases? https://github.com/coreos/fedora-coreos-tracker/issues/7#issuecomment-409654340 17:24:57 ksinny: we haven't really decided a cadence yet 17:25:06 ksinny: do you mind opening a new ticket for that ? 17:25:24 dustymabe: will do it 17:25:35 ok 17:27:07 #agree the use cases in #7 seem reasnonable to the members of this meeting. each individual will give their vote in ticket 17:27:21 ok open floor time 17:27:23 #topic open floor 17:27:37 * dustymabe waves at everyone and thanks them for waiting patiently 17:27:53 belated additional thought on partition layout: 17:28:14 one change vs. CL with everything-on-root is that the user can fill up the disk so we can no longer perform updates. 17:28:22 lorbus[m]: did you have something for open floor ? 17:28:23 is that a concern? 17:29:03 * ajeddeloh has to go 17:29:03 jbrooks: so if we're doing kubernetes for coreos, I'm assumign we still use containerized kubeadm? 17:29:06 bgilbert: is there any way around "filling up root" in either traditional CL, traditional atomic host, or FCOS ? 17:29:12 see y'all next week 17:29:15 dustymabe: it's not ready yet :( 17:29:22 jberkus, We need to discuss all of that 17:29:25 lorbus[m]: poo 17:29:30 dustymabe: there's no way around it happening, but on CL it shouldn't break updates 17:29:35 separate /boot and /usr 17:29:35 who of you is going to be at Flock next week? 17:29:50 At the moment, containerized kubeadm isn't even working for me. I'd prefer to ship it in the image 17:30:08 kubeadm+kubelet+kubectl 17:30:08 dustymabe: in principle we could do the same here, but I guess it'd require rpm-ostree changes 17:30:12 bgilbert: i guess a big question is whether we ship with /var as a separate mount by default 17:30:30 bgilbert: maybe we can pick up that discussion in the ticket ? 17:30:44 lorbus[m]: I'll be at flock and so will bgilbert and kaeso 17:30:45 dustymabe: sure 17:30:47 lorbus[m]: me 17:31:01 me as well 17:31:05 jbrooks: i think that seems reasonable +cri-o 17:31:15 Yeah, that too 17:31:27 But then that raises questions about origin 17:31:34 but I think practically we need to evaluate what we ship when we start adding it to the image 17:31:35 cool! looking forward to meeting you all! 17:32:59 jbrooks: does that seem reasonable? 17:33:21 dustymabe, evaluating what we ship? 17:33:47 i.e. target those 4 and then evaluate if we want to change that once we actually have an artifact 17:34:09 * dustymabe notes we are over time 17:34:12 Yes 17:34:21 cool, anyone else with anything before we break? 17:35:16 #endmeeting