16:30:27 #startmeeting fedora_coreos_meeting 16:30:27 Meeting started Wed Dec 11 16:30:27 2019 UTC. 16:30:27 This meeting is logged and archived in a public location. 16:30:27 The chair is dustymabe. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:30:27 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:30:27 The meeting name has been set to 'fedora_coreos_meeting' 16:30:33 #topic roll call 16:30:55 .hello2 16:30:56 jlebon: jlebon 'None' 16:31:13 .hello lucab 16:31:14 kaeso[m]: lucab 'Luca Bruno' 16:32:05 .hello2 16:32:06 dustymabe: dustymabe 'Dusty Mabe' 16:32:25 .hello2 16:32:25 ajeddeloh: ajeddeloh 'Andrew Jeddeloh' 16:33:09 .hello mnguyen 16:33:10 mnguyen_: mnguyen 'Michael Nguyen' 16:33:26 .hello sinnykumari 16:33:27 ksinny: sinnykumari 'Sinny Kumari' 16:33:36 .hello miabbott 16:33:37 miabbott: miabbott 'Micah Abbott' 16:34:08 welcome all! 16:34:46 #chair jlebon kaeso[m] ajeddeloh mnguyen_ ksinny miabbott 16:34:46 Current chairs: ajeddeloh dustymabe jlebon kaeso[m] ksinny miabbott mnguyen_ 16:34:54 #topic Action items from last meeting 16:35:06 * ajeddeloh to create an ignition-validate container 16:35:36 that's the only item we have from last meeting.. and I think from the meeting before we had something about sending a patch to crypto policies to remove python requirement from the rpm 16:35:44 Still need to do that, but it's on my list 16:36:52 +1 16:36:54 thanks ajeddeloh 16:37:22 We have one meeting topic and then a few misc items I want to bring up 16:37:31 #topic behavior if no Ignition is provided 16:37:36 #link https://github.com/coreos/fedora-coreos-tracker/issues/279 16:38:08 so basically it's not obvious to users right now if an ignition config didn't get detected or used 16:38:52 there was some discussion in the ticket about trying to do something so users don't end up in a confusing situation 16:39:22 it ranged from halting the boot, to trying to let the user know of the possible error condition in the console-login-helper-messages 16:39:59 I like the console-login-helper-messages idea 16:40:08 failing the boot is a bad idea 16:40:31 we can't fail in the initramfs since ssh keys may get fetched/added later 16:40:35 yeah, i like that too 16:40:59 basically say if (1) an Ignition config was provided and (2) if any provider SSH keys were found 16:41:00 if Ignition ran and got a config it should still have the cached one in /run 16:41:26 so [ -f /run/ignition.json ] should be enough to detect if it ran 16:42:04 but even if it runs and gets a config it doesn't mean it picked the user one, right? 16:42:20 hmm oh right 16:42:24 base configs and all 16:42:38 those indeed 16:43:13 the hash we log right now, is that over the user-provided config only? Perhaps we can re-use that 16:43:38 could it write somewhere the sources it merged for the final config? e.g. /run/ignition.json.sources 16:43:42 parsing logs is not _great_ but we could 16:44:18 you can log structured entries into the journal and it's not bad querying it back 16:44:30 we use that a bunch in rpm-ostree 16:44:33 oh sorry, I don't mean parsing logs, I just mean persisting the hash (if that can be manually matched by a user) 16:44:50 wait, the base config is on the machine 16:45:00 just compare ignition.json to the base config 16:45:14 sounds good to me.. assuming it doesn't get mangled in some way 16:45:27 it does, since it gets rerendered 16:45:49 but piping both through jq or similar would work 16:45:53 if we didn't have a base config, this wouldn't work though 16:46:14 jlebon: how so 16:46:17 "" == "" 16:47:05 ok, second counter: :) 16:47:21 if the user config is a subset of the base config, it'll just get merged into the same config, right? 16:47:32 comparing JSON has the assumption that JSON can be sanely canonicalized, which is not true 16:47:33 yes 16:48:03 feels cleaner to have a `/run/ignition-sources.json`, which would be useful in its own right 16:48:29 structured journal entries work too though 16:48:32 would we include the base config in it? 16:48:38 I'd rather just augment the logic in Ignition which is fetching the user config, in order to record the hash before merging 16:48:58 ajeddeloh: yeah, everything ignition used to derive the final config 16:51:36 I dont have a strong opinion on ignition.sources vs logging the user hash 16:52:19 jlebon: what did you plan to log, all config fragments? 16:52:29 i think it's mostly similar. basically have ignition record the sources and hashes from each source somewhere 16:52:55 kaeso[m]: oh no, just the source URIs and hashes 16:53:19 i think cloud-init had a similar thing 16:54:09 ok so is there an RFE for ignition somewhere in here? 16:54:11 no strong opinions either where it gets recorded, as long as it's easily parseable too 16:54:33 I guess we'd need something like a `kind` to know if a fragment is a user or a base one, too 16:55:08 kaeso[m]: so the base doesn't have a uri 16:55:31 we could just write "base" instead of a uri 16:55:40 ajeddeloh: file:///usr/lib/ignition/base.ign ? 16:55:57 ajeddeloh: the ISO embedded one too is coming from a file 16:56:52 thats not a base config 16:56:56 thats the user config 16:57:15 unless I'm misunderstanding 16:57:35 i think we can discuss this in an ignition ticket 16:57:48 ack 16:58:03 +1 16:58:21 who wants to open the ticket? 16:58:25 ajeddeloh: I think I'm agreeing with your last proposal, I just worded my massage badly :) 16:58:59 oh yeah 16:59:13 we can just write file:/// uris since it always fetches the same ones 16:59:55 #action jlebon to open an RFE for ignition to make logic for #279 easier 17:00:16 ack 17:00:24 can you all voice your opinion in https://github.com/coreos/fedora-coreos-tracker/issues/279 about preference for console-login-helper messages approach? 17:02:34 +1 17:02:48 #topic OKD community asking for azure images 17:03:00 #link https://github.com/openshift/community/projects/1#card-30394302 17:03:18 A member of the OKD community was asking if there were azure FCOS images that could be used 17:03:48 Since our images built by `cosa buildextend-azure` should be working, I added it as an output of the pipeline 17:04:00 https://github.com/coreos/fedora-coreos-pipeline/pull/175 17:04:37 #info The release that we're doing today should have azure images in it that people can try to upload and use 17:05:10 anybody here want to volunteer to verify one of the images when we build it? /me really should try to dig up some azure creds 17:06:16 we have access to Azure creds (and knowledge) in the RHCOS/OCP program. we could find a volunteer to help out from that side of the fence 17:06:32 cool. thanks miabbott 17:06:58 you can action me if you like and i'll figure it out 17:07:16 #action miabbott to help us get the azure image upload/boot tested 17:07:19 thanks miabbott 17:07:24 #topic open floor 17:07:32 any other topics to discuss today? 17:07:56 should we mention the issue that the last update could have caused to peoples systems? 17:08:38 yeah, that's probably a good idea 17:08:40 #info the last update caused issues if you started from a moderately old FCOS. See https://github.com/coreos/fedora-coreos-tracker/issues/322 17:09:04 you can workaround by running `sudo mount /dev/disk/by-label/boot /boot` 17:09:55 once the release kaeso[m] is doing is out, we should probably email that out too 17:10:43 thanks kaeso[m] for doing this week's release! 17:11:04 kaeso++ 17:11:17 kaeso++ 17:11:17 ksinny: Karma for lucab changed to 2 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 17:11:56 once release is out I'll try to unstuck my canary and send the step by email, sounds good? 17:13:22 SGTM 17:13:54 anything else before we close out? 17:14:29 #action lucab to send upgrade email with manual recovery steps 17:14:47 +1 17:14:52 will end meeting in 20 17:19:40 #endmeeting