16:30:01 #startmeeting fedora_coreos_meeting 16:30:02 Meeting started Wed Feb 9 16:30:01 2022 UTC. 16:30:02 This meeting is logged and archived in a public location. 16:30:02 The chair is dustymabe. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 16:30:02 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:30:02 The meeting name has been set to 'fedora_coreos_meeting' 16:30:08 #topic roll call 16:30:10 .hi 16:30:11 dustymabe: Something blew up, please try again 16:30:14 dustymabe: An error has occurred and has been logged. Please contact this bot's administrator for more information. 16:30:15 .hi 16:30:17 ravanelli: Something blew up, please try again 16:30:20 ravanelli: An error has occurred and has been logged. Please contact this bot's administrator for more information. 16:30:22 zodbot is dead today 16:30:40 .hi siosml 16:30:41 travier: Something blew up, please try again 16:30:42 .hi siosm 16:30:44 travier: An error has occurred and has been logged. Please contact this bot's administrator for more information. 16:30:47 travier: Something blew up, please try again 16:30:48 .hi miabbott 16:30:50 travier: An error has occurred and has been logged. Please contact this bot's administrator for more information. 16:30:53 miabbott_: Something blew up, please try again 16:30:56 miabbott_: An error has occurred and has been logged. Please contact this bot's administrator for more information. 16:30:59 .hello2 16:31:00 jlebon: Something blew up, please try again 16:31:03 yikes 16:31:03 jlebon: An error has occurred and has been logged. Please contact this bot's administrator for more information. 16:31:07 it's not dead. it's just the lookups failing. 16:31:18 * nirik can fix it, but otherwise all the rest of the meeting functions are fine. 16:33:01 :) 16:33:01 nirik++ 16:33:01 nirik: cool, thanks 16:33:01 "i'm not quite dead yet" 16:33:01 #chair ravanelli travier miabbott_ jlebon 16:33:01 Current chairs: dustymabe jlebon miabbott_ ravanelli travier 16:33:01 h-e-l-l-o 16:33:01 #chair fifofonix 16:33:01 Current chairs: dustymabe fifofonix jlebon miabbott_ ravanelli travier 16:33:01 .hi 16:33:01 dustymabe: Let's skip 1062 again to focus on the other interesting changes instead 16:33:01 .hello 16:33:01 .hi 16:33:02 #chair aaradhak 16:33:02 Current chairs: aaradhak dustymabe fifofonix jlebon miabbott_ ravanelli travier 16:33:02 travier: sounds good 16:33:07 dustymabe: Karma for kevin changed to 21 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 16:33:10 aaradhak: (hello ) -- Alias for "hellomynameis $1". 16:33:13 lucab: lucab 'Luca BRUNO' 16:33:16 aaradhak: aaradhak 'Aashish Radhakrishnan' 16:33:39 .hi siosm 16:33:39 travier: Sorry, but user 'travier' does not exist 16:33:45 .hello siosm 16:33:46 travier: siosm 'Timothée Ravier' 16:33:52 #topic Action items from last meeting 16:33:55 #chair lucab 16:33:55 Current chairs: aaradhak dustymabe fifofonix jlebon lucab miabbott_ ravanelli travier 16:34:22 I don't think we had any specific action items from the last meeting other than me re-energizing some work we have in progress 16:34:38 will move on to meeting topics 16:35:08 +1 16:35:14 #topic Actually move iptables to the nft backend 16:35:21 #link https://github.com/coreos/fedora-coreos-tracker/issues/676 16:35:38 * dustymabe goes to check who added the meeting label 16:35:47 jlebon: you win 16:35:53 ahh right heh 16:36:05 hmm ok, i think i meant to redrop the label on this but since we're here: 16:36:42 this is more or less ready to roll out now after lots of tweaking and testing. the only bit left to iron out is the schedule 16:37:09 since it'll line up really closely to the f36 rebase, we were suggesting tying them together 16:37:10 (❤️ the checklist on that ticket) 16:37:34 i.e. it would land in next first during its rebase to f36 16:37:42 and in testing when that rebases to f36 16:38:15 this isn't just to make it easier to understand, but also to make actually rolling this out easier 16:38:40 because if you look at the checklist, you'll see it's non-trivial :) 16:39:06 anyway, that's all. it does mean though that the window between next and testing receiving it will be shorter than initially discussed 16:39:36 #proposed To make it easier to understand and easier to rollout we will couple the conversion to iptables-nft with the rebase to F36. This means the notice period window will be shorter than initially discussed. 16:39:43 ack/nack/discussion? 16:40:22 +1 from me 16:40:38 +1 16:41:21 While this has the potential to break complex iptables setup, this is easily reverted if need be on a per-node basis or in an Ignition config, thus not a compatibility concern 16:41:39 From most "legal" iptables usage, this should be transparent 16:41:44 for* 16:41:56 my only comment is to flesh out the schedule/dates in the checklist, if possible. things like `wait until scheduled migration date for testing-devel` are a bit ambiguous 16:42:12 otherwise +1 to the plan 16:42:15 miabbott: it's in the email draft :) 16:42:28 ah cool, thanks for the pointer 16:42:47 i didn't want two sources to update 16:43:14 any more votes? 16:43:19 jlebon I assume you're +1 16:43:40 dustymabe: wasn't sure if i could vote, but yes :) 16:43:54 yeah it was confusing because I did the proposed 16:43:57 +1 sounds like a plan 16:44:14 #agreed To make it easier to understand and easier to rollout we will couple the conversion to iptables-nft with the rebase to F36. This means the notice period window will be shorter than initially discussed. 16:44:33 #topic networking: consider the effects of BOOTIF kernel argument on nm-initrd-generator 16:44:40 #link https://github.com/coreos/fedora-coreos-tracker/issues/1048 16:45:02 I updated the issue with a proposal: https://github.com/coreos/fedora-coreos-tracker/issues/1048#issuecomment-1033329183 16:45:41 basically: update our "was networking config provided" logic to handle BOOTIF 16:46:59 i think that makes sense. 16:47:06 i like it better than changing default kargs 16:47:39 +1 too. Prefer to require small changes for a specific case that changes for everybody here 16:47:41 yeah - the only downside is the "doesn't apply to the initramfs" part (i.e. your networking in initramfs and real root could be different) 16:48:07 but if you are hitting this you are already using PXE so updating kernel arguments should be easy IMO 16:48:34 IOW you can add rd.bootif=0 easily 16:49:32 yeah. and really it wouldn't be any different on other systems 16:49:49 other dracut+NM-based systems* 16:50:04 #proposed We will try to address the BOOTIF issue by updated our "was networking config provided" logic to handle BOOTIF rather than blanket applying rd.bootif=0 globally 16:50:19 will fix the type in the agreed 16:50:24 typo 16:50:38 ack 16:50:54 ack 16:50:56 ack 16:50:58 ack 16:51:18 aaradhak: fifofonix: don't be too shy to vote :) 16:51:31 ack 16:51:58 #agreed We will try to address the BOOTIF issue by updating our "was networking config provided" logic to handle BOOTIF rather than blanket applying rd.bootif=0 globally 16:52:24 #topic New Package Request: qemu-user-static 16:52:31 #link https://github.com/coreos/fedora-coreos-tracker/issues/1088 16:53:04 looks like a request for qemu-user-static to enable running aarch64 containers on x86_64 and vice versa 16:53:55 Right now this pulls in Python so this needs packaging work at a minimum 16:54:22 yep 16:54:42 and a bunch of other bloat we probably don't want 16:54:47 Then it could be interesting to have sub packages that provide only a specific arch support 16:54:54 agreed; i think the ticket sums up the current situation nicely 16:54:55 so that we can ship only that 16:55:12 fyi i do that kind of x-arch build with dind gitlab-runners (on fcos of course) 16:55:23 fifofonix: nice! 16:55:26 fifofonix++ 16:55:26 dustymabe: Karma for fifofonix changed to 1 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 16:55:28 ie why put it on the os. 16:55:43 yeah let's game this out 16:55:54 even if the packaging work was done, would we still want it in the base? 16:57:00 couldn't this run fine in a container? 16:57:00 If we could have just aarch64 for x86_64 and the reverse, with a reasonable size, I think it would be OK. Not a strong +1 but fine 16:57:17 our whole build system is centered on running VMs in containers :) 16:57:18 I'd be a bit wary of shipping the binfmt fragments by default 16:57:49 or is the idea that e.g. docker transparently uses this? 16:58:10 jlebon: i.e. run a aarch64 container (VM) inside a x86_64 container that has qemu-user-static ? 16:58:18 To use it from a container you need to use podman in podman 16:58:40 right (at least that's my understanding) 16:58:43 Not even sure it works in fact 16:58:59 as you would not be able to do the binfmt config 16:59:03 might not even work 16:59:21 jlebon: the latter I think 16:59:23 i think this is what i'm doing no? ie. gitlab-runner runs as an x86 docker dind container and then use qemu to build aarch64 images, but maybe i'm not getting the use case. 16:59:26 ok right, i misunderstood what this is trying to do 17:00:08 fifofonix: are you using a QEMU VM or the static helper? 17:00:30 And what's your host? 17:00:47 (you said fcos, sorry) 17:00:50 travier: this is why i don't vote sometimes. only qualified people should be able to vote. host is fcos. using qemu static (i think) 17:01:15 fifofonix: it's always ok to give your opinion 17:01:46 #proposed There are obviously packaging enhancements that could be made here (removal of python dep, reduction of shipped emulators by splitting out into subpackages) that are worth making even if we don't include qemu-user-static by default. Once those packaging improvements land we'd need to further consider it for inclusion in FCOS. It's a good idea, but maybe not necessary for the 17:01:49 base layer. 17:01:55 there's a lot of mumbling in there 17:01:57 AFAIU this isn't about VMs. This is about qemu doing internally translation of the machine code of a binary, which thus can run on a different arch. 17:02:25 fifofonix: would be great if you could share an example (if possible of course) 17:02:47 dustymabe: +1 17:02:53 i can do that after the meeting. my first action in one of these meetings i believe. may go quiet now parallel processing. 17:02:54 ack 17:03:07 lucab: right, that's what i understand as well. probably worth spelling this out in the issue to make it clearer 17:04:05 #agreed There are obviously packaging enhancements that could be made here (removal of python dep, reduction of shipped emulators by splitting out into subpackages) that are worth making even if we don't include qemu-user-static by default. Once those packaging improvements land we'd need to further consider it for inclusion in FCOS. It's a good idea, but maybe not necessary for the base 17:04:08 layer. 17:04:13 moving on to the next topic 17:04:35 actually we are at the halfway point - anything that is important and needs to be discussed today? 17:04:47 otherwise we might break into discussing F36 changes 17:05:05 travier: CFP need to talk about today? 17:06:14 * dustymabe goes to f36 changes 17:06:27 #topic tracker: Fedora 36 changes considerations 17:06:30 (good for open discussion later) 17:06:33 #link https://github.com/coreos/fedora-coreos-tracker/issues/918 17:07:06 #info some of us met earlier today to sift through and weed out changes that we don't think need discussion. 17:07:25 The preliminary results are in the hackmd at https://hackmd.io/kyMDKu25T76xAsUaSjMzHQ?edit 17:07:56 so we'll go through that HACKMD now for any items that don't have a check mark and see if they need a ticket opened for them for further investigation and a volunteer to look into it 17:08:20 any questions before we proceed? 17:08:47 use ?view to track numbers since they're not on the md side 17:09:16 subtopic: 102 Introduce module Obsoletes and EOL 17:09:32 This one needs more investigation? 17:09:57 I guess we did add support for installing modules recently 17:10:30 hmm ok i can take this one 17:10:47 we'll have to decide on the rpm-ostree side how to handle this 17:10:50 #action jlebon to open issue to investigate "102 Introduce module Obsoletes and EOL" 17:10:56 thanks jlebon 17:11:13 subtopic: 103 DNS Over TLS 17:11:53 this one should mostly be transparent to us but DNS has been troublesome in the past 17:12:03 so i wouldn't be surprised if something breaks 17:12:22 looks like it's a systemd build time flag and we use systemd-resolved 17:12:55 so i think no action but we should keep an eye out for potential fallout 17:13:00 +1 17:13:11 OKD might be impacted 17:13:12 +1 17:13:13 I was unsure if we still had some divergence from current Fedora defaults 17:13:18 yeah, looks like it falls back to unencrypted if the dns server doesn't support TLS 17:13:22 there is also DNSOverTLS= setting in resolved.conf 17:13:32 lucab: not currently 17:14:02 i think I'll still open a subticket for this and record our discussion there so it's open for any potential issues that are discovered 17:14:49 #action we think we can pick up DNSoverTLS changes passively but dustymabe will open a ticket to record the discussion here and provide a space for any issues that come up to be discussed. 17:15:17 subtopic: 111 Drop NIS(+) support from PAM 17:15:53 jlebon mentions: may affect users who use NIS+? likely not though. If so, we should direct them to e.g. LDAP or FreeIPA as the Change proposal suggests. so overall, skip. 17:16:11 jlebon: safe to move on? 17:16:30 safe, NIS has been "deprecated" for a while now 17:16:34 i'm not familiar with NIS+ and not even sure if we ship everything needed today to support it in FCOS (though people could always layer i guess) 17:16:40 #info 111 Drop NIS(+) support from PAM may affect users who use NIS+? likely not though. If so, we should direct them to e.g. LDAP or FreeIPA as the Change proposal suggests. so overall, skip. 17:16:40 dustymabe: yeah i think so 17:16:45 +1 17:16:46 * miabbott relives the days of relying on NIS at sun micro 17:17:09 jlebon: should 112 have a ✔️ in front of it too? 17:17:31 dustymabe: yeah sounds good 17:17:34 and 114 ? 17:17:45 and 118 :) 17:17:46 +1 17:18:03 118 might need tracking 17:18:06 to ba safe 17:18:08 be* 17:18:11 no action 17:18:13 k 17:18:32 i think we can skip it for now though 17:18:51 #action jlebon to open a tracking issue for 118 Switch GnuTLS to allowlisting to track any fallout from the change 17:19:00 sorry ^^ got trigger happy 17:19:15 hmm, i think i'd prefer filing tickets if issues come up 17:19:20 subtopic 120 Golang 1.18 17:19:26 k 17:19:29 #undo 17:19:29 Removing item from minutes: ACTION by dustymabe at 17:18:51 : jlebon to open a tracking issue for 118 Switch GnuTLS to allowlisting to track any fallout from the change 17:20:24 anything for the golang one? 17:20:38 maybe a tracking ticket to enable 1.18 CI on the upstream projects? 17:20:39 this one i think the main thing is probably to add it to upstream CIs when we can 17:20:53 +1 17:21:16 #action miabbott to open a tracking ticket for early testing of golang 1.18 when it's available 17:21:20 ack 17:21:30 :) 17:21:36 I guess something like this would be useful FCOS continuous stream 17:22:01 subtopic 208 Retired Packages 17:22:22 #action travier file a ticket to make sure we don't ship retired packages in FCOS 17:22:58 is that a problem for us though? 17:23:17 I think this is more targetted at a user's system that is upgrading 17:23:20 If they are retired then it means that we probably have to take over maintenance 17:23:30 The change itself is fine for us 17:23:40 no, I mean. If they are retired our builds will fail 17:23:51 true 17:23:56 so there's no way for this to happen to us today 17:24:04 indeed, good catch 17:24:06 #undo 17:24:06 Removing item from minutes: ACTION by travier at 17:22:22 : travier file a ticket to make sure we don't ship retired packages in FCOS 17:24:31 so we can skip 17:24:42 yeah i think this change is targetted at someone who has a yum based system and is upgrading and they want to get rid of old packages that aren't receiving updates 17:24:50 yep 17:24:55 though I guess the same question applies 17:25:12 if someone has package layered on FCOS a package that is no longer available, what happens? 17:25:33 if it's a local package, it stays layered. if it's from repos, it'll fail to fetch the package 17:25:33 They won't get updates anymore 17:25:47 yep, and they might not know it :( 17:26:04 i.e. their system auto updates, but now fails the auto update and sits there 17:26:23 Will likely break if rpm-ostree can not satisfy the dependencies (i.e. newer glibc) 17:26:33 but this is not new, this can already happen today 17:26:53 break as in: rpm-ostree/zincati will stop auto-updating 17:26:57 #action dustymabe to open an issue for investigation into missing packages preventing auto-updates from working 17:27:03 travier: indeed 17:27:36 yeah, though that's kinda part of the tradeoff when you go into hybrid mode. you're exposed to these kinds of things and there's a lot we can't shield from 17:27:51 I don't think we can do something here apart from adding a message to the admin via console-login-helper-messages for example 17:27:53 jlebon: indeed. I just wonder if maybe we can make things more clear 17:27:58 travier: exactly 17:28:01 clhm helper 17:28:24 Zincati could write something saying "I failed to update X times" 17:28:33 and CLHM would display that 17:28:38 subtopic 221 Keylime subpackaging and agent alternatives 17:28:43 good idea 17:29:00 I wasn't sure on this one - we just generate some information using keylime during build 17:29:09 we do generate* 17:29:25 oh travier linked to an issue 17:29:56 ok https://github.com/coreos/fedora-coreos-tracker/issues/982 was a request for us including the agent in FCOS 17:29:59 yes, there is already an issue for that so we can skip (and maybe ask for an update on the issue) 17:30:16 re. compose time: assuming the format itself doesn't change, i think we're ok 17:30:21 so we don't currently include any keylime stuff in FCOS 17:30:34 and ok.. jlebon says build time we should be good 17:30:46 we ship a hashlist, but it's undocumented because it's just for experimentation 17:30:54 not in FCOS to be clear 17:31:00 but it's in the builddir 17:31:22 Filed https://github.com/coreos/console-login-helper-messages/issues/107 for 208 17:31:24 #info we don't currently include the keylime agent in FCOS but we do generate a hashlist at build time for experimentation. Assuming the format of the hashlist hasn't changed we should be good herer. 17:31:38 #undo 17:31:38 Removing item from minutes: INFO by dustymabe at 17:31:24 : we don't currently include the keylime agent in FCOS but we do generate a hashlist at build time for experimentation. Assuming the format of the hashlist hasn't changed we should be good herer. 17:31:41 #info we don't currently include the keylime agent in FCOS but we do generate a hashlist at build time for experimentation. Assuming the format of the hashlist hasn't changed we should be good here. 17:31:50 ok thats all! 17:31:52 #topic open floor 17:32:01 thanks for bearing with us - and sorry we're late for open floor again 17:32:17 #info f36 just branched from rawhide, so now f37 exists 17:32:37 https://github.com/coreos/fedora-coreos-tracker/issues/1093 > Container Plumbing Days 2022. Feel free to suggest a talk! 17:32:38 * dustymabe needs to go look at checklists and stuff 17:32:54 dustymabe: yeah, let's open the f36 rebase ticket? 17:32:58 * dustymabe craves in person conferences again 17:33:13 jlebon: yeah, not yet. I think there are quite a few updates I need to make to the template first 17:33:21 How about we make a talk for "What's new and what's next in Fedora CoreOS for container users"? Anybody want to work with me on that one? 17:33:32 wants* 17:33:37 dustymabe: and we should close https://github.com/coreos/fedora-coreos-tracker/issues/884 :) 17:34:02 :) 17:34:17 any other topics for open floor? 17:34:24 travier: walters might be interested for the coreos layering bit 17:34:33 +1 jlebon 17:35:13 * dustymabe sets a timer for meeting end 17:36:01 #endmeeting