16:30:11 #startmeeting fedora_coreos_meeting 16:30:11 Meeting started Wed Jun 15 16:30:11 2022 UTC. 16:30:11 This meeting is logged and archived in a public location. 16:30:11 The chair is dustymabe. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 16:30:11 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:30:11 The meeting name has been set to 'fedora_coreos_meeting' 16:30:18 #topic roll call 16:30:21 .hi 16:30:22 dustymabe: dustymabe 'Dusty Mabe' 16:32:27 .hi 16:32:28 lorbus: lorbus 'Christian Glombek' 16:32:58 #chair lorbus 16:32:58 Current chairs: dustymabe lorbus 16:33:04 .hi 16:33:05 jmarrero: jmarrero 'Joseph Marrero' 16:33:20 .hello2 16:33:21 jlebon: jlebon 'None' 16:33:26 .hi 16:33:27 saqali: saqali 'Saqib Ali' 16:34:06 #chair jmarrero saqali 16:34:06 Current chairs: dustymabe jmarrero lorbus saqali 16:34:10 #chair jlebon 16:34:10 Current chairs: dustymabe jlebon jmarrero lorbus saqali 16:34:33 .hello miabbott 16:34:34 miabbott: miabbott 'Micah Abbott' 16:35:27 #chair miabbott 16:35:27 Current chairs: dustymabe jlebon jmarrero lorbus miabbott saqali 16:36:10 ok let's get started 16:36:26 #topic Action items from last meeting 16:36:33 * cverna to open ticket for FCOS as an edition and update 16:36:34 * dustymabe to schedule ad-hoc meeting to go over f37 changes ahead of next week's community meeting 16:36:36 * jlebon to schedule meeting to discuss Fedora CoreOS layering use cases 16:36:51 .hi 16:36:52 aaradhak[m]: Sorry, but user 'aaradhak [m]' does not exist 16:37:02 .hi 16:37:03 x3mboy: x3mboy 'Eduard Lucena' 16:37:13 #info jlebon has scheduled a meeting to discuss Fedora CoreOS layering use cases 16:37:29 i'm waiting to see if some primary stakeholders can make the suggested time before sending it out to the list 16:38:26 #info dustymabe scheduled met with jlebon, lucab, saqali this morning to narrow down changes to discuss 16:38:38 jlebon: +1 16:38:43 cverna: around today? 16:38:48 .hi 16:38:53 #chair aaradhak[m] x3mboy mnguyen 16:38:53 Current chairs: aaradhak[m] dustymabe jlebon jmarrero lorbus miabbott mnguyen saqali x3mboy 16:39:24 cverna is probably still out on PTO/sick leave 16:39:24 #action cverna to open ticket for FCOS as an edition and update 16:39:30 +1 16:39:45 ok let's jump in 16:39:52 #topic New Package Request: qemu-user-static 16:40:03 #link https://github.com/coreos/fedora-coreos-tracker/issues/1088 16:40:52 brought this up again since the packaging changes have landed (or are about to land) 16:41:02 .hi 16:41:03 jdoss: jdoss 'Joe Doss' 16:41:06 .hi 16:41:07 ravanelli: ravanelli 'Renata Ravanelli' 16:41:08 I am alive. 16:41:11 one example of the now representative changeset: https://github.com/coreos/fedora-coreos-tracker/issues/1088#issuecomment-1150393245 16:41:18 #chair jdoss ravanelli 16:41:18 Current chairs: aaradhak[m] dustymabe jdoss jlebon jmarrero lorbus miabbott mnguyen ravanelli saqali x3mboy 16:41:30 jdoss: lives! 16:41:33 .chair jdoss 16:41:33 jdoss is seated in a chair with a nice view of a placid lake, unsuspecting that another chair is about to be slammed into them. 16:41:48 lol 16:42:35 so it looks like we can essentially just install a single package that gives us the desired functionality on each architecture that we want to install them on 16:43:44 so... should we move forward making this change? AND what platforms do we want to install what compat RPMS on? 16:43:51 I'd love qemu by default 16:44:15 i'm kinda meh on this change and feel like it falls better in the layering realm 16:45:03 I might agree with you more if layering was a real solution right now, but it's not 16:45:07 yeah I am layering qemu and a few other things on server provision and I block other services from starting with systemd. I does add like 5min to my server coming on line to do work as they have to reboot. 16:45:15 but i understand also the podman team really want this baked in to make life easier 16:45:21 jlebon: oh.. 16:45:29 you mean `rpm-ostree install` and not `coreos layering` ? 16:45:47 dustymabe: both :) 16:45:59 one available right now, one available Soon (tm) 16:46:06 :) 16:46:35 I think it could make sense to have a "batteries included" approach for non x86_64 architectures running x86_64 containers 16:46:59 since x86_64 containers are the predominant offering right now 16:47:44 jdoss: yeah I don't know if this change is going to give you what you are talking about 16:47:53 this doesn't really give you all of qemu 16:48:02 yeah I just re-read the issue. bummer. 16:48:16 one thing that could be interesting is baking it in, but only for podman/moby-engine to use so we're not introducing non-container expectations 16:48:30 and then eventually pulling it out when layering becomes easier 16:49:18 what would it be used for otherwise? running x86 binaries delivered by Ignition on aarch64 ? 16:49:51 right, yeah 16:50:17 but mainly so it's a clear contract with those apps so that we could revisit it more easily later 16:50:23 ehh, I think that probably won't be super common (i.e. maybe not worth the effor the lock it down to just podman/moby) 16:51:10 any other opinions on the current topic? 16:51:35 miabbott: mnguyen bgilbert (in spirit) ravanelli etc.. 16:52:03 it was nice of the podman team to do the packaging work we requested. 16:52:52 how would we decide which arches to include? 16:53:12 definitely! it makes the layering UX much nicer too 16:53:14 I think that is a followup 16:53:20 first should we 16:53:24 second how exactly 16:53:40 not necessarily. if there's a risk of a slippery slope situation, then it might be better not to jump in at all 16:53:48 ok let's flesh that out then 16:54:09 proposal: just install `qemu-user-static-x86` on non x86_64 platforms 16:54:34 primary FCOS image stays the same. aarch64 and s390x (and ppc64le in the future) now have an added rpm 16:55:15 it's approximately 7-8M 16:55:58 if we can draw the line there and stick to it that sounds ok 16:56:30 i'm fine with including the x86 package temporarily to help the podman use case; revisiting it later when coreos layering is more mature seems appropriate 16:56:35 I think the reasoning can be along the lines of "alot of container images exist for x86-64 but not the other architectures yet" 16:57:25 +1 16:57:36 +1 16:57:59 I don't quite understand the "layering isn't ready so let's do something else" versus "let's push layering!!!1one!" 😃 16:58:22 #proposed we will include the qemu-user-static-x86 package on non x86_64 FCOS images to allow access to the large inventory of containers only built for x86_64. 16:59:17 +1 -1 ? 16:59:35 +1 16:59:36 Hmm so by not shipping on x86_64 it would mean using qemu for other purposes would be harder for other software or so? 16:59:36 weak +1 from me 17:00:08 walters: I think the rationale of "allow access to the large inventory of containers only built for x86_64" doesn't really apply to x86_64 17:00:25 +1 17:01:26 i'll add "out of the box" to the agreed to make it more clear 17:01:26 i'd like to say we're not committing to this long-term, but may provide an alternate mechanism for the same end state 17:01:54 jlebon: i.e. in the proposed text? 17:02:01 Have we ever removed a package after providing it? 17:02:06 walters: i think the missing piece using layering in the podman use case is that we aren't able to generate qemu artifacts from the container image generated using layering. the podman use case wants to boot as quickly as possible, so having to rebase to a container image is probably a no-go for them 17:02:35 we can provide them a solution now and improve it via layering in the future 17:02:44 dustymabe: maybe just adding "for now, " at the start and "we may consider replacing this with layering in the future." at the end 17:02:59 with a layering mechanism* 17:03:03 miabbott: ehh. that's part of it. Also, the "update" story for layering is missing. No zincati there at all. 17:03:29 miabbott: That's https://github.com/coreos/fedora-coreos-tracker/issues/1151 17:03:30 well, it's also a releng process change for them to maintain that 17:04:02 walters: yes, i know the tracker issue...but it's not reality today 17:04:28 firstboot layering might be more palatable for them 17:04:48 #proposed For now we will include the qemu-user-static-x86 package on non x86_64 FCOS images to allow "out of the box" access to the large inventory of containers only built for x86_64. We may revisit this in the future once CoreOS layering is more mature or if there comes a time when containers for other architectures are as ubiquitous. 17:04:52 (e.g. the work in https://github.com/coreos/rpm-ostree/pull/3006) 17:04:52 ok updated the proposed ^^ 17:05:33 look better? 17:05:34 ack +1 17:05:41 +1 17:05:53 +1 17:06:04 +1 17:07:14 it's interesting if you look at e.g. https://koji.fedoraproject.org/koji/rpminfo?rpmID=30644202 17:07:24 I assume jmarrero is still +1 17:07:28 there aren't that many files. just the binary and binfmt.d dropin 17:07:42 +1 17:07:57 jlebon: yeah 17:08:06 minimal 17:08:07 would be much cheaper to layer it if it didn't involve rpm at all 17:08:22 anyway, don't want to sidetrack :) 17:08:29 #agreed For now we will include the qemu-user-static-x86 package on non x86_64 FCOS images to allow "out of the box" access to the large inventory of containers only built for x86_64. We may revisit this in the future once CoreOS layering is more mature or if there comes a time when containers for other architectures are as ubiquitous. 17:08:44 Thanks for the discussion there. 17:08:52 (like, they could literally just fetch a few files via Ignition into /usr/local and call it done -- obviously there's more to it, but...) 17:09:15 #topic tracker: Fedora 37 changes considerations 17:09:19 #link https://github.com/coreos/fedora-coreos-tracker/issues/1222 17:09:30 I think what I'm looking for is to s/We may revisit this...once layering is more mature/We will continue to work on layering/ e.g. 17:09:59 I think it's obvious that we are continuing to work on coreos layering 17:10:25 we talked at the beginning of this meeting (action items) about forming a working group to flesh out use cases 17:11:19 ok this one is about F37 changes 17:11:44 a few of us met earlier today to discuss the existing changeset and weed out any trivial ones that we can ignore or have no impact on us 17:12:37 all of the items in the description of https://github.com/coreos/fedora-coreos-tracker/issues/1222 that we can ignore or have no impact on us have a check mark ✔️ 17:12:52 all of the items that have a ⚠️ - we should discuss further 17:13:11 each item in the list also has a NOTES: entry with some rationale 17:13:38 we can start to go through each one of the ⚠️ items now to see what action we need to take 17:13:53 in most cases we'll decide to open a ticket and further investigate in the separate ticket 17:14:11 subitem 110. Signed RPM Contents 17:14:28 This change addes a signed/verified hash of each file in each RPM 17:15:03 There are no changes needed for us but we could choose to use this in the future if we wanted to leverage it for something 17:15:49 I don't know if we should open an issue specifically for "investigate new features for X", probably not 17:16:02 does everyone agree there shouldn't be any changes needed for FCOS for this? 17:16:24 yup definitely 17:16:41 i think of it more as the change encouraging a discussion about what our story is re. all the recent talks of IMA/fs-verity/composefs etc.. in FCOS 17:16:53 indeed. 17:17:04 Maybe a topic for a community video meeting? 17:17:22 we could invite alexl/giuseppe 17:17:29 could be. interested in walters' thoughts 17:17:34 +1 17:18:30 I think for now we just drop a note in the change that FCOS will not include the IMA digests...but that could change in the future 17:18:48 WFM 17:18:58 ok next subtopic 17:19:09 subtopic 116. Strong crypto settings: phase 3, forewarning 1/2 17:19:33 it looks like this is a pre-cursor to a F38/F39 change for stronger crypto policy defaults 17:20:14 if nothing is going to change for F37 then obviously we don't need to do anything yet, but we could consider opting in our `next` stream early to the stricter defaults.. OR running automated tests against them 17:21:04 +1 17:21:10 i.e. should we consider those options? We can open a ticket to track 17:21:50 i think we probably should yeah 17:22:20 +1 will do 17:22:25 subtopic 118. BIOS boot.iso with GRUB2 17:23:11 My understanding is that the people maintaining syslinux eventually want to not maintain it. We use syslinux for ISO booting in BIOS mode on x86_64, but believe that we might be able to move to GRUB2 for this. Will take investigation, and we'll also need to consider RHCOS. 17:23:45 *maintaining syslinux in Fedora* 17:24:29 This shouldn't require any changes of us now, but if the syslinux stack ever does get fully dropped from Fedora we should be ready for it 17:24:43 so adapting now would be ideal. 17:24:48 thoughts? 17:24:49 maybe we should just match what the distro uses. e.g. if Fedora moves to GRUB2 for BIOS ISO, we move FCOS, but if RHEL doesn't, we don't move RHCOS 17:25:20 my understanding is that there might be some subtle compat differences between the two? 17:25:22 jlebon: probably. unfortunately that means maintaining both stacks for longer 17:25:40 dustymabe: yeah, depends how hard that'd be in the cosa side 17:25:51 and also coreos-installer since it needs to know for ISO kargs 17:26:09 indeed. 17:26:18 I'll open a ticket for this investigation 17:26:31 but we don't want to be in a situation where e.g. the RHEL Server ISO boots on a machine, but not the RHCOS ISO 17:26:49 +1 17:27:01 subtopic 207. Enable read only /sysroot for Fedora Silverblue & Kinoite 17:27:03 i would imagine RHEL dropping BIOS wouldn't happen until RHEL 10 at the earliest 17:27:26 miabbott: well to be clear.. they aren't dropping BIOS 17:27:33 they are switching the bootloader used on BIOS 17:27:39 _nods_ 17:27:40 for booting ISOs and such 17:28:08 understood; still the switch probably would happen as part of RHEL 10 17:28:14 if at all 17:28:20 ok for this one we already default to read-only /sysroot but some of our very early systems they might not have that 17:28:27 see https://github.com/coreos/fedora-coreos-tracker/issues/1222#issuecomment-1156676431 17:29:13 I agree with jlebon that the reward/risk is low/high. 17:29:21 a CLHM dropin would be a nice in between 17:29:45 i can split that out into a separate issue and we can decide on it next meeting 17:30:05 jlebon: that works. I can create the issue when I create the others 17:30:12 dustymabe: ack thanks! 17:30:14 next subtopic 17:30:32 subtopic 209. Support FIDO Device Onboarding 17:31:11 We weren't sure if there was anything we should do for this. This should *require* any changes, but we may want to enable new features by supporting it 17:31:25 does anybody know any more about this change? maybe walters ? 17:32:35 seems like a provisioning stack? 17:32:39 i've been meaning to dig into this to see how the trust system works because obviously credential provisioning is one big issue with Ignition and it sounds like this could help with that 17:32:50 Package the rust implementation of the FIDO device onboarding stack including client, rendezvous service, owner onboarding service and prototype manufacturing service. 17:32:52 Enable the client service by default for IoT Edition 17:32:54 Add the client service to the IoT Edition deliverables 17:33:07 might not share any code at all and just ideas 17:33:23 I mean I wonder if this is somehow an alternative provisioning vector to Ignition 17:33:33 which wouldn't be great 17:34:13 yeah agreed. depends how the stack is split up 17:34:23 I guess we can open an issue and ask for more information from peter/patrick 17:34:54 ok moving on to open floor 17:34:59 #topic open floor 17:35:01 anyway, i'd file this like the IMA thing: nothing really, just might make it a good time to spur some discussions 17:35:09 nothing really to do* 17:35:34 jlebon: i.e. maybe instead of opening a ticket we see if someone wants to bring it as a topic to the community meeting? 17:35:38 video* 17:36:06 anyone with topics for open floor? 17:36:23 (thanks for listening to me ramble in the meeting today) 17:36:40 dustymabe: might be worth filing a ticket still. would be an interesting research project/spike for someone 17:36:56 but not necessarily link it to the f37 rebase ticket 17:37:14 jlebon: we've got a few skeletons of those in our issue tracker already :) 17:37:34 :) 17:37:48 jlebon: if we don't linke back to the f37 rebase ticket (like the others) then maybe you can open a ticket for the IMA and FIDO ones and I'll do the others 17:38:06 dustymabe: ack sure 17:38:27 #action jlebon to open investigation tickets for the IMA/FIDO changes 17:38:37 any other topics before we close out the meeting? 17:40:01 #endmeeting