dustymabe added a new comment to an issue you are following:
``
> Maybe let's open a separate issue for that?
+1 - please open a separate issue.
``
To reply, visit the link below or just reply to this email
https://pagure.io/atomic-wg/issue/282
jlebon added a new comment to an issue you are following:
``
So, I'm not sure this should have been closed quite yet. The patches above only changed Anaconda so we do not show locales we don't actually ship. Though the question of whether we should ship all locales either in-tree or through some other mechanism is still open, right? Maybe let's open a separate issue for that?
``
To reply, visit the link below or just reply to this email
https://pagure.io/atomic-wg/issue/282
smilner opened a new pull-request against the project: `atomic-wg` that you are following:
``
Update manual steps for releasing atomic host
``
To reply, visit the link below or just reply to this email
https://pagure.io/atomic-wg/pull-request/397
dustymabe opened a new pull-request against the project: `fedora-atomic` that you are following:
``
f27: manifest: include firewalld in Atomic Host
``
To reply, visit the link below or just reply to this email
https://pagure.io/fedora-atomic/pull-request/104
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
summary: https://meetbot.fedoraproject.org/fedora-meeting-1/2018-01-10/fedora_atomic…
full log: https://meetbot.fedoraproject.org/fedora-meeting-1/2018-01-10/fedora_atomic…
===================================
#fedora-meeting-1: fedora_atomic_wg
===================================
Meeting started by dustymabe at 16:35:08 UTC. The full logs are
available at
https://meetbot.fedoraproject.org/fedora-meeting-1/2018-01-10/fedora_atomic…
.
Meeting summary
- ---------------
* roll call (dustymabe, 16:35:11)
* previous meeting action items (dustymabe, 16:38:26)
* Using buildah in Atomic Host (dustymabe, 16:39:39)
* LINK: https://pagure.io/atomic-wg/issue/402 (dustymabe, 16:39:45)
* ACTION: ashcrow to create ticket for actually making a buildah
container in fedora that we can recommend people use to build OCI
images (dustymabe, 16:51:51)
* Overhaul list of members, Quorum Rules (dustymabe, 16:52:16)
* LINK: https://pagure.io/atomic-wg/issue/363 (dustymabe, 16:52:25)
* ACTION: sanja to take membership proposal AND voting proposal from
https://pagure.io/atomic-wg/issue/363 and add them to the wiki and
close ticket (dustymabe, 16:58:02)
* Decide strategy for including container runtimes in Atomic Host
(dustymabe, 16:58:50)
* LINK: https://pagure.io/atomic-wg/issue/360 (dustymabe, 16:58:55)
* ACTION: ashcrow to create issue to specifically discuss adding crio
to atomic host base image (dustymabe, 17:08:40)
* open floor / news (dustymabe, 17:08:56)
Meeting ended at 17:27:44 UTC.
Action Items
- ------------
* ashcrow to create ticket for actually making a buildah container in
fedora that we can recommend people use to build OCI images
* sanja to take membership proposal AND voting proposal from
https://pagure.io/atomic-wg/issue/363 and add them to the wiki and
close ticket
* ashcrow to create issue to specifically discuss adding crio to atomic
host base image
Action Items, by person
- -----------------------
* ashcrow
* ashcrow to create ticket for actually making a buildah container in
fedora that we can recommend people use to build OCI images
* ashcrow to create issue to specifically discuss adding crio to
atomic host base image
* sanja
* sanja to take membership proposal AND voting proposal from
https://pagure.io/atomic-wg/issue/363 and add them to the wiki and
close ticket
* **UNASSIGNED**
* (none)
People Present (lines said)
- ---------------------------
* dustymabe (132)
* ashcrow (29)
* walters (21)
* zodbot (16)
* sanja (15)
* jberkus (13)
* ksinny (9)
* jbrooks (7)
* unicell (6)
* strigazi (2)
* kushal (1)
* jlebon (1)
* sayan (1)
Generated by `MeetBot`_ 0.1.4
.. _`MeetBot`: http://wiki.debian.org/MeetBot
-----BEGIN PGP SIGNATURE-----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=xU8b
-----END PGP SIGNATURE-----
jberkus reported a new issue against the project: `atomic-wg` that you are following:
``
Currently, we ship docker in the base image for Fedora Atomic Host. With the release of CRI-O, as well as the issues around docker versions, one possible solution is to ship only runc with the base Atomic Host, and make container runtimes installable as system containers. If we don't move docker to a system container, there's a strong argument to also ship CRI-O as part of the base image.
Arguments in favor of System Containers for CRs:
* minimizes the base system image
* helps deal with docker/containerd versioning issues
* doesn't require users to ship container runtimes they don't want
* consistent with our general modularity approach
* puts CRI-O/docker on a separate upgrade cycle, which can help around kube/openshift updates
* allows community to add other runtimes if they want (e.g. Rkt)
Arguments against using System Containers for CRs:
* extra step (or two) for new user startup
* total disk size for atomic + cri-o + docker will actually be larger
* not sure if all things docker work as a system container
* puts docker/CRI-O on a separate upgrade cycle, which could break around kernel updates
Discuss!
``
To reply, visit the link below or just reply to this email
https://pagure.io/atomic-wg/issue/360
smilner reported a new issue against the project: `atomic-wg` that you are following:
``
Having buildah available in some for for Atomic Host seems to make sense. How should/would we do this? Options include:
- part of the base compose
- as a container itself
- require it be installed via rpm layering
/cc @nalin @dwalsh @sdodson @dustymabe @miabbott
``
To reply, visit the link below or just reply to this email
https://pagure.io/atomic-wg/issue/402
dustymabe opened a new pull-request against the project: `fedora-atomic` that you are following:
``
rawhide: manifest: include firewalld in Atomic Host
``
To reply, visit the link below or just reply to this email
https://pagure.io/fedora-atomic/pull-request/103
walters opened a new pull-request against the project: `fedora-atomic` that you are following:
``
Add ex-jigdo-spec
``
To reply, visit the link below or just reply to this email
https://pagure.io/fedora-atomic/pull-request/100
jberkus reported a new issue against the project: `atomic-wg` that you are following:
``
Article Title: Fedora 27 Atomic Feature Roundup
Deadline: October 30
Priority: Normal
Publication: Fedora Community Blog
This should be a round-up of the features in Fedora 27 Atomic, for a general audience that hasn't followed Atomic for the last 6 months. Should cover features from the talking points briefly and link off to other articles.
``
To reply, visit the link below or just reply to this email
https://pagure.io/atomic-wg/issue/356
jberkus reported a new issue against the project: `atomic-wg` that you are following:
``
Title: Installing Kubernetes on Fedora 27 Atomic
Deadline: November 15
Publication: Project Atomic Blog, Docs
Priority: Low
This should be based on the F26 article from Jason Brooks, updated to show the correct options and terminal sessions for F27.
``
To reply, visit the link below or just reply to this email
https://pagure.io/atomic-wg/issue/357
walters opened a new pull-request against the project: `fedora-atomic` that you are following:
``
Use boot_location: new
``
To reply, visit the link below or just reply to this email
https://pagure.io/fedora-atomic/pull-request/102
walters reported a new issue against the project: `fedora-atomic` that you are following:
``
See https://github.com/projectatomic/rpm-ostree/pull/959#issuecomment-325780234
Right now we have:
```
[root@localhost ~]# ostree ls -R -X -C fedora-atomic:fedora/27/x86_64/atomic-host /boot|grep initramfs
-00600 0 0 52565370 7e6c941d0eefc5760917b300bade10e107d99c89fd0f627b7d9e1cf03068b9bd { [(b'security.selinux', b'system_u:object_r:boot_t:s0')] } /boot/initramfs-4.13.9-300.fc27.x86_64.img-850b4ded439b2151106725e7b522d8485d312c9ed80aee65c818c9f99c2c1701
[root@localhost ~]# ostree ls -R -X -C fedora-atomic:fedora/27/x86_64/atomic-host /usr/lib/ostree-boot|grep initramfs
-00600 0 0 52565370 79acadd126fcb5a02142119dfab6bd35fd5bfb46606adeab23f89cb04c4afc2a { [(b'security.selinux', b'system_u:object_r:lib_t:s0')] } /usr/lib/ostree-boot/initramfs-4.13.9-300.fc27.x86_64.img-850b4ded439b2151106725e7b522d8485d312c9ed80aee65c818c9f99c2c1701
[root@localhost ~]# ostree ls -R -X -C fedora-atomic:fedora/27/x86_64/atomic-host /usr/lib/modules|grep initramfs
-00600 0 0 52565370 f70d77da922263abc7e4f4e9fc92e178b051df8e10bd3105ebbb642ca5748f4b { [(b'security.selinux', b'system_u:object_r:modules_object_t:s0')] } /usr/lib/modules/4.13.9-300.fc27.x86_64/initramfs.img
```
Which means 3 physically distinct copies of the initramfs, and with `/boot` as its own partition, that brings it to 4. Using `boot_location: new` should bring us to 2 copies in the tree, and at that point I think we should change the SELinux policy to bring that to 1.
I still need to verify that everything works for Anaconda with that set.
``
To reply, visit the link below or just reply to this email
https://pagure.io/fedora-atomic/issue/94
walters opened a new pull-request against the project: `fedora-atomic` that you are following:
``
post: Strip glibc_post_upgrade.x86_64
``
To reply, visit the link below or just reply to this email
https://pagure.io/fedora-atomic/pull-request/101
gscrivano reported a new issue against the project: `atomic-wg` that you are following:
``
I'd like to refer to an image in the registry without referring to the Fedora version that it is based on, so that it will be easier to track if an image was updated and get always the latest version.
For example, it could be a new namespace "latest" or "current" that points to the latest "f[1-9][0-9]+" one, as:
`registry.fedoraproject.org/latest -> registry.fedoraproject.org/f26`
With such a change I could do something like:
```
# atomic install --system registry.fedoraproject.org/latest/etcd
```
and keep using "atomic pull && atomic containers update etcd" to keep the container updated without worrying that the latest version will be in a different namespace at some point.
Another advantage of such change is that it will make easier to use images from the Fedora registry onto other systems (such as RHEL or CentOS) where it is not immediate to know what is last version of Fedora available and how to get the most updated version of an image.
This won't break current use cases, as the namespaced images will still exist.
``
To reply, visit the link below or just reply to this email
https://pagure.io/atomic-wg/issue/376