# 20211103_Fedora-CoreOS-Virtual-Meeting
location: https://meet.google.com/igd-ekxw-nzi
### Agenda
#### Roll Call
Add your name and involvement/interest in FCOS here:
- Dusty Mabe - dusty@dustymabe.com - FCOS/RHCOS team at Red Hat
- Colin Walters - walters@verbum.org - RHT CoreOS team
- Jan Kuparinen - copperi@fedoraproject.org
- Jonathan Lebon - jonathan@jlebon.com - FCOS/RHCOS team
- Jaime Magiera - jaimelm@umich.edu - University of Michigan
- Michael Nguyen - mnguyen@redhat.com - FCOS/RHCOS team
- Luca Bruno - lucab@redhat.com
- Joseph Marrero - jmarrero@redhat.com - FCOS/RHCOS team
- Renata Ravanelli - rravanel@redhat.com FCOS/RHCOS team
- Neal Gompa - ngompa@fedoraproject.org - KDE SIG / OKD WG
- Benjamin Gilbert - bgilbert@redhat.com - FCOS/RHCOS team
#### INFO
- FYI - `testing` stream planned to be rebased to Fedora 35 content next week
#### Action items from [last meeting](https://meetbot-raw.fedoraproject.org/teams/fedora_coreos_meeting/fedora_coreos_meeting.2021-10-27-16.27.txt)
* dustymabe to write docs for rpi4 including updating EEPROM
- DWM: draft PR for documentation on updating EEPROM
- https://github.com/coreos/fedora-coreos-docs/pull/336
#### enhancements: Propose CoreOS layering
- presented by Colin Walters
- link: https://github.com/coreos/enhancements/pull/7
- Notes:
- This proposal builds on a previous proposal. Taking what we're doing with OSTREE and using container storage to store the OSTree commits. Updates come over the wire from a container registry.
- Everything that exists today with FCOS will continue to work. This is just an alternative optional feature.
- The core change in the proposal:
- History: we've had friction with users at times over what should be in the base OS
- What if we thought of Fedora CoreOS as a base image (like in containers)
- Uses Dockerfile workflow
- Creates a layer that can then be used as your Host OS
- Package layering exists but has some drawbacks
- requires the thing you're adding to be an RPM
- JMC: If I'm booted from that generated image will I get updates for the base layer?
- No, when you build this image you become responsible for building your derived image.
-
- JL: we want to improve the package layering and other rpm-ostree operations to be able to apply them on first boot seamlessly
- DWM: Could we make the built container images happen client side so we just apply it on top when a new update comes in.
- i.e. just like package layering is done today
- DWM: what happens to the update graph if someone is following quay.io/foo
- we would need to do some work to enable this
- DWM: can I run this container (podman run), would I want to?
- in order for Dockerfile/Containerfile layering to work you must be able to run things inside the container, so it must be able to run and feel like a container that you can run in a container runtime
- JL: now you can configure the OS via a container or Ignition, this gets a little messy.
- DWM: could we re-use this for server side layering stuff?
- we could use this workflow to create derivatives and export them back into our hosted fedora ostree repository
- CW: if you create tooling that splits the OS contents into separate chunks we can get more efficient downloads from OCI registries
#### Platform Request: VirtualBox
- link: https://github.com/coreos/fedora-coreos-tracker/issues/1008
- Notes:
#### Platform Request: Nutanix AOS with AHV
- link: https://github.com/coreos/fedora-coreos-tracker/issues/1007
- Notes:
#### Any other topics? [Fedora CoreOS Goals](https://hackmd.io/h3qv7mn4RDKd_n50ANdqxw)
#### Open Floor
- NG: kinoite is an rpm-ostree based deliverable
- NG: we can't deliver kinoite as a live ISO (at least with existing Fedora releng tooling)
- NG: without a live ISO it's hard to tell people what to use as a rescue environment
- CW: FCOS uses a live ISO today, so it's possible