-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
frontend for systemd-sysext #7
Comments
Going through old issues at the moment. @cgwalters, do you still think dynamic overlays like that make sense? Do you have a concrete use case or user story in mind? |
Yes definitely, I've retitled and retargeted this issue to be explictly about a bootc/container-native frontend to sysext, which has a ton of use cases. |
Also xref rpm-software-management/dnf5#1731 |
These two things I think have a lot of overlap with the logically bound container images. Do you see this maybe re-using some of the same mechanisms for delivery/binding? |
LBIs themselves overlap with the host storage, which gets into #20 Clearly all of these things should be stored/managed consistently. sysexts are designed in a relatively simple way where any tool can just drop things in specified directories, but I think for bootc-managed ones we likely want something more "immutable" (API driven, behind readonly bind mount). |
Let's add first class support for systemd-sysext - but instead of being DDI oriented we fetch and upgrade them from a registry.
Something like:
-M
here means to automatically runsystemd-sysext merge
after the operation. We'd store the sysexts in/var/lib/extensions
by default. Other operations:These would only remove sysexts that we "own" or write.
Also,
bootc upgrade
by default should error out if a target sysext is incompatible.Original issue:
I think it would make sense to support functionality similarly to https://www.freedesktop.org/software/systemd/man/systemd-sysext.html - we could even use that as a backend, though it needs some design around interactions eventually lowering "live apply" type flows.
A strawman could look like:
That would add a new container image that would be dynamically unioned with the host's rootfs - on updates, we reapply both - and we'd also verify compatibility and fail if e.g. they appeared somehow incompatible. (A lot of potential things to do in "verify compatibility...")
The text was updated successfully, but these errors were encountered: