Replies: 3 comments 3 replies
-
Another path is to add Anaconda to an existing bootc image and then generate a LiveISO out of it. It's currently blocked on: |
Beta Was this translation helpful? Give feedback.
-
Today I have made some more experients and faced two issues. Then I have an empty partition mounted with just empty
Q2) If this is related to empty |
Beta Was this translation helpful? Give feedback.
-
I definitely see the benefits of running bootc from inside the container and I like the idea. However, it is just not possible to make this default as size of the container images might be quite huge. The nice example are supported RHEL AI containers which has over 100GB size IIRC. We can't run these containers from a memory. If we want to go this way we would have to have some way of doing the partitioning first and then use that to download the container and install from that. We already doing something like that with DNF transaction. I think this might be doable but we would need to make this coexist with the bootc installation. I mean, bootc needs to allow us to use some of the space for the container image and not erase that during installation. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
This is for work on Anaconda. Today,
bootc install
defaults to assuming it's run from the container image being installed.--source-imgref
turns this off, and it's used by bootc-image-builder today. However, I'd really like going forward in general to lean strongly into the "run bootc install from target container" as much as possible, and this would mean that Anaconda would need to fetch (into RAM) the target container image by default, then run it. I know this would be a pretty substantial change, but it would have a lot of benefits.But to continue with the current architecture, when using
--source-imgref
today that turns off the "install self container" mode, and it does mean that some infrastructure (such as selinux-policy) to bootstrap its labeling state.I think we could probably lift this requirement and fall back to doing labeling as a secondary post-fixup path, using the policy from the target root. That would be a bit involved but doable.
Beta Was this translation helpful? Give feedback.
All reactions