Closed wking closed 3 years ago
You are slowly re-implementing yum repository ;-)
I assume there's a reason yum and reposync are not good candidates for this.
A lot of things have compression and signatures and channels; for example, OCI container images and OSTree does too.
I don't think it makes a whole lot of sense to wrap our disk images in RPMs (or containers or ostree refs) though.
(Random aside: ostree has deltas, and they are significantly better than deltarpm)
Well, it may make sense at some point to wrap our disk images "bootimages" in containers just for ease of mirroring.
KubeVirt actually has this concept of shipping images via registery, btw (https://github.com/kubevirt/kubevirt/blob/master/docs/container-register-disks.md )
My point was indeed there are enough implementations, that's all.
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale
.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle rotten
.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen
.
If this issue is safe to close now please do so with /close
.
/lifecycle rotten /remove-lifecycle stale
Rotten issues close after 30d of inactivity.
Reopen the issue by commenting /reopen
.
Mark the issue as fresh by commenting /remove-lifecycle rotten
.
Exclude this issue from closing again by commenting /lifecycle frozen
.
/close
@openshift-bot: Closing this issue.
Currently:
but there are a lot of possibilities for mutation between the build box and my local system (we're not even transmitting that SHA over HTTPS!). It would be nice to have a file (or per-gzipped-blob files, it doesn't really matter) with the filenames and hashes, like:
that was signed by some release key. Then I could check that there had been no tampering between the signing bot (or wherever the release key was held) and my local download. One benefit would be catching accidental corruption (openshift/installer#475), but this would also give us protection from malicious folks on the VPN, etc., etc.
Hashing the gzipped blobs allows me to verify the payload before going through the trouble of unzipping (e.g. gzip-bomb protection). Hashing the unzipped blobs allows me to verify uncompressed images in my local cache (openshift/installer#395).
CC @ashcrow