-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unified storage #20
Comments
Would containers-storage be another potential backend? Some considerations there of course (mixing images of different trust level and duplication) but it seems natural to have the OS container go there just like any other image so then you'd manage it with |
Potentially. That said, it was an intentional decision so far to separate application container storage from the OS. This ties into larger architectural decisions taken. Specifically today, we tend to view containers as optional. For example, we'd need to ensure things like |
How about a transactional-update/BTRFS backend? It is straightforward and naturally supports |
@cgwalters, do you want to track this separately from the podman backend? |
I've reworked this issue to now be about unified storage.
Long story short, the goal here is to make composefs the technological heart of things. Depending on BTRFS specifically doesn't give us a lot of value versus what we already have, augmented with composefs. "Live apply" type things are related but distinct. |
In the short term one thing we could do is basically add an opt-in flag (part of the origin?
|
Was thinking about this more and honestly we can probably rely on bypassing all the containers/storage/overlay abstractions as is done in https://github.com/containers/bootc/pull/215/files#diff-d61a00deb019ae32a7f695e1323119424ce1a268fb34d0639f3e74fb2ed78fedR244 - especially for a storage version we "own". |
Just to cross-reference a few things, I also have been working in the background on https://github.com/cgwalters/composefs-oci which is basically a "clean slate experimental playground" looking at "what might it look like if we made composefs the heart of things" - which it basically isn't today for ostree or c/storage (it's kind of awkwardly glued on the side to both). In reality there's a lot to do to productize that, and the most practical short term will likely continue to be improving c/storage and strategically "hollowing out" ostree where we can; xref ostreedev/ostree#3291 |
Today this project uses ostree-containers for the base image.
Much more recently, we landed logically bound app images which ended up requiring a bootc-owned containers/storage instance.
This left us in a confusing situation where we have two image storage backends used by bootc - one for the booted host, and one for LBIs.
The code they don't share is mostly containers/storage.
This issue tracks unification: Having bootc leverage more of containers/storage (which is going to likely require containers/storage improvements.
The text was updated successfully, but these errors were encountered: