(no title)
arianvanp | 14 days ago
Boot images should be Dm-verity protected EROFS images. We should not be building new things on OCI. It's really mind-blowing to me that this is a new direction people who are supposed to be top of class OS builders are moving to as a direction.
They took the CoreOS dream and threw everything in the trash
looperhacks|14 days ago
> Boot images should be Dm-verity protected EROFS images
Maybe I'm misunderstanding you - I gather that you think the boot images are distributed as OCI images? That's not the case, bootc is more about building the image, updating it and the overall structure. Booting an image built with bootc does not involve any container infrastructure (unless you start services that depend on containers, I guess - but that's deep in userspace). There's technically nothing preventing this from using verified read-only images.
arianvanp|12 days ago
Yes? That's literally the sales pitch on the website. Am I missing something?
Quote from https://bootc-dev.github.io/ tells me that bootc is using OCI as a delivery format for bootable images.
Transactional, in-place operating system updates using OCI/Docker container images.
Motivation The original Docker container model of using "layers" to model applications has been extremely successful. This project aims to apply the same technique for bootable host systems - using standard OCI/Docker containers as a transport and delivery format for base operating system updates
saltamimi|14 days ago
exceptione|14 days ago
curt15|14 days ago