Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature Request] Ability to phase out old OS images #684

Open
Tracked by #285
martinmo opened this issue Aug 2, 2024 · 5 comments
Open
Tracked by #285

[Feature Request] Ability to phase out old OS images #684

martinmo opened this issue Aug 2, 2024 · 5 comments
Assignees
Labels
enhancement New feature or request IaaS Issues or pull requests relevant for Team1: IaaS SCS is standardized SCS is standardized SCS-VP10 Related to tender lot SCS-VP10
Milestone

Comments

@martinmo
Copy link
Member

martinmo commented Aug 2, 2024

Motivated by #682 (comment).

We need to discuss:

  • Should SCS standards enforce phasing out (or even banning) old OS images which are not maintained anymore?
  • If so, how? Suggestion by @mbuechse is to introduce new status values in the YAML specified by the standard images standard: discouraged and forbidden.
  • How should deletion be implemented? e.g., move to visibility community
@martinmo martinmo added enhancement New feature or request IaaS Issues or pull requests relevant for Team1: IaaS SCS is standardized SCS is standardized SCS-VP10 Related to tender lot SCS-VP10 labels Aug 2, 2024
@mbuechse
Copy link
Contributor

mbuechse commented Aug 2, 2024

@martinmo assigned this to you -- please bring this before Team IaaS, or reassign it to me if you think I should do it.

@mbuechse
Copy link
Contributor

mbuechse commented Aug 5, 2024

@martinmo just FYI, this change does not require a new major version; however, we should probably also extend https://docs.scs.community/standards/scs-0104-v1-standard-images#yaml-lifecycle to include the case that some formerly optional image becomes forbidden, in which case a new yaml would have to be created.

@martinmo
Copy link
Member Author

martinmo commented Aug 7, 2024

Discussed in the IaaS call today:

  • general tendency to enforce this in the certification was "no"
  • real deletion should be avoided (that's why I left open the "implementation" of that in my initial comment, such as with visibility community)
    • another approach is using os_hidden
    • deletion is almost certainly not possible because of clone dependencies e.g. in Ceph
  • warnings should be avoided (warning fatigue)
  • state discouraged could be ok

OpenStack API docs about os_hidden property:

This field controls whether an image is displayed in the default image-list response. A “hidden” image is out of date somehow (for example, it may not have the latest updates applied) and hence should not be a user’s first choice, but it’s not deleted because it may be needed for server rebuilds. By hiding it from the default image list, it’s easier for end users to find and use a more up-to-date version of this image. (Since Image API v2.7)

OpenStack API docs about community visibility:

Any user may read the image and its data payload, but the image does not appear in the default image list of any user other than the owner.

(This visibility value was added in the Image API v2.5)

source: https://docs.openstack.org/api-ref/image/v2/#create-image

@martinmo
Copy link
Member Author

martinmo commented Aug 7, 2024

And:

  • Users might have extended license for dists that are EOL for the general public.
  • Be optimistic: image contain the version, rely on user to choose latest version.

@mbuechse
Copy link
Contributor

mbuechse commented Aug 7, 2024

I think there may be use cases for this, just not EOL

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request IaaS Issues or pull requests relevant for Team1: IaaS SCS is standardized SCS is standardized SCS-VP10 Related to tender lot SCS-VP10
Projects
Status: Backlog
Development

No branches or pull requests

2 participants