1% of SUSE Manager's functionality in 0.1% of the lines of code

Let's create a much simpler SUSE Manager — one you could use at home! Users should be able to deploy and operate in minutes with minimal configuration, while still retaining the very core features that make SUSE Manager useful!

Scope

We explicitly leave out anything that Salt or Cobbler can do: goal is only repository management.

That means:

  • downloading repos from various sources (plain http repos is implemented, we want to add SCC, SUSE Manager and RHN in this HackWeek or later)
  • storing them in various backends (filesystem and AWS S3 are implemented)
  • serve them in plain http (to be done in this HackWeek)
  • add filtering abilities to the served http repos (eg. appending "?upto=2017-10-01" to the URL will serve a repo with updates up to October. To be done in this HackWeek or later)

Tech

We use the Go programming language because it can be picked up by any programmer in one week. We aim for a 12-factor app for maximal deployment flexibility in cloud and container settings.

Questions? Want to join?

Since this project was born as an extension of sumaform, please use the gitter chat there!

A list of actionable items is available at the minima project's GitHub Issues page.

Looking for hackers with the skills:

go golang rpm

This project is part of:

Hack Week 16

Activity

  • almost 8 years ago: TBro liked this project.
  • almost 8 years ago: cschum liked this project.
  • almost 8 years ago: joachimwerner liked this project.
  • almost 8 years ago: cxiong liked this project.
  • almost 8 years ago: j_renner liked this project.
  • almost 8 years ago: admehmood liked this project.
  • almost 8 years ago: cbbayburt liked this project.
  • almost 8 years ago: ldevulder liked this project.
  • almost 8 years ago: moio added keyword "go" to this project.
  • almost 8 years ago: moio added keyword "golang" to this project.
  • almost 8 years ago: moio added keyword "rpm" to this project.
  • almost 8 years ago: moio liked this project.
  • almost 8 years ago: moio started this project.
  • almost 8 years ago: moio originated this project.

  • Comments

    • ikapelyukhin
      almost 8 years ago by ikapelyukhin | Reply

      That project sounds pretty similar to what RMT is supposed to do. RMT is a successor to SMT, which is already SUMA's younger sibling with less functionality :-)

      I've created a hackweek project for it.

      We plan to release RMT for SLES15, if it sounds like RMT is something you can use -- you are welcome to hack on it, or to just give it a try, we'll appreciate your feedback. :-)

      • moio
        almost 8 years ago by moio | Reply

        I am evaluating to contribute to RMT - I am still not sure if it fits the sumaform use case or not. Thanks for letting me know!

    Similar Projects

    terraform-provider-feilong by e_bischoff

    Project Description

    People need to test operating systems and applications on s390 platform.

    Installation from scratch solutions include:

    • just deploy and provision manually add-emoji (with the help of ftpboot script, if you are at SUSE)
    • use s3270 terminal emulation (used by openQA people?)
    • use LXC from IBM to start CP commands and analyze the results
    • use zPXE to do some PXE-alike booting (used by the orthos team?)
    • use tessia to install from scratch using autoyast
    • use libvirt for s390 to do some nested virtualization on some already deployed z/VM system
    • directly install a Linux kernel on a LPAR and use kvm + libvirt from there

    Deployment from image solutions include:

    • use ICIC web interface (openstack in disguise, contributed by IBM)
    • use ICIC from the openstack terraform provider (used by Rancher QA)
    • use zvm_ansible to control SMAPI
    • connect directly to SMAPI low-level socket interface

    IBM Cloud Infrastructure Center (ICIC) harnesses the Feilong API, but you can use Feilong without installing ICIC, provided you set up a "z/VM cloud connector" into one of your VMs following this schema.

    What about writing a terraform Feilong provider, just like we have the terraform libvirt provider? That would allow to transparently call Feilong from your main.tf files to deploy and destroy resources on your system/z.

    Other Feilong-based solutions include:

    • make libvirt Feilong-aware
    • simply call Feilong from shell scripts with curl
    • use zvmconnector client python library from Feilong
    • use zthin part of Feilong to directly command SMAPI.

    Goal for Hackweek 23

    My final goal is to be able to easily deploy and provision VMs automatically on a z/VM system, in a way that people might enjoy even outside of SUSE.

    My technical preference is to write a terraform provider plugin, as it is the approach that involves the least software components for our deployments, while remaining clean, and compatible with our existing development infrastructure.

    Goals for Hackweek 24

    Feilong provider works and is used internally by SUSE Manager team. Let's push it forward!

    Let's add support for fiberchannel disks and multipath.

    Possible goals for Hackweek 25

    Modernization, maturity, and maintenance.


    Mammuthus - The NFS-Ganesha inside Kubernetes controller by vcheng

    Description

    As the user-space NFS provider, the NFS-Ganesha is wieldy use with serval projects. e.g. Longhorn/Rook. We want to create the Kubernetes Controller to make configuring NFS-Ganesha easy. This controller will let users configure NFS-Ganesha through different backends like VFS/CephFS.

    Goals

    1. Create NFS-Ganesha Package on OBS: nfs-ganesha5, nfs-ganesha6
    2. Create NFS-Ganesha Container Image on OBS: Image
    3. Create a Kubernetes controller for NFS-Ganesha and support the VFS configuration on demand. Mammuthus

    Resources

    NFS-Ganesha