I’m opening this thread to gather thoughts and community feedback around a proposal to officially include Fedora bootc base container images in the Fedora ecosystem, with the intention that people will consider submitting this as an official Fedora 43 Change proposal.
This comes as part of a broader initiative to support bootable containers (bootc), an exciting new approach to deliver OS environments as OCI-compliant container images that can be booted directly on bare metal or virtual machines. These bootc images align well with Fedora’s innovation goals and could serve a new generation of edge, cloud, and embedded systems use cases.
Background
The request originated who have been actively building Fedora-based bootc images and testing them through automated pipelines. Now that the builds are stable, there’s interest in:
- Publishing these images publicly
- Integrating them formally as part of the Fedora release artifacts
- Allowing the community to use, test, and iterate on them
Traditionally, Fedora adds new image types at release boundaries through the Change process, so the ideal path forward would be to submit this as a Fedora 43 Change and begin shipping these images as part of the release.
Proposal Summary
Goals:
- Ship
fedora-bootc
base images alongside other Fedora deliverables - Host them in Fedora’s official container registries (like
quay.io/fedora
) - Ensure they meet Fedora’s security, naming, and metadata standards
- Align this initiative with Fedora’s infrastructure, signing, and release processes
Key Considerations
1. Where will these images live?
Current options:
- Short-term (testing):
quay.io/fedoraci
orquay.io/fedora-testing/fedora-bootc
- Long-term (release):
quay.io/fedora/fedora-bootc
We recommend final delivery to quay.io/fedora/fedora-bootc
for production use, and possibly phasing out registry.fedoraproject.org
in the long term.
2. Do these images require formal review?
We’d like to discuss:
- Should this go through the Fedora Container Image Review process?
- Is a Change proposal enough to handle inclusion?
- What group (Cloud SIG? QA? Infra?) should help us vet and sponsor this?
Who can help sponsor and shepherd the image through the inclusion process?
3. Tagging & Metadata
To comply with Fedora standards, the image should:
- Follow naming conventions:
fedora-bootc
(not version or branch specific) - Include proper OCI metadata (e.g., labels like
name
,summary
,version
, etc.) - Use date-based tags or semver, along with
:latest
4. Security & Signing
Fedora requires image signing, so we’ll need:
- Koji (or alternative) signing integration
- Regular scanning (e.g., Trivy, Clair)
- Possibly including SBOMs
What’s the best way to handle signing and vulnerability scanning if we host these images on Quay?
5. Integration into Fedora Infra
The current build system is an external pipeline, but we want to ensure:
- Fedora Infra can consume logs and build metadata transparently
- Long-term compatibility with Fedora CI/CD expectations
Related Work & Konflux Integration
This effort is already being discussed in multiple places:
Fedora Discussion: Fedora-bootc image CI/CD migration to Konflux
GitLab Issue: Transition builds to Konflux and shared pipeline (#33)
A Fedora Konflux cluster is now operational, and contributors have already offered support to help transition bootc image builds into this shared pipeline. This could become an important component of the proposed Fedora 43 integration work.
Suggested Path Forward
Here’s how we could proceed toward Fedora 43:
- Submit a Change Proposal: Clearly defining deliverables, registry target, image definition, and compliance scope.
- Prototype & Test in Parallel: Continue testing via
quay.io/fedoraci
to gather feedback. - Image Review & Metadata Compliance: Collaborate with interested SIGs or QA teams to ensure the base image meets Fedora standards.
- Establish Signing Pipeline: Work with Fedora Infra or Release Engineering to secure and verify images.
- Monitor & Iterate: Include feedback cycles post-beta or RC testing to adapt prior to final release.
Open for Feedback
I’d love to hear from:
- SIGs or groups who’d like to co-own or sponsor this effort
- Infra folks on registry/signing integration
- Community members on use cases or blockers you foresee
- Release engineers and QA about how this fits into our testing matrix
You can also join the discussion or leave comments on the RelEng ticket #12731, which I’ve opened to coordinate progress and gather input from other stakeholders.
Looking forward to your thoughts!
—
Samyak