-
Notifications
You must be signed in to change notification settings - Fork 183
osbuild: pause using container-storage for builds #4374
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Using container storage in the supermin VM was first introduced in 9190a34. This was a nice optimization but it's causing issues where the digest of the deployed container within the bootimages is different than what is in our metadata and what is pushed to the registry. See coreos/fedora-coreos-tracker#2066 for more information.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Code Review
This pull request pauses the usage of container storage for builds by commenting out the logic that checks for local container images. This is a temporary measure to address an issue with inconsistent container digests that was affecting Zincati, as detailed in the linked issue. The change is clear, correct, and the added comment provides good context for why this optimization is being disabled. The approach of commenting out the code is appropriate for a temporary pause.
tlbueno
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating disk images that had different OCI digests than the releases OCI image. This results in deployed being unable to update [3] because Zincati look for the deployed OCI checksum in the graph to determines the update path [4]. This introduces a workaround for it : one day a week we will change the image pullspec in the OCI graph with the invalid values to give a chance to Zincati to trigger an update. This will get the node back to a valid state. [1] coreos/coreos-assembler@9190a34 [2] coreos/coreos-assembler#4374 [3] coreos/fedora-coreos-tracker#2066 [4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating disk images that had different OCI digests than the released OCI image. This results in deployed nodes being unable to update [3] because Zincati look for the deployed OCI checksum in the graph to determines the update path [4]. This introduces a workaround for it : one day a week we will change the image pullspec in the OCI graph with the invalid values to give a chance to Zincati to trigger an update. This will get the node back to a valid state. Note that we won't update the last release in the graph, so Zincati have a valid checksum to fetch from the registry. [1] coreos/coreos-assembler@9190a34 [2] coreos/coreos-assembler#4374 [3] coreos/fedora-coreos-tracker#2066 [4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating disk images that had different OCI digests than the released OCI image. This results in deployed nodes being unable to update [3] because Zincati look for the deployed OCI checksum in the graph to determines the update path [4]. This introduces a workaround for it : one day a week we will change the image pullspec in the OCI graph with the invalid values to give a chance to Zincati to trigger an update. This will get the node back to a valid state. Note that we won't update the last release in the graph, so Zincati have a valid checksum to fetch from the registry. [1] coreos/coreos-assembler@9190a34 [2] coreos/coreos-assembler#4374 [3] coreos/fedora-coreos-tracker#2066 [4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating disk images that had different OCI digests than the released OCI image. This results in deployed nodes being unable to update [3] because Zincati look for the deployed OCI checksum in the graph to determines the update path [4]. This introduces a workaround for it : one day a week we will change the image pullspec in the OCI graph with the invalid values to give a chance to Zincati to trigger an update. This will get the node back to a valid state. Note that we won't update the last release in the graph, so Zincati have a valid checksum to fetch from the registry. [1] coreos/coreos-assembler@9190a34 [2] coreos/coreos-assembler#4374 [3] coreos/fedora-coreos-tracker#2066 [4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating disk images that had different OCI digests than the released OCI image. This results in deployed nodes being unable to update [3] because Zincati look for the deployed OCI checksum in the graph to determines the update path [4]. This introduces a workaround for it : one day a week we will change the image pullspec in the OCI graph with the invalid values to give a chance to Zincati to trigger an update. This will get the node back to a valid state. Note that we won't update the last release in the graph, so Zincati have a valid checksum to fetch from the registry. [1] coreos/coreos-assembler@9190a34 [2] coreos/coreos-assembler#4374 [3] coreos/fedora-coreos-tracker#2066 [4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating disk images that had different OCI digests than the released OCI image. This results in deployed nodes being unable to update [3] because Zincati look for the deployed OCI checksum in the graph to determines the update path [4]. This introduces a workaround for it : one day a week we will change the image pullspec in the OCI graph with the invalid values to give a chance to Zincati to trigger an update. This will get the node back to a valid state. Note that we won't update the last release in the graph, so Zincati have a valid checksum to fetch from the registry. [1] coreos/coreos-assembler@9190a34 [2] coreos/coreos-assembler#4374 [3] coreos/fedora-coreos-tracker#2066 [4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
Using container storage in the supermin VM was first introduced in 9190a34. This was a nice optimization but it's causing issues where the digest of the deployed container within the bootimages is different than what is in our metadata and what is pushed to the registry.
See coreos/fedora-coreos-tracker#2066 for more information.