Skip to content

Conversation

@dustymabe
Copy link
Member

Using container storage in the supermin VM was first introduced in 9190a34. This was a nice optimization but it's causing issues where the digest of the deployed container within the bootimages is different than what is in our metadata and what is pushed to the registry.

See coreos/fedora-coreos-tracker#2066 for more information.

Using container storage in the supermin VM was first introduced in
9190a34. This was a nice optimization but it's causing issues where the
digest of the deployed container within the bootimages is different
than what is in our metadata and what is pushed to the registry.

See coreos/fedora-coreos-tracker#2066
for more information.
Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

This pull request pauses the usage of container storage for builds by commenting out the logic that checks for local container images. This is a temporary measure to address an issue with inconsistent container digests that was affecting Zincati, as detailed in the linked issue. The change is clear, correct, and the added comment provides good context for why this optimization is being disabled. The approach of commenting out the code is appropriate for a temporary pause.

@dustymabe dustymabe enabled auto-merge (rebase) November 18, 2025 19:43
@tlbueno tlbueno self-requested a review November 18, 2025 22:14
Copy link
Member

@tlbueno tlbueno left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@dustymabe dustymabe merged commit 31a90d0 into coreos:main Nov 18, 2025
6 checks passed
@dustymabe dustymabe deleted the dusty-no-container-storage branch November 18, 2025 22:15
jbtrystram added a commit to jbtrystram/fedora-coreos-cincinnati that referenced this pull request Nov 24, 2025
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating
disk images that had different OCI digests than the releases OCI image.
This results in deployed being unable to update [3] because Zincati look
for the deployed OCI checksum in the graph to determines the update path
[4].

This introduces a workaround for it : one day a week we will change the
image pullspec in the OCI graph with the invalid values to give a
chance to Zincati to trigger an update. This will get the node back to
a valid state.

[1] coreos/coreos-assembler@9190a34
[2] coreos/coreos-assembler#4374
[3] coreos/fedora-coreos-tracker#2066
[4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
jbtrystram added a commit to jbtrystram/fedora-coreos-cincinnati that referenced this pull request Nov 24, 2025
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating
disk images that had different OCI digests than the released OCI image.
This results in deployed nodes being unable to update [3] because
Zincati look for the deployed OCI checksum in the graph to determines
the update path [4].

This introduces a workaround for it : one day a week we will change the
image pullspec in the OCI graph with the invalid values to give a
chance to Zincati to trigger an update. This will get the node back to
a valid state.
Note that we won't update the last release in the graph, so Zincati have
a valid checksum to fetch from the registry.

[1] coreos/coreos-assembler@9190a34
[2] coreos/coreos-assembler#4374
[3] coreos/fedora-coreos-tracker#2066
[4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
jbtrystram added a commit to jbtrystram/fedora-coreos-cincinnati that referenced this pull request Nov 30, 2025
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating
disk images that had different OCI digests than the released OCI image.
This results in deployed nodes being unable to update [3] because
Zincati look for the deployed OCI checksum in the graph to determines
the update path [4].

This introduces a workaround for it : one day a week we will change the
image pullspec in the OCI graph with the invalid values to give a
chance to Zincati to trigger an update. This will get the node back to
a valid state.
Note that we won't update the last release in the graph, so Zincati have
a valid checksum to fetch from the registry.

[1] coreos/coreos-assembler@9190a34
[2] coreos/coreos-assembler#4374
[3] coreos/fedora-coreos-tracker#2066
[4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
jbtrystram added a commit to jbtrystram/fedora-coreos-cincinnati that referenced this pull request Dec 2, 2025
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating
disk images that had different OCI digests than the released OCI image.
This results in deployed nodes being unable to update [3] because
Zincati look for the deployed OCI checksum in the graph to determines
the update path [4].

This introduces a workaround for it : one day a week we will change the
image pullspec in the OCI graph with the invalid values to give a
chance to Zincati to trigger an update. This will get the node back to
a valid state.
Note that we won't update the last release in the graph, so Zincati have
a valid checksum to fetch from the registry.

[1] coreos/coreos-assembler@9190a34
[2] coreos/coreos-assembler#4374
[3] coreos/fedora-coreos-tracker#2066
[4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
jbtrystram added a commit to jbtrystram/fedora-coreos-cincinnati that referenced this pull request Dec 2, 2025
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating
disk images that had different OCI digests than the released OCI image.
This results in deployed nodes being unable to update [3] because
Zincati look for the deployed OCI checksum in the graph to determines
the update path [4].

This introduces a workaround for it : one day a week we will change the
image pullspec in the OCI graph with the invalid values to give a
chance to Zincati to trigger an update. This will get the node back to
a valid state.
Note that we won't update the last release in the graph, so Zincati have
a valid checksum to fetch from the registry.

[1] coreos/coreos-assembler@9190a34
[2] coreos/coreos-assembler#4374
[3] coreos/fedora-coreos-tracker#2066
[4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
jbtrystram added a commit to jbtrystram/fedora-coreos-cincinnati that referenced this pull request Dec 4, 2025
A bug introduced in coreos-assembler[1] (reverted [2]) ended up creating
disk images that had different OCI digests than the released OCI image.
This results in deployed nodes being unable to update [3] because
Zincati look for the deployed OCI checksum in the graph to determines
the update path [4].

This introduces a workaround for it : one day a week we will change the
image pullspec in the OCI graph with the invalid values to give a
chance to Zincati to trigger an update. This will get the node back to
a valid state.
Note that we won't update the last release in the graph, so Zincati have
a valid checksum to fetch from the registry.

[1] coreos/coreos-assembler@9190a34
[2] coreos/coreos-assembler#4374
[3] coreos/fedora-coreos-tracker#2066
[4] https://github.com/coreos/zincati/blob/238a79a9c2d11a39d7b7f9c6e71888b75d2c6ab3/src/cincinnati/mod.rs#L230-L245
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants