-
Notifications
You must be signed in to change notification settings - Fork 34
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: handle ancient empty docker layers #522
Conversation
@rchincha the only file in the only patch is a .bats file. Did you forget some git-add action? |
Codecov Report
@@ Coverage Diff @@
## main #522 +/- ##
==========================================
- Coverage 13.34% 13.32% -0.03%
==========================================
Files 40 40
Lines 5852 5863 +11
==========================================
Hits 781 781
- Misses 4943 4954 +11
Partials 128 128
📣 We’re building smart automated test selection to slash your CI/CD build times. Learn more |
3 files right? |
Without this PR, the same test fails. A real-world image has been copied over to ghcr.io so should be internal without any dependency on dockerhub. |
https://github.com/containers/image/blob/main/image/docker_schema2.go I think this means it is a well-known type -- can we test if the image has the matching sha256? I'm going to see if I can programmatically create a simple image with such a layer. |
A single layer doesn't make sense IMO. What Dockerfile directive would make only that? |
ENV or RUN; any command that doesn't actually modify the rootfs. Why? I do not know. |
gives us
|
acb522e
to
c370eb2
Compare
Included your example in the unit tests. |
100addb
to
78da0a8
Compare
Earlier versions of docker images had empty layers of 1024 zero-valued octets. moby/moby#20917 (comment) Signed-off-by: Ramkumar Chinchani <[email protected]>
Will move the ghcr test to a SLOW_TEST (nightly) once you review/approve |
This PR should close #525 right? |
Earlier versions of docker images had empty layers of 1024 zero-valued octets. moby/moby#20917 (comment) Signed-off-by: Ramkumar Chinchani <[email protected]> (cherry picked from commit f0f9642)
Earlier versions of docker images had empty layers of 1024 zero-valued octets. moby/moby#20917 (comment) Signed-off-by: Ramkumar Chinchani <[email protected]> (cherry picked from commit f0f9642) Signed-off-by: Ramkumar Chinchani <[email protected]>
Earlier versions of docker images had empty layers of 1024 zero-valued octets. moby/moby#20917 (comment) Signed-off-by: Ramkumar Chinchani <[email protected]> (cherry picked from commit f0f9642) Signed-off-by: Ramkumar Chinchani <[email protected]>
Earlier versions of docker images had empty layers of 1024 zero-valued octets. moby/moby#20917 (comment) Signed-off-by: Ramkumar Chinchani <[email protected]> (cherry picked from commit f0f9642) Signed-off-by: Ramkumar Chinchani <[email protected]>
Earlier versions of docker images had empty layers of 1024 zero-valued octets. moby/moby#20917 (comment) (cherry picked from commit f0f9642) Signed-off-by: Ramkumar Chinchani <[email protected]>
Earlier versions of docker images had empty layers of 1024 zero-valued octets. moby/moby#20917 (comment) (cherry picked from commit f0f9642) Signed-off-by: Ramkumar Chinchani <[email protected]>
Earlier versions of docker images had empty layers of 1024 zero-valued octets.
What type of PR is this?
Which issue does this PR fix:
What does this PR do / Why do we need it:
If an issue # is not available please add repro steps and logs showing the issue:
Testing done on this change:
Automation added to e2e:
Will this break upgrades or downgrades?
Does this PR introduce any user-facing change?:
By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.