-
Notifications
You must be signed in to change notification settings - Fork 198
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
experimental: Add build-chunked-oci #5222
base: main
Are you sure you want to change the base?
Conversation
Skipping CI for Draft Pull Request. |
OK I've been testing this out with this; the demo here is to make a smaller base image from our larger one, removing python and linux-firmware but even removing rpm-ostree and dnf. (We can't yet remove rpm because paast-selinux depends on it for bad reasons))
Anyways, this builds and starts to install, but what I get trying to do an install is:
And that's the only corrupt file - it turns out to be the |
➡️ #5225 Holy cow was that painful to debug. |
I'm working on doing container reencapsulation and using a user-mode repo and got burned by the hardlinking here and rpm always *writing* to the repo even when reading it. Most systems we care about have reflinks so it's cheap. And in practice most usage of this before was actually checking out from bare (not bare-user) repos, so we were copying anyways. Signed-off-by: Colin Walters <[email protected]>
Signed-off-by: Colin Walters <[email protected]>
Closes: coreos#5221 Signed-off-by: Colin Walters <[email protected]>
ba7cb67
to
6d58780
Compare
We really want this for coreos/rpm-ostree#5222 to be able to rebuild images from their container-synthesized rootfs. Really, the only xattr we don't want to emit in to the tar stream is security.selinux for now. Eventually we should try to switch to putting that into the tar stream too, but it needs more validation. Signed-off-by: Colin Walters <[email protected]>
We really want this for coreos/rpm-ostree#5222 to be able to rebuild images from their container-synthesized rootfs. Really, the only xattr we don't want to emit in to the tar stream is security.selinux for now. Eventually we should try to switch to putting that into the tar stream too, but it needs more validation. Signed-off-by: Colin Walters <[email protected]>
We really want this for coreos/rpm-ostree#5222 to be able to rebuild images from their container-synthesized rootfs. Really, the only xattr we don't want to emit in to the tar stream is security.selinux for now. Eventually we should try to switch to putting that into the tar stream too, but it needs more validation. Signed-off-by: Colin Walters <[email protected]>
Closes: #5221
Signed-off-by: Colin Walters [email protected]