-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Removing untagged images can damage tagged images #63
Comments
Do you propose we update the README of this action to notify users about this behaviour, or do you think this is something we can fix by changing the implementation? |
My understanding is there's no fix currently, but that's based on GH support answers, didn't verify it myself. So I propose adding a warning in readme and pinning this issue for the time being. |
I have confirmed that disabling provenance ( Workaround: - uses: docker/build-push-action@v4
with:
provenance: false
... |
That's very helpful. Would you be interested in creating a PR too @lukasz-mitka? |
No, sorry. |
Workaround for corrupted images due to snok/container-retention-policy#63
Duplicate of #43 |
When removing untagged images it damages the docker manifest. The workaround is to disable the attestations. Link: snok/container-retention-policy#63 Signed-off-by: Daniel Wagner <dwagner@suse.de>
I fixed this in a new project. https://github.com/dataaxiom/ghcr-cleanup-action, without the providence workaround above. It requires uploading a temporary manifest to unlink the tag, then that can be deleted. |
Please see #43 (comment) @rohanmars. Any reason you don't think that would work? |
Yes skipping sha's is what I did essentially not to not delete the platform specific images linked from the manifest. It gets more complicated when you want to support multiple tags to the same multiarch image and when you want to actually delete the multiarch image. In the delete case you would want to include these digests. |
For when you actually want to delete the multi-arch image, I would have thought that you'd be fine as long as you always make sure not to delete the SHAs associated with the current tag. Any old untagged images can then be deleted safely - assuming you're passing in the SHAs of all multi-arch images. Is there anything else that needs to be taken into account? |
The latest release adds a The migration guide for v3 is included in the release post 👍 If you run into any issues, please share them in the issue opened for tracking the v3 release |
Running action like so
Can damage tagged images:
GitHub Support response:
provenance
is enabled by default sincedocker/build-push-action@v4
My workaround is to disable it:
Solution for already broken images: republish them
The text was updated successfully, but these errors were encountered: