-
Notifications
You must be signed in to change notification settings - Fork 82
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to bind a signed image at install time #812
Comments
Hm, only glancing at this one thing I notice is
It's a legacy media type, not OCI. This is a thing we should start trying to change across Red Hat images. But indeed there may be a larger conflict here even with OCI that may need fixing. |
Hey @cgwalters we just stumbled on this while tying to locally build one RHEL 9.4 image. With a really simple
That fails with:
|
Hi @Odilhao that issue is related (in fact ultimately the same I suspect) but practically distinct because the failure there is in bootc-image-builder code. For reasons I don't understand really (and we're debating in multiple places), bootc-image-builder ends up copying the input container's rootfs and running it via custom tooling instead of just launching it via a standard OCI mechanism (e.g. podman). |
cc @mvo5 @achilleas-k re ⬆ |
There's a couple of things we can simplify in the way we move around the container. We initially read it from the host container store, copy it to an internal store, then mount it so we can copy out the contents and create a build root. The copy into the internal store can probably be skipped, I think it's a leftover from previous workflows that required it. I still think mounting and copying the container contents out to use its tooling is the right thing to do in osbuild. The alternative, using
with
The latter would need a lot of changes in the internals of osbuild, all of which would be to serve image mode and have no value for every other kind of build. Perhaps it's worth considering replacing bubblewrap in osbuild's internals with podman, change the way we set up build roots to be compatible with the bootc world, so that we can reuse this workflow everywehre, but that's a much bigger story and effort than "just launching tooling via a standard OCI mechanism". |
Can you explain a bit more about why that is? It's not obvious to me why that'd be the case. I think it's more about replacing just that specific bit with Anyways just to xref it looks like the bib side of this is now in osbuild/bootc-image-builder#676 |
We are unable to copy a signed image from c/storage -> c/storage while preserving the signature. See containers/image#2599 fixes containers#812 Signed-off-by: Chris Kyrouac <[email protected]>
We are unable to copy a signed image from c/storage -> c/storage while preserving the signature. See containers/image#2599 fixes containers#812 Signed-off-by: Chris Kyrouac <[email protected]>
When bootc tries to copy the signed image from the host to the install disk it fails with the following error:
Adding "--remove-signatures" to the
podman image push
command here fixes this error, however the result is an unsigned image. I did some digging through the containers/image code, skopeo docs, and containers-storage.conf docs. It looks like the only way to copy and sign an image is to re-sign the image when copying it, I couldn't find a way to copy a signed image while preserving the signature. I might be missing something though.The text was updated successfully, but these errors were encountered: