Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docker-containers: Don't unconditionally prune images #79253

Merged
merged 1 commit into from Feb 5, 2020

Conversation

benley
Copy link
Member

@benley benley commented Feb 5, 2020

Motivation for this change

NixOS has virtualisation.docker.autoPrune.enable for this functionality; we probably should not do it every time a container starts up.

(also, some trivial documentation fixes)

Things done
  • Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
  • Built on platform(s)
    • NixOS
    • macOS
    • other Linux distributions
  • Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
  • Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
  • Tested execution of all binary files (usually in ./result/bin/)
  • Determined the impact on package closure size (by running nix path-info -S before and after)
  • Ensured that relevant documentation is up to date
  • Fits CONTRIBUTING.md.

cc @yorickvP

NixOS has `virtualisation.docker.autoPrune.enable` for this
functionality; we should not do it every time a container starts up.

(also, some trivial documentation fixes)
@@ -220,10 +220,9 @@ let
++ map escapeShellArg container.cmd
);

ExecStartPre = ["-${pkgs.docker}/bin/docker rm -f ${name}"
"-${pkgs.docker}/bin/docker image prune -f"] ++
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I wasn't able to find out why this was added in the first place 5083439#diff-a632ec0d1be978f9f4d3736c79cc51c3R224.

I thought maybe as a mean to ensure the image is always pulled, however it couldn't have worked provided the image needs to be in a dangling state (SO about dangling images).

A better way to ensure the latest image is used (to avoid outdated local cache) would be to always pull the image, which @mkaito added in the same PR, but then removed due to this comment because it was systematically pulling. While we may not want to always pull the image, making this available as an option is a very valid use case.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hmm, good thought. I had assumed it was done to avoid leaving stale images around when it gets updated but perhaps it had more to do with the image pulling policy.

Kubernetes pods have an imagePullPolicy field that you can set to Always, IfNotPresent, or Never. We could emulate the first two of those easily, but Never is harder unless docker run has a flag that I haven't seen to do it.

I'll look into this a bit and open another PR to add an option to control pulling at some point.

@benley benley merged commit d04bdce into NixOS:master Feb 5, 2020
@benley benley deleted the benley/docker-no-prune branch February 5, 2020 21:30
dtzWill pushed a commit to dtzWill/nixpkgs that referenced this pull request Feb 5, 2020
NixOS has `virtualisation.docker.autoPrune.enable` for this
functionality; we should not do it every time a container starts up.

(also, some trivial documentation fixes)

(cherry picked from commit d04bdce)
@alaviss alaviss mentioned this pull request Dec 8, 2022
13 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants