-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to update docker (with watchtower) #1289
Comments
We don't recommend the use of Watchtower or any other automated update: https://github.com/pi-hole/docker-pi-hole#note-on-watchtower |
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
This comment was marked as off-topic.
How does this apply to our build process? What is the benefit of doing it, and what is the danger of not doing it? |
This comment was marked as off-topic.
This comment was marked as off-topic.
this affect the ability to update in some way pi-hole when dockered. |
Does this affect normal updates? (In my experience... No, as I've updated between images with no issues) or is it just watchtower updates? If it's the latter, I don't know how worried I am about this... One should not be updating Pi-hole containers with watchtower, ever... |
I just updated my own installation from This is not about a problem with Pi-hole. |
I just spent all day trying to figure this out. So it is affecting a number of people. Probably good to keep an eye on it even if there is nothing you guys can do. It helps people who are searching for an answer. |
Are you able to manually update the image? |
so I used docker desktop and docker for windows to pull the image, save it, and then manually copy it to the appliance I'm running containers on. The appliance is getting 404s for pihole still. Other containers work though. |
At this stage, I don't really understand the problem. I gather that those using watchtower are unable to update via watchtower (which is something we do not recommend for this image anyway, as mentioned in the readme), but what has changed in buildx to cause this issue? Where do the 404's come into it? If you To refer back to @dschaper's question:
Not averse to making changes, but I need to understand exactly why changes need to be made, and what benefit it will bring. Is there an upstream issue with buildx that's being tracked? I don't want to hace to pin to a specific version of that forever... |
That makes two of us... I wish I could get more substantial logs out of the appliance to be able to shed some light on the situation, but if there is a way, I don't know how. I don't even know if it's using watchtower under the hood, or just exhibiting the same symptoms. The appliance has it's own interface for pulling down docker containers from For what it's worth, this seems to have only started happening in the last 10 or so hours, and was definitely working fine this morning. In my case, I'm running it on a MikroTik CCR2116-12G-4S+ so it's pretty locked down with no traditional shell to fall back to. (that I know of anyways) |
This comment was marked as off-topic.
This comment was marked as off-topic.
I am also having issues pulling the 2023.01.4 and 2023.01.5 tags directly via podman on an arm64 system (2023.01.3 worked fine however). NOTE: I am not using watchtower. It's interesting that using docker (not podman) to pull all the image tags referenced above work properly from a different x86_64 system. I do suspect it has something to do with the github docker builders defaulting to buildx v0.10.0 as stated above but I have not dug into exactly why that is. It might be worth a try pinning the buildx version to v0.9.1 in this repo's github workflow yaml. I have inspected the image and it does seem structurally different in versions > 2023.01.3 and this upstream issue also seems to related: docker/setup-buildx-action#187 |
From This is a build option so in build-push-action:
Or if you invoke buildx directly then docker buildx build --provenance false .... |
Yeah, came across that earlier when reading through the issues. I will give it a go when I get to a computer. It seems a better option than just pinning to an old version |
From : containrrr/watchtower#1528 (comment)
That's not strictly true, and I think unfairly misrepresents what I've said. I have also said I will try adding disabling And to quote @crazy-max:
Agree with this. But I will always always always maintain though that people should not be keeping Pi-hole (a critical part of one's network) automatically updated with Watchtower. Watchtower is fine in principle... just don't use it for Pi-hole. We can and will push breaking changes (we try not to, but sometimes it just has to happen) - imagine that bringing down your whole network because you let it just upgrade itself in the middle of the night/when you were away. To repeat a link shared earlier: https://github.com/pi-hole/docker-pi-hole#note-on-watchtower However this issue appears at the surface level to be affecting more than just users using watchtower - as there are reports of |
please try the |
I agree disabling provenance is a better alternative to pinning the actual version. I saw this referenced in a few places after I had commented here. The
|
Thanks for the feedback - I will tag a new version |
That was my understanding. My mistake. Good to see that your take the issue. Thank you thank you :) |
And thank you for the update in the git |
So I just tried Not sure if that's expected or not, but I'm pretty happy about it! If it is expected, thanks very much! If it's not, please let me know if I can help ding in deeper to figure out what's going on now. |
It's expected #1290 |
Amazing! Thanks team! Much appreciated! |
Hello
Apparently there is an issue with buildx
You should pin the buildx version to v0.9.1 to fix your images (Example: cilium/cilium#23206)
Thanks
The text was updated successfully, but these errors were encountered: