Open cfergeau opened 3 days ago
Using podman on macos, I mistakenly ran podman image list -f json instead of podman image list --format json and got a crash
podman image list -f json
podman image list --format json
Steps to reproduce the issue
% podman image list -f invalid panic: runtime error: index out of range [1] with length 1 goroutine 1 [running]: github.com/containers/podman/v5/pkg/domain/infra/tunnel.(*ImageEngine).List(0x1400071a2d0, {0x1039a6d50?, 0x0?}, {0x0?, 0x0?, {0x140001caf30?, 0x0?, 0x0?}}) /Users/runner/work/podman/podman/pkg/domain/infra/tunnel/images.go:41 +0x32c github.com/containers/podman/v5/cmd/podman/images.images(0x1048b0600, {0x140000aaf40?, 0x0?, 0x2?}) /Users/runner/work/podman/podman/cmd/podman/images/list.go:125 +0x204 github.com/spf13/cobra.(*Command).execute(0x1048b0600, {0x1400003a120, 0x2, 0x2}) /Users/runner/work/podman/podman/vendor/github.com/spf13/cobra/command.go:983 +0x840 github.com/spf13/cobra.(*Command).ExecuteC(0x1048abe20) /Users/runner/work/podman/podman/vendor/github.com/spf13/cobra/command.go:1115 +0x344 github.com/spf13/cobra.(*Command).Execute(...) /Users/runner/work/podman/podman/vendor/github.com/spf13/cobra/command.go:1039 github.com/spf13/cobra.(*Command).ExecuteContext(...) /Users/runner/work/podman/podman/vendor/github.com/spf13/cobra/command.go:1032 main.Execute() /Users/runner/work/podman/podman/cmd/podman/root.go:115 +0xc8 main.main() /Users/runner/work/podman/podman/cmd/podman/main.go:61 +0x4b0
An error similar to the one I get on linux:
Error: invalid image filter "invalid": must be in the format "filter=value or filter!=value"
host: arch: arm64 buildahVersion: 1.36.0 cgroupControllers: - cpu - io - memory - pids cgroupManager: systemd cgroupVersion: v2 conmon: package: conmon-2.1.10-1.fc40.aarch64 path: /usr/bin/conmon version: 'conmon version 2.1.10, commit: ' cpuUtilization: idlePercent: 97.34 systemPercent: 0.89 userPercent: 1.77 cpus: 5 databaseBackend: sqlite distribution: distribution: fedora variant: coreos version: "40" eventLogger: journald freeLocks: 2043 hostname: localhost.localdomain idMappings: gidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 100000 size: 1000000 uidmap: - container_id: 0 host_id: 501 size: 1 - container_id: 1 host_id: 100000 size: 1000000 kernel: 6.8.11-300.fc40.aarch64 linkmode: dynamic logDriver: journald memFree: 1459552256 memTotal: 2044608512 networkBackend: netavark networkBackendInfo: backend: netavark dns: package: aardvark-dns-1.11.0-1.20240531102943328308.main.4.g6838c50.fc40.aarch64 path: /usr/libexec/podman/aardvark-dns version: aardvark-dns 1.12.0-dev package: netavark-1.11.0-1.20240606174759319307.main.8.gfebe31a.fc40.aarch64 path: /usr/libexec/podman/netavark version: netavark 1.12.0-dev ociRuntime: name: crun package: crun-1.15-1.20240607090105650503.main.32.gea54402.fc40.aarch64 path: /usr/bin/crun version: |- crun version UNKNOWN commit: 7cfd0aeb40e4605b6b0ee0afd9cfca80f9c5f68a rundir: /run/user/501/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL os: linux pasta: executable: /usr/bin/pasta package: passt-0^20240510.g7288448-1.fc40.aarch64 version: | pasta 0^20240510.g7288448-1.fc40.aarch64-pasta Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. remoteSocket: exists: true path: /run/user/501/podman/podman.sock rootlessNetworkCmd: pasta security: apparmorEnabled: false capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT rootless: true seccompEnabled: true seccompProfilePath: /usr/share/containers/seccomp.json selinuxEnabled: true serviceIsRemote: true slirp4netns: executable: /usr/bin/slirp4netns package: slirp4netns-1.2.2-2.fc40.aarch64 version: |- slirp4netns version 1.2.2 commit: 0ee2d87523e906518d34a6b423271e4826f71faf libslirp: 4.7.0 SLIRP_CONFIG_VERSION_MAX: 4 libseccomp: 2.5.3 swapFree: 0 swapTotal: 0 uptime: 0h 23m 51.00s variant: v8 plugins: authorization: null log: - k8s-file - none - passthrough - journald network: - bridge - macvlan - ipvlan volume: - local registries: search: - docker.io store: configFile: /var/home/core/.config/containers/storage.conf containerStore: number: 0 paused: 0 running: 0 stopped: 0 graphDriverName: overlay graphOptions: {} graphRoot: /var/home/core/.local/share/containers/storage graphRootAllocated: 106769133568 graphRootUsed: 4636852224 graphStatus: Backing Filesystem: xfs Native Overlay Diff: "true" Supports d_type: "true" Supports shifting: "false" Supports volatile: "true" Using metacopy: "false" imageCopyTmpDir: /var/tmp imageStore: number: 0 runRoot: /run/user/501/containers transientStore: false volumePath: /var/home/core/.local/share/containers/storage/volumes version: APIVersion: 5.1.1 Built: 1717459200 BuiltTime: Tue Jun 4 02:00:00 2024 GitCommit: "" GoVersion: go1.22.3 Os: linux OsArch: linux/arm64 Version: 5.1.1
### Podman in a container No ### Privileged Or Rootless None ### Upstream Latest Release Yes ### Additional environment details macOS on Apple silicon ### Additional information This happens on macos, but not on linux.
Issue Description
Using podman on macos, I mistakenly ran
podman image list -f json
instead ofpodman image list --format json
and got a crashSteps to reproduce the issue
Steps to reproduce the issue
podman image list -f json
(any invalid filter will do)Describe the results you received
Describe the results you expected
An error similar to the one I get on linux:
podman info output