-
Story
-
Resolution: Done
-
Undefined
-
None
-
None
-
5
-
False
-
-
False
-
rhel-container-tools
-
-
-
RUN 269, RUN 270, RUN 271, RUN 272, RUN 273
[2958474355] Upstream Reporter: Salynn
Upstream issue status: Closed
Upstream description:
Issue Description
When an image has multiple names (tags), running podman image <name> for one of the names results in all names being listed. The man page for podman-images says
List images that contain a substring in their name: podman images "image|image" which seems to imply that only images whose name matches the provided argument should be listed, not other names with the same id.
This is semi-problematic when scripting or asking for json output. The json output will be perfectly duplicated.
Steps to reproduce the issue
Steps to reproduce the issue
- echo "FROM fedora:41" > Containerfile
- podman build -t example
- podman images example
- podman images example --format json
Describe the results you received
Both localhost/example:latest and registry.fedoraproject.org/fedora:41 are listed for podman images example. An array of two identical items is returned for podman images example --format json.
Describe the results you expected
Only localhost/example:latest is listed for podman images example. An array of one item is returned for podman images example --format json.
podman info output
Client: APIVersion: 5.4.1 BuildOrigin: brew Built: 1741713733 BuiltTime: Tue Mar 11 10:22:13 2025 GitCommit: "" GoVersion: go1.24.1 Os: darwin OsArch: darwin/amd64 Version: 5.4.1 host: arch: amd64 buildahVersion: 1.39.2 cgroupControllers: - cpu - io - memory - pids cgroupManager: systemd cgroupVersion: v2 conmon: package: conmon-2.1.12-3.fc41.x86_64 path: /usr/bin/conmon version: 'conmon version 2.1.12, commit: ' cpuUtilization: idlePercent: 98.74 systemPercent: 0.94 userPercent: 0.32 cpus: 16 databaseBackend: sqlite distribution: distribution: fedora variant: coreos version: "41" eventLogger: journald freeLocks: 2045 hostname: localhost.localdomain idMappings: gidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 100000 size: 1000000 uidmap: - container_id: 0 host_id: 501 size: 1 - container_id: 1 host_id: 100000 size: 1000000 kernel: 6.12.13-200.fc41.x86_64 linkmode: dynamic logDriver: journald memFree: 506904576 memTotal: 3098738688 networkBackend: netavark networkBackendInfo: backend: netavark dns: package: aardvark-dns-1.14.0-1.fc41.x86_64 path: /usr/libexec/podman/aardvark-dns version: aardvark-dns 1.14.0 package: netavark-1.14.0-1.fc41.x86_64 path: /usr/libexec/podman/netavark version: netavark 1.14.0 ociRuntime: name: crun package: crun-1.20-2.fc41.x86_64 path: /usr/bin/crun version: |- crun version 1.20 commit: 9c9a76ac11994701dd666c4f0b869ceffb599a66 rundir: /run/user/501/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL os: linux pasta: executable: /usr/bin/pasta package: passt-0^20250121.g4f2c8e7-2.fc41.x86_64 version: | pasta 0^20250121.g4f2c8e7-2.fc41.x86_64 Copyright Red Hat GNU General Public License, version 2 or later <https://www.gnu.org/licenses/old-licenses/gpl-2.0.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. remoteSocket: exists: true path: unix:///run/user/501/podman/podman.sock rootlessNetworkCmd: pasta security: apparmorEnabled: false capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT rootless: true seccompEnabled: true seccompProfilePath: /usr/share/containers/seccomp.json selinuxEnabled: true serviceIsRemote: true slirp4netns: executable: /usr/bin/slirp4netns package: slirp4netns-1.3.1-1.fc41.x86_64 version: |- slirp4netns version 1.3.1 commit: e5e368c4f5db6ae75c2fce786e31eef9da6bf236 libslirp: 4.8.0 SLIRP_CONFIG_VERSION_MAX: 5 libseccomp: 2.5.5 swapFree: 0 swapTotal: 0 uptime: 30h 40m 5.00s (Approximately 1.25 days) variant: "" plugins: authorization: null log: - k8s-file - none - passthrough - journald network: - bridge - macvlan - ipvlan volume: - local registries: search: - docker.io store: configFile: /var/home/core/.config/containers/storage.conf containerStore: number: 2 paused: 0 running: 2 stopped: 0 graphDriverName: overlay graphOptions: {} graphRoot: /var/home/core/.local/share/containers/storage graphRootAllocated: 106521055232 graphRootUsed: 7752204288 graphStatus: Backing Filesystem: xfs Native Overlay Diff: "true" Supports d_type: "true" Supports shifting: "false" Supports volatile: "true" Using metacopy: "false" imageCopyTmpDir: /var/tmp imageStore: number: 9 runRoot: /run/user/501/containers transientStore: false volumePath: /var/home/core/.local/share/containers/storage/volumes version: APIVersion: 5.4.1 BuildOrigin: Fedora Project Built: 1741651200 BuiltTime: Tue Mar 11 00:00:00 2025 GitCommit: b79bc8afe796cba51dd906270a7e1056ccdfcf9e GoVersion: go1.23.7 Os: linux OsArch: linux/amd64 Version: 5.4.1Podman in a container
No
Privileged Or Rootless
Rootless
Upstream Latest Release
Yes
Additional environment details
podman is running builds inside a podman-machine on macOS (Darwin macbookpro.lan 24.3.0 Darwin Kernel Version 24.3.0: Thu Jan 2 20:22:00 PST 2025; root:xnu-11215.81.4~3/RELEASE_X86_64 x86_64). Podman Desktop also installed, but the machine was created via podman-machine in the cli.
Additional information
No response
Upstream URL: https://github.com/containers/podman/issues/25725
- links to