-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Open
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.macosMacOS (OSX) relatedMacOS (OSX) relatedneeds-infoNeed info from reporterNeed info from reporterremoteProblem is in podman-remoteProblem is in podman-remotetriagedIssue has been triagedIssue has been triaged
Description
Issue Description
If I have an image with the tag quay.io/nivologd/httpd-24:latest
, and I use the podman tag
command to assign the exact same tag to an untagged image, the original image with that tag disappears.
Steps to reproduce the issue
- Have an image with the tag
quay.io/nivologd/httpd-24:latest
. - Have an untagged image.
- Use the
podman tag
command to assign the existing tag to the untagged image. For example:podman tag <image_id_of_untagged_image> quay.io/nivologd/httpd-24:latest
.
Describe the results you received
Both the original image and the untagged image have the tag.
Describe the results you expected
Podman prevents using the same tag for two images.
podman info output
podman info
Client:
APIVersion: 5.6.0
BuildOrigin: pkginstaller
Built: 1755272543
BuiltTime: Fri Aug 15 17:42:23 2025
GitCommit: da671ef6cfa3fc9ac6225c18f1dd0a70a951e43f
GoVersion: go1.25.0
Os: darwin
OsArch: darwin/arm64
Version: 5.6.0
host:
arch: arm64
buildahVersion: 1.41.4
cgroupControllers:
- cpuset
- cpu
- io
- memory
- pids
- rdma
- misc
- dmem
cgroupManager: systemd
cgroupVersion: v2
conmon:
package: conmon-2.1.13-1.fc42.aarch64
path: /usr/bin/conmon
version: 'conmon version 2.1.13, commit: '
cpuUtilization:
idlePercent: 99.66
systemPercent: 0.24
userPercent: 0.1
cpus: 7
databaseBackend: sqlite
distribution:
distribution: fedora
variant: coreos
version: "42"
emulatedArchitectures:
- linux/386
- linux/amd64
- linux/arm64be
eventLogger: journald
freeLocks: 2046
hostname: localhost.localdomain
idMappings:
gidmap: null
uidmap: null
kernel: 6.15.9-201.fc42.aarch64
linkmode: dynamic
logDriver: journald
memFree: 2785366016
memTotal: 3787653120
networkBackend: netavark
networkBackendInfo:
backend: netavark
dns:
package: aardvark-dns-1.16.0-1.fc42.aarch64
path: /usr/libexec/podman/aardvark-dns
version: aardvark-dns 1.16.0
package: netavark-1.16.0-1.fc42.aarch64
path: /usr/libexec/podman/netavark
version: netavark 1.16.0
ociRuntime:
name: crun
package: crun-1.23.1-1.fc42.aarch64
path: /usr/bin/crun
version: |-
crun version 1.23.1
commit: d20b23dba05e822b93b82f2f34fd5dada433e0c2
rundir: /run/crun
spec: 1.0.0
+SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL
os: linux
pasta:
executable: /usr/bin/pasta
package: passt-0^20250805.g309eefd-2.fc42.aarch64
version: |
pasta 0^20250805.g309eefd-2.fc42.aarch64-pasta
Copyright Red Hat
GNU General Public License, version 2 or later
<https://www.gnu.org/licenses/old-licenses/gpl-2.0.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
remoteSocket:
exists: true
path: unix:///run/podman/podman.sock
rootlessNetworkCmd: pasta
security:
apparmorEnabled: false
capabilities: CAP_CHOWN,CAP_DAC_OVERRIDE,CAP_FOWNER,CAP_FSETID,CAP_KILL,CAP_NET_BIND_SERVICE,CAP_SETFCAP,CAP_SETGID,CAP_SETPCAP,CAP_SETUID,CAP_SYS_CHROOT
rootless: false
seccompEnabled: true
seccompProfilePath: /usr/share/containers/seccomp.json
selinuxEnabled: true
serviceIsRemote: true
slirp4netns:
executable: /usr/bin/slirp4netns
package: slirp4netns-1.3.1-2.fc42.aarch64
version: |-
slirp4netns version 1.3.1
commit: e5e368c4f5db6ae75c2fce786e31eef9da6bf236
libslirp: 4.8.0
SLIRP_CONFIG_VERSION_MAX: 5
libseccomp: 2.5.5
swapFree: 0
swapTotal: 0
uptime: 0h 14m 40.00s
variant: v8
plugins:
authorization: null
log:
- k8s-file
- none
- passthrough
- journald
network:
- bridge
- macvlan
- ipvlan
volume:
- local
registries:
search:
- docker.io
store:
configFile: /usr/share/containers/storage.conf
containerStore:
number: 1
paused: 0
running: 0
stopped: 1
graphDriverName: overlay
graphOptions:
overlay.additionalImageStores:
- /usr/lib/containers/storage
overlay.imagestore: /usr/lib/containers/storage
overlay.mountopt: nodev,metacopy=on
graphRoot: /var/lib/containers/storage
graphRootAllocated: 99252940800
graphRootUsed: 8683622400
graphStatus:
Backing Filesystem: xfs
Native Overlay Diff: "false"
Supports d_type: "true"
Supports shifting: "true"
Supports volatile: "true"
Using metacopy: "true"
imageCopyTmpDir: /var/tmp
imageStore:
number: 5
runRoot: /run/containers/storage
transientStore: false
volumePath: /var/lib/containers/storage/volumes
version:
APIVersion: 5.6.1
BuildOrigin: 'Copr: packit/containers-podman-26994'
Built: 1756944000
BuiltTime: Thu Sep 4 02:00:00 2025
GitCommit: 1e2b2315150b2ffa0971596fb5da8cd83f3ce0e1
GoVersion: go1.24.6
Os: linux
OsArch: linux/arm64
Version: 5.6.1
Podman in a container
No
Privileged Or Rootless
None
Upstream Latest Release
Yes
Additional environment details
Additional environment details
Additional information
Additional information like issue happens only occasionally or issue happens with a particular architecture or on a particular setting
Metadata
Metadata
Assignees
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.macosMacOS (OSX) relatedMacOS (OSX) relatedneeds-infoNeed info from reporterNeed info from reporterremoteProblem is in podman-remoteProblem is in podman-remotetriagedIssue has been triagedIssue has been triaged