-
-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: avoid race condition by not running exec/start twice #702
Conversation
Codecov Report
@@ Coverage Diff @@
## master #702 +/- ##
==========================================
+ Coverage 49.27% 50.49% +1.22%
==========================================
Files 23 23
Lines 2401 2535 +134
==========================================
+ Hits 1183 1280 +97
- Misses 1090 1114 +24
- Partials 128 141 +13
Continue to review full report at Codecov.
|
@ZauberNerd - i need you to rebase this PR before it can be merged...or allow reviewers to update the branch. |
@ZauberNerd this pull request has failed checks 🛠 |
ContainerExecAttach implicitly runs ContainerExecStart while attaching to stdout/stderr. Ref: https://github.com/moby/moby/blob/e02bc91dcbf6ab70ab39352f3577a4394b0f863a/client/container_exec.go#L40 Calling both can lead to a race condition as observed in nektos#627 Fixes: nektos#627 Co-authored-by: Markus Wolf <[email protected]>
56f7fab
to
22b45e3
Compare
@ZauberNerd this pull request has (not) failed checks 🛠 👀 |
I've rebased the branch. I can't see the "Allow maintainers to edit the PR" checkbox. Maybe it doesn't work for organisation accounts? |
ContainerExecAttach implicitly runs ContainerExecStart while attaching
to stdout/stderr.
Ref: https://github.com/moby/moby/blob/e02bc91dcbf6ab70ab39352f3577a4394b0f863a/client/container_exec.go#L40
Calling both can lead to a race condition as observed in #627
Fixes: #627