2018-05-15 14:51:56 +00:00
![PODMAN logo ](logo/podman-logo-source.svg )
2017-11-01 19:30:09 +00:00
2020-07-20 14:56:12 +00:00
# Podman: A tool for managing OCI containers and pods
2017-11-01 19:30:09 +00:00
2020-07-20 14:56:12 +00:00
Podman (the POD MANager) is a tool for managing containers and images, volumes mounted into those containers, and pods made from groups of containers.
Podman is based on libpod, a library for container lifecycle management that is also contained in this repository. The libpod library provides APIs for managing containers, pods, container images, and volumes.
2018-11-14 15:15:14 +00:00
2022-02-17 20:14:27 +00:00
* [Latest Version: 4.0.0 ](https://github.com/containers/podman/releases/latest )
2020-05-19 12:51:26 +00:00
* Latest Remote client for Windows
2021-07-03 07:00:47 +00:00
* Latest Remote client for macOS
2020-05-19 12:51:26 +00:00
* Latest Static Remote client for Linux
2020-10-30 14:32:17 +00:00
* Continuous Integration: [![Build Status ](https://api.cirrus-ci.com/github/containers/podman.svg )](https://cirrus-ci.com/github/containers/podman/master)
2020-07-28 12:23:45 +00:00
* [GoDoc: ![GoDoc ](https://godoc.org/github.com/containers/podman/libpod?status.svg )](https://godoc.org/github.com/containers/podman/libpod)
2017-11-01 19:30:09 +00:00
2018-12-11 17:55:19 +00:00
## Overview and scope
2017-11-01 19:30:09 +00:00
2020-07-20 14:56:12 +00:00
At a high level, the scope of Podman and libpod is the following:
2017-11-01 19:30:09 +00:00
2020-07-20 14:56:12 +00:00
* Support for multiple container image formats, including OCI and Docker images.
* Full management of those images, including pulling from various sources (including trust and verification), creating (built via Containerfile or Dockerfile or committed from a container), and pushing to registries and other storage backends.
* Full management of container lifecycle, including creation (both from an image and from an exploded root filesystem), running, checkpointing and restoring (via CRIU), and removal.
2022-02-17 20:14:27 +00:00
* Full management of container networking, using CNI, Netavark, and slirp4netns
2020-07-20 14:56:12 +00:00
* Support for pods, groups of containers that share resources and are managed together.
2020-08-28 15:18:10 +00:00
* Support for running containers and pods without root or other elevated privileges.
2018-05-11 14:37:35 +00:00
* Resource isolation of containers and pods.
2020-07-20 14:56:12 +00:00
* Support for a Docker-compatible CLI interface.
2020-08-28 15:18:10 +00:00
* No manager daemon, for improved security and lower resource utilization at idle.
2020-05-07 17:27:21 +00:00
* Support for a REST API providing both a Docker-compatible interface and an improved interface exposing advanced Podman functionality.
2017-11-01 19:30:09 +00:00
2021-07-03 07:00:47 +00:00
Podman presently only supports running containers on Linux. However, we are building a remote client which can run on Windows and macOS and manage Podman containers on a Linux system via the REST API using SSH tunneling.
2019-01-29 22:35:23 +00:00
2018-12-11 17:55:19 +00:00
## Roadmap
2017-11-01 19:30:09 +00:00
2020-07-20 14:56:12 +00:00
1. Further improvements to the REST API, with a focus on bugfixes and implementing missing functionality
1. Improvements on rootless containers, with a focus on improving the user experience and exposing presently-unavailable features when possible
2022-02-17 20:14:27 +00:00
1. Improvements to Pods, including the addition of pod-level resource limits
2018-12-11 17:55:19 +00:00
2019-09-16 13:48:12 +00:00
## Communications
2020-12-21 22:48:43 +00:00
If you think you've identified a security issue in the project, please *DO NOT* report the issue publicly via the GitHub issue tracker, mailing list, or IRC.
2019-09-26 17:01:56 +00:00
Instead, send an email with as many details as possible to `security@lists.podman.io` . This is a private mailing list for the core maintainers.
2021-10-04 19:27:54 +00:00
For general questions and discussion, please use Podman's
[channels ](https://podman.io/community/#slack-irc-matrix-and-discord ).
2019-09-16 13:48:12 +00:00
For discussions around issues/bugs and features, you can use the GitHub
2020-07-28 12:23:45 +00:00
[issues ](https://github.com/containers/podman/issues )
2019-09-16 13:48:12 +00:00
and
2020-07-28 12:23:45 +00:00
[PRs ](https://github.com/containers/podman/pulls )
2019-09-16 13:48:12 +00:00
tracking system.
There is also a [mailing list ](https://lists.podman.io/archives/ ) at `lists.podman.io` .
2020-03-31 19:02:39 +00:00
You can subscribe by sending a message to `podman-join@lists.podman.io` with the subject `subscribe` .
2019-09-16 13:48:12 +00:00
2019-04-29 16:56:33 +00:00
## Rootless
Podman can be easily run as a normal user, without requiring a setuid binary.
When run without root, Podman containers use user namespaces to set root in the container to the user running Podman.
Rootless Podman runs locked-down containers with no privileges that the user running the container does not have.
Some of these restrictions can be lifted (via `--privileged` , for example), but rootless containers will never have more privileges than the user that launched them.
If you run Podman as your user and mount in `/etc/passwd` from the host, you still won't be able to change it, since your user doesn't have permission to do so.
2022-01-15 19:56:12 +00:00
Almost all normal Podman functionality is available, though there are some [shortcomings ](https://github.com/containers/podman/blob/main/rootless.md ).
Any recent Podman release should be able to run rootless without any additional configuration, though your operating system may require some additional configuration detailed in the [install guide ](https://github.com/containers/podman/blob/main/install.md ).
2019-03-31 14:49:21 +00:00
2022-01-15 19:56:12 +00:00
A little configuration by an administrator is required before rootless Podman can be used, the necessary setup is documented [here ](https://github.com/containers/podman/blob/main/docs/tutorials/rootless_tutorial.md ).
2019-07-01 18:35:13 +00:00
2018-12-11 17:55:19 +00:00
## Out of scope
2020-07-20 14:56:12 +00:00
* Specialized signing and pushing of images to various storage backends.
2019-02-25 14:08:02 +00:00
See [Skopeo ](https://github.com/containers/skopeo/ ) for those tasks.
2020-07-20 14:56:12 +00:00
* Support for the Kubernetes CRI interface for container management.
The [CRI-O ](https://github.com/cri-o/cri-o ) daemon specializes in that.
2017-11-01 19:30:09 +00:00
2018-01-18 20:37:42 +00:00
## OCI Projects Plans
2022-02-17 20:14:27 +00:00
Podman uses OCI projects and best of breed libraries for different aspects:
2020-07-13 20:22:24 +00:00
- Runtime: We use the [OCI runtime tools ](https://github.com/opencontainers/runtime-tools ) to generate OCI runtime configurations that can be used with any OCI-compliant runtime, like [crun ](https://github.com/containers/crun/ ) and [runc ](https://github.com/opencontainers/runc/ ).
- Images: Image management uses the [containers/image ](https://github.com/containers/image ) library.
- Storage: Container and image storage is managed by [containers/storage ](https://github.com/containers/storage ).
2022-02-17 20:14:27 +00:00
- Networking: Networking support through use of [Netavark ](https://github.com/containers/netavark ) and [Aardvark ](https://github.com/containers/aardvark-dns ). Support for [CNI ](https://github.com/containernetworking/cni ) is also available. Rootless networking is handled via [slirp4netns ](https://github.com/rootless-containers/slirp4netns ).
2018-09-18 19:31:54 +00:00
- Builds: Builds are supported via [Buildah ](https://github.com/containers/buildah ).
2020-07-13 20:22:24 +00:00
- Conmon: [Conmon ](https://github.com/containers/conmon ) is a tool for monitoring OCI runtimes, used by both Podman and CRI-O.
2022-02-17 20:14:27 +00:00
- Seccomp: A unified [Seccomp ](https://github.com/containers/common/blob/main/pkg/seccomp/seccomp.json ) policy for Podman, Buildah, and CRI-O.
2017-11-01 19:30:09 +00:00
2018-01-16 00:26:42 +00:00
## Podman Information for Developers
2018-09-29 17:04:16 +00:00
For blogs, release announcements and more, please checkout the [podman.io ](https://podman.io ) website!
2018-05-17 15:18:01 +00:00
**[Installation notes](install.md)**
2018-01-16 00:26:42 +00:00
Information on how to install Podman in your environment.
pkg/hooks: Version the hook structure and add 1.0.0 hooks
This shifts the matching logic out of libpod/container_internal and
into the hook package, where we can reuse it after vendoring into
CRI-O. It also adds unit tests with almost-complete coverage. Now
libpod is even more isolated from the hook internals, which makes it
fairly straightforward to bump the hook config file to 1.0.0. I've
dubbed the old format 0.1.0, although it doesn't specify an explicit
version. Motivation for some of my changes with 1.0.0:
* Add an explicit version field. This will make any future JSON
structure migrations more straightforward by avoiding the need for
version-guessing heuristics.
* Collect the matching properties in a new When sub-structure. This
makes the root Hook structure easier to understand, because you
don't have to read over all the matching properties when wrapping
your head around Hook.
* Replace the old 'hook' and 'arguments' with a direct embedding of
the runtime-spec's hook structure. This provides access to
additional upstream properties (args[0], env, and timeout) and
avoids the complication of a CRI-O-specific analog structure.
* Add a 'when.always' property. You can usually accomplish this
effect in another way (e.g. when.commands = [".*"]), but having a
boolean explicitly for this use-case makes for easier reading and
writing.
* Replace the previous annotations array with an annotations map. The
0.1.0 approach matched only the values regardless of key, and that
seems unreliable.
* Replace 'cmds' with 'when.commands', because while there are a few
ways to abbreviate "commands", there's only one way to write it out
in full ;). This gives folks one less thing to remember when
writing hook JSON.
* Replace the old "inject if any specified condition matches" with
"inject if all specified conditions match". This allows for more
precise targeting. Users that need more generous targeting can
recover the previous behavior by creating a separate 1.0.0 hook file
for each specified 0.1.0 condition.
I've added doc-compat support for the various pluralizations of the
0.1.0 properties. Previously, the docs and code were not in
agreement. More on this particular facet in [1].
I've updated the docs to point out that the annotations being matched
are the OCI config annotations. This differs from CRI-O, where the
annotations used are the Kubernetes-supplied annotations [2,3]. For
example, io.kubernetes.cri-o.Volumes [4] is part of CRI-O's runtime
config annotations [5], but not part of the Kubernetes-supplied
annotations CRI-O uses for matching hooks.
The Monitor method supports the CRI-O use-case [6]. podman doesn't
need it directly, but CRI-O will need it when we vendor this package
there.
I've used nvidia-container-runtime-hook for the annotation examples
because Dan mentioned the Nvidia folks as the motivation behind
annotation matching. The environment variables are documented in [7].
The 0.1.0 hook config, which does not allow for environment variables,
only works because runc currently leaks the host environment into the
hooks [8]. I haven't been able to find documentation for their usual
annotation trigger or hook-install path, so I'm just guessing there.
[1]: https://github.com/kubernetes-incubator/cri-o/pull/1235
[2]: https://github.com/kubernetes-incubator/cri-o/blob/v1.10.0/server/container_create.go#L760
[3]: https://github.com/kubernetes-incubator/cri-o/blob/v1.10.0/server/container_create.go#L772
[4]: https://github.com/kubernetes-incubator/cri-o/blob/v1.10.0/pkg/annotations/annotations.go#L97-L98
[5]: https://github.com/kubernetes-incubator/cri-o/blob/v1.10.0/server/container_create.go#L830-L834
[6]: https://github.com/kubernetes-incubator/cri-o/pull/1345/
[7]: https://github.com/NVIDIA/nvidia-container-runtime/tree/v1.3.0-1#environment-variables-oci-spec
[8]: https://github.com/opencontainers/runc/pull/1738
Signed-off-by: W. Trevor King <wking@tremily.us>
Closes: #686
Approved by: mheon
2018-04-27 17:35:32 +00:00
**[OCI Hooks Support](pkg/hooks/README.md)**
Information on how Podman configures [OCI Hooks][spec-hooks] to run when launching a container.
2018-01-16 00:26:42 +00:00
2021-08-26 17:15:23 +00:00
**[Podman API](https://docs.podman.io/en/latest/_static/api.html)**
2020-10-12 15:14:05 +00:00
Documentation on the Podman REST API.
2018-05-17 15:18:01 +00:00
2019-11-01 01:06:56 +00:00
**[Podman Commands](https://podman.readthedocs.io/en/latest/Commands.html)**
2018-01-18 20:37:42 +00:00
A list of the Podman commands with links to their man pages and in many cases videos
showing the commands in use.
2018-01-16 00:26:42 +00:00
2018-05-17 15:18:01 +00:00
**[Podman Troubleshooting Guide](troubleshooting.md)**
A list of common issues and solutions for Podman.
**[Podman Usage Transfer](transfer.md)**
2018-01-18 20:37:42 +00:00
Useful information for ops and dev transfer as it relates to infrastructure that utilizes Podman. This page
includes tables showing Docker commands and their Podman equivalent commands.
2018-01-16 00:26:42 +00:00
2018-02-15 12:31:46 +00:00
**[Tutorials](docs/tutorials)**
2018-05-11 14:37:35 +00:00
Tutorials on using Podman.
2018-01-16 00:26:42 +00:00
2022-01-15 19:56:12 +00:00
**[Remote Client](https://github.com/containers/podman/blob/main/docs/tutorials/remote_client.md)**
2019-02-25 15:48:24 +00:00
A brief how-to on using the Podman remote-client.
2022-01-15 19:56:12 +00:00
**[Basic Setup and Use of Podman in a Rootless environment](https://github.com/containers/podman/blob/main/docs/tutorials/rootless_tutorial.md)**
2019-07-01 18:35:13 +00:00
A tutorial showing the setup and configuration necessary to run Rootless Podman.
2018-08-24 21:08:53 +00:00
**[Release Notes](RELEASE_NOTES.md)**
2020-09-27 20:48:56 +00:00
Release notes for recent Podman versions.
2018-08-24 21:08:53 +00:00
2018-04-27 18:58:18 +00:00
**[Contributing](CONTRIBUTING.md)**
Information about contributing to this project.
2017-11-01 19:30:09 +00:00
2020-11-06 00:34:01 +00:00
[spec-hooks]: https://github.com/opencontainers/runtime-spec/blob/v1.0.2/config.md#posix-platform-hooks
2018-09-13 23:08:43 +00:00
## Buildah and Podman relationship
2019-02-25 10:38:23 +00:00
Buildah and Podman are two complementary open-source projects that are
available on most Linux platforms and both projects reside at
[GitHub.com ](https://github.com ) with Buildah
[here ](https://github.com/containers/buildah ) and Podman
2020-07-28 12:23:45 +00:00
[here ](https://github.com/containers/podman ). Both, Buildah and Podman are
2019-02-25 10:38:23 +00:00
command line tools that work on Open Container Initiative (OCI) images and
containers. The two projects differentiate in their specialization.
2018-09-13 23:08:43 +00:00
Buildah specializes in building OCI images. Buildah's commands replicate all
2019-02-25 10:38:23 +00:00
of the commands that are found in a Dockerfile. This allows building images
with and without Dockerfiles while not requiring any root privileges.
Buildah’ s ultimate goal is to provide a lower-level coreutils interface to
build images. The flexibility of building images without Dockerfiles allows
for the integration of other scripting languages into the build process.
Buildah follows a simple fork-exec model and does not run as a daemon
but it is based on a comprehensive API in golang, which can be vendored
into other tools.
2018-09-13 23:08:43 +00:00
Podman specializes in all of the commands and functions that help you to maintain and modify
OCI images, such as pulling and tagging. It also allows you to create, run, and maintain those containers
2019-08-20 13:33:10 +00:00
created from those images. For building container images via Dockerfiles, Podman uses Buildah's
golang API and can be installed independently from Buildah.
2018-09-13 23:08:43 +00:00
A major difference between Podman and Buildah is their concept of a container. Podman
allows users to create "traditional containers" where the intent of these containers is
to be long lived. While Buildah containers are really just created to allow content
2019-02-25 10:38:23 +00:00
to be added back to the container image. An easy way to think of it is the
2018-09-13 23:08:43 +00:00
`buildah run` command emulates the RUN command in a Dockerfile while the `podman run`
command emulates the `docker run` command in functionality. Because of this and their underlying
2019-02-25 10:38:23 +00:00
storage differences, you can not see Podman containers from within Buildah or vice versa.
2018-09-13 23:08:43 +00:00
2019-02-25 10:38:23 +00:00
In short, Buildah is an efficient way to create OCI images while Podman allows
2018-09-13 23:08:43 +00:00
you to manage and maintain those images and containers in a production environment using
2018-09-14 14:58:52 +00:00
familiar container cli commands. For more details, see the
2018-09-18 19:31:54 +00:00
[Container Tools Guide ](https://github.com/containers/buildah/tree/master/docs/containertools ).
2020-05-07 17:27:21 +00:00
2020-11-18 21:12:33 +00:00
## Podman Former API (Varlink)
2020-12-25 17:10:13 +00:00
Podman formerly offered a Varlink-based API for remote management of containers. However, this API
was replaced by the REST API. Varlink support has been removed as of the 3.0 release.
2020-05-07 17:27:21 +00:00
For more details, you can see [this blog ](https://podman.io/blogs/2020/01/17/podman-new-api.html ).