Find a file
Daniel J Walsh 652a985998
podman build is not using the default oci-runtime
Currently if the user installs runc in an alternative path
podman run uses it but podman build does not.

This patch will pass the default oci runtime to be used by podman
down to the image builder.

Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
2018-12-28 12:36:25 -05:00
.copr re-add BR for golang compiler to contrib/spec/podman.spec.in 2018-10-04 09:48:22 -05:00
.github Vendor in latest containers/buildah 2018-09-18 17:20:30 -04:00
.tool Lint: Silence few given goconst lint warnings 2018-11-10 10:52:24 +01:00
cmd/podman podman build is not using the default oci-runtime 2018-12-28 12:36:25 -05:00
cni docs: fix contrib/cni broken link 2018-05-14 13:30:39 +00:00
completions/bash Allow alias for list, ls, ps to work 2018-12-23 09:38:57 -05:00
contrib Merge pull request #2023 from rhatdan/config 2018-12-22 03:11:08 -08:00
docs Allow alias for list, ls, ps to work 2018-12-23 09:38:57 -05:00
hack Add script to create CI VMs for debugging 2018-12-14 14:34:43 -05:00
libpod podman build is not using the default oci-runtime 2018-12-28 12:36:25 -05:00
logo Touch up logo links 2018-05-15 17:35:11 +00:00
pkg Fixes to handle /dev/shm correctly. 2018-12-24 09:03:53 -05:00
test Fixes to handle /dev/shm correctly. 2018-12-24 09:03:53 -05:00
utils Add container runlabel command 2018-09-28 14:14:13 -05:00
vendor Vendor in latest psgo code to fix race conditions 2018-12-21 09:07:21 -05:00
version Bump to v0.12.2-dev 2018-12-13 13:55:32 -05:00
.cirrus.yml cirrus: Use updated images including new crui 2018-12-21 16:08:21 -05:00
.gitignore Improve ps handling of container start/stop time 2018-08-08 12:37:51 +00:00
.papr.sh Fix cleanup for "Pause a bunch of running containers" 2018-11-06 19:35:22 -06:00
.papr.yml Cirrus: Migrate PAPR testing of F28 to Cirrus 2018-12-14 11:19:41 -05:00
.papr_prepare.sh Load NAT modules to fix tests involving CRIU 2018-11-23 19:09:48 +01:00
.ubuntu_prepare.sh Add ability for ubuntu to be tested 2018-10-03 12:45:37 -05:00
API.md Add Play 2018-12-19 14:20:55 -06:00
changelog.txt Bump to v0.12.1.2 2018-12-13 13:55:31 -05:00
code-of-conduct.md Initial checkin from CRI-O repo 2017-11-01 11:24:59 -04:00
commands.md Merge pull request #1928 from baude/podtokube 2018-12-07 07:46:52 -08:00
CONTRIBUTING.md [skip ci] Gate: Update docs w/ safer local command 2018-12-19 14:28:32 -05:00
crio-umount.conf Initial checkin from CRI-O repo 2017-11-01 11:24:59 -04:00
docker docker: Double quote array expansions to avoid re-splitting elements 2018-10-05 11:00:27 +02:00
Dockerfile Makefile tweaks to fix make shell 2018-12-12 14:41:49 -05:00
Dockerfile.CentOS Updated CRIO_COMMIT to pull in new conmon for CRIU 2018-11-28 08:00:37 +01:00
Dockerfile.Fedora Revert "downgrade runc due a rootless bug" 2018-11-28 21:31:27 +01:00
install.md Bump golang to v1.10 in install.md 2018-11-13 13:40:29 -05:00
libpod.conf Add support for /usr/local installation 2018-10-23 22:25:59 +02:00
LICENSE Initial commit 2017-11-01 11:01:27 -04:00
Makefile Merge pull request #1757 from kunalkushwaha/contrib-perftest 2018-12-20 06:51:01 -08:00
OWNERS Make list of approvers same as reviewers 2018-11-13 06:57:03 -05:00
README.md Change all 'can not' to 'cannot' for proper usage 2018-12-21 10:27:54 -05:00
RELEASE_NOTES.md Add release notes for 0.12.1.2 2018-12-13 13:53:00 -05:00
seccomp.json update seccomp.json 2018-11-08 14:21:00 +01:00
transfer.md Change references to cri-o to point at new repository 2018-09-07 17:47:45 +00:00
troubleshooting.md Change all 'can not' to 'cannot' for proper usage 2018-12-21 10:27:54 -05:00
Vagrantfile Enhancements to papr tests 2017-11-17 02:07:18 +00:00
vendor.conf Vendor in latest psgo code to fix race conditions 2018-12-21 09:07:21 -05:00

PODMAN logo

Library and tool for running OCI-based containers in Pods

Libpod provides a library for applications looking to use the Container Pod concept, popularized by Kubernetes. libpod also contains the podman tool, for managing Pods, Containers, and Container Images.

Overview and scope

At a high level, the scope of libpod and podman is the following:

  • Support multiple image formats including the existing Docker/OCI image formats.
  • Support for multiple means to download images including trust & image verification.
  • Container image management (managing image layers, overlay filesystems, etc).
  • Full management of container lifecycle
  • Support for pods to manage groups of containers together
  • Resource isolation of containers and pods.
  • Integration with CRI-O to share containers and backend code.

Roadmap

  1. Python frontend for Varlink API
  2. Integrate libpod into CRI-O to replace its existing container management backend
  3. Further work on the podman pod command
  4. Further improvements on rootless containers
  5. In-memory locking to replace file locks

Out of scope

  • Signing and pushing images to various image storages. See Skopeo.
  • Container Runtimes daemons for working with Kubernetes CRIs. See CRI-O.

OCI Projects Plans

The plan is to use OCI projects and best of breed libraries for different aspects:

  • Runtime: runc (or any OCI compliant runtime) and oci runtime tools to generate the spec
  • Images: Image management using containers/image
  • Storage: Container and image storage is managed by containers/storage
  • Networking: Networking support through use of CNI
  • Builds: Builds are supported via Buildah.
  • Conmon: Conmon is a tool for monitoring OCI runtimes. It is part of the CRI-O package

Podman Information for Developers

For blogs, release announcements and more, please checkout the podman.io website!

Installation notes Information on how to install Podman in your environment.

OCI Hooks Support Information on how Podman configures OCI Hooks to run when launching a container.

Podman API Documentation on the Podman API using Varlink.

Podman Commands A list of the Podman commands with links to their man pages and in many cases videos showing the commands in use.

Podman Troubleshooting Guide A list of common issues and solutions for Podman.

Podman Usage Transfer Useful information for ops and dev transfer as it relates to infrastructure that utilizes Podman. This page includes tables showing Docker commands and their Podman equivalent commands.

Tutorials Tutorials on using Podman.

Release Notes Release notes for recent Podman versions

Contributing Information about contributing to this project.

Buildah and Podman relationship

Buildah and Podman are two complementary Open-source projects that are available on most Linux platforms and both projects reside at GitHub.com with Buildah (GitHub) and Podman (GitHub). Both Buildah and Podman are command line tools that work on OCI images and containers. The two projects differentiate in their specialization.

Buildah specializes in building OCI images. Buildah's commands replicate all of the commands that are found in a Dockerfile. Buildahs goal is also to provide a lower level coreutils interface to build images, allowing people to build containers without requiring a Dockerfile. The intent with Buildah is to allow other scripting languages to build container images, without requiring a daemon.

Podman specializes in all of the commands and functions that help you to maintain and modify OCI images, such as pulling and tagging. It also allows you to create, run, and maintain those containers created from those images.

A major difference between Podman and Buildah is their concept of a container. Podman allows users to create "traditional containers" where the intent of these containers is to be long lived. While Buildah containers are really just created to allow content to be added back to the container image. An easy way to think of it is the buildah run command emulates the RUN command in a Dockerfile while the podman run command emulates the docker run command in functionality. Because of this and their underlying storage differences, you cannot see Podman containers from within Buildah or vice versa.

In short Buildah is an efficient way to create OCI images while Podman allows you to manage and maintain those images and containers in a production environment using familiar container cli commands. For more details, see the Container Tools Guide.