Find a file
Matthew Heon 83db80ce17 Only remove image volumes when removing containers
When removing volumes with rm --volumes we want to only remove
volumes that were created with the container. Volumes created
separately via 'podman volume create' should not be removed.

Also ensure that --rm implies volumes will be removed.

Fixes #2441

Signed-off-by: Matthew Heon <matthew.heon@pm.me>
2019-02-26 12:16:58 -05:00
.copr re-add BR for golang compiler to contrib/spec/podman.spec.in 2018-10-04 09:48:22 -05:00
.github issue template: run podman info --debug 2019-02-25 11:57:02 +01:00
.tool Lint: Silence few given goconst lint warnings 2018-11-10 10:52:24 +01:00
cmd/podman Only remove image volumes when removing containers 2019-02-26 12:16:58 -05:00
cni docs: fix contrib/cni broken link 2018-05-14 13:30:39 +00:00
completions/bash Merge pull request #2320 from QiWang19/stdinPW 2019-02-14 22:31:58 +01:00
contrib Fix up handling of user defined network namespaces 2019-02-23 05:47:27 -05:00
docs Add volume path to default libpod.conf (and manpage) 2019-02-26 09:38:02 -05:00
hack hack/tree_status.sh: preserve new lines 2019-02-20 13:35:52 +01:00
libpod Only remove image volumes when removing containers 2019-02-26 12:16:58 -05:00
logo Touch up logo links 2018-05-15 17:35:11 +00:00
pkg podman-remote pod pause|unpause|restart 2019-02-25 16:14:06 -06:00
test Merge pull request #2358 from rhatdan/namespace 2019-02-25 21:31:50 +01:00
utils podman-remote save [image] 2019-02-20 12:58:05 -06:00
vendor vendor containers/image v1.5 2019-02-26 15:55:20 +01:00
version enable podman-remote version 2019-01-21 15:23:30 -06:00
.cirrus.yml Cirrus: Install Go 1.11 on Ubuntu VMs 2019-02-22 12:07:36 -05:00
.gitignore pod infra container is started before a container in a pod is run, started, or attached. 2019-02-15 16:39:24 -05:00
.papr.sh Run integrations test with remote-client 2019-01-14 14:51:32 -06:00
.papr.yml Cirrus: Migrate PAPR testing of F28 to Cirrus 2018-12-14 11:19:41 -05:00
.papr_prepare.sh Move python code from contrib to it's own repo python-podman 2019-01-10 11:27:50 -07:00
.ubuntu_prepare.sh Add ability for ubuntu to be tested 2018-10-03 12:45:37 -05:00
API.md Merge pull request #2404 from baude/remoteerrors 2019-02-23 22:10:03 +01:00
changelog.txt Update master branch with v1.0 changes from 1.0 branch 2019-01-14 10:18:09 -05:00
code-of-conduct.md Initial checkin from CRI-O repo 2017-11-01 11:24:59 -04:00
commands.md Merge pull request #2151 from QiWang19/cp 2019-02-14 22:31:52 +01:00
CONTRIBUTING.md Introduce how to start to hack on libpod. 2019-02-22 17:12:18 +01:00
crio-umount.conf Initial checkin from CRI-O repo 2017-11-01 11:24:59 -04:00
docker docker: Double quote array expansions to avoid re-splitting elements 2018-10-05 11:00:27 +02:00
Dockerfile Reduce Dockerfile based build time for libpod. 2019-02-01 11:36:52 +09:00
Dockerfile.CentOS Move python code from contrib to it's own repo python-podman 2019-01-10 11:27:50 -07:00
Dockerfile.Fedora Move python code from contrib to it's own repo python-podman 2019-01-10 11:27:50 -07:00
install.md install.md: add section about vendoring 2019-02-07 13:47:42 +01:00
libpod.conf Add volume path to default libpod.conf (and manpage) 2019-02-26 09:38:02 -05:00
LICENSE Initial commit 2017-11-01 11:01:27 -04:00
Makefile build varlink without GOPATH 2019-02-13 12:25:08 -06:00
OWNERS Make list of approvers same as reviewers 2018-11-13 06:57:03 -05:00
README.md README: refine "Out of scope" section 2019-02-26 15:02:40 +01:00
RELEASE_NOTES.md Update master branch with v1.0 changes from 1.0 branch 2019-01-14 10:18:09 -05:00
seccomp.json update seccomp.json 2018-11-08 14:21:00 +01:00
transfer.md 'podman cp' copy between host and container 2019-02-14 09:29:53 -05:00
troubleshooting.md Add troubleshooting information about running a rootless containers. 2019-02-10 08:08:22 -07:00
Vagrantfile Enhancements to papr tests 2017-11-17 02:07:18 +00:00
vendor.conf vendor containers/image v1.5 2019-02-26 15:55:20 +01:00

PODMAN logo

Library and tool for running OCI-based containers in Pods

Libpod provides a library for applications looking to use the Container Pod concept, popularized by Kubernetes. Libpod also contains the Pod Manager tool (Podman). Podman manages pods, containers, container images, and container volumes.

Overview and scope

At a high level, the scope of libpod and podman is the following:

  • Support multiple image formats including the existing Docker/OCI image formats.
  • Support for multiple means to download images including trust & image verification.
  • Container image management (managing image layers, overlay filesystems, etc).
  • Full management of container lifecycle
  • Support for pods to manage groups of containers together
  • Resource isolation of containers and pods.
  • Integration with CRI-O to share containers and backend code.

This project tests all builds against each supported version of Fedora, the latest released version of Red Hat Enterprise Linux, and the latest Ubuntu Long Term Support release. The community has also reported success with other Linux flavors.

Roadmap

  1. Allow the Podman CLI to use a Varlink backend to connect to remote Podman instances
  2. Integrate libpod into CRI-O to replace its existing container management backend
  3. Further work on the podman pod command
  4. Further improvements on rootless containers

Out of scope

  • Specializing in signing and pushing images to various storage backends. See Skopeo for those tasks.
  • Container runtimes daemons for working with the Kubernetes CRI interface. CRI-O specializes in that.
  • Supporting docker-compose. We believe that Kubernetes is the defacto standard for composing Pods and for orchestrating containers, making Kubernetes YAML a defacto standard file format. Hence, Podman allows the creation and execution of Pods from a Kubernetes YAML file (see podman-play-kube). Podman can also generate Kubernetes YAML based on a container or Pod (see podman-generate-kube), which allows for an easy transition from a local development environment to a production Kubernetes cluster.

OCI Projects Plans

The plan is to use OCI projects and best of breed libraries for different aspects:

  • Runtime: runc (or any OCI compliant runtime) and OCI runtime tools to generate the spec
  • Images: Image management using containers/image
  • Storage: Container and image storage is managed by containers/storage
  • Networking: Networking support through use of CNI
  • Builds: Builds are supported via Buildah.
  • Conmon: Conmon is a tool for monitoring OCI runtimes. It is part of the CRI-O package

Podman Information for Developers

For blogs, release announcements and more, please checkout the podman.io website!

Installation notes Information on how to install Podman in your environment.

OCI Hooks Support Information on how Podman configures OCI Hooks to run when launching a container.

Podman API Documentation on the Podman API using Varlink.

Podman Commands A list of the Podman commands with links to their man pages and in many cases videos showing the commands in use.

Podman Troubleshooting Guide A list of common issues and solutions for Podman.

Podman Usage Transfer Useful information for ops and dev transfer as it relates to infrastructure that utilizes Podman. This page includes tables showing Docker commands and their Podman equivalent commands.

Tutorials Tutorials on using Podman.

Release Notes Release notes for recent Podman versions

Contributing Information about contributing to this project.

Buildah and Podman relationship

Buildah and Podman are two complementary open-source projects that are available on most Linux platforms and both projects reside at GitHub.com with Buildah here and Podman here. Both, Buildah and Podman are command line tools that work on Open Container Initiative (OCI) images and containers. The two projects differentiate in their specialization.

Buildah specializes in building OCI images. Buildah's commands replicate all of the commands that are found in a Dockerfile. This allows building images with and without Dockerfiles while not requiring any root privileges. Buildahs ultimate goal is to provide a lower-level coreutils interface to build images. The flexibility of building images without Dockerfiles allows for the integration of other scripting languages into the build process. Buildah follows a simple fork-exec model and does not run as a daemon but it is based on a comprehensive API in golang, which can be vendored into other tools.

Podman specializes in all of the commands and functions that help you to maintain and modify OCI images, such as pulling and tagging. It also allows you to create, run, and maintain those containers created from those images.

A major difference between Podman and Buildah is their concept of a container. Podman allows users to create "traditional containers" where the intent of these containers is to be long lived. While Buildah containers are really just created to allow content to be added back to the container image. An easy way to think of it is the buildah run command emulates the RUN command in a Dockerfile while the podman run command emulates the docker run command in functionality. Because of this and their underlying storage differences, you can not see Podman containers from within Buildah or vice versa.

In short, Buildah is an efficient way to create OCI images while Podman allows you to manage and maintain those images and containers in a production environment using familiar container cli commands. For more details, see the Container Tools Guide.