From 7e9a7f0dafeadf9c1392571cadedc9f010214181 Mon Sep 17 00:00:00 2001 From: Daniel J Walsh Date: Tue, 8 Feb 2022 15:38:37 -0500 Subject: [PATCH] update config files Signed-off-by: Daniel J Walsh --- Containerfile.5.md | 6 +++--- containerignore.5.md | 2 +- containers.conf | 14 ++++++++------ containers.conf.5.md | 45 ++++++++++++++++++++++++-------------------- shortnames.conf | 30 +++++++++++++++++++++++++++++ 5 files changed, 67 insertions(+), 30 deletions(-) diff --git a/Containerfile.5.md b/Containerfile.5.md index 842d25d..141e99d 100644 --- a/Containerfile.5.md +++ b/Containerfile.5.md @@ -159,7 +159,7 @@ Container engines pass secret the secret file into the build using the `--secret **--mount**=*type=secret,TYPE-SPECIFIC-OPTION[,...]* -- `id` is the identifier to for the secret passed into the `buildah bud --secret` or `podman build --secret`. This identifier is associated with the RUN --mount identifier to use in the Containerfile. +- `id` is the identifier for the secret passed into the `buildah bud --secret` or `podman build --secret`. This identifier is associated with the RUN --mount identifier to use in the Containerfile. - `dst`|`target`|`destination` rename the secret file to a specific file in the Containerfile RUN command to use. @@ -190,7 +190,7 @@ The secret needs to be passed to the build using the --secret flag. The final im it possible to **RUN** commands using a base image that does not contain `/bin/sh`. Note that the exec form is parsed as a JSON array, which means that you must - use double-quotes (") around words not single-quotes ('). + use double-quotes (") around words, not single-quotes ('). **CMD** -- **CMD** has three forms: @@ -216,7 +216,7 @@ The secret needs to be passed to the build using the --secret flag. The final im If you use the shell form of the **CMD**, the `` executes in `/bin/sh -c`: Note that the exec form is parsed as a JSON array, which means that you must - use double-quotes (") around words not single-quotes ('). + use double-quotes (") around words, not single-quotes ('). ``` FROM ubuntu diff --git a/containerignore.5.md b/containerignore.5.md index a3edc0c..b26ef11 100644 --- a/containerignore.5.md +++ b/containerignore.5.md @@ -6,7 +6,7 @@ # INTRODUCTION -Before container engines build image, they look for a file named .containerignore or .dockerignore in the root +Before container engines build an image, they look for a file named .containerignore or .dockerignore in the root context directory. If one of these file exists, the CLI modifies the context to exclude files and directories that match patterns specified in the file. This avoids adding them to images using the ADD or COPY instruction. diff --git a/containers.conf b/containers.conf index 1470e07..084088c 100644 --- a/containers.conf +++ b/containers.conf @@ -399,14 +399,16 @@ log_driver = "journald" # Infra (pause) container image name for pod infra containers. When running a # pod, we start a `pause` process in a container to hold open the namespaces # associated with the pod. This container does nothing other then sleep, -# reserving the pods resources for the lifetime of the pod. +# reserving the pods resources for the lifetime of the pod. By default container +# engines run a builtin container using the pause executable. If you want override +# specify an image to pull. # -#infra_image = "k8s.gcr.io/pause:3.4.1" +#infra_image = "" # Specify the locking mechanism to use; valid values are "shm" and "file". # Change the default only if you are sure of what you are doing, in general # "file" is useful only on platforms where cgo is not available for using the -# faster "shm" lock type. You may need to run "podman system renumber" after +# faster "shm" lock type. You may need to run "podman system renumber" after # you change the lock type. # #lock_type** = "shm" @@ -465,7 +467,7 @@ log_driver = "journald" # #runtime = "crun" -# List of the OCI runtimes that support --format=json. When json is supported +# List of the OCI runtimes that support --format=json. When json is supported # engine will use it for reporting nicer errors. # #runtime_supports_json = ["crun", "runc", "kata", "runsc", "krun"] @@ -478,8 +480,8 @@ log_driver = "journald" # #runtime_supports_nocgroups = ["crun", "krun"] -# Default location for storing temporary container image content. Can be overridden with the TMPDIR environment -# variable. If you specify "storage", then the location of the +# Default location for storing temporary container image content. Can be overridden with the TMPDIR environment +# variable. If you specify "storage", then the location of the # container/storage tmp directory will be used. # image_copy_tmp_dir="/var/tmp" diff --git a/containers.conf.5.md b/containers.conf.5.md index 7855ce0..7c0d274 100644 --- a/containers.conf.5.md +++ b/containers.conf.5.md @@ -11,7 +11,7 @@ a TOML format that can be easily modified and versioned. Container engines read the /usr/share/containers/containers.conf and /etc/containers/containers.conf, and /etc/containers/containers.conf.d/*.conf files -if they exist. When running in rootless mode, they also read +if they exist. When running in rootless mode, they also read $HOME/.config/containers/containers.conf and $HOME/.config/containers/containers.conf.d/*.conf files. @@ -159,7 +159,7 @@ Run an init inside the container that forwards signals and reaps processes. **init_path**="/usr/libexec/podman/catatonit" Path to the container-init binary, which forwards signals and reaps processes -within containers. Note that the container-init binary will only be used when +within containers. Note that the container-init binary will only be used when the `--init` for podman-create and podman-run is set. **ipcns**="private" @@ -191,7 +191,7 @@ limit is never exceeded. **log_tag**="" -Default format tag for container log messages. This is useful for creating a specific tag for container log messages. Container log messages default to using the truncated container ID as a tag. +Default format tag for container log messages. This is useful for creating a specific tag for container log messages. Container log messages default to using the truncated container ID as a tag. **netns**="private" @@ -203,7 +203,7 @@ Options are: **no_hosts**=false -Create /etc/hosts for the container. By default, container engines manage +Create /etc/hosts for the container. By default, container engines manage /etc/hosts, automatically adding the container's own IP address. **pidns**="private" @@ -377,7 +377,7 @@ Disabling this can save memory. **env**=[] -Environment variables to be used when running the container engine (e.g., Podman, Buildah). For example "http_proxy=internal.proxy.company.com". +Environment variables to be used when running the container engine (e.g., Podman, Buildah). For example "http_proxy=internal.proxy.company.com". Note these environment variables will not be used within the container. Set the env section under [containers] table, if you want to set environment variables for the container. @@ -435,21 +435,26 @@ Not setting this field will fall back to containers/image defaults. (6) **infra_command**="/pause" -Command to run the infra container. - -**infra_image**="k8s.gcr.io/pause:3.4.1" - -Infra (pause) container image name for pod infra containers. When running a -pod, we start a `pause` process in a container to hold open the namespaces -associated with the pod. This container does nothing other then sleep, +Infra (pause) container image command for pod infra containers. When running a +pod, we start a `/pause` process in a container to hold open the namespaces +associated with the pod. This container does nothing other then sleep, reserving the pods resources for the lifetime of the pod. +**infra_image**="" + +Infra (pause) container image for pod infra containers. When running a +pod, we start a `pause` process in a container to hold open the namespaces +associated with the pod. This container does nothing other then sleep, +reserving the pods resources for the lifetime of the pod. By default container +engines run a builtin container using the pause executable. If you want override +specify an image to pull. + **lock_type**="shm" Specify the locking mechanism to use; valid values are "shm" and "file". Change the default only if you are sure of what you are doing, in general "file" is useful only on platforms where cgo is not available for using the -faster "shm" lock type. You may need to run "podman system renumber" after you +faster "shm" lock type. You may need to run "podman system renumber" after you change the lock type. **machine_enabled**=false @@ -460,13 +465,13 @@ container inside the VM to to host. **multi_image_archive**=false -Allows for creating archives (e.g., tarballs) with more than one image. Some container engines, such as Podman, interpret additional arguments as tags for one image and hence do not store more than one image. The default behavior can be altered with this option. +Allows for creating archives (e.g., tarballs) with more than one image. Some container engines, such as Podman, interpret additional arguments as tags for one image and hence do not store more than one image. The default behavior can be altered with this option. **namespace**="" Default engine namespace. If the engine is joined to a namespace, it will see only containers and pods that were created in the same namespace, and will -create new containers and pods in that namespace. The default namespace is "", +create new containers and pods in that namespace. The default namespace is "", which corresponds to no namespace. When no namespace is set, all containers and pods are visible. @@ -499,7 +504,7 @@ Whether to use chroot instead of pivot_root in the runtime. **num_locks**=2048 Number of locks available for containers and pods. Each created container or -pod consumes one lock. The default number available is 2048. If this is +pod consumes one lock. The default number available is 2048. If this is changed, a lock renumbering must be performed, using the `podman system renumber` command. @@ -535,8 +540,8 @@ The list of OCI runtimes that support running containers without CGroups. **image_copy_tmp_dir**="/var/tmp" -Default location for storing temporary container image content. Can be -overridden with the TMPDIR environment variable. If you specify "storage", then +Default location for storing temporary container image content. Can be +overridden with the TMPDIR environment variable. If you specify "storage", then the location of the container/storage tmp directory will be used. If set then it is the users responsibility to cleanup storage. Configure tmpfiles.d(5) to cleanup storage. @@ -576,7 +581,7 @@ the primary uid/gid of the container. **compression_format**="" -Specifies the compression format to use when pushing an image. Supported values are: `gzip`, `zstd` and `zstd:chunked`. +Specifies the compression format to use when pushing an image. Supported values are: `gzip`, `zstd` and `zstd:chunked`. ## SERVICE DESTINATION TABLE The `service_destinations` table contains configuration options used to set up remote connections to the podman service for the podman API. @@ -656,7 +661,7 @@ configuration. Rootless users can further override fields in the config by creating a config file stored in the `$HOME/.config/containers/containers.conf` file. If the `CONTAINERS_CONF` path environment variable is set, just -this path will be used. This is primarily used for testing. +this path will be used. This is primarily used for testing. Fields specified in the containers.conf file override the default options, as well as options in previously read containers.conf files. diff --git a/shortnames.conf b/shortnames.conf index 80df6f0..51b0e50 100644 --- a/shortnames.conf +++ b/shortnames.conf @@ -2,6 +2,8 @@ # almalinux "almalinux" = "docker.io/library/almalinux" "almalinux-minimal" = "docker.io/library/almalinux-minimal" + # Arch Linux + "archlinux" = "docker.io/archlinux/archlinux" # centos "centos" = "quay.io/centos/centos" # containers @@ -43,9 +45,25 @@ "rhel" = "registry.access.redhat.com/rhel" "rhel6" = "registry.access.redhat.com/rhel6" "rhel7" = "registry.access.redhat.com/rhel7" + "rhel7.9" = "registry.access.redhat.com/rhel7.9" + "rhel-atomic" = "registry.access.redhat.com/rhel-atomic" + "rhel-minimal" = "registry.access.redhat.com/rhel-minimum" + "rhel-init" = "registry.access.redhat.com/rhel-init" + "rhel7-atomic" = "registry.access.redhat.com/rhel7-atomic" + "rhel7-minimal" = "registry.access.redhat.com/rhel7-minimum" + "rhel7-init" = "registry.access.redhat.com/rhel7-init" + "rhel7/rhel" = "registry.access.redhat.com/rhel7/rhel" + "rhel7/rhel-atomic" = "registry.access.redhat.com/rhel7/rhel7/rhel-atomic" + "ubi7/ubi" = "registry.access.redhat.com/ubi7/ubi" + "ubi7/ubi-minimal" = "registry.access.redhat.com/ubi7-minimal" + "ubi7/ubi-init" = "registry.access.redhat.com/ubi7-init" "ubi7" = "registry.access.redhat.com/ubi7" "ubi7-init" = "registry.access.redhat.com/ubi7-init" "ubi7-minimal" = "registry.access.redhat.com/ubi7-minimal" + "rhel8" = "registry.access.redhat.com/ubi8" + "rhel8-init" = "registry.access.redhat.com/ubi8-init" + "rhel8-minimal" = "registry.access.redhat.com/ubi8-minimal" + "rhel8-micro" = "registry.access.redhat.com/ubi8-micro" "ubi8" = "registry.access.redhat.com/ubi8" "ubi8-minimal" = "registry.access.redhat.com/ubi8-minimal" "ubi8-init" = "registry.access.redhat.com/ubi8-init" @@ -54,6 +72,18 @@ "ubi8/ubi-minimal" = "registry.access.redhat.com/ubi8-minimal" "ubi8/ubi-init" = "registry.access.redhat.com/ubi8-init" "ubi8/ubi-micro" = "registry.access.redhat.com/ubi8-micro" + "rhel9" = "registry.access.redhat.com/ubi9" + "rhel9-init" = "registry.access.redhat.com/ubi9-init" + "rhel9-minimal" = "registry.access.redhat.com/ubi9-minimal" + "rhel9-micro" = "registry.access.redhat.com/ubi9-micro" + "ubi9" = "registry.access.redhat.com/ubi9" + "ubi9-minimal" = "registry.access.redhat.com/ubi9-minimal" + "ubi9-init" = "registry.access.redhat.com/ubi9-init" + "ubi9-micro" = "registry.access.redhat.com/ubi9-micro" + "ubi9/ubi" = "registry.access.redhat.com/ubi9/ubi" + "ubi9/ubi-minimal" = "registry.access.redhat.com/ubi9-minimal" + "ubi9/ubi-init" = "registry.access.redhat.com/ubi9-init" + "ubi9/ubi-micro" = "registry.access.redhat.com/ubi9-micro" # Rocky Linux "rockylinux" = "docker.io/library/rockylinux" # Debian