$ podman search debian
NAME DESCRIPTION
docker.io/library/debian Debian is a Linux distribution that's compos...
docker.io/dockette/debian My Debian Sid | Jessie | Wheezy Base Images
docker.io/corpusops/debian debian corpusops baseimage
docker.io/treehouses/debian
docker.io/rootpublic/debian
docker.io/debian/snapshot "debian", but with sources.list pointing to...
docker.io/debian/eol End of Life Debian versions (pointing at arc...
docker.io/vulhub/debian
docker.io/debian/buildd https://hub.docker.com/_/debian/ but --varia...
docker.io/voxpupuli/debian
docker.io/debian/archvsync
docker.io/smartentry/debian debian with smartentry
docker.io/i386/debian Debian is a Linux distribution that's compos...
docker.io/amd64/debian Debian is a Linux distribution that's compos...
docker.io/arm64v8/debian Debian is a Linux distribution that's compos...
docker.io/arm32v7/debian Debian is a Linux distribution that's compos...
docker.io/telkomindonesia/debian All-in-One Debian (9.x) Base Image Repositor...
docker.io/arm32v5/debian Debian is a Linux distribution that's compos...
docker.io/s390x/debian Debian is a Linux distribution that's compos...
docker.io/ppc64le/debian Debian is a Linux distribution that's compos...
docker.io/mips64le/debian Debian is a Linux distribution that's compos...
docker.io/32bit/debian Debian for i386 (32bit)
docker.io/dalaobanniubi/debian
docker.io/vptech/debian Docker images of Debian.
docker.io/dj0x/debian GNU/Debian-Git-ssh
debianイメージのダウンロード
$ podman pull debian
Resolved "debian" as an alias (/etc/containers/registries.conf.d/shortnames.conf)
Trying to pull docker.io/library/debian:latest...
Getting image source signatures
Copying blob 155ad54a8b28 done |
Copying config d4ccddb816 done |
Writing manifest to image destination
d4ccddb816ba27eaae22ef3d56175d53f47998e2acb99df1ae0e5b426b28a076
イメージ確認
$ podman images
REPOSITORY TAG IMAGE ID CREATED SIZE
docker.io/library/debian latest d4ccddb816ba 3 weeks ago 121 MB
上記debianイメージからコンテナ起動
$ podman run -dit --name debian-container debian
f9782c009da00e4e521fd395551acc5491c207e957b8c949c26e53813df668ae
プロセス確認
$ podman ps
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
f9782c009da0 docker.io/library/debian:latest bash 6 seconds ago Up 6 seconds debian-container
コンテナ内へアクセス(lsコマンド)
$ podman attach debian-container
# ls
bin boot dev etc home lib lib64 media mnt opt proc root run sbin srv sys tmp usr var
AppArmor is similar to SELinux in that rules are added to the kernel to control process access to the system. Like SELinux, AppArmor could cause a permission-denied error. You can verify whether it is the problem by turning off AppArmor separation:
$ podman run --security-opt apparmor=unconfined …
Our team has heard of cases where unconfined is still not working. You can try disabling the apparmor profile or AppArmor itself.
bridge[:OPTIONS,…]: Create a network stack on the default bridge. This is the default for rootful containers. It is possible to specify these additional options:
alias=name: Add network-scoped alias for the container.
ip=IPv4: Specify a static IPv4 address for this container.
ip6=IPv6: Specify a static IPv6 address for this container.
mac=MAC: Specify a static MAC address for this container.
interface_name=name: Specify a name for the created network interface inside the container.
host_interface_name=name: Specify a name for the created network interface outside the container.Any other options will be passed through to netavark without validation. This can be useful to pass arguments to netavark plugins.For example, to set a static ipv4 address and a static mac address, use --network bridge:ip=10.88.0.10,mac=44:33:22:11:00:99.
[:OPTIONS,…]: Connect to a user-defined network; this is the network name or ID from a network created by podman network create. It is possible to specify the same options described under the bridge mode above. Use the –network option multiple times to specify additional networks.
For backwards compatibility it is also possible to specify comma-separated networks on the first –network argument, however this prevents you from using the options described under the bridge section above.
none: Create a network namespace for the container but do not configure network interfaces for it, thus the container has no network connectivity.
container:id: Reuse another container’s network stack.
host: Do not create a network namespace, the container uses the host’s network. Note: The host mode gives the container full access to local system services such as D-bus and is therefore considered insecure.
ns:path: Path to a network namespace to join.
private: Create a new namespace for the container. This uses the bridge mode for rootful containers and slirp4netns for rootless ones.
slirp4netns[:OPTIONS,…]: use slirp4netns(1) to create a user network stack. It is possible to specify these additional options, they can also be set with network_cmd_options in containers.conf:
allow_host_loopback=true|false: Allow slirp4netns to reach the host loopback IP (default is 10.0.2.2 or the second IP from slirp4netns cidr subnet when changed, see the cidr option below). The default is false.
mtu=MTU: Specify the MTU to use for this network. (Default is 65520).
cidr=CIDR: Specify ip range to use for this network. (Default is 10.0.2.0/24).
enable_ipv6=true|false: Enable IPv6. Default is true. (Required for outbound_addr6).
outbound_addr=INTERFACE: Specify the outbound interface slirp binds to (ipv4 traffic only).
outbound_addr=IPv4: Specify the outbound ipv4 address slirp binds to.
outbound_addr6=INTERFACE: Specify the outbound interface slirp binds to (ipv6 traffic only).
outbound_addr6=IPv6: Specify the outbound ipv6 address slirp binds to.
port_handler=rootlesskit: Use rootlesskit for port forwarding. Default.
Note: Rootlesskit changes the source IP address of incoming packets to an IP address in the container network namespace, usually 10.0.2.100. If the application requires the real source IP address, e.g. web server logs, use the slirp4netns port handler. The rootlesskit port handler is also used for rootless containers when connected to user-defined networks.
port_handler=slirp4netns: Use the slirp4netns port forwarding, it is slower than rootlesskit but preserves the correct source IP address. This port handler cannot be used for user-defined networks.
pasta[:OPTIONS,…]: use pasta(1) to create a user-mode networking stack.
This is the default for rootless containers and only supported in rootless mode.
By default, IPv4 and IPv6 addresses and routes, as well as the pod interface name, are copied from the host. If port forwarding isn’t configured, ports are forwarded dynamically as services are bound on either side (init namespace or container namespace). Port forwarding preserves the original source IP address. Options described in pasta(1) can be specified as comma-separated arguments.
In terms of pasta(1) options, –config-net is given by default, in order to configure networking when the container is started, and –no-map-gw is also assumed by default, to avoid direct access from container to host using the gateway address. The latter can be overridden by passing –map-gw in the pasta-specific options (despite not being an actual pasta(1) option).
Also, -t none and -u none are passed if, respectively, no TCP or UDP port forwarding from host to container is configured, to disable automatic port forwarding based on bound ports. Similarly, -T none and -U none are given to disable the same functionality from container to host.
Some examples:
pasta:–map-gw: Allow the container to directly reach the host using the gateway address.
pasta:–mtu,1500: Specify a 1500 bytes MTU for the tap interface in the container.
pasta:–ipv4-only,-a,10.0.2.0,-n,24,-g,10.0.2.2,–dns-forward,10.0.2.3,-m,1500,–no-ndp,–no-dhcpv6,–no-dhcp, equivalent to default slirp4netns(1) options: disable IPv6, assign 10.0.2.0/24 to the tap0 interface in the container, with gateway 10.0.2.3, enable DNS forwarder reachable at 10.0.2.3, set MTU to 1500 bytes, disable NDP, DHCPv6 and DHCP support.
pasta:-I,tap0,–ipv4-only,-a,10.0.2.0,-n,24,-g,10.0.2.2,–dns-forward,10.0.2.3,–no-ndp,–no-dhcpv6,–no-dhcp, equivalent to default slirp4netns(1) options with Podman overrides: same as above, but leave the MTU to 65520 bytes
pasta:-t,auto,-u,auto,-T,auto,-U,auto: enable automatic port forwarding based on observed bound ports from both host and container sides
pasta:-T,5201: enable forwarding of TCP port 5201 from container to host, using the loopback interface instead of the tap interface for improved performance
Invalid if using –dns, –dns-option, or –dns-search with –network set to none or container:id.
If used together with –pod, the container joins the pod’s network namespace.