This project provides alpine-based podman container images and statically linked (rootless) podman binaries for linux/amd64 and linux/arm64/v8 machines along with its dependencies (without systemd support):
- podman
- crun
- runc
- conmon
- fuse-overlayfs and libfuse
- Netavark: container network stack and default in podman 5 or later
- catatonit
CNI networking has been replaced with Netavark since Podman version 5.
The following image tags are supported:
| Tag | Description |
|---|---|
latest, <VERSION> |
podman with all dependencies: runc, crun, conmon, fuse-overlayfs, netavark, pasta, aardvark-dns, catatonit. |
minimal, <VERSION>-minimal |
podman, crun, conmon, fuse-overlayfs and netavark binaries, configured to use the host's existing namespaces (low isolation level). |
remote, <VERSION>-remote |
the podman remote binary. |
By default containers are run as user root.
However the podman (uid/gid 1000) user can be used instead for which also a subuid/gid mapping is configured with the image (as described within the binary installation section below).
Please note that, when running non-remote podman within a docker container, the docker container needs to be --privileged.
Run podman in docker:
docker run --privileged -u podman:podman mgoltzsche/podman:minimal docker run alpine:latest echo hello from nested containerWithin the container docker is linked to podman to support applications that use the docker command.
In case you're using an arm64 machine (e.g. a Raspberry Pi), you need to substitute "amd64" with "arm64" within the commands below to make the installation work for you.
Download the statically linked binaries of podman and its dependencies:
curl -fsSL -o podman-linux-amd64.tar.gz https://github.com/mgoltzsche/podman-static/releases/latest/download/podman-linux-amd64.tar.gzVerify the archive's signature (optional):
curl -fsSL -o podman-linux-amd64.tar.gz.asc https://github.com/mgoltzsche/podman-static/releases/latest/download/podman-linux-amd64.tar.gz.asc
gpg --keyserver hkps://keyserver.ubuntu.com --recv-keys 0CCF102C4F95D89E583FF1D4F8B5AF50344BB503
gpg --batch --verify podman-linux-amd64.tar.gz.asc podman-linux-amd64.tar.gzThis may fail every now and then due to desync/unavailable key servers. In that case please retry.
Download a specific version:
VERSION=<VERSION>
curl -fsSL -o podman-linux-amd64.tar.gz https://github.com/mgoltzsche/podman-static/releases/download/$VERSION/podman-linux-amd64.tar.gzInstall the binaries and configuration on your host after you've inspected the archive:
tar -xzf podman-linux-amd64.tar.gz
sudo cp -r podman-linux-amd64/usr podman-linux-amd64/etc /If you have docker installed on the same host it might be broken until you remove the newly installed /usr/local/bin/runc binary since older docker versions are not compatible with the latest runc version provided here while podman is also compatible with the older runc version that comes e.g. with docker 1.19 on Ubuntu.
To install podman on a host without having any root privileges, you need to copy the binaries and configuration into your home directory and adjust the binary paths within the configuration correspondingly. For more information see podman's rootless installation instructions.
The following binaries should be installed on your host:
iptablesnsenteruidmap(for rootless mode)
nftables (with or without optional iptables-nft wrapper) to be included in the future WIP.
In order to run rootless containers that use multiple uids/gids you may want to set up a uid/gid mapping for your user on your host:
sudo sh -c "echo $(id -un):100000:200000 >> /etc/subuid"
sudo sh -c "echo $(id -gn):100000:200000 >> /etc/subgid"Please make sure you don't add the mapping multiple times.
On an apparmor-enabled host such as Ubuntu >=23.10, podman may fail with reexec: Permission denied the first time it is run.
In that case you have to change your podman apparmor profile at /etc/apparmor.d/podman so that it also applies to /usr/local/bin/podman as follows (also see here):
sudo sed -Ei 's!^profile podman /usr/bin/podman !profile podman /usr/{bin,local/bin}/podman !' /etc/apparmor.d/podmanTo support applications that rely on the docker command, a quick option is to link podman as follows:
sudo ln -s /usr/local/bin/podman /usr/local/bin/dockerBefore updating binaries on your host please terminate all corresponding processes.
To restart containers with restart-policy=always on boot, enable the podman-restart systemd service:
systemctl enable podman-restartpodman run alpine:latest echo hello from podmanThe default storage location depends on the user:
- For
rootstorage is located at/var/lib/containers/storage. - For unprivileged users storage is located at
~/.local/share/containers/storage.
make images testBefore uninstalling the binaries, you may remove containers, pods, images, volumes, and so on to free up space:
sudo podman system resetNext, remove all the copied binaries from the following folders:
sudo rm -rf /etc/containers/*
sudo rm -rf /usr/local/bin/{crun,fuse-overlayfs,fusermount3,pasta,pasta.avx2,podman,runc}
sudo rm -rf /usr/local/{lib,libexec}/podman
sudo rm -rf /usr/local/lib/systemd/{system,user}/podman*
sudo rm /usr/local/lib/systemd/{system,user}-generators/podman-*-generator