From e6904f6f89e59fadd103c6562d3f97036ba1a19d Mon Sep 17 00:00:00 2001 From: Daniel J Walsh Date: Fri, 3 Feb 2023 06:30:17 -0600 Subject: [PATCH] Cleanup podman-systemd.unit file Sort options alphabetically Add kubernetes example. Signed-off-by: Daniel J Walsh --- docs/source/markdown/podman-systemd.unit.5.md | 441 +++++++++--------- 1 file changed, 232 insertions(+), 209 deletions(-) diff --git a/docs/source/markdown/podman-systemd.unit.5.md b/docs/source/markdown/podman-systemd.unit.5.md index b3894971fa..258b123a4c 100644 --- a/docs/source/markdown/podman-systemd.unit.5.md +++ b/docs/source/markdown/podman-systemd.unit.5.md @@ -56,7 +56,9 @@ Currently, only the `Alias`, `WantedBy` and `RequiredBy` keys are supported. words `WantedBy=other.service`, not `WantedBy=other.container`. The same is true for other kinds of dependencies, too, like `After=other.service`. -### Container units +================================================================================ + +### Container units [Container] Container units are named with a `.container` extension and contain a `[Container] `section describing the container that should be run as a service. The resulting service file will contain a line like @@ -71,15 +73,34 @@ There is only one required key, `Image`, which defines the container image the s Supported keys in `Container` section are: -#### `Image=` +#### `AddCapability=` -The image to run in the container. This image must be locally installed for the service to work -when it is activated, because the generated service file will never try to download images. -It is recommended to use a fully qualified image name rather than a short name, both for -performance and robustness reasons. +By default, the container runs with no capabilities (due to DropCapabilities='all'). If any specific +caps are needed, then add them with this key. For example using `AddCapability=CAP_DAC_OVERRIDE`. -The format of the name is the same as when passed to `podman run`, so it supports e.g., using -`:tag` or using digests guarantee a specific image version. +This is a space separated list of capabilities. This key can be listed multiple times. + +For example: +``` +AddCapability=CAP_DAC_OVERRIDE CAP_IPC_OWNER +``` + +#### `AddDevice=` + +Adds a device node from the host into the container. The format of this is +`HOST-DEVICE[:CONTAINER-DEVICE][:PERMISSIONS]`, where `HOST-DEVICE` is the path of +the device node on the host, `CONTAINER-DEVICE` is the path of the device node in +the container, and `PERMISSIONS` is a list of permissions combining 'r' for read, +'w' for write, and 'm' for mknod(2). + +This key can be listed multiple times. + +#### `Annotation=` + +Set one or more OCI annotations on the container. The format is a list of `key=value` items, +similar to `Environment`. + +This key can be listed multiple times. #### `ContainerName=` @@ -87,6 +108,17 @@ The (optional) name of the Podman container. If this is not specified, the defau of `systemd-%N` will be used, which is the same as the service name but with a `systemd-` prefix to avoid conflicts with user-managed containers. +#### `DropCapability=` (defaults to `all`) + +Drop these capabilities from the default podman capability set, or `all` to drop all capabilities. + +This is a space separated list of capabilities. This key can be listed multiple times. + +For example: +``` +DropCapability=CAP_DAC_OVERRIDE CAP_IPC_OWNER +``` + #### `Environment=` Set an environment variable in the container. This uses the same format as @@ -109,43 +141,90 @@ If this is set then it defines what command line to run in the container. If it default entry point of the container image is used. The format is the same as for [systemd command lines](https://www.freedesktop.org/software/systemd/man/systemd.service.html#Command%20lines). -#### `User=` +#### `ExposeHostPort=` -The (numeric) uid to run as inside the container. This does not need to match the uid on the host, -which can be modified with `RemapUsers`, but if that is not specified, this uid is also used on the host. +Exposes a port, or a range of ports (e.g. `50-59`), from the host to the container. Equivalent +to the Podman `--expose` option. + +This key can be listed multiple times. #### `Group=` The (numeric) gid to run as inside the container. This does not need to match the gid on the host, which can be modified with `RemapUsers`, but if that is not specified, this gid is also used on the host. +#### `Image=` + +The image to run in the container. This image must be locally installed for the service to work +when it is activated, because the generated service file will never try to download images. +It is recommended to use a fully qualified image name rather than a short name, both for +performance and robustness reasons. + +The format of the name is the same as when passed to `podman run`, so it supports e.g., using +`:tag` or using digests guarantee a specific image version. + +#### `Label=` + +Set one or more OCI labels on the container. The format is a list of `key=value` items, +similar to `Environment`. + +This key can be listed multiple times. + +#### `Network=` + +Specify a custom network for the container. This has the same format as the `--network` option +to `podman run`. For example, use `host` to use the host network in the container, or `none` to +not set up networking in the container. + +As a special case, if the `name` of the network ends with `.network`, a Podman network called +`systemd-$name` will be used, and the generated systemd service will contain +a dependency on the `$name-network.service`. Such a network can be automatically +created by using a `$name.network` quadlet file. + +This key can be listed multiple times. + #### `NoNewPrivileges=` (defaults to `no`) If enabled (which is the default), this disables the container processes from gaining additional privileges via things like setuid and file capabilities. -#### `DropCapability=` (defaults to `all`) +#### `Notify=` (defaults to `no`) -Drop these capabilities from the default podman capability set, or `all` to drop all capabilities. +By default, Podman is run in such a way that the systemd startup notify command is handled by +the container runtime. In other words, the service is deemed started when the container runtime +starts the child in the container. However, if the container application supports +[sd_notify](https://www.freedesktop.org/software/systemd/man/sd_notify.html), then setting +`Notify`to true will pass the notification details to the container allowing it to notify +of startup on its own. -This is a space separated list of capabilities. This key can be listed multiple times. +#### `PodmanArgs=` -For example: -``` -DropCapability=CAP_DAC_OVERRIDE CAP_IPC_OWNER -``` +This key contains a list of arguments passed directly to the end of the `podman run` command +in the generated file (right before the image name in the command line). It can be used to +access Podman features otherwise unsupported by the generator. Since the generator is unaware +of what unexpected interactions can be caused by these arguments, is not recommended to use +this option. -#### `AddCapability=` +The format of this is a space separated list of arguments, which can optionally be individually +escaped to allow inclusion of whitespace and other control characters. This key can be listed +multiple times. -By default, the container runs with no capabilities (due to DropCapabilities='all'). If any specific -caps are needed, then add them with this key. For example using `AddCapability=CAP_DAC_OVERRIDE`. +#### `PublishPort=` -This is a space separated list of capabilities. This key can be listed multiple times. +Exposes a port, or a range of ports (e.g. `50-59`), from the container to the host. Equivalent +to the Podman `--publish` option. The format is similar to the Podman options, which is of +the form `ip:hostPort:containerPort`, `ip::containerPort`, `hostPort:containerPort` or +`containerPort`, where the number of host and container ports must be the same (in the case +of a range). -For example: -``` -AddCapability=CAP_DAC_OVERRIDE CAP_IPC_OWNER -``` +If the IP is set to 0.0.0.0 or not set at all, the port will be bound on all IPv4 addresses on +the host; use [::] for IPv6. + +Note that not listing a host port means that Podman will automatically select one, and it +may be different for each invocation of service. This makes that a less useful option. The +allocated port can be found with the `podman port` command. + +This key can be listed multiple times. #### `ReadOnly=` (defaults to `no`) @@ -153,61 +232,58 @@ If enabled, makes image read-only, with /var/tmp, /tmp and /run a tmpfs (unless **NOTE:** Podman will automatically copy any content from the image onto the tmpfs -#### `SeccompProfile=` - -Set the seccomp profile to use in the container. If unset, the default podman profile is used. -Set to either the pathname of a json file, or `unconfined` to disable the seccomp filters. - -#### `RemapUsers=` - -If this is set, then host user and group ids are remapped in the container. It currently -supports values: `auto`, `manual` and `keep-id`. - -In `manual` mode, the `RemapUid` and `RemapGid` options can define an -exact mapping of uids from host to container. You must specify these. +#### `RemapGid=` -In `auto` mode mode, the subuids and subgids allocated to the `containers` user is used to allocate -host uids/gids to use for the container. By default this will try to estimate a count of the ids -to remap, but `RemapUidSize` can be specified to use an explicit size. Use `RemapUid` and `RemapGid` key to force a particular host uid to be mapped to the container. In `keep-id` mode, the running user is mapped to the same id in the container. This is supported only on user systemd units. +If `RemapUsers` is enabled, this specifies a gid mapping of the form `container_gid:from_gid:amount`, +which will map `amount` number of gids on the host starting at `from_gid` into the container, starting +at `container_gid`. + #### `RemapUid=` If `RemapUsers` is enabled, this specifies a uid mapping of the form `container_uid:from_uid:amount`, which will map `amount` number of uids on the host starting at `from_uid` into the container, starting at `container_uid`. -#### `RemapGid=` - -If `RemapUsers` is enabled, this specifies a gid mapping of the form `container_gid:from_gid:amount`, -which will map `amount` number of gids on the host starting at `from_gid` into the container, starting -at `container_gid`. - #### `RemapUidSize=` If `RemapUsers` is enabled and set to `auto`, this specifies the count of the ids to remap -#### `Notify=` (defaults to `no`) +#### `RemapUsers=` -By default, Podman is run in such a way that the systemd startup notify command is handled by -the container runtime. In other words, the service is deemed started when the container runtime -starts the child in the container. However, if the container application supports -[sd_notify](https://www.freedesktop.org/software/systemd/man/sd_notify.html), then setting -`Notify`to true will pass the notification details to the container allowing it to notify -of startup on its own. +If this is set, then host user and group ids are remapped in the container. It currently +supports values: `auto`, `manual` and `keep-id`. -#### `Timezone=` (if unset uses system-configured default) +In `manual` mode, the `RemapUid` and `RemapGid` options can define an +exact mapping of uids from host to container. You must specify these. -The timezone to run the container in. +In `auto` mode mode, the subuids and subgids allocated to the `containers` user is used to allocate +host uids/gids to use for the container. By default this will try to estimate a count of the ids +to remap, but `RemapUidSize` can be specified to use an explicit size. Use `RemapUid` and #### `RunInit=` (default to `no`) If enabled, the container will have a minimal init process inside the container that forwards signals and reaps processes. +#### `SeccompProfile=` + +Set the seccomp profile to use in the container. If unset, the default podman profile is used. +Set to either the pathname of a json file, or `unconfined` to disable the seccomp filters. + +#### `Timezone=` (if unset uses system-configured default) + +The timezone to run the container in. + +#### `User=` + +The (numeric) uid to run as inside the container. This does not need to match the uid on the host, +which can be modified with `RemapUsers`, but if that is not specified, this uid is also used on the host. + #### `VolatileTmp=` (default to `no`, or `yes` if `ReadOnly` enabled) If enabled, the container will have a fresh tmpfs mounted on `/tmp`. @@ -226,80 +302,9 @@ created by using a `$name.volume` quadlet file. This key can be listed multiple times. -#### `Network=` +================================================================================ -Specify a custom network for the container. This has the same format as the `--network` option -to `podman run`. For example, use `host` to use the host network in the container, or `none` to -not set up networking in the container. - -As a special case, if the `name` of the network ends with `.network`, a Podman network called -`systemd-$name` will be used, and the generated systemd service will contain -a dependency on the `$name-network.service`. Such a network can be automatically -created by using a `$name.network` quadlet file. - -This key can be listed multiple times. - -#### `ExposeHostPort=` - -Exposes a port, or a range of ports (e.g. `50-59`), from the host to the container. Equivalent -to the Podman `--expose` option. - -This key can be listed multiple times. - -#### `PublishPort=` - -Exposes a port, or a range of ports (e.g. `50-59`), from the container to the host. Equivalent -to the Podman `--publish` option. The format is similar to the Podman options, which is of -the form `ip:hostPort:containerPort`, `ip::containerPort`, `hostPort:containerPort` or -`containerPort`, where the number of host and container ports must be the same (in the case -of a range). - -If the IP is set to 0.0.0.0 or not set at all, the port will be bound on all IPv4 addresses on -the host; use [::] for IPv6. - -Note that not listing a host port means that Podman will automatically select one, and it -may be different for each invocation of service. This makes that a less useful option. The -allocated port can be found with the `podman port` command. - -This key can be listed multiple times. - -#### `AddDevice=` - -Adds a device node from the host into the container. The format of this is -`HOST-DEVICE[:CONTAINER-DEVICE][:PERMISSIONS]`, where `HOST-DEVICE` is the path of -the device node on the host, `CONTAINER-DEVICE` is the path of the device node in -the container, and `PERMISSIONS` is a list of permissions combining 'r' for read, -'w' for write, and 'm' for mknod(2). - -This key can be listed multiple times. - -#### `PodmanArgs=` - -This key contains a list of arguments passed directly to the end of the `podman run` command -in the generated file (right before the image name in the command line). It can be used to -access Podman features otherwise unsupported by the generator. Since the generator is unaware -of what unexpected interactions can be caused by these arguments, is not recommended to use -this option. - -The format of this is a space separated list of arguments, which can optionally be individually -escaped to allow inclusion of whitespace and other control characters. This key can be listed -multiple times. - -#### `Label=` - -Set one or more OCI labels on the container. The format is a list of `key=value` items, -similar to `Environment`. - -This key can be listed multiple times. - -#### `Annotation=` - -Set one or more OCI annotations on the container. The format is a list of `key=value` items, -similar to `Environment`. - -This key can be listed multiple times. - -### Kube units +### Kube units [Kube] Kube units are named with a `.kube` extension and contain a `[Kube] `section describing how `podman kube play` should be run as a service. The resulting service file will contain a line like @@ -311,38 +316,13 @@ There is only one required key, `Yaml`, which defines the path to the Kubernetes Supported keys in the `Kube` section are: -#### `Yaml=` - -The path, absolute or relative to the location of the unit file, to the Kubernetes YAML file to use. - -#### `RemapUsers=` - -If this is set, then host user and group ids are remapped in the container. It currently -supports values: `auto`, and `keep-id`. - -In `auto` mode mode, the subuids and subgids allocated to the `containers` user is used to allocate -host uids/gids to use for the container. By default this will try to estimate a count of the ids -to remap, but `RemapUidSize` can be specified to use an explicit size. Use `RemapUid` and -`RemapGid` key to force a particular host uid to be mapped to the container. - -In `keep-id` mode, the running user is mapped to the same id in the container. This is supported -only on user systemd units. - -#### `RemapUid=` - -If `RemapUsers` is enabled, this specifies a uid mapping of the form `container_uid:from_uid:amount`, -which will map `amount` number of uids on the host starting at `from_uid` into the container, starting -at `container_uid`. - -#### `RemapGid=` - -If `RemapUsers` is enabled, this specifies a gid mapping of the form `container_gid:from_gid:amount`, -which will map `amount` number of gids on the host starting at `from_gid` into the container, starting -at `container_gid`. +#### `ConfigMap=` -#### `RemapUidSize=` +Pass the Kubernetes ConfigMap YAML at path to `podman kube play` via the `--configmap` argument. +Unlike the `configmap` argument, the value may contain only one path but +it may be absolute or relative to the location of the unit file. -If `RemapUsers` is enabled and set to `auto`, this specifies the count of the ids to remap. +This key may be used multiple times #### `Network=` @@ -357,14 +337,6 @@ created by using a `$name.network` quadlet file. This key can be listed multiple times. -#### `ConfigMap=` - -Pass the Kubernetes ConfigMap YAML at path to `podman kube play` via the `--configmap` argument. -Unlike the `configmap` argument, the value may contain only one path but -it may be absolute or relative to the location of the unit file. - -This key may be used multiple times - #### `PublishPort=` Exposes a port, or a range of ports (e.g. `50-59`), from the container to the host. Equivalent @@ -382,54 +354,42 @@ entry from the unit file will take precedence This key can be listed multiple times. -### Volume units - -Volume files are named with a `.volume` extension and contain a section `[Volume]` describing the -named Podman volume. The generated service is a one-time command that ensures that the volume -exists on the host, creating it if needed. - -For a volume file named `$NAME.volume`, the generated Podman volume will be called `systemd-$NAME`, -and the generated service file `$NAME-volume.service`. - -Using volume units allows containers to depend on volumes being automatically pre-created. This is -particularly interesting when using special options to control volume creation, as Podman will -otherwise create volumes with the default options. - -Supported keys in `Volume` section are: - -#### `User=` - -The host (numeric) uid, or user name to use as the owner for the volume - -#### `Group=` +#### `RemapGid=` -The host (numeric) gid, or group name to use as the group for the volume +If `RemapUsers` is enabled, this specifies a gid mapping of the form `container_gid:from_gid:amount`, +which will map `amount` number of gids on the host starting at `from_gid` into the container, starting +at `container_gid`. -#### `Label=` +#### `RemapUid=` -Set one or more OCI labels on the volume. The format is a list of -`key=value` items, similar to `Environment`. +If `RemapUsers` is enabled, this specifies a uid mapping of the form `container_uid:from_uid:amount`, +which will map `amount` number of uids on the host starting at `from_uid` into the container, starting +at `container_uid`. -This key can be listed multiple times. +#### `RemapUidSize=` -#### `Device=` +If `RemapUsers` is enabled and set to `auto`, this specifies the count of the ids to remap. -The path of a device which should be mounted for the volume. +#### `RemapUsers=` -#### `Type=` +If this is set, then host user and group ids are remapped in the container. It currently +supports values: `auto`, and `keep-id`. -The filesystem type of `Device` as used by the **mount(8)** commands `-t` option. +In `auto` mode mode, the subuids and subgids allocated to the `containers` user is used to allocate +host uids/gids to use for the container. By default this will try to estimate a count of the ids +to remap, but `RemapUidSize` can be specified to use an explicit size. Use `RemapUid` and +`RemapGid` key to force a particular host uid to be mapped to the container. -#### `Options=` +In `keep-id` mode, the running user is mapped to the same id in the container. This is supported +only on user systemd units. -The mount options to use for a filesystem as used by the **mount(8)** command `-o` option. +#### `Yaml=` -#### `Copy=` (default to `yes`) +The path, absolute or relative to the location of the unit file, to the Kubernetes YAML file to use. -If enabled, the content of the image located at the mountpoint of the volume is copied into the -volume on the first run. +======================================================================== -### Network units +### Network units [Network] Network files are named with a `.network` extension and contain a section `[Network]` describing the named Podman network. The generated service is a one-time command that ensures that the network @@ -470,6 +430,12 @@ Restrict external access of this network. This is equivalent to the Podman `--internal` option +#### `IPAMDriver=` + +Set the ipam driver (IP Address Management Driver) for the network. Currently `host-local`, `dhcp` and `none` are supported. + +This is equivalent to the Podman `--ipam-driver` option + #### `IPRange=` Allocate container IP from a range. The range must be a complete subnet and in CIDR notation. The ip-range option must be used with a subnet option. @@ -478,18 +444,19 @@ This is equivalent to the Podman `--ip-range` option This key can be listed multiple times. -#### `IPAMDriver=` - -Set the ipam driver (IP Address Management Driver) for the network. Currently `host-local`, `dhcp` and `none` are supported. - -This is equivalent to the Podman `--ipam-driver` option - #### `IPv6=` Enable IPv6 (Dual Stack) networking. This is equivalent to the Podman `--ipv6` option +#### `Label=` + +Set one or more OCI labels on the network. The format is a list of +`key=value` items, similar to `Environment`. + +This key can be listed multiple times. + #### `Options=` Set driver specific options. @@ -504,13 +471,55 @@ This is equivalent to the Podman `--subnet` option This key can be listed multiple times. +================================================================================ + +### Volume units [Volume] + +Volume files are named with a `.volume` extension and contain a section `[Volume]` describing the +named Podman volume. The generated service is a one-time command that ensures that the volume +exists on the host, creating it if needed. + +For a volume file named `$NAME.volume`, the generated Podman volume will be called `systemd-$NAME`, +and the generated service file `$NAME-volume.service`. + +Using volume units allows containers to depend on volumes being automatically pre-created. This is +particularly interesting when using special options to control volume creation, as Podman will +otherwise create volumes with the default options. + +Supported keys in `Volume` section are: + +#### `Copy=` (default to `yes`) + +If enabled, the content of the image located at the mountpoint of the volume is copied into the +volume on the first run. + +#### `Device=` + +The path of a device which should be mounted for the volume. + +#### `Group=` + +The host (numeric) gid, or group name to use as the group for the volume + #### `Label=` -Set one or more OCI labels on the network. The format is a list of +Set one or more OCI labels on the volume. The format is a list of `key=value` items, similar to `Environment`. This key can be listed multiple times. +#### `Options=` + +The mount options to use for a filesystem as used by the **mount(8)** command `-o` option. + +#### `Type=` + +The filesystem type of `Device` as used by the **mount(8)** commands `-t` option. + +#### `User=` + +The host (numeric) uid, or user name to use as the owner for the volume + ## EXAMPLES Example `test.container`: @@ -537,6 +546,20 @@ Restart=always WantedBy=multi-user.target default.target ``` +Example `test.kube`: +``` +[Unit] +Description=A kubernetes yaml based service +Before=local-fs.target + +[Kube] +Yaml=/opt/k8s/deployment.yml + +[Install] +# Start by default on boot +WantedBy=multi-user.target default.target +``` + Example `test.volume`: ```