From 6499a529ce505e4c50234498490af3b7f7c8e14b Mon Sep 17 00:00:00 2001 From: Max Goltzsche Date: Wed, 26 Aug 2020 21:57:47 +0200 Subject: [PATCH] Update readme --- README.md | 18 ++++++++---------- 1 file changed, 8 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index 5391af6..5654c6c 100644 --- a/README.md +++ b/README.md @@ -1,37 +1,35 @@ # podman container image This image provides an easy way to try out podman and a base for -nested containerization scenarios where the child container should -run as unprivileged user. +nested and rootless containerization scenarios. -The alpine-based image contains the following statically linked binaries +The alpine-based image provides the following statically linked binaries _(without systemd support)_: * [podman](https://github.com/containers/libpod) * [runc](https://github.com/opencontainers/runc/) * [conmon](https://github.com/containers/conmon) * [fuse-overlayfs](https://github.com/containers/fuse-overlayfs) * [slirp4netns](https://github.com/rootless-containers/slirp4netns) -* [buildah](https://github.com/containers/buildah) - +* [CNI plugins](https://github.com/containernetworking/plugins): loopback, bridge, host-local, portmap, firewall, tuning Containers need to be `--privileged`. - As a workaround for docker the entrypoint script changes the owner of the storage volume mount point (`/podman/.local/share/containers/storage`) -to the unprivileged `podman` user (100000) -before it runs the provided command. +to the unprivileged user `podman` (100000) before it runs the provided command. ## Usage example +Run podman in docker (within the container `docker` links to `podman`): ``` docker run --privileged mgoltzsche/podman:latest docker run alpine:latest echo hello from podman ``` -## Local build, test & run +## Local build & test ``` -./make.sh build test run +make +make test ```