1buildah-from(1)             General Commands Manual            buildah-from(1)
2
3
4

NAME

6       buildah-from  - Creates a new working container, either from scratch or
7       using a specified image as a starting point.
8
9

SYNOPSIS

11       buildah from [options] image
12
13

DESCRIPTION

15       Creates a working container based upon the specified  image  name.   If
16       the  supplied image name is "scratch" a new empty container is created.
17       Image names use a "transport":"details" format.
18
19
20       Multiple transports are supported:
21
22
23       dir:path
24         An existing local directory path containing the manifest, layer  tar‐
25       balls,  and  signatures in individual files. This is a non-standardized
26       format, primarily useful for debugging or noninvasive image inspection.
27
28
29       docker://docker-reference (Default)
30         An image in a registry implementing the  "Docker  Registry  HTTP  API
31       V2".   By   default,   uses   the  authorization  state  in  $XDG\_RUN‐
32       TIME\_DIR/containers/auth.json, which is set using (buildah login).  If
33       the  authorization  state is not found there, $HOME/.docker/config.json
34       is checked, which is set using (docker login).
35         If docker-reference does not include a registry name, localhost  will
36       be  consulted first, followed by any registries named in the registries
37       configuration.
38
39
40       docker-archive:path
41         An image is retrieved as a docker load formatted file.
42
43
44       docker-daemon:docker-reference
45         An image docker-reference stored  in  the  docker  daemon's  internal
46       storage.   docker-reference  must  include  either  a  tag or a digest.
47       Alternatively, when reading images, the format can also be  docker-dae‐
48       mon:algo:digest (an image ID).
49
50
51       oci:path:tag**
52         An image tag in a directory compliant with "Open Container Image Lay‐
53       out Specification" at path.
54
55
56       oci-archive:path:tag
57         An image tag in a directory compliant with "Open Container Image Lay‐
58       out Specification" at path.
59
60
61       ostree:image[@/absolute/repo/path]
62         An image in local OSTree repository.  /absolute/repo/path defaults to
63       /ostree/repo.
64
65
66   DEPENDENCIES
67       Buildah resolves the path to the registry to pull  from  by  using  the
68       /etc/containers/registries.conf file, registries.conf(5).  If the buil‐
69       dah from command fails with an "image not known"  error,  first  verify
70       that  the  registries.conf  file  is installed and configured appropri‐
71       ately.
72
73

RETURN VALUE

75       The container ID of the container that was  created.   On  error  1  is
76       returned.
77
78

OPTIONS

80       --add-host=[]
81
82
83       Add a custom host-to-IP mapping (host:ip)
84
85
86       Add  a  line  to  /etc/hosts. The format is hostname:ip. The --add-host
87       option can be set multiple times.
88
89
90       --authfile path
91
92
93       Path of the authentication file. Default is ${XDG_RUNTIME_DIR}/contain‐
94       ers/auth.json,  which is set using buildah login.  If the authorization
95       state is not found there, $HOME/.docker/config.json is  checked,  which
96       is set using docker login.
97
98
99       --cap-add=CAP_xxx
100
101
102       Add  the  specified capability to the default set of capabilities which
103       will be supplied for subsequent buildah run invocations which use  this
104       container.   Certain  capabilities  are granted by default; this option
105       can be used to add more.
106
107
108       --cap-drop=CAP_xxx
109
110
111       Remove the specified capability from the default  set  of  capabilities
112       which will be supplied for subsequent buildah run invocations which use
113       this  container.   The  CAP_AUDIT_WRITE,  CAP_CHOWN,  CAP_DAC_OVERRIDE,
114       CAP_FOWNER,   CAP_FSETID,  CAP_KILL,  CAP_MKNOD,  CAP_NET_BIND_SERVICE,
115       CAP_SETFCAP, CAP_SETGID, CAP_SETPCAP,  CAP_SETUID,  and  CAP_SYS_CHROOT
116       capabilities  are granted by default; this option can be used to remove
117       them.
118
119
120       If a capability is specified  to  both  the  --cap-add  and  --cap-drop
121       options,  it  will  be  dropped,  regardless  of the order in which the
122       options were given.
123
124
125       --cert-dir path
126
127
128       Use certificates at path (*.crt, *.cert, *.key) to connect to the  reg‐
129       istry.  The default certificates directory is /etc/containers/certs.d.
130
131
132       --cgroup-parent=""
133
134
135       Path  to  cgroups under which the cgroup for the container will be cre‐
136       ated. If the path is not absolute, the path is considered to  be  rela‐
137       tive  to  the cgroups path of the init process. Cgroups will be created
138       if they do not already exist.
139
140
141       --cidfile ContainerIDFile
142
143
144       Write the container ID to the file.
145
146
147       --cni-config-dir=directory
148
149
150       Location of CNI configuration files which will  dictate  which  plugins
151       will  be used to configure network interfaces and routing when the con‐
152       tainer is subsequently used for buildah run, if processes to be started
153       will be run in their own network namespaces, and networking is not dis‐
154       abled.
155
156
157       --cni-plugin-path=directory[:directory[:directory[...]]]
158
159
160       List of directories in which the CNI plugins which  will  be  used  for
161       configuring network namespaces can be found.
162
163
164       --cpu-period=0
165
166
167       Limit the CPU CFS (Completely Fair Scheduler) period
168
169
170       Limit  the container's CPU usage. This flag tell the kernel to restrict
171       the container's CPU usage to the period you specify.
172
173
174       --cpu-quota=0
175
176
177       Limit the CPU CFS (Completely Fair Scheduler) quota
178
179
180       Limit the container's CPU usage. By default, containers  run  with  the
181       full  CPU  resource.  This  flag  tell  the kernel to restrict the con‐
182       tainer's CPU usage to the quota you specify.
183
184
185       --cpu-shares, -c=0
186
187
188       CPU shares (relative weight)
189
190
191       By default, all containers get the same proportion of CPU cycles.  This
192       proportion  can  be  modified  by  changing  the  container's CPU share
193       weighting relative to the weighting of all other running containers.
194
195
196       To modify the proportion from the default of 1024, use the --cpu-shares
197       flag to set the weighting to 2 or higher.
198
199
200       The  proportion  will  only apply when CPU-intensive processes are run‐
201       ning.  When tasks in one container are idle, other containers  can  use
202       the left-over CPU time. The actual amount of CPU time will vary depend‐
203       ing on the number of containers running on the system.
204
205
206       For example, consider three containers, one has a cpu-share of 1024 and
207       two others have a cpu-share setting of 512. When processes in all three
208       containers attempt to use  100%  of  CPU,  the  first  container  would
209       receive 50% of the total CPU time. If you add a fourth container with a
210       cpu-share of 1024, the first container only gets 33% of  the  CPU.  The
211       remaining containers receive 16.5%, 16.5% and 33% of the CPU.
212
213
214       On a multi-core system, the shares of CPU time are distributed over all
215       CPU cores. Even if a container is limited to  less  than  100%  of  CPU
216       time, it can use 100% of each individual CPU core.
217
218
219       For example, consider a system with more than three cores. If you start
220       one container {C0} with -c=512 running one process,  and  another  con‐
221       tainer  {C1} with -c=1024 running two processes, this can result in the
222       following division of CPU shares:
223
224
225              PID    container    CPU CPU share
226              100    {C0}     0   100% of CPU0
227              101    {C1}     1   100% of CPU1
228              102    {C1}     2   100% of CPU2
229
230
231
232       --cpuset-cpus=""
233
234
235       CPUs in which to allow execution (0-3, 0,1)
236
237
238       --cpuset-mems=""
239
240
241       Memory nodes (MEMs) in which to allow execution (0-3, 0,1). Only effec‐
242       tive on NUMA systems.
243
244
245       If   you   have   four   memory   nodes   on  your  system  (0-3),  use
246       --cpuset-mems=0,1 then processes in your container will only use memory
247       from the first two memory nodes.
248
249
250       --creds creds
251
252
253       The  [username[:password]]  to use to authenticate with the registry if
254       required.  If one or both values  are  not  supplied,  a  command  line
255       prompt  will  appear  and  the  value  can be entered.  The password is
256       entered without echo.
257
258
259       --dns=[]
260
261
262       Set custom DNS servers
263
264
265       This option can be used to override the DNS configuration passed to the
266       container.  Typically this is necessary when the host DNS configuration
267       is invalid for the container (e.g., 127.0.0.1). When this is  the  case
268       the --dns flag is necessary for every run.
269
270
271       The  special  value  none  can  be  specified  to  disable  creation of
272       /etc/resolv.conf in the container by Buildah. The /etc/resolv.conf file
273       in the image will be used without changes.
274
275
276       --dns-option=[]
277
278
279       Set custom DNS options
280
281
282       --dns-search=[]
283
284
285       Set custom DNS search domains
286
287
288       --http-proxy
289
290
291       By default proxy environment variables are passed into the container if
292       set for the Buildah process.  This  can  be  disabled  by  setting  the
293       --http-proxy  option  to  false.   The  environment variables passed in
294       include http_proxy, https_proxy,  ftp_proxy,  no_proxy,  and  also  the
295       upper case versions of those.
296
297
298       Defaults to true
299
300
301       --ipc how
302
303
304       Sets  the configuration for IPC namespaces when the container is subse‐
305       quently used for buildah run.  The configured  value  can  be  ""  (the
306       empty  string)  or  "container"  to  indicate  that a new IPC namespace
307       should be created, or it can be "host" to indicate that the IPC  names‐
308       pace  in  which Buildah itself is being run should be reused, or it can
309       be the path to an IPC namespace which is  already  in  use  by  another
310       process.
311
312
313       --isolation type
314
315
316       Controls  what  type  of  isolation is used for running processes under
317       buildah run.  Recognized types include oci (OCI-compatible runtime, the
318       default),  rootless  (OCI-compatible  runtime  invoked using a modified
319       configuration, with --no-new-keyring added to  its  create  invocation,
320       with network and UTS namespaces disabled, and IPC, PID, and user names‐
321       paces enabled; the default for  unprivileged  users),  and  chroot  (an
322       internal  wrapper that leans more toward chroot(1) than container tech‐
323       nology).
324
325
326       Note: You can also override the default isolation type by  setting  the
327       BUILDAH_ISOLATION environment variable.  export BUILDAH_ISOLATION=oci
328
329
330       --memory, -m=""
331
332
333       Memory limit (format: <number>[<unit>], where unit = b, k, m or g)
334
335
336       Allows  you  to  constrain  the memory available to a container. If the
337       host supports swap memory, then the -m memory  setting  can  be  larger
338       than  physical  RAM.  If  a limit of 0 is specified (not using -m), the
339       container's memory is not limited. The actual limit may be  rounded  up
340       to  a  multiple of the operating system's page size (the value would be
341       very large, that's millions of trillions).
342
343
344       --memory-swap="LIMIT"
345
346
347       A limit value equal to memory plus swap. Must  be  used  with  the   -m
348       (--memory) flag. The swap LIMIT should always be larger than -m (--mem‐
349       ory) value.  By default, the swap LIMIT will be set to double the value
350       of --memory.
351
352
353       The  format  of  LIMIT  is  <number>[<unit>].  Unit can be b (bytes), k
354       (kilobytes), m (megabytes), or g (gigabytes). If you  don't  specify  a
355       unit, b is used. Set LIMIT to -1 to enable unlimited swap.
356
357
358       --name name
359
360
361       A name for the working container
362
363
364       --net how --network how
365
366
367       Sets  the  configuration  for  network namespaces when the container is
368       subsequently used for buildah run.  The configured value can be "" (the
369       empty  string)  or "container" to indicate that a new network namespace
370       should be created, or it can be "host" to  indicate  that  the  network
371       namespace  in which Buildah itself is being run should be reused, or it
372       can be the path to a network namespace  which  is  already  in  use  by
373       another process.
374
375
376       --pid how
377
378
379       Sets  the configuration for PID namespaces when the container is subse‐
380       quently used for buildah run.  The configured  value  can  be  ""  (the
381       empty  string)  or  "container"  to  indicate  that a new PID namespace
382       should be created, or it can be "host" to indicate that the PID  names‐
383       pace  in  which Buildah itself is being run should be reused, or it can
384       be the path to a PID namespace which  is  already  in  use  by  another
385       process.
386
387
388       --pull
389
390
391       When  the  flag  is  enabled, attempt to pull the latest image from the
392       registries listed in registries.conf if a local image does not exist or
393       the image is newer than the one in storage. Raise an error if the image
394       is not in any listed registry and is not present locally.
395
396
397       If the flag is disabled (with --pull=false), do not pull the image from
398       the  registry,  use only the local version. Raise an error if the image
399       is not present locally.
400
401
402       Defaults to true.
403
404
405       --pull-always
406
407
408       Pull the image from the first registry it is found in as listed in reg‐
409       istries.conf.   Raise  an error if not found in the registries, even if
410       the image is present locally.
411
412
413       --quiet, -q
414
415
416       If an image needs to be pulled from  the  registry,  suppress  progress
417       output.
418
419
420       --security-opt=[]
421
422
423       Security Options
424
425
426       "label=user:USER"   : Set the label user for the container
427         "label=role:ROLE"   : Set the label role for the container
428         "label=type:TYPE"   : Set the label type for the container
429         "label=level:LEVEL" : Set the label level for the container
430         "label=disable"     : Turn off label confinement for the container
431         "no-new-privileges" : Not supported
432
433
434       "seccomp=unconfined" : Turn off seccomp confinement for the container
435         "seccomp=profile.json  :   White listed syscalls seccomp Json file to
436       be used as a seccomp filter
437
438
439       "apparmor=unconfined" : Turn off apparmor confinement for the container
440         "apparmor=your-profile" : Set the apparmor  confinement  profile  for
441       the container
442
443
444       --shm-size=""
445
446
447       Size  of /dev/shm. The format is <number><unit>. number must be greater
448       than 0.  Unit  is  optional  and  can  be  b  (bytes),  k  (kilobytes),
449       m(megabytes),  or g (gigabytes).  If you omit the unit, the system uses
450       bytes. If you omit the size entirely, the system uses 64m.
451
452
453       --tls-verify bool-value
454
455
456       Require HTTPS and verify certificates when talking  to  container  reg‐
457       istries (defaults to true)
458
459
460       --ulimit type=soft-limit[:hard-limit]
461
462
463       Specifies resource limits to apply to processes launched during buildah
464       run.  This option can be specified multiple times.  Recognized resource
465       types include:
466         "core": maximimum core dump size (ulimit -c)
467         "cpu": maximum CPU time (ulimit -t)
468         "data": maximum size of a process's data segment (ulimit -d)
469         "fsize": maximum size of new files (ulimit -f)
470         "locks": maximum number of file locks (ulimit -x)
471         "memlock": maximum amount of locked memory (ulimit -l)
472         "msgqueue": maximum amount of data in message queues (ulimit -q)
473         "nice": niceness adjustment (nice -n, ulimit -e)
474         "nofile": maximum number of open files (ulimit -n)
475         "nofile": maximum number of open files (1048576); when run by root
476         "nproc": maximum number of processes (ulimit -u)
477         "nproc": maximum number of processes (1048576); when run by root
478         "rss": maximum size of a process's (ulimit -m)
479         "rtprio": maximum real-time scheduling priority (ulimit -r)
480         "rttime":  maximum  amount  of  real-time  execution between blocking
481       syscalls
482         "sigpending": maximum number of pending signals (ulimit -i)
483         "stack": maximum stack size (ulimit -s)
484
485
486       --userns how
487
488
489       Sets the configuration for user namespaces when the container is subse‐
490       quently  used  for  buildah  run.   The configured value can be "" (the
491       empty string) or "container" to indicate  that  a  new  user  namespace
492       should be created, it can be "host" to indicate that the user namespace
493       in which Buildah itself is being run should be reused, or it can be the
494       path to an user namespace which is already in use by another process.
495
496
497       --userns-uid-map mapping
498
499
500       Directly specifies a UID mapping which should be used to set ownership,
501       at the filesytem level, on  the  container's  contents.   Commands  run
502       using  buildah  run  will default to being run in their own user names‐
503       paces, configured using the UID and GID maps.
504
505
506       Entries in this map take the form of one or more triples of a  starting
507       in-container UID, a corresponding starting host-level UID, and the num‐
508       ber of consecutive IDs which the map entry represents.
509
510
511       This option overrides the remap-uids setting in the options section  of
512       /etc/containers/storage.conf.
513
514
515       If  this option is not specified, but a global --userns-uid-map setting
516       is supplied, settings from the global option will be used.
517
518
519       If   none   of   --userns-uid-map-user,   --userns-gid-map-group,    or
520       --userns-uid-map  are specified, but --userns-gid-map is specified, the
521       UID map will be set to use the same numeric values as the GID map.
522
523
524       --userns-gid-map mapping
525
526
527       Directly specifies a GID mapping which should be used to set ownership,
528       at  the  filesytem  level,  on  the container's contents.  Commands run
529       using buildah run will default to being run in their  own  user  names‐
530       paces, configured using the UID and GID maps.
531
532
533       Entries  in this map take the form of one or more triples of a starting
534       in-container GID, a corresponding starting host-level GID, and the num‐
535       ber of consecutive IDs which the map entry represents.
536
537
538       This  option overrides the remap-gids setting in the options section of
539       /etc/containers/storage.conf.
540
541
542       If this option is not specified, but a global --userns-gid-map  setting
543       is supplied, settings from the global option will be used.
544
545
546       If    none   of   --userns-uid-map-user,   --userns-gid-map-group,   or
547       --userns-gid-map are specified, but --userns-uid-map is specified,  the
548       GID map will be set to use the same numeric values as the UID map.
549
550
551       --userns-uid-map-user user
552
553
554       Specifies  that a UID mapping which should be used to set ownership, at
555       the filesytem level, on the  container's  contents,  can  be  found  in
556       entries in the /etc/subuid file which correspond to the specified user.
557       Commands run using buildah run will default to being run in  their  own
558       user   namespaces,   configured   using  the  UID  and  GID  maps.   If
559       --userns-gid-map-group is specified, but --userns-uid-map-user  is  not
560       specified,  Buildah will assume that the specified group name is also a
561       suitable user name to use as the default setting for this option.
562
563
564       --userns-gid-map-group group
565
566
567       Specifies that a GID mapping which should be used to set ownership,  at
568       the  filesytem  level,  on  the  container's  contents, can be found in
569       entries in the /etc/subgid  file  which  correspond  to  the  specified
570       group.   Commands  run  using  buildah run will default to being run in
571       their own user namespaces, configured using the UID and GID  maps.   If
572       --userns-uid-map-user  is  specified, but --userns-gid-map-group is not
573       specified, Buildah will assume that the specified user name is  also  a
574       suitable group name to use as the default setting for this option.
575
576
577       --uts how
578
579
580       Sets  the configuration for UTS namespaces when the container is subse‐
581       quently used for buildah run.  The configured  value  can  be  ""  (the
582       empty  string)  or  "container"  to  indicate  that a new UTS namespace
583       should be created, or it can be "host" to indicate that the UTS  names‐
584       pace  in  which Buildah itself is being run should be reused, or it can
585       be the path to a UTS namespace which  is  already  in  use  by  another
586       process.
587
588
589       --volume, -v[=[HOST-DIR:CONTAINER-DIR[:OPTIONS]]]
590
591
592       Create a bind mount. If you specify, -v /HOST-DIR:/CONTAINER-DIR, Buil‐
593       dah
594          bind mounts /HOST-DIR in the host to /CONTAINER-DIR in the Buildah
595          container. The OPTIONS are a comma delimited list and can be:
596
597
598              · [rw|ro]
599
600              · [z|Z|O]
601
602              · [[r]shared|[r]slave|[r]private|[r]unbindable]
603
604
605
606       The CONTAINER-DIR must be an  absolute  path  such  as  /src/docs.  The
607       HOST-DIR  must  be  an  absolute  path as well. Buildah bind-mounts the
608       HOST-DIR to the path you specify. For example, if you  supply  /foo  as
609       the  host  path,  Buildah  copies the contents of /foo to the container
610       filesystem on the host and bind mounts that into the container.
611
612
613       You can specify multiple  -v options to mount one or more mounts  to  a
614       container.
615
616
617       You  can add the :ro or :rw suffix to a volume to mount it read-only or
618       read-write mode, respectively. By  default,  the  volumes  are  mounted
619       read-write.  See examples.
620
621
622       Labeling Volume Mounts
623
624
625       Labeling  systems like SELinux require that proper labels are placed on
626       volume content mounted into a container. Without a label, the  security
627       system  might  prevent  the processes running inside the container from
628       using the content. By default, Buildah does not change the  labels  set
629       by the OS.
630
631
632       To  change  a label in the container context, you can add either of two
633       suffixes :z or :Z to the volume mount. These suffixes tell  Buildah  to
634       relabel  file objects on the shared volumes. The z option tells Buildah
635       that two containers share the volume  content.  As  a  result,  Buildah
636       labels  the  content  with a shared content label. Shared volume labels
637       allow all containers to read/write content.  The Z option tells Buildah
638       to  label  the content with a private unshared label.  Only the current
639       container can use a private volume.
640
641
642       Overlay Volume Mounts
643
644
645       The :O flag tells Buildah to mount the directory from  the  host  as  a
646       temporary  storage  using the Overlay file system. The RUN command con‐
647       tainers are allowed to modify contents within the  mountpoint  and  are
648       stored  in the container storage in a separate directory.  In Ovelay FS
649       terms the source directory will be the lower, and the container storage
650       directory  will  be  the  upper.  Modifications  to the mount point are
651       destroyed when the RUN command finishes executing, similar to  a  tmpfs
652       mount point.
653
654
655       Any  subsequent  execution  of  RUN  commands  sees the original source
656       directory content, any changes from previous  RUN  commands  no  longer
657       exists.
658
659
660       One use case of the overlay mount is sharing the package cache from the
661       host into the container to allow speeding up builds.
662
663
664       Note:
665
666
667               - Overlay mounts are not currently supported in rootless mode.
668               - The `O` flag is not allowed to be specified with the `Z` or `z` flags. Content mounted into the container is labeled with the private label.
669                 On SELinux systems, labels in the source directory needs to be readable by the container label. If not, SELinux container separation must be disabled for the container to work.
670               - Modification of the directory volume mounted into the container with an overlay mount can cause unexpected failures.  It is recommended that you do not modify the directory until the container finishes running.
671
672
673
674       By default bind mounted volumes are private. That means any mounts done
675       inside  container  will not be visible on the host and vice versa. This
676       behavior can be changed by specifying a volume mount propagation  prop‐
677       erty.
678
679
680       When  the  mount  propagation  policy is set to shared, any mounts com‐
681       pleted inside the container on that volume will be visible to both  the
682       host  and container. When the mount propagation policy is set to slave,
683       one way mount propagation is enabled and any mounts  completed  on  the
684       host  for that volume will be visible only inside of the container.  To
685       control  the  mount  propagation  property  of  the  volume   use   the
686       :[r]shared, :[r]slave, [r]private or [r]unbindablepropagation flag. The
687       propagation property can be specified only for bind mounted volumes and
688       not  for  internal  volumes  or named volumes. For mount propagation to
689       work on the source mount point (the mount point  where  source  dir  is
690       mounted on) it has to have the right propagation properties. For shared
691       volumes, the source mount point has to be shared. And  for  slave  vol‐
692       umes, the source mount has to be either shared or slave.
693
694
695       Use  df <source-dir> to determine the source mount and then use findmnt
696       -o TARGET,PROPAGATION <source-mount-dir> to determine propagation prop‐
697       erties of source mount, if findmnt utility is not available, the source
698       mount point can  be  determined  by  looking  at  the  mount  entry  in
699       /proc/self/mountinfo. Look at optional fields and see if any propagaion
700       properties are specified.  shared:X means the mount is shared, master:X
701       means  the  mount is slave and if nothing is there that means the mount
702       is private.
703
704
705       To change propagation properties of a mount point use  the  mount  com‐
706       mand.  For  example,  to  bind mount the source directory /foo do mount
707       --bind /foo /foo and mount --make-private --make-shared /foo. This will
708       convert  /foo into a shared mount point.  The propagation properties of
709       the source mount can be changed directly. For  instance  if  /  is  the
710       source mount for /foo, then use mount --make-shared / to convert / into
711       a shared mount.
712
713

EXAMPLE

715       buildah from --pull imagename
716
717
718       buildah from --pull docker://myregistry.example.com/imagename
719
720
721       buildah from docker-daemon:imagename:imagetag
722
723
724       buildah from --name mycontainer docker-archive:filename
725
726
727       buildah from oci-archive:filename
728
729
730       buildah from --name mycontainer dir:directoryname
731
732
733       buildah  from  --pull-always   --name   "mycontainer"   docker://myreg‐
734       istry.example.com/imagename
735
736
737       buildah    from    --tls-verify=false    myregistry/myrepository/image‐
738       name:imagetag
739
740
741       buildah from --creds=myusername:mypassword  --cert-dir    /auth  myreg‐
742       istry/myrepository/imagename:imagetag
743
744
745       buildah  from  --authfile=/tmp/auths/myauths.json  myregistry/myreposi‐
746       tory/imagename:imagetag
747
748
749       buildah from --memory 40m  --cpu-shares  2  --cpuset-cpus  0,2  --secu‐
750       rity-opt     label=level:s0:c100,c200    myregistry/myrepository/image‐
751       name:imagetag
752
753
754       buildah     from     --ulimit     nofile=1024:1028      --cgroup-parent
755       /path/to/cgroup/parent myregistry/myrepository/imagename:imagetag
756
757
758       buildah   from   --volume  /home/test:/myvol:ro,Z  myregistry/myreposi‐
759       tory/imagename:imagetag
760
761
762       buildah  from   -v   /var/lib/yum:/var/lib/yum:O   myregistry/myreposi‐
763       tory/imagename:imagetag
764
765

Files

767       registries.conf (/etc/containers/registries.conf)
768
769
770       registries.conf  is  the  configuration file which specifies which con‐
771       tainer registries should be consulted when completing image names which
772       do not include a registry or domain portion.
773
774
775       policy.json (/etc/containers/policy.json)
776
777
778       Signature  policy  file.   This  defines the trust policy for container
779       images.  Controls which container registries can be used for image, and
780       whether or not the tool should trust the images.
781
782

SEE ALSO

784       buildah(1),  buildah-pull(1), buildah-login(1), docker-login(1), names‐
785       paces(7),   pid_namespaces(7),   policy.json(5),    registries.conf(5),
786       user_namespaces(7)
787
788
789
790buildah                           March 2017                   buildah-from(1)
Impressum