1podman-system-service(1)    General Commands Manual   podman-system-service(1)
2
3
4

NAME

6       podman-system-service - Run an API service
7
8

SYNOPSIS

10       podman system service [options]
11
12

DESCRIPTION

14       The  podman system service command creates a listening service that an‐
15       swers API calls for Podman.  The command is available on Linux  systems
16       and is usually executed in systemd services.  The command is not avail‐
17       able when the Podman command is executed directly on a Windows or macOS
18       host or in other situations where the Podman command is accessing a re‐
19       mote Podman API service.
20
21
22       The REST API provided by podman system service is split into two parts:
23       a  compatibility layer offering support for the Docker v1.40 API, and a
24       Podman-native Libpod layer.  Documentation for the latter is  available
25       at  https://docs.podman.io/en/latest/_static/api.html.   Both  APIs are
26       versioned, but the server does not reject requests with an  unsupported
27       version set.
28
29
30   Run the command in a systemd service
31       The  command  podman system service supports systemd socket activation.
32       When the command is run in a  systemd  service,  the  API  service  can
33       therefore be provided on demand.  If the systemd service is not already
34       running, it will be activated as soon as a client connects to the  lis‐
35       tening socket. Systemd then executes the podman system service command.
36       After some time of inactivity, as defined by  the  --time  option,  the
37       command terminates.  Systemd sets the podman.service state as inactive.
38       At this point there is no podman system service process running. No un‐
39       necessary compute resources are wasted.  As soon as another client con‐
40       nects, systemd activates the systemd service again.
41
42
43       The systemd unit files that declares the Podman API service  for  users
44       are
45
46
47/usr/lib/systemd/user/podman.service
48
49/usr/lib/systemd/user/podman.socket
50
51
52
53       In  the file podman.socket the path of the listening Unix socket is de‐
54       fined by
55
56       ListenStream=%t/podman/podman.sock
57
58
59
60       The path contains the systemd specifier %t which systemd expands to the
61       value  of  the environment variable XDG_RUNTIME_DIR (see systemd speci‐
62       fiers in the systemd.unit(5) man page).
63
64
65       In addition to the systemd user services, there is also a systemd  sys‐
66       tem  service  podman.service.   It  runs rootful Podman and is accessed
67       from the Unix socket  /run/podman/podman.sock.  See  the  systemd  unit
68       files
69
70
71/usr/lib/systemd/system/podman.service
72
73/usr/lib/systemd/system/podman.socket
74
75
76
77       The  podman  system service command does not support more than one lis‐
78       tening socket for the API service.
79
80
81       Note: The default systemd unit files (system and user) change the  log-
82       level option to info from error. This change provides additional infor‐
83       mation on each API call.
84
85
86   Run the command directly
87       To support running an API service without using a systemd service,  the
88       command  also  takes  an  optional endpoint argument for the API in URI
89       form.  For example,  unix:///tmp/foobar.sock  or  tcp://localhost:8080.
90       If no endpoint is provided, defaults is used.  The default endpoint for
91       a rootful service is  unix:///run/podman/podman.sock  and  rootless  is
92       unix://$XDG_RUNTIME_DIR/podman/podman.sock         (for         example
93       unix:///run/user/1000/podman/podman.sock)
94
95
96   Access the Unix socket from inside a container
97       To access the API service inside a container: - mount the socket  as  a
98       volume - run the container with --security-opt label=disable
99
100
101   Security
102       Please  note  that the API grants full access to all Podman functional‐
103       ity, and thus allows arbitrary code execution as the user  running  the
104       API, with no ability to limit or audit this access.  The API's security
105       model is built upon access via a Unix socket with access restricted via
106       standard file permissions, ensuring that only the user running the ser‐
107       vice will be able to access it.  We strongly recommend  against  making
108       the API socket available via the network (IE, bindings the service to a
109       tcp URL).  Even access via Localhost carries risks - anyone with access
110       to  the system will be able to access the API.  If remote access is re‐
111       quired, we instead recommend forwarding the API  socket  via  SSH,  and
112       limiting  access on the remote machine to the greatest extent possible.
113       If a tcp URL must be used, using the --cors option  is  recommended  to
114       improve security.
115
116

OPTIONS

118   --cors
119       CORS headers to inject to the HTTP response. The default value is empty
120       string which disables CORS headers.
121
122
123   --help, -h
124       Print usage statement.
125
126
127   --time, -t
128       The time until the session expires in seconds. The default  is  5  sec‐
129       onds. A value of 0 means no timeout, therefore the session does not ex‐
130       pire.
131
132
133       The default timeout can be changed via the service_timeout=VALUE  field
134       in containers.conf.  See containers.conf(5) for more information.
135
136

EXAMPLES

138       To start the systemd socket for a rootless service, run as the user:
139
140       systemctl --user start podman.socket
141
142
143
144       The  socket can then be used by for example docker-compose that needs a
145       Docker-compatible API.
146
147       $ ls $XDG_RUNTIME_DIR/podman/podman.sock
148       /run/user/1000/podman/podman.sock
149       $ export DOCKER_HOST=unix://$XDG_RUNTIME_DIR/podman/podman.sock
150       $ docker-compose up
151
152
153
154       To configure the systemd socket to be automatically started  after  re‐
155       boots, run as the user:
156
157       systemctl --user enable podman.socket
158       loginctl enable-linger <USER>
159
160
161
162       To start the systemd socket for the rootful service, run:
163
164       sudo systemctl start podman.socket
165
166
167
168       To configure the socket to be automatically started after reboots, run:
169
170       sudo systemctl enable podman.socket
171
172
173
174       It  is possible to run the API without using systemd socket activation.
175       In this case the API will not be available on demand because  the  com‐
176       mand will stay terminated after the inactivity timeout has passed.  Run
177       an API with an inactivity timeout of 5 seconds without using socket ac‐
178       tivation:
179
180       podman system service --time 5
181
182
183
184       The default socket was used as no URI argument was provided.
185
186

SEE ALSO

188       podman(1), podman-system-connection(1), containers.conf(5)
189
190

HISTORY

192       January  2020,  Originally  compiled by Brent Baude <bbaude@redhat.com>
193       November 2020, Updated by Jhon Honce (jhonce at redhat dot com)
194
195
196
197                                                      podman-system-service(1)
Impressum