1containers.conf(5) configuration containers.conf(5)
2
3
4
6 containers.conf - The container engine configuration file specifies de‐
7 fault configuration options and command-line flags for container en‐
8 gines.
9
10
11
13 Container engines like Podman & Buildah read containers.conf file, if
14 it exists and modify the defaults for running containers on the host.
15 containers.conf uses a TOML format that can be easily modified and ver‐
16 sioned.
17
18
19 Container engines read the /usr/share/containers/containers.conf and
20 /etc/containers/containers.conf, and /etc/containers/contain‐
21 ers.conf.d/.conf files if they exist. When running in rootless mode,
22 they also read $HOME/.config/containers/containers.conf and $HOME/.con‐
23 fig/containers/containers.conf.d/.conf files.
24
25
26 Fields specified in containers conf override the default options, as
27 well as options in previously read containers.conf files.
28
29
30 Config files in the .d directories, are added in alpha numeric sorted
31 order and must end in .conf.
32
33
34 Not all options are supported in all container engines.
35
36
37 Note container engines also use other configuration files for configur‐
38 ing the environment.
39
40
41 • storage.conf for configuration of container and images stor‐
42 age.
43
44 • registries.conf for definition of container registires to
45 search while pulling. container images.
46
47 • policy.conf for controlling which images can be pulled to the
48 system.
49
50
51
52
54 The TOML format ⟨https://github.com/toml-lang/toml⟩ is used as the en‐
55 coding of the configuration file. Every option is nested under its ta‐
56 ble. No bare options are used. The format of TOML can be simplified to:
57
58
59 [table1]
60 option = value
61
62 [table2]
63 option = value
64
65 [table3]
66 option = value
67
68 [table3.subtable1]
69 option = value
70
71
72
74 The containers table contains settings to configure and manage the OCI
75 runtime.
76
77
78 annotations = [] List of annotations. Specified as "key=value" pairs to
79 be added to all containers.
80
81
82 Example: "run.oci.keep_original_groups=1"
83
84
85 apparmor_profile="container-default"
86
87
88 Used to change the name of the default AppArmor profile of container
89 engines. The default profile name is "container-default".
90
91
92 cgroups="enabled"
93
94
95 Determines whether the container will create CGroups. Options are:
96 enabled Enable cgroup support within container
97 disabled Disable cgroup support, will inherit cgroups from parent
98 no-conmon Do not create a cgroup dedicated to conmon.
99
100
101 cgroupns="private"
102
103
104 Default way to to create a cgroup namespace for the container. Options
105 are: private Create private Cgroup Namespace for the container. host
106 Share host Cgroup Namespace with the container.
107
108
109 default_capabilities=[]
110
111
112 List of default capabilities for containers.
113
114
115 The default list is:
116
117
118 default_capabilities = [
119 "AUDIT_WRITE",
120 "CHOWN",
121 "DAC_OVERRIDE",
122 "FOWNER",
123 "FSETID",
124 "KILL",
125 "MKNOD",
126 "NET_BIND_SERVICE",
127 "NET_RAW",
128 "SETGID",
129 "SETPCAP",
130 "SETUID",
131 "SYS_CHROOT",
132 ]
133
134
135
136 default_sysctls=[]
137
138
139 A list of sysctls to be set in containers by default, specified as
140 "name=value".
141
142
143 Example:"net.ipv4.ping_group_range=0 1000".
144
145
146 default_ulimits=[]
147
148
149 A list of ulimits to be set in containers by default, specified as
150 "name=soft-limit:hard-limit".
151
152
153 Example: "nofile=1024:2048".
154
155
156 devices=[]
157
158
159 List of devices. Specified as 'device-on-host:device-on-container:per‐
160 missions'.
161
162
163 Example: "/dev/sdc:/dev/xvdc:rwm".
164
165
166 dns_options=[]
167
168
169 List of default DNS options to be added to /etc/resolv.conf inside of
170 the container.
171
172
173 dns_searches=[]
174
175
176 List of default DNS search domains to be added to /etc/resolv.conf in‐
177 side of the container.
178
179
180 dns_servers=[]
181
182
183 A list of dns servers to override the DNS configuration passed to the
184 container. The special value “none” can be specified to disable cre‐
185 ation of /etc/resolv.conf in the container.
186
187
188 env=["PATH=/usr/local/sbin:/usr/lo‐
189 cal/bin:/usr/sbin:/usr/bin:/sbin:/bin", "TERM=xterm"]
190
191
192 Environment variable list for the container process, used for passing
193 environment variables to the container.
194
195
196 env_host=false
197
198
199 Pass all host environment variables into the container.
200
201
202 http_proxy=true
203
204
205 Default proxy environment variables will be passed into the container.
206 The environment variables passed in include: http_proxy, https_proxy,
207 ftp_proxy, no_proxy, and the upper case versions of these. The no_proxy
208 option is needed when host system uses a proxy but container should not
209 use proxy. Proxy environment variables specified for the container in
210 any other way will override the values passed from the host.
211
212
213 init=false
214
215
216 Run an init inside the container that forwards signals and reaps pro‐
217 cesses.
218
219
220 init_path="/usr/libexec/podman/catatonit"
221
222
223 Path to the container-init binary, which forwards signals and reaps
224 processes within containers. Note that the container-init binary will
225 only be used when the --init for podman-create and podman-run is set.
226
227
228 ipcns="shareable"
229
230
231 Default way to to create a IPC namespace for the container. Options
232 are:
233 host Share host IPC Namespace with the container.
234 none Create shareable IPC Namespace for the container without a
235 private /dev/shm.
236 private Create private IPC Namespace for the container, other con‐
237 tainers are not allowed to share it.
238 shareable Create shareable IPC Namespace for the container.
239
240
241 keyring=true
242
243
244 Indicates whether the container engines create a kernel keyring for use
245 within the container.
246
247
248 label=true
249
250
251 Indicates whether the container engine uses MAC(SELinux) container sep‐
252 aration via labeling. This option is ignored on disabled systems.
253
254
255 log_driver="k8s-file"
256
257
258 Logging driver for the container. Available options: k8s-file and jour‐
259 nald.
260
261
262 log_size_max=-1
263
264
265 Maximum size allowed for the container's log file. Negative numbers in‐
266 dicate that no size limit is imposed. If it is positive, it must be >=
267 8192 to match/exceed conmon's read buffer. The file is truncated and
268 re-opened so the limit is never exceeded.
269
270
271 log_tag=""
272
273
274 Default format tag for container log messages. This is useful for cre‐
275 ating a specific tag for container log messages. Container log messages
276 default to using the truncated container ID as a tag.
277
278
279 netns="private"
280
281
282 Default way to to create a NET namespace for the container. Options
283 are:
284 private Create private NET Namespace for the container.
285 host Share host NET Namespace with the container.
286 none Containers do not use the network.
287
288
289 no_hosts=false
290
291
292 Create /etc/hosts for the container. By default, container engines man‐
293 age /etc/hosts, automatically adding the container's own IP ad‐
294 dress.
295
296
297 pidns="private"
298
299
300 Default way to to create a PID namespace for the container. Options
301 are:
302 private Create private PID Namespace for the container.
303 host Share host PID Namespace with the container.
304
305
306 pids_limit=1024
307
308
309 Maximum number of processes allowed in a container. 0 indicates that no
310 limit is imposed.
311
312
313 prepare_volume_on_create=false
314
315
316 Copy the content from the underlying image into the newly created vol‐
317 ume when the container is created instead of when it is started. If
318 false, the container engine will not copy the content until the con‐
319 tainer is started. Setting it to true may have negative performance im‐
320 plications.
321
322
323 seccomp_profile="/usr/share/containers/seccomp.json"
324
325
326 Path to the seccomp.json profile which is used as the default seccomp
327 profile for the runtime.
328
329
330 shm_size="65536k"
331
332
333 Size of /dev/shm. The format is <number><unit>. number must be greater
334 than 0. Unit is optional and can be: b (bytes), k (kilobytes),
335 m(megabytes), or g (gigabytes). If you omit the unit, the system uses
336 bytes. If you omit the size entirely, the system uses 65536k.
337
338
339 tz=""
340
341
342 Set timezone in container. Takes IANA timezones as well as local, which
343 sets the timezone in the container to match the host machine. If not
344 set, then containers will run with the time zone specified in the im‐
345 age.
346
347
348 Examples:
349 tz="local"
350 tz="America/New_York"
351
352
353 umask="0022"
354
355
356 Sets umask inside the container.
357
358
359 userns="host"
360
361
362 Default way to to create a USER namespace for the container. Options
363 are:
364 private Create private USER Namespace for the container.
365 host Share host USER Namespace with the container.
366
367
368 userns_size=65536
369
370
371 Number of UIDs to allocate for the automatic container creation. UIDs
372 are allocated from the “container” UIDs listed in /etc/subuid &
373 /etc/subgid.
374
375
376 utsns="private"
377
378
379 Default way to to create a UTS namespace for the container. Options
380 are:
381 private Create private UTS Namespace for the container.
382 host Share host UTS Namespace with the container.
383
384
385 volumes=[]
386
387
388 List of volumes. Specified as "directory-on-host:directory-in-con‐
389 tainer:options".
390
391
392 Example: "/db:/var/lib/db:ro".
393
394
396 The network table contains settings pertaining to the management of CNI
397 plugins.
398
399
400 network_backend=""
401
402
403 Network backend determines what network driver will be used to set up
404 and tear down container networks. Valid values are "cni" and "ne‐
405 tavark". The default value is empty which means that it will automati‐
406 cally choose CNI or netavark. If there are already containers/images or
407 CNI networks preset it will choose CNI.
408
409
410 Before changing this value all containers must be stopped otherwise it
411 is likely that iptables rules and network interfaces might leak on the
412 host. A reboot will fix this.
413
414
415 cni_plugin_dirs=[]
416
417
418 List of paths to directories where CNI plugin binaries are located.
419
420
421 The default list is:
422
423
424 cni_plugin_dirs = [
425 "/usr/local/libexec/cni",
426 "/usr/libexec/cni",
427 "/usr/local/lib/cni",
428 "/usr/lib/cni",
429 "/opt/cni/bin",
430 ]
431
432
433
434 default_network="podman"
435
436
437 The network name of the default network to attach pods to.
438
439
440 default_subnet="10.88.0.0/16"
441
442
443 The subnet to use for the default network (named above in default_net‐
444 work). If the default network does not exist, it will be automatically
445 created the first time a tool is run using this subnet.
446
447
448 default_subnet_pools=[]
449
450
451 DefaultSubnetPools is a list of subnets and size which are used to al‐
452 locate subnets automatically for podman network create. It will iter‐
453 ate through the list and will pick the first free subnet with the given
454 size. This is only used for ipv4 subnets, ipv6 subnets are always as‐
455 signed randomly.
456
457
458 The default list is (10.89.0.0-10.255.255.0/24):
459
460
461 default_subnet_pools = [
462 {"base" = "10.89.0.0/16", "size" = 24},
463 {"base" = "10.90.0.0/15", "size" = 24},
464 {"base" = "10.92.0.0/14", "size" = 24},
465 {"base" = "10.96.0.0/11", "size" = 24},
466 {"base" = "10.128.0.0/9", "size" = 24},
467 ]
468
469
470
471 network_config_dir="/etc/cni/net.d/"
472
473
474 Path to the directory where network configuration files are located.
475 For the CNI backend the default is "/etc/cni/net.d" as root and
476 "$HOME/.config/cni/net.d" as rootless. For the netavark backend
477 "/etc/containers/networks" is used as root and "$graphroot/networks" as
478 rootless.
479
480
482 The engine table contains configuration options used to set up con‐
483 tainer engines such as Podman and Buildah.
484
485
486 active_service=""
487
488
489 Name of destination for accessing the Podman service. See SERVICE DES‐
490 TINATION TABLE below.
491
492
493 cgroup_manager="systemd"
494
495
496 The cgroup management implementation used for the runtime. Supports
497 cgroupfs and systemd.
498
499
500 conmon_env_vars=[]
501
502
503 Environment variables to pass into Conmon.
504
505
506 conmon_path=[]
507
508
509 Paths to search for the conmon container manager binary. If the paths
510 are empty or no valid path was found, then the $PATH environment vari‐
511 able will be used as the fallback.
512
513
514 The default list is:
515
516
517 conmon_path=[
518 "/usr/libexec/podman/conmon",
519 "/usr/local/libexec/podman/conmon",
520 "/usr/local/lib/podman/conmon",
521 "/usr/bin/conmon",
522 "/usr/sbin/conmon",
523 "/usr/local/bin/conmon",
524 "/usr/local/sbin/conmon",
525 "/run/current-system/sw/bin/conmon",
526 ]
527
528
529
530 detach_keys="ctrl-p,ctrl-q"
531
532
533 Keys sequence used for detaching a container. Specify the keys se‐
534 quence used to detach a container. Format is a single character [a-Z]
535 or a comma separated sequence of ctrl-<value>, where <value> is one of:
536 a-z, @, ^, [, \, ], ^ or _
537
538
539 enable_port_reservation=true
540
541
542 Determines whether the engine will reserve ports on the host when they
543 are forwarded to containers. When enabled, when ports are forwarded to
544 containers, they are held open by conmon as long as the container is
545 running, ensuring that they cannot be reused by other programs on the
546 host. However, this can cause significant memory usage if a container
547 has many ports forwarded to it. Disabling this can save memory.
548
549
550 env=[]
551
552
553 Environment variables to be used when running the container engine
554 (e.g., Podman, Buildah). For example "http_proxy=internal.proxy.com‐
555 pany.com". Note these environment variables will not be used within
556 the container. Set the env section under [containers] table, if you
557 want to set environment variables for the container.
558
559
560 events_logfile_path=""
561
562
563 Define where event logs will be stored, when events_logger is "file".
564
565
566 events_logfile_max_size=0
567
568
569 Sets the maximum size for events_logfile_path in bytes. When the limit
570 is exceeded, the logfile will be rotated and the old one will be
571 deleted. If the maximumn size is set to 0, then no limit will be ap‐
572 plied, and the logfile will not be rotated.
573
574
575 events_logger="journald"
576
577
578 Default method to use when logging events. Valid values: file, jour‐
579 nald, and none.
580
581
582 helper_binaries_dir=["/usr/libexec/podman", ...]
583
584
585 A is a list of directories which are used to search for helper bina‐
586 ries.
587
588
589 The default paths on Linux are: - /usr/local/libexec/podman - /usr/lo‐
590 cal/lib/podman - /usr/libexec/podman - /usr/lib/podman
591
592
593 The default paths on macOS are: - /usr/local/opt/podman/libexec
594 - /opt/homebrew/bin - /opt/homebrew/opt/podman/libexec - /usr/lo‐
595 cal/bin - /usr/local/libexec/podman - /usr/local/lib/podman
596 - /usr/libexec/podman - /usr/lib/podman
597
598
599 The default path on Windows is: - C:\Program Files\RedHat\Podman
600
601
602 hooks_dir=["/etc/containers/oci/hooks.d", ...]
603
604
605 Path to the OCI hooks directories for automatically executed hooks.
606
607
608 image_default_format="oci"|"v2s2"|"v2s1"
609
610
611 Manifest Type (oci, v2s2, or v2s1) to use when pulling, pushing, build‐
612 ing container images. By default images pulled and pushed match the
613 format of the source image. Building/committing defaults to OCI. Note:
614 image_build_format is deprecated.
615
616
617 image_default_transport="docker://"
618
619
620 Default transport method for pulling and pushing images.
621
622
623 image_parallel_copies=0
624
625
626 Maximum number of image layers to be copied (pulled/pushed) simultane‐
627 ously. Not setting this field will fall back to containers/image de‐
628 faults. (6)
629
630
631 infra_command="/pause"
632
633
634 Infra (pause) container image command for pod infra containers. When
635 running a pod, we start a /pause process in a container to hold open
636 the namespaces associated with the pod. This container does nothing
637 other then sleep, reserving the pods resources for the lifetime of the
638 pod.
639
640
641 infra_image=""
642
643
644 Infra (pause) container image for pod infra containers. When running a
645 pod, we start a pause process in a container to hold open the name‐
646 spaces associated with the pod. This container does nothing other then
647 sleep, reserving the pods resources for the lifetime of the pod. By de‐
648 fault container engines run a builtin container using the pause exe‐
649 cutable. If you want override specify an image to pull.
650
651
652 lock_type="shm"
653
654
655 Specify the locking mechanism to use; valid values are "shm" and
656 "file". Change the default only if you are sure of what you are doing,
657 in general "file" is useful only on platforms where cgo is not avail‐
658 able for using the faster "shm" lock type. You may need to run "podman
659 system renumber" after you change the lock type.
660
661
662 machine_enabled=false
663
664
665 Indicates if Podman is running inside a VM via Podman Machine. Podman
666 uses this value to do extra setup around networking from the container
667 inside the VM to to host.
668
669
670 multi_image_archive=false
671
672
673 Allows for creating archives (e.g., tarballs) with more than one image.
674 Some container engines, such as Podman, interpret additional arguments
675 as tags for one image and hence do not store more than one image. The
676 default behavior can be altered with this option.
677
678
679 namespace=""
680
681
682 Default engine namespace. If the engine is joined to a namespace, it
683 will see only containers and pods that were created in the same name‐
684 space, and will create new containers and pods in that namespace. The
685 default namespace is "", which corresponds to no namespace. When no
686 namespace is set, all containers and pods are visible.
687
688
689 network_cmd_path=""
690
691
692 Path to the slirp4netns binary.
693
694
695 network_cmd_options=["enable_ipv6=true",]
696
697
698 Default options to pass to the slirp4netns binary.
699
700
701 Valid options values are:
702
703
704 • allow_host_loopback=true|false: Allow the slirp4netns to reach
705 the host loopback IP (10.0.2.2, which is added to /etc/hosts
706 as host.containers.internal for your convenience). Default is
707 false.
708
709 • mtu=MTU: Specify the MTU to use for this network. (Default is
710 65520).
711
712 • cidr=CIDR: Specify ip range to use for this network. (Default
713 is 10.0.2.0/24).
714
715 • enable_ipv6=true|false: Enable IPv6. Default is false. (Re‐
716 quired for outbound_addr6).
717
718 • outbound_addr=INTERFACE: Specify the outbound interface slirp
719 should bind to (ipv4 traffic only).
720
721 • outbound_addr=IPv4: Specify the outbound ipv4 address slirp
722 should bind to.
723
724 • outbound_addr6=INTERFACE: Specify the outbound interface slirp
725 should bind to (ipv6 traffic only).
726
727 • outbound_addr6=IPv6: Specify the outbound ipv6 address slirp
728 should bind to.
729
730 • port_handler=rootlesskit: Use rootlesskit for port forwarding.
731 Default. Note: Rootlesskit changes the source IP address of
732 incoming packets to a IP address in the container network
733 namespace, usually 10.0.2.100. If your application requires
734 the real source IP address, e.g. web server logs, use the
735 slirp4netns port handler. The rootlesskit port handler is also
736 used for rootless containers when connected to user-defined
737 networks.
738
739 • port_handler=slirp4netns: Use the slirp4netns port forwarding,
740 it is slower than rootlesskit but preserves the correct source
741 IP address. This port handler cannot be used for user-defined
742 networks.
743
744
745
746 no_pivot_root=false
747
748
749 Whether to use chroot instead of pivot_root in the runtime.
750
751
752 num_locks=2048
753
754
755 Number of locks available for containers and pods. Each created con‐
756 tainer or pod consumes one lock. The default number available is 2048.
757 If this is changed, a lock renumbering must be performed, using the
758 podman system renumber command.
759
760
761 pull_policy="always"|"missing"|"never"
762
763
764 Pull image before running or creating a container. The default is miss‐
765 ing.
766
767
768 • missing: attempt to pull the latest image from the registries
769 listed in registries.conf if a local image does not exist.
770 Raise an error if the image is not in any listed registry and
771 is not present locally.
772
773 • always: pull the image from the first registry it is found in
774 as listed in registries.conf. Raise an error if not found in
775 the registries, even if the image is present locally.
776
777 • never: do not pull the image from the registry, use only the
778 local version. Raise an error if the image is not present lo‐
779 cally.
780
781
782
783 remote = false Indicates whether the application should be running in
784 remote mode. This flag modifies the --remote option on container en‐
785 gines. Setting the flag to true will default podman --remote=true for
786 access to the remote Podman service.
787
788
789 runtime=""
790
791
792 Default OCI specific runtime in runtimes that will be used by default.
793 Must refer to a member of the runtimes table. Default runtime will be
794 searched for on the system using the priority: "crun", "runc", "kata".
795
796
797 runtime_supports_json=["crun", "runc", "kata", "runsc", "krun"]
798
799
800 The list of the OCI runtimes that support --format=json.
801
802
803 runtime_supports_kvm=["kata", "krun"]
804
805
806 The list of OCI runtimes that support running containers with KVM sepa‐
807 ration.
808
809
810 runtime_supports_nocgroups=["crun", "krun"]
811
812
813 The list of OCI runtimes that support running containers without
814 CGroups.
815
816
817 image_copy_tmp_dir="/var/tmp"
818
819
820 Default location for storing temporary container image content. Can be
821 overridden with the TMPDIR environment variable. If you specify "stor‐
822 age", then the location of the container/storage tmp directory will be
823 used. If set then it is the users responsibility to cleanup storage.
824 Configure tmpfiles.d(5) to cleanup storage.
825
826
827 service_timeout=5
828
829
830 Number of seconds to wait without a connection before the podman sys‐
831 tem service times out and exits
832
833
834 static_dir="/var/lib/containers/storage/libpod"
835
836
837 Directory for persistent libpod files (database, etc). By default this
838 will be configured relative to where containers/storage stores contain‐
839 ers.
840
841
842 stop_timeout=10
843
844
845 Number of seconds to wait for container to exit before sending kill
846 signal.
847
848
849 exit_command_delay=300
850
851
852 Number of seconds to wait for the API process for the exec call before
853 sending exit command mimicking the Docker behavior of 5 minutes (in
854 seconds).
855
856
857 tmp_dir="/run/libpod"
858
859
860 The path to a temporary directory to store per-boot container. Must be
861 a tmpfs (wiped after reboot).
862
863
864 volume_path="/var/lib/containers/storage/volumes"
865
866
867 Directory where named volumes will be created in using the default vol‐
868 ume driver. By default this will be configured relative to where con‐
869 tainers/storage store containers. This convention is followed by the
870 default volume driver, but may not be by other drivers.
871
872
873 chown_copied_files=true
874
875
876 Determines whether file copied into a container will have changed own‐
877 ership to the primary uid/gid of the container.
878
879
880 compression_format=""
881
882
883 Specifies the compression format to use when pushing an image. Sup‐
884 ported values are: gzip, zstd and zstd:chunked.
885
886
888 The service_destinations table contains configuration options used to
889 set up remote connections to the podman service for the podman API.
890
891
892 [service_destinations.{name}] URI to access the Podman service
893 uri="ssh://user@production.example.com/run/user/1001/podman/pod‐
894 man.sock"
895
896
897 Example URIs:
898
899
900 • rootless local - unix://run/user/1000/podman/podman.sock
901
902 • rootless remote - ssh://user@engineering.lab.com‐
903 pany.com/run/user/1000/podman/podman.sock
904
905 • rootfull local - unix://run/podman/podman.sock
906
907 • rootfull remote - ssh://root@10.10.1.136:22/run/podman/pod‐
908 man.sock
909
910
911
912 identity="~/.ssh/id_rsa
913
914
915 Path to file containing ssh identity key
916
917
918 [engine.volume_plugins]
919
920
921 A table of all the enabled volume plugins on the system. Volume plugins
922 can be used as the backend for Podman named volumes. Individual plugins
923 are specified below, as a map of the plugin name (what the plugin will
924 be called) to its path (filepath of the plugin's unix socket).
925
926
928 The secret table contains settings for the configuration of the secret
929 subsystem.
930
931
932 driver=file
933
934
935 Name of the secret driver to be used. Currently valid values are:
936 * file
937 * pass
938
939
940 [secrets.opts]
941
942
943 The driver specific options object.
944
945
947 The machine table contains configurations for podman machine VMs
948
949
950 cpus=1 Number of CPU's a machine is created with.
951
952
953 disk_size=10
954
955
956 The size of the disk in GB created when init-ing a podman-machine VM
957
958
959 image=""
960
961
962 Default image used when creating a new VM using podman machine init.
963 Options: On Linux/Mac, testing, stable, next. On Windows, the major
964 version of the OS (e.g 35). For all platforms you can alternatively
965 specify a custom path or download URL to an image. The default is test‐
966 ing on Linux/Mac, and 35 on Windows.
967
968
969 memory=2048
970
971
972 Memory in MB a machine is created with.
973
974
975 user=""
976
977
978 Username to use and create on the podman machine OS for rootless con‐
979 tainer access. The default value is user. On Linux/Mac the default is‐
980 core.
981
982
983 volumes=["$HOME:$HOME"]
984
985
986 Host directories to be mounted as volumes into the VM by default. En‐
987 vironment variables like $HOME as well as complete paths are supported
988 for the source and destination. An optional third field :ro can be used
989 to tell the container engines to mount the volume readonly.
990
991
992
994 containers.conf
995
996
997 Distributions often provide a /usr/share/containers/containers.conf
998 file to define default container configuration. Administrators can
999 override fields in this file by creating /etc/containers/contain‐
1000 ers.conf to specify their own configuration. Rootless users can further
1001 override fields in the config by creating a config file stored in the
1002 $HOME/.config/containers/containers.conf file.
1003
1004
1005 If the CONTAINERS_CONF path environment variable is set, just this path
1006 will be used. This is primarily used for testing.
1007
1008
1009 Fields specified in the containers.conf file override the default op‐
1010 tions, as well as options in previously read containers.conf files.
1011
1012
1013 storage.conf
1014
1015
1016 The /etc/containers/storage.conf file is the default storage configura‐
1017 tion file. Rootless users can override fields in the storage config by
1018 creating $HOME/.config/containers/storage.conf.
1019
1020
1021 If the CONTAINERS_STORAGE_CONF path environment variable is set, this
1022 path is used for the storage.conf file rather than the default. This
1023 is primarily used for testing.
1024
1025
1026
1028 containers-storage.conf(5), containers-policy.json(5), containers-reg‐
1029 istries.conf(5), tmpfiles.d(5)
1030
1031
1032
1033engine Container containers.conf(5)