2018-09-18 03:20:16 +08:00

2018-03-30 08:25:12 +08:00
2017-12-05 05:31:23 +08:00
# Installation Instructions
2019-01-30 21:41:48 +08:00
## Installing packaged versions of buildah
2020-02-14 04:21:26 +08:00
#### [Amazon Linux 2](https://aws.amazon.com/amazon-linux-2/)
The [Kubic project ](https://build.opensuse.org/project/show/devel:kubic:libcontainers:stable )
provides updated packages for CentOS 7 which can be used unmodified on Amazon Linux 2.
```bash
cd /etc/yum.repos.d/
sudo wget https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/CentOS_7/devel:kubic:libcontainers:stable.repo
2020-03-24 01:12:47 +08:00
sudo yum -y yum-plugin-copr
sudo yum -y copr enable lsm5/container-selinux
2020-02-14 04:21:26 +08:00
sudo yum -y install buildah
```
2019-01-30 21:41:48 +08:00
### [Arch Linux](https://www.archlinux.org)
```bash
sudo pacman -S buildah
```
2020-02-14 04:21:26 +08:00
#### [CentOS](https://www.centos.org)
Buildah is available in the default Extras repos for CentOS 7 and in
the AppStream repo for CentOS 8 and Stream, however the available version often
lags the upstream release.
```bash
sudo yum -y install buildah
```
2020-02-12 22:54:01 +08:00
The [Kubic project ](https://build.opensuse.org/project/show/devel:kubic:libcontainers:stable )
2020-02-14 04:21:26 +08:00
provides updated packages for CentOS 7, 8 and Stream.
2020-02-12 22:54:01 +08:00
```bash
2020-02-14 04:21:26 +08:00
# CentOS 7
2020-02-12 22:54:01 +08:00
cd /etc/yum.repos.d/
2020-02-14 04:21:26 +08:00
sudo wget https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/CentOS_7/devel:kubic:libcontainers:stable.repo
sudo yum -y install buildah
# CentOS 8
sudo dnf -y module disable container-tools
sudo dnf -y install 'dnf-command(copr)'
sudo dnf -y copr enable rhcontainerbot/container-selinux
cd /etc/yum.repos.d
sudo wget https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/CentOS_8/devel:kubic:libcontainers:stable.repo
sudo dnf -y install buildah
# CentOS Stream
sudo dnf -y module disable container-tools
sudo dnf -y install 'dnf-command(copr)'
sudo dnf -y copr enable rhcontainerbot/container-selinux
cd /etc/yum.repos.d
sudo wget https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/CentOS_8_Stream/devel:kubic:libcontainers:stable.repo
sudo dnf -y install buildah
2020-02-12 22:54:01 +08:00
```
2020-02-14 04:21:26 +08:00
2020-01-16 19:13:19 +08:00
#### [Debian](https://debian.org)
The buildah package is [being worked on ](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928083 )
for inclusion in the default Debian repos.
Alternatively, the [Kubic project ](https://build.opensuse.org/project/show/devel:kubic:libcontainers:stable )
provides packages for Debian 10, testing and unstable.
```bash
# Debian Unstable/Sid
echo 'deb http://download.opensuse.org/repositories/devel:/kubic:/libcontainers:/stable/Debian_Unstable/ /' > /etc/apt/sources.list.d/devel:kubic:libcontainers:stable.list
wget -nv https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/Debian_Unstable/Release.key -O Release.key
# Debian Testing
echo 'deb http://download.opensuse.org/repositories/devel:/kubic:/libcontainers:/stable/Debian_Testing/ /' > /etc/apt/sources.list.d/devel:kubic:libcontainers:stable.list
wget -nv https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/Debian_Testing/Release.key -O Release.key
# Debian 10
echo 'deb http://download.opensuse.org/repositories/devel:/kubic:/libcontainers:/stable/Debian_10/ /' > /etc/apt/sources.list.d/devel:kubic:libcontainers:stable.list
wget -nv https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/Debian_10/Release.key -O Release.key
sudo apt-key add - < Release.key
sudo apt-get update -qq
sudo apt-get -qq -y install buildah
```
2019-01-30 21:41:48 +08:00
### [Fedora](https://www.fedoraproject.org), [CentOS](https://www.centos.org)
```bash
sudo yum -y install buildah
```
### [Fedora SilverBlue](https://silverblue.fedoraproject.org)
Installed by default
### [Fedora CoreOS](https://coreos.fedoraproject.org)
Not Available. Must be installed via package layering.
rpm-ostree install buildah
2020-02-09 08:26:38 +08:00
Note: [`podman` ](https://podman.io ) build is available by default.
2019-01-30 21:41:48 +08:00
### [Gentoo](https://www.gentoo.org)
```bash
sudo emerge app-emulation/libpod
```
### [openSUSE](https://www.opensuse.org)
```bash
sudo zypper install buildah
```
### [openSUSE Kubic](https://kubic.opensuse.org)
transactional-update pkg in buildah
### [RHEL7](https://www.redhat.com/en/technologies/linux-platforms/enterprise-linux)
Subscribe, then enable Extras channel and install buildah.
```bash
sudo subscription-manager repos --enable=rhel-7-server-extras-rpms
sudo yum -y install buildah
```
2020-01-16 19:13:19 +08:00
#### [Raspbian](https://raspbian.org)
The Kubic project provides packages for Raspbian 10.
```bash
# Raspbian 10
echo 'deb http://download.opensuse.org/repositories/devel:/kubic:/libcontainers:/stable/Raspbian_10/ /' > /etc/apt/sources.list.d/devel:kubic:libcontainers:stable.list
wget -nv https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/Raspbian_10/Release.key -O Release.key
sudo apt-key add - < Release.key
sudo apt-get update -qq
sudo apt-get -qq -y install buildah
```
2019-01-30 21:41:48 +08:00
### [RHEL8 Beta](https://www.redhat.com/en/blog/powering-its-future-while-preserving-present-introducing-red-hat-enterprise-linux-8-beta?intcmp=701f2000001Cz6OAAS)
```bash
sudo yum module enable -y container-tools:1.0
sudo yum module install -y buildah
```
### [Ubuntu](https://www.ubuntu.com)
2020-02-11 07:53:40 +08:00
The Kubic project provides packages for Ubuntu 18.04, 19.04 and 19.10 (it should also work with direct derivatives like Pop!\_OS).
2020-01-16 19:13:19 +08:00
2019-01-30 21:41:48 +08:00
```bash
2020-01-16 19:13:19 +08:00
. /etc/os-release
2020-02-11 07:53:40 +08:00
sudo sh -c "echo 'deb http://download.opensuse.org/repositories/devel:/kubic:/libcontainers:/stable/x${ID^}_${VERSION_ID}/ /' > /etc/apt/sources.list.d/devel:kubic:libcontainers:stable.list"
wget -nv https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/x${ID^}_${VERSION_ID}/Release.key -O Release.key
2020-01-16 19:13:19 +08:00
sudo apt-key add - < Release.key
2019-03-29 10:18:37 +08:00
sudo apt-get update -qq
2019-01-30 21:41:48 +08:00
sudo apt-get -qq -y install buildah
```
# Building from scratch
2018-01-03 01:48:35 +08:00
## System Requirements
### Kernel Version Requirements
To run Buildah on Red Hat Enterprise Linux or CentOS, version 7.4 or higher is required.
On other Linux distributions Buildah requires a kernel version of 4.0 or
higher in order to support the OverlayFS filesystem. The kernel version can be checked
with the 'uname -a' command.
### runc Requirement
Buildah uses `runc` to run commands when `buildah run` is used, or when `buildah build-using-dockerfile`
encounters a `RUN` instruction, so you'll also need to build and install a compatible version of
[runc ](https://github.com/opencontainers/runc ) for Buildah to call for those cases. If Buildah is installed
via a package manager such as yum, dnf or apt-get, runc will be installed as part of that process.
2018-04-14 06:20:25 +08:00
### CNI Requirement
When Buildah uses `runc` to run commands, it defaults to running those commands
in the host's network namespace. If the command is being run in a separate
user namespace, though, for example when ID mapping is used, then the command
will also be run in a separate network namespace.
A newly-created network namespace starts with no network interfaces, so
commands which are run in that namespace are effectively disconnected from the
network unless additional setup is done. Buildah relies on the CNI
[library ](https://github.com/containernetworking/cni ) and
[plugins ](https://github.com/containernetworking/plugins ) to set up interfaces
and routing for network namespaces.
If Buildah is installed via a package manager such as yum, dnf or apt-get, a
package containing CNI plugins may be available (in Fedora, the package is
named `containernetworking-cni` ). If not, they will need to be installed,
for example using:
```
git clone https://github.com/containernetworking/plugins
2020-02-09 08:26:38 +08:00
( cd ./plugins; ./build_linux.sh )
sudo mkdir -p /opt/cni/bin
sudo install -v ./plugins/bin/* /opt/cni/bin
2018-04-14 06:20:25 +08:00
```
The CNI library needs to be configured so that it will know which plugins to
call to set up namespaces. Usually, this configuration takes the form of one
or more configuration files in the `/etc/cni/net.d` directory. A set of example
configuration files is included in the
2018-09-18 03:20:16 +08:00
[`docs/cni-examples` ](https://github.com/containers/buildah/tree/master/docs/cni-examples )
2018-04-14 06:20:25 +08:00
directory of this source tree.
2018-01-03 01:48:35 +08:00
## Package Installation
Buildah is available on several software repositories and can be installed via a package manager such
as yum, dnf or apt-get on a number of Linux distributions.
## Installation from GitHub
Prior to installing Buildah, install the following packages on your Linux distro:
2017-12-05 05:31:23 +08:00
* make
2019-12-10 11:13:28 +08:00
* golang (Requires version 1.12 or higher.)
2017-12-05 05:31:23 +08:00
* bats
* btrfs-progs-devel
* bzip2
* device-mapper-devel
* git
* go-md2man
* gpgme-devel
* glib2-devel
* libassuan-devel
2018-02-23 01:46:09 +08:00
* libseccomp-devel
2017-12-05 05:31:23 +08:00
* runc (Requires version 1.0 RC4 or higher.)
2018-06-23 00:33:33 +08:00
* containers-common
2017-12-05 05:31:23 +08:00
2018-01-03 01:48:35 +08:00
### Fedora
2017-12-12 00:13:17 +08:00
2017-12-05 05:31:23 +08:00
In Fedora, you can use this command:
```
dnf -y install \
make \
golang \
bats \
btrfs-progs-devel \
device-mapper-devel \
glib2-devel \
gpgme-devel \
libassuan-devel \
2018-02-23 01:46:09 +08:00
libseccomp-devel \
2017-12-05 05:31:23 +08:00
git \
bzip2 \
go-md2man \
runc \
2018-06-23 00:33:33 +08:00
containers-common
2017-12-05 05:31:23 +08:00
```
Then to install Buildah on Fedora follow the steps in this example:
```
mkdir ~/buildah
cd ~/buildah
export GOPATH=`pwd`
2018-09-18 03:20:16 +08:00
git clone https://github.com/containers/buildah ./src/github.com/containers/buildah
cd ./src/github.com/containers/buildah
2017-12-05 05:31:23 +08:00
make
2017-12-12 00:22:17 +08:00
sudo make install
2017-12-05 05:31:23 +08:00
buildah --help
```
2018-01-03 01:48:35 +08:00
### RHEL, CentOS
2017-12-12 00:13:17 +08:00
2018-04-14 06:20:25 +08:00
In RHEL and CentOS 7, ensure that you are subscribed to the `rhel-7-server-rpms` ,
2018-08-09 15:57:58 +08:00
`rhel-7-server-extras-rpms` , `rhel-7-server-optional-rpms` and `EPEL` repositories, then
2017-12-05 05:31:23 +08:00
run this command:
```
yum -y install \
make \
golang \
bats \
btrfs-progs-devel \
device-mapper-devel \
glib2-devel \
gpgme-devel \
libassuan-devel \
2018-02-23 01:46:09 +08:00
libseccomp-devel \
2017-12-05 05:31:23 +08:00
git \
bzip2 \
go-md2man \
runc \
skopeo-containers
```
2018-04-14 06:20:25 +08:00
The build steps for Buildah on RHEL or CentOS are the same as for Fedora, above.
2017-12-12 00:13:17 +08:00
2018-11-08 06:42:14 +08:00
*NOTE:* Buildah on RHEL or CentOS version 7.* is not supported running as non-root due to
these systems not having newuidmap or newgidmap installed. It is possible to pull
the shadow-utils source RPM from Fedora 29 and build and install from that in order to
run Buildah as non-root on these systems.
2018-02-23 19:08:12 +08:00
### openSUSE
2018-11-13 21:20:00 +08:00
On openSUSE Tumbleweed, install go via `zypper in go` , then run this command:
2018-02-23 19:08:12 +08:00
```
zypper in make \
git \
golang \
runc \
bzip2 \
libgpgme-devel \
libseccomp-devel \
device-mapper-devel \
libbtrfs-devel \
go-md2man
```
2018-04-14 06:20:25 +08:00
The build steps for Buildah on SUSE / openSUSE are the same as for Fedora, above.
2018-02-23 19:08:12 +08:00
2018-01-03 01:48:35 +08:00
### Ubuntu
2017-12-05 05:31:23 +08:00
2018-01-03 01:48:35 +08:00
In Ubuntu zesty and xenial, you can use these commands:
2017-12-05 05:31:23 +08:00
```
2020-02-09 08:26:38 +08:00
sudo apt-get -y install software-properties-common
sudo add-apt-repository -y ppa:alexlarsson/flatpak
sudo add-apt-repository -y ppa:gophers/archive
sudo apt-add-repository -y ppa:projectatomic/ppa
sudo apt-get -y -qq update
sudo apt-get -y install bats btrfs-tools git libapparmor-dev libdevmapper-dev libglib2.0-dev libgpgme11-dev libseccomp-dev libselinux1-dev skopeo-containers go-md2man
sudo apt-get -y install golang-1.12
2017-12-05 05:31:23 +08:00
```
Then to install Buildah on Ubuntu follow the steps in this example:
```
mkdir ~/buildah
cd ~/buildah
export GOPATH=`pwd`
2018-09-18 03:20:16 +08:00
git clone https://github.com/containers/buildah ./src/github.com/containers/buildah
cd ./src/github.com/containers/buildah
2020-02-09 08:26:38 +08:00
PATH=/usr/lib/go-1.12/bin:$PATH make runc all SECURITYTAGS="apparmor seccomp"
2017-12-12 02:25:42 +08:00
sudo make install install.runc
2017-12-05 05:31:23 +08:00
buildah --help
```
2017-12-12 00:20:47 +08:00
2018-01-03 01:48:35 +08:00
### Debian
2017-12-12 00:20:47 +08:00
To install the required dependencies, you can use those commands, tested under Debian GNU/Linux amd64 9.3 (stretch):
```
gpg --recv-keys 0x018BA5AD9DF57A4448F0E6CF8BECF1637AD8C79D
2020-02-09 08:26:38 +08:00
sudo gpg --export 0x018BA5AD9DF57A4448F0E6CF8BECF1637AD8C79D >> /usr/share/keyrings/projectatomic-ppa.gpg
sudo echo 'deb [signed-by=/usr/share/keyrings/projectatomic-ppa.gpg] http://ppa.launchpad.net/projectatomic/ppa/ubuntu zesty main' > /etc/apt/sources.list.d/projectatomic-ppa.list
sudo apt update
sudo apt -y install -t stretch-backports golang
sudo apt -y install bats btrfs-tools git libapparmor-dev libdevmapper-dev libglib2.0-dev libgpgme11-dev libseccomp-dev libselinux1-dev skopeo-containers go-md2man
2018-06-23 00:33:33 +08:00
```
2017-12-12 00:20:47 +08:00
The build steps on Debian are otherwise the same as Ubuntu, above.
2018-06-23 00:33:33 +08:00
2019-02-21 18:11:38 +08:00
## Vendoring - Dependency Management
2019-10-29 04:56:48 +08:00
This project is using [go modules ](https://github.com/golang/go/wiki/Modules ) for dependency management. If the CI is complaining about a pull request leaving behind an unclean state, it is very likely right about it. After changing dependencies, make sure to run `make vendor-in-container` to synchronize the code with the go module and repopulate the `./vendor` directory.
2019-02-21 18:11:38 +08:00
2018-06-23 00:33:33 +08:00
## Configuration files
2019-01-30 03:26:39 +08:00
The following configuration files are required in order for Buildah to run appropriately. The
majority of these files are commonly contained in the `containers-common` package.
2019-03-19 01:16:31 +08:00
### [registries.conf](https://github.com/containers/buildah/blob/master/docs/samples/registries.conf)
2018-06-23 00:33:33 +08:00
2018-10-19 02:23:07 +08:00
#### Man Page: [registries.conf.5](https://github.com/containers/image/blob/master/docs/containers-registries.conf.5.md)
2018-06-23 00:33:33 +08:00
`/etc/containers/registries.conf`
registries.conf is the configuration file which specifies which container registries should be consulted when completing image names which do not include a registry or domain portion.
#### Example from the Fedora `containers-common` package
```
cat /etc/containers/registries.conf
# This is a system-wide configuration file used to
# keep track of registries for various container backends.
# It adheres to TOML format and does not support recursive
# lists of registries.
# The default location for this configuration file is /etc/containers/registries.conf.
# The only valid categories are: 'registries.search', 'registries.insecure',
# and 'registries.block'.
[registries.search]
registries = ['docker.io', 'registry.fedoraproject.org', 'quay.io', 'registry.access.redhat.com', 'registry.centos.org']
# If you need to access insecure registries, add the registry's fully-qualified name.
# An insecure registry is one that does not have a valid SSL certificate or only does HTTP.
[registries.insecure]
registries = []
# If you need to block pull access from a registry, uncomment the section below
# and add the registries fully-qualified name.
#
# Docker only
[registries.block]
registries = []
```
### [mounts.conf](https://src.fedoraproject.org/rpms/skopeo/blob/master/f/mounts.conf)
`/usr/share/containers/mounts.conf` and optionally `/etc/containers/mounts.conf`
2019-09-03 20:43:19 +08:00
The mounts.conf files specify volume mount files or directories that are automatically mounted inside containers when executing the `buildah run` or `buildah build-using-dockerfile` commands. Container processes can then use this content. The volume mount content does not get committed to the final image. This file is usually provided by the containers-common package.
2018-06-23 00:33:33 +08:00
Usually these directories are used for passing secrets or credentials required by the package software to access remote package repositories.
2019-09-03 20:43:19 +08:00
For example, a mounts.conf with the line "`/usr/share/rhel/secrets:/run/secrets`", the content of `/usr/share/rhel/secrets` directory is mounted on `/run/secrets` inside the container. This mountpoint allows Red Hat Enterprise Linux subscriptions from the host to be used within the container. It is also possible to omit the destination if it's equal to the source path. For example, specifying `/var/lib/secrets` will mount the directory into the same container destination path `/var/lib/secrets` .
2018-06-23 00:33:33 +08:00
Note this is not a volume mount. The content of the volumes is copied into container storage, not bind mounted directly from the host.
#### Example from the Fedora `containers-common` package:
```
cat /usr/share/containers/mounts.conf
/usr/share/rhel/secrets:/run/secrets
```
### [seccomp.json](https://src.fedoraproject.org/rpms/skopeo/blob/master/f/seccomp.json)
`/usr/share/containers/seccomp.json`
seccomp.json contains the whitelist of seccomp rules to be allowed inside of
containers. This file is usually provided by the containers-common package.
The link above takes you to the seccomp.json
2018-09-18 03:20:16 +08:00
### [policy.json](https://github.com/containers/skopeo/blob/master/default-policy.json)
2018-06-23 00:33:33 +08:00
`/etc/containers/policy.json`
#### Man Page: [policy.json.5](https://github.com/containers/image/blob/master/docs/policy.json.md)
#### Example from the Fedora `containers-common` package:
```
cat /etc/containers/policy.json
{
"default": [
{
"type": "insecureAcceptAnything"
}
],
"transports":
{
"docker-daemon":
{
"": [{"type":"insecureAcceptAnything"}]
}
}
}
```
2019-07-02 23:44:18 +08:00
## Vendoring
2019-11-17 00:31:41 +08:00
Buildah uses Go Modules for vendoring purposes. If you need to update or add a vendored package into Buildah, please follow this procedure:
2019-08-01 19:13:37 +08:00
* Enter into your sandbox `src/github.com/containers/buildah` and ensure that the GOPATH variable is set to the directory prior as noted above.
2019-07-02 23:44:18 +08:00
* `export GO111MODULE=on`
* Assuming you want to 'bump' the `github.com/containers/storage` package to version 1.12.13, use this command: `go get github.com/containers/storage@v1.12.13`
2019-10-29 04:56:48 +08:00
* `make vendor-in-container`
2019-07-02 23:44:18 +08:00
* `make`
* `make install`
* Then add any updated or added files with `git add` then do a `git commit` and create a PR.
2019-08-11 02:18:52 +08:00
### Vendor from your own fork
If you wish to vendor in your personal fork to try changes out (assuming containers/storage in the below example):
* `go mod edit -replace github.com/containers/storage=github.com/{mygithub_username}/storage@YOUR_BRANCH`
2019-10-29 04:56:48 +08:00
* `make vendor-in-container`
2019-08-11 02:18:52 +08:00
To revert
* `go mod edit -dropreplace github.com/containers/storage`
2019-10-29 04:56:48 +08:00
* `make vendor-in-container`
2019-08-30 23:08:58 +08:00
To speed up fetching dependencies, you can use a [Go Module Proxy ](https://proxy.golang.org ) by setting `GOPROXY=https://proxy.golang.org` .