mirror of
				https://github.com/OpenVoiceOS/OpenVoiceOS
				synced 2025-06-05 22:19:21 +02:00 
			
		
		
		
	[All] Additions for dockerized system
This commit is contained in:
		| @@ -12,7 +12,7 @@ set menu_color_highlight=white/red | |||||||
|  |  | ||||||
| load_env | load_env | ||||||
|  |  | ||||||
| default_cmdline="rootfstype=squashfs init=/sbin/pre-init systemd.machine_id=$MACHINE_ID fsck.repair=yes zram.enabled=1 zram.num_devices=3 console=tty1 systemd.unified_cgroup_hierarchy=1 cgroup_enable=cpuset cgroup_memory=1 audit=0 $boot_condition rootwait" | default_cmdline="rootfstype=squashfs init=/sbin/pre-init systemd.machine_id=$MACHINE_ID fsck.repair=yes zram.enabled=1 zram.num_devices=3 console=tty1 systemd.unified_cgroup_hierarchy=1 cgroup_enable=cpuset cgroup_memory=1 $boot_condition rootwait" | ||||||
| file_env -f ($root)/cmdline.txt cmdline | file_env -f ($root)/cmdline.txt cmdline | ||||||
|  |  | ||||||
| regexp --set 1:boothd (.+),.+ ${root} | regexp --set 1:boothd (.+),.+ ${root} | ||||||
|   | |||||||
| @@ -12,7 +12,7 @@ set menu_color_highlight=white/red | |||||||
|  |  | ||||||
| load_env | load_env | ||||||
|  |  | ||||||
| default_cmdline="rootfstype=squashfs init=/sbin/pre-init systemd.machine_id=$MACHINE_ID fsck.repair=yes zram.enabled=1 zram.num_devices=3 console=tty1 systemd.unified_cgroup_hierarchy=1 cgroup_enable=cpuset cgroup_memory=1 audit=0 $boot_condition rootwait" | default_cmdline="rootfstype=squashfs init=/sbin/pre-init systemd.machine_id=$MACHINE_ID fsck.repair=yes zram.enabled=1 zram.num_devices=3 console=tty1 systemd.unified_cgroup_hierarchy=1 cgroup_enable=cpuset cgroup_memory=1 $boot_condition rootwait" | ||||||
| file_env -f ($root)/cmdline.txt cmdline | file_env -f ($root)/cmdline.txt cmdline | ||||||
|  |  | ||||||
| regexp --set 1:boothd (.+),.+ ${root} | regexp --set 1:boothd (.+),.+ ${root} | ||||||
|   | |||||||
| @@ -28,7 +28,7 @@ BR2_ROOTFS_POST_IMAGE_SCRIPT="$(BR2_EXTERNAL)/board/ovos/ova/post-image.sh" | |||||||
| BR2_ROOTFS_POST_SCRIPT_ARGS="--ova" | BR2_ROOTFS_POST_SCRIPT_ARGS="--ova" | ||||||
| BR2_LINUX_KERNEL=y | BR2_LINUX_KERNEL=y | ||||||
| BR2_LINUX_KERNEL_CUSTOM_VERSION=y | BR2_LINUX_KERNEL_CUSTOM_VERSION=y | ||||||
| BR2_LINUX_KERNEL_CUSTOM_VERSION_VALUE="6.1.37" | BR2_LINUX_KERNEL_CUSTOM_VERSION_VALUE="6.1.46" | ||||||
| BR2_LINUX_KERNEL_DEFCONFIG="x86_64" | BR2_LINUX_KERNEL_DEFCONFIG="x86_64" | ||||||
| BR2_LINUX_KERNEL_CONFIG_FRAGMENT_FILES="$(BR2_EXTERNAL)/kernel/ovos.config $(BR2_EXTERNAL)/kernel/device-drivers.config $(BR2_EXTERNAL)/kernel/docker.config $(BR2_EXTERNAL)/board/ovos/ova/kernel.config" | BR2_LINUX_KERNEL_CONFIG_FRAGMENT_FILES="$(BR2_EXTERNAL)/kernel/ovos.config $(BR2_EXTERNAL)/kernel/device-drivers.config $(BR2_EXTERNAL)/kernel/docker.config $(BR2_EXTERNAL)/board/ovos/ova/kernel.config" | ||||||
| BR2_LINUX_KERNEL_LZ4=y | BR2_LINUX_KERNEL_LZ4=y | ||||||
| @@ -132,7 +132,6 @@ BR2_PACKAGE_GPTFDISK=y | |||||||
| BR2_PACKAGE_GPTFDISK_GDISK=y | BR2_PACKAGE_GPTFDISK_GDISK=y | ||||||
| BR2_PACKAGE_GPTFDISK_SGDISK=y | BR2_PACKAGE_GPTFDISK_SGDISK=y | ||||||
| BR2_PACKAGE_GPTFDISK_CGDISK=y | BR2_PACKAGE_GPTFDISK_CGDISK=y | ||||||
| BR2_PACKAGE_GVFS=y |  | ||||||
| BR2_PACKAGE_PARTED=y | BR2_PACKAGE_PARTED=y | ||||||
| BR2_PACKAGE_READ_EDID=y | BR2_PACKAGE_READ_EDID=y | ||||||
| BR2_PACKAGE_RNG_TOOLS=y | BR2_PACKAGE_RNG_TOOLS=y | ||||||
| @@ -150,6 +149,7 @@ BR2_PACKAGE_LIBARCHIVE=y | |||||||
| BR2_PACKAGE_LIBDEFLATE=y | BR2_PACKAGE_LIBDEFLATE=y | ||||||
| BR2_PACKAGE_LZ4_PROGS=y | BR2_PACKAGE_LZ4_PROGS=y | ||||||
| BR2_PACKAGE_CA_CERTIFICATES=y | BR2_PACKAGE_CA_CERTIFICATES=y | ||||||
|  | BR2_PACKAGE_LIBKSBA=y | ||||||
| BR2_PACKAGE_LIBSSH2=y | BR2_PACKAGE_LIBSSH2=y | ||||||
| BR2_PACKAGE_LIBOPENSSL_BIN=y | BR2_PACKAGE_LIBOPENSSL_BIN=y | ||||||
| BR2_PACKAGE_LIBOPENSSL_ENGINES=y | BR2_PACKAGE_LIBOPENSSL_ENGINES=y | ||||||
| @@ -167,8 +167,10 @@ BR2_PACKAGE_LIBNDP=y | |||||||
| BR2_PACKAGE_LIBRSYNC=y | BR2_PACKAGE_LIBRSYNC=y | ||||||
| BR2_PACKAGE_LIBURIPARSER=y | BR2_PACKAGE_LIBURIPARSER=y | ||||||
| BR2_PACKAGE_LIBWEBSOCKETS=y | BR2_PACKAGE_LIBWEBSOCKETS=y | ||||||
|  | BR2_PACKAGE_SLIRP4NETNS=y | ||||||
| BR2_PACKAGE_ZEROMQ=y | BR2_PACKAGE_ZEROMQ=y | ||||||
| BR2_PACKAGE_ZEROMQ_WEBSOCKET=y | BR2_PACKAGE_ZEROMQ_WEBSOCKET=y | ||||||
|  | BR2_PACKAGE_LIBNPTH=y | ||||||
| BR2_PACKAGE_LIBUNISTRING=y | BR2_PACKAGE_LIBUNISTRING=y | ||||||
| BR2_PACKAGE_PCRE2=y | BR2_PACKAGE_PCRE2=y | ||||||
| BR2_PACKAGE_BLUEZ_TOOLS=y | BR2_PACKAGE_BLUEZ_TOOLS=y | ||||||
| @@ -205,10 +207,22 @@ BR2_PACKAGE_TIME=y | |||||||
| BR2_PACKAGE_TINI=y | BR2_PACKAGE_TINI=y | ||||||
| BR2_PACKAGE_WHICH=y | BR2_PACKAGE_WHICH=y | ||||||
| BR2_PACKAGE_ATTR=y | BR2_PACKAGE_ATTR=y | ||||||
|  | BR2_PACKAGE_AUDIT=y | ||||||
|  | BR2_PACKAGE_BUILDAH=y | ||||||
|  | BR2_PACKAGE_DOCKER_CLI_BUILDX=y | ||||||
|  | BR2_PACKAGE_DOCKER_COMPOSE=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE_EXPERIMENTAL=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE_DRIVER_BTRFS=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE_DRIVER_DEVICEMAPPER=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE_DRIVER_VFS=y | ||||||
| BR2_PACKAGE_EFIBOOTMGR=y | BR2_PACKAGE_EFIBOOTMGR=y | ||||||
| BR2_PACKAGE_HTOP=y | BR2_PACKAGE_HTOP=y | ||||||
| BR2_PACKAGE_OPENVMTOOLS=y | BR2_PACKAGE_OPENVMTOOLS=y | ||||||
| BR2_PACKAGE_PODMAN=y | BR2_PACKAGE_PODMAN=y | ||||||
|  | BR2_PACKAGE_PODMAN_DRIVER_BTRFS=y | ||||||
|  | BR2_PACKAGE_PODMAN_DRIVER_DEVICEMAPPER=y | ||||||
|  | BR2_PACKAGE_PODMAN_DRIVER_VFS=y | ||||||
| BR2_PACKAGE_PROCPS_NG=y | BR2_PACKAGE_PROCPS_NG=y | ||||||
| BR2_PACKAGE_SHADOW=y | BR2_PACKAGE_SHADOW=y | ||||||
| BR2_PACKAGE_SHADOW_SHADOWGRP=y | BR2_PACKAGE_SHADOW_SHADOWGRP=y | ||||||
| @@ -231,7 +245,6 @@ BR2_PACKAGE_SYSTEMD_RFKILL=y | |||||||
| # BR2_PACKAGE_SYSTEMD_VCONSOLE is not set | # BR2_PACKAGE_SYSTEMD_VCONSOLE is not set | ||||||
| BR2_PACKAGE_SYSTEMD_BOOTCHART=y | BR2_PACKAGE_SYSTEMD_BOOTCHART=y | ||||||
| BR2_PACKAGE_TAR=y | BR2_PACKAGE_TAR=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_BINARIES=y |  | ||||||
| BR2_PACKAGE_UTIL_LINUX_HWCLOCK=y | BR2_PACKAGE_UTIL_LINUX_HWCLOCK=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_KILL=y | BR2_PACKAGE_UTIL_LINUX_KILL=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_LOGGER=y | BR2_PACKAGE_UTIL_LINUX_LOGGER=y | ||||||
| @@ -239,10 +252,8 @@ BR2_PACKAGE_UTIL_LINUX_LOGIN=y | |||||||
| BR2_PACKAGE_UTIL_LINUX_LSMEM=y | BR2_PACKAGE_UTIL_LINUX_LSMEM=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_MESG=y | BR2_PACKAGE_UTIL_LINUX_MESG=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_MORE=y | BR2_PACKAGE_UTIL_LINUX_MORE=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_MOUNTPOINT=y |  | ||||||
| BR2_PACKAGE_UTIL_LINUX_NOLOGIN=y | BR2_PACKAGE_UTIL_LINUX_NOLOGIN=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_PARTX=y | BR2_PACKAGE_UTIL_LINUX_PARTX=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_PIVOT_ROOT=y |  | ||||||
| BR2_PACKAGE_UTIL_LINUX_SU=y | BR2_PACKAGE_UTIL_LINUX_SU=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_SWITCH_ROOT=y | BR2_PACKAGE_UTIL_LINUX_SWITCH_ROOT=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_ZRAMCTL=y | BR2_PACKAGE_UTIL_LINUX_ZRAMCTL=y | ||||||
|   | |||||||
| @@ -29,7 +29,7 @@ BR2_ROOTFS_POST_IMAGE_SCRIPT="$(BR2_EXTERNAL)/board/ovos/raspberrypi/rpi4/post-i | |||||||
| BR2_ROOTFS_POST_SCRIPT_ARGS="--rpi4" | BR2_ROOTFS_POST_SCRIPT_ARGS="--rpi4" | ||||||
| BR2_LINUX_KERNEL=y | BR2_LINUX_KERNEL=y | ||||||
| BR2_LINUX_KERNEL_CUSTOM_TARBALL=y | BR2_LINUX_KERNEL_CUSTOM_TARBALL=y | ||||||
| BR2_LINUX_KERNEL_CUSTOM_TARBALL_LOCATION="$(call github,raspberrypi,linux,9d516c9f10eb7c6950131488e9893d3c1530c0dc)/linux-9d516c9f10eb7c6950131488e9893d3c1530c0dc.tar.gz" | BR2_LINUX_KERNEL_CUSTOM_TARBALL_LOCATION="$(call github,raspberrypi,linux,9ed4f05ba2e2bcd9065831674e97b2b1283e866d)/linux-9ed4f05ba2e2bcd9065831674e97b2b1283e866d.tar.gz" | ||||||
| BR2_LINUX_KERNEL_DEFCONFIG="bcm2711" | BR2_LINUX_KERNEL_DEFCONFIG="bcm2711" | ||||||
| BR2_LINUX_KERNEL_CONFIG_FRAGMENT_FILES="$(BR2_EXTERNAL)/kernel/ovos.config $(BR2_EXTERNAL)/kernel/device-drivers.config $(BR2_EXTERNAL)/kernel/docker.config $(BR2_EXTERNAL)/board/ovos/raspberrypi/kernel.config" | BR2_LINUX_KERNEL_CONFIG_FRAGMENT_FILES="$(BR2_EXTERNAL)/kernel/ovos.config $(BR2_EXTERNAL)/kernel/device-drivers.config $(BR2_EXTERNAL)/kernel/docker.config $(BR2_EXTERNAL)/board/ovos/raspberrypi/kernel.config" | ||||||
| BR2_LINUX_KERNEL_LZ4=y | BR2_LINUX_KERNEL_LZ4=y | ||||||
| @@ -112,7 +112,6 @@ BR2_PACKAGE_GPTFDISK=y | |||||||
| BR2_PACKAGE_GPTFDISK_GDISK=y | BR2_PACKAGE_GPTFDISK_GDISK=y | ||||||
| BR2_PACKAGE_GPTFDISK_SGDISK=y | BR2_PACKAGE_GPTFDISK_SGDISK=y | ||||||
| BR2_PACKAGE_GPTFDISK_CGDISK=y | BR2_PACKAGE_GPTFDISK_CGDISK=y | ||||||
| BR2_PACKAGE_GVFS=y |  | ||||||
| BR2_PACKAGE_I2C_TOOLS=y | BR2_PACKAGE_I2C_TOOLS=y | ||||||
| BR2_PACKAGE_PARTED=y | BR2_PACKAGE_PARTED=y | ||||||
| BR2_PACKAGE_RASPI_GPIO=y | BR2_PACKAGE_RASPI_GPIO=y | ||||||
| @@ -133,6 +132,7 @@ BR2_PACKAGE_LIBARCHIVE=y | |||||||
| BR2_PACKAGE_LIBDEFLATE=y | BR2_PACKAGE_LIBDEFLATE=y | ||||||
| BR2_PACKAGE_LZ4_PROGS=y | BR2_PACKAGE_LZ4_PROGS=y | ||||||
| BR2_PACKAGE_CA_CERTIFICATES=y | BR2_PACKAGE_CA_CERTIFICATES=y | ||||||
|  | BR2_PACKAGE_LIBKSBA=y | ||||||
| BR2_PACKAGE_LIBSSH2=y | BR2_PACKAGE_LIBSSH2=y | ||||||
| BR2_PACKAGE_LIBOPENSSL_BIN=y | BR2_PACKAGE_LIBOPENSSL_BIN=y | ||||||
| BR2_PACKAGE_LIBOPENSSL_ENGINES=y | BR2_PACKAGE_LIBOPENSSL_ENGINES=y | ||||||
| @@ -150,8 +150,10 @@ BR2_PACKAGE_LIBNDP=y | |||||||
| BR2_PACKAGE_LIBRSYNC=y | BR2_PACKAGE_LIBRSYNC=y | ||||||
| BR2_PACKAGE_LIBURIPARSER=y | BR2_PACKAGE_LIBURIPARSER=y | ||||||
| BR2_PACKAGE_LIBWEBSOCKETS=y | BR2_PACKAGE_LIBWEBSOCKETS=y | ||||||
|  | BR2_PACKAGE_SLIRP4NETNS=y | ||||||
| BR2_PACKAGE_ZEROMQ=y | BR2_PACKAGE_ZEROMQ=y | ||||||
| BR2_PACKAGE_ZEROMQ_WEBSOCKET=y | BR2_PACKAGE_ZEROMQ_WEBSOCKET=y | ||||||
|  | BR2_PACKAGE_LIBNPTH=y | ||||||
| BR2_PACKAGE_LIBUNISTRING=y | BR2_PACKAGE_LIBUNISTRING=y | ||||||
| BR2_PACKAGE_PCRE2=y | BR2_PACKAGE_PCRE2=y | ||||||
| BR2_PACKAGE_BLUEZ_TOOLS=y | BR2_PACKAGE_BLUEZ_TOOLS=y | ||||||
| @@ -188,10 +190,22 @@ BR2_PACKAGE_TIME=y | |||||||
| BR2_PACKAGE_TINI=y | BR2_PACKAGE_TINI=y | ||||||
| BR2_PACKAGE_WHICH=y | BR2_PACKAGE_WHICH=y | ||||||
| BR2_PACKAGE_ATTR=y | BR2_PACKAGE_ATTR=y | ||||||
|  | BR2_PACKAGE_AUDIT=y | ||||||
|  | BR2_PACKAGE_BUILDAH=y | ||||||
|  | BR2_PACKAGE_DOCKER_CLI_BUILDX=y | ||||||
|  | BR2_PACKAGE_DOCKER_COMPOSE=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE_EXPERIMENTAL=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE_DRIVER_BTRFS=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE_DRIVER_DEVICEMAPPER=y | ||||||
|  | BR2_PACKAGE_DOCKER_ENGINE_DRIVER_VFS=y | ||||||
| BR2_PACKAGE_EFIBOOTMGR=y | BR2_PACKAGE_EFIBOOTMGR=y | ||||||
| BR2_PACKAGE_HTOP=y | BR2_PACKAGE_HTOP=y | ||||||
| BR2_PACKAGE_OPENVMTOOLS=y | BR2_PACKAGE_OPENVMTOOLS=y | ||||||
| BR2_PACKAGE_PODMAN=y | BR2_PACKAGE_PODMAN=y | ||||||
|  | BR2_PACKAGE_PODMAN_DRIVER_BTRFS=y | ||||||
|  | BR2_PACKAGE_PODMAN_DRIVER_DEVICEMAPPER=y | ||||||
|  | BR2_PACKAGE_PODMAN_DRIVER_VFS=y | ||||||
| BR2_PACKAGE_PROCPS_NG=y | BR2_PACKAGE_PROCPS_NG=y | ||||||
| BR2_PACKAGE_SHADOW=y | BR2_PACKAGE_SHADOW=y | ||||||
| BR2_PACKAGE_SHADOW_SHADOWGRP=y | BR2_PACKAGE_SHADOW_SHADOWGRP=y | ||||||
| @@ -214,7 +228,6 @@ BR2_PACKAGE_SYSTEMD_RFKILL=y | |||||||
| # BR2_PACKAGE_SYSTEMD_VCONSOLE is not set | # BR2_PACKAGE_SYSTEMD_VCONSOLE is not set | ||||||
| BR2_PACKAGE_SYSTEMD_BOOTCHART=y | BR2_PACKAGE_SYSTEMD_BOOTCHART=y | ||||||
| BR2_PACKAGE_TAR=y | BR2_PACKAGE_TAR=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_BINARIES=y |  | ||||||
| BR2_PACKAGE_UTIL_LINUX_HWCLOCK=y | BR2_PACKAGE_UTIL_LINUX_HWCLOCK=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_KILL=y | BR2_PACKAGE_UTIL_LINUX_KILL=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_LOGGER=y | BR2_PACKAGE_UTIL_LINUX_LOGGER=y | ||||||
| @@ -222,10 +235,8 @@ BR2_PACKAGE_UTIL_LINUX_LOGIN=y | |||||||
| BR2_PACKAGE_UTIL_LINUX_LSMEM=y | BR2_PACKAGE_UTIL_LINUX_LSMEM=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_MESG=y | BR2_PACKAGE_UTIL_LINUX_MESG=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_MORE=y | BR2_PACKAGE_UTIL_LINUX_MORE=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_MOUNTPOINT=y |  | ||||||
| BR2_PACKAGE_UTIL_LINUX_NOLOGIN=y | BR2_PACKAGE_UTIL_LINUX_NOLOGIN=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_PARTX=y | BR2_PACKAGE_UTIL_LINUX_PARTX=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_PIVOT_ROOT=y |  | ||||||
| BR2_PACKAGE_UTIL_LINUX_SU=y | BR2_PACKAGE_UTIL_LINUX_SU=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_SWITCH_ROOT=y | BR2_PACKAGE_UTIL_LINUX_SWITCH_ROOT=y | ||||||
| BR2_PACKAGE_UTIL_LINUX_ZRAMCTL=y | BR2_PACKAGE_UTIL_LINUX_ZRAMCTL=y | ||||||
|   | |||||||
| @@ -47,8 +47,10 @@ CONFIG_TMPFS_POSIX_ACL=y | |||||||
| CONFIG_TMPFS_XATTR=y | CONFIG_TMPFS_XATTR=y | ||||||
| CONFIG_TMPFS_INODE64=y | CONFIG_TMPFS_INODE64=y | ||||||
|  |  | ||||||
| # CONFIG_SECCOMP is not set | CONFIG_SECCOMP=y | ||||||
| # CONFIG_AUDIT is not set | CONFIG_SECCOMP_FILTER=y | ||||||
|  |  | ||||||
|  | CONFIG_AUDIT=y | ||||||
| # CONFIG_SECURITY is not set | # CONFIG_SECURITY is not set | ||||||
| # CONFIG_SECURITY_SELINUX is not set | # CONFIG_SECURITY_SELINUX is not set | ||||||
|  |  | ||||||
|   | |||||||
							
								
								
									
										3
									
								
								buildroot-external/rootfs-overlay/etc/docker/daemon.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										3
									
								
								buildroot-external/rootfs-overlay/etc/docker/daemon.json
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,3 @@ | |||||||
|  | { | ||||||
|  |    "data-root": "/opt/docker" | ||||||
|  | } | ||||||
| @@ -12,3 +12,5 @@ fs.inotify.max_user_instances = 512 | |||||||
| fs.inotify.max_user_watches = 524288 | fs.inotify.max_user_watches = 524288 | ||||||
|  |  | ||||||
| kernel.unprivileged_userns_clone = 1 | kernel.unprivileged_userns_clone = 1 | ||||||
|  | net.ipv4.ping_group_range = 0 2147483647 | ||||||
|  | net.ipv4.ip_unprivileged_port_start = 80 | ||||||
|   | |||||||
| @@ -10,3 +10,4 @@ Environment=QT_IM_MODULE=qtvirtualkeyboard | |||||||
| Environment=QT_QUICK_CONTROLS_STYLE=OpenVoiceStyle | Environment=QT_QUICK_CONTROLS_STYLE=OpenVoiceStyle | ||||||
| Environment=XDG_CURRENT_DESKTOP=kde | Environment=XDG_CURRENT_DESKTOP=kde | ||||||
| Environment=QML2_IMPORT_PATH=/usr/lib/qml | Environment=QML2_IMPORT_PATH=/usr/lib/qml | ||||||
|  | Delegate=cpu cpuset io memory pids | ||||||
|   | |||||||
| @@ -0,0 +1,5 @@ | |||||||
|  | [storage] | ||||||
|  | driver = "overlay" | ||||||
|  |  | ||||||
|  | [storage.options] | ||||||
|  | mount_program = "/usr/bin/fuse-overlayfs" | ||||||
| @@ -0,0 +1,777 @@ | |||||||
|  | # The containers configuration file specifies all of the available configuration | ||||||
|  | # command-line options/flags for container engine tools like Podman & Buildah, | ||||||
|  | # but in a TOML format that can be easily modified and versioned. | ||||||
|  |  | ||||||
|  | # Please refer to containers.conf(5) for details of all configuration options. | ||||||
|  | # Not all container engines implement all of the options. | ||||||
|  | # All of the options have hard coded defaults and these options will override | ||||||
|  | # the built in defaults. Users can then override these options via the command | ||||||
|  | # line. Container engines will read containers.conf files in up to three | ||||||
|  | # locations in the following order: | ||||||
|  | #  1. /usr/share/containers/containers.conf | ||||||
|  | #  2. /etc/containers/containers.conf | ||||||
|  | #  3. $HOME/.config/containers/containers.conf (Rootless containers ONLY) | ||||||
|  | #  Items specified in the latter containers.conf, if they exist, override the | ||||||
|  | # previous containers.conf settings, or the default settings. | ||||||
|  |  | ||||||
|  | [containers] | ||||||
|  |  | ||||||
|  | # List of annotation. Specified as | ||||||
|  | # "key = value" | ||||||
|  | # If it is empty or commented out, no annotations will be added | ||||||
|  | # | ||||||
|  | #annotations = [] | ||||||
|  |  | ||||||
|  | # Used to change the name of the default AppArmor profile of container engine. | ||||||
|  | # | ||||||
|  | #apparmor_profile = "container-default" | ||||||
|  |  | ||||||
|  | # The hosts entries from the base hosts file are added to the containers hosts | ||||||
|  | # file. This must be either an absolute path or as special values "image" which | ||||||
|  | # uses the hosts file from the container image or "none" which means | ||||||
|  | # no base hosts file is used. The default is "" which will use /etc/hosts. | ||||||
|  | # | ||||||
|  | #base_hosts_file = "" | ||||||
|  |  | ||||||
|  | # List of cgroup_conf entries specifying a list of cgroup files to write to and | ||||||
|  | # their values. For example `memory.high=1073741824` sets the | ||||||
|  | # memory.high limit to 1GB. | ||||||
|  | # cgroup_conf = [] | ||||||
|  |  | ||||||
|  | # Default way to to create a cgroup namespace for the container | ||||||
|  | # Options are: | ||||||
|  | # `private` Create private Cgroup Namespace for the container. | ||||||
|  | # `host`    Share host Cgroup Namespace with the container. | ||||||
|  | # | ||||||
|  | #cgroupns = "private" | ||||||
|  |  | ||||||
|  | # Control container cgroup configuration | ||||||
|  | # Determines  whether  the  container will create CGroups. | ||||||
|  | # Options are: | ||||||
|  | # `enabled`   Enable cgroup support within container | ||||||
|  | # `disabled`  Disable cgroup support, will inherit cgroups from parent | ||||||
|  | # `no-conmon` Do not create a cgroup dedicated to conmon. | ||||||
|  | # | ||||||
|  | #cgroups = "enabled" | ||||||
|  |  | ||||||
|  | # List of default capabilities for containers. If it is empty or commented out, | ||||||
|  | # the default capabilities defined in the container engine will be added. | ||||||
|  | # | ||||||
|  | #default_capabilities = [ | ||||||
|  | #  "CHOWN", | ||||||
|  | #  "DAC_OVERRIDE", | ||||||
|  | #  "FOWNER", | ||||||
|  | #  "FSETID", | ||||||
|  | #  "KILL", | ||||||
|  | #  "NET_BIND_SERVICE", | ||||||
|  | #  "SETFCAP", | ||||||
|  | #  "SETGID", | ||||||
|  | #  "SETPCAP", | ||||||
|  | #  "SETUID", | ||||||
|  | #  "SYS_CHROOT", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # A list of sysctls to be set in containers by default, | ||||||
|  | # specified as "name=value", | ||||||
|  | # for example:"net.ipv4.ping_group_range=0 0". | ||||||
|  | # | ||||||
|  | default_sysctls = [ | ||||||
|  |   "net.ipv4.ping_group_range=0 0", | ||||||
|  | ] | ||||||
|  |  | ||||||
|  | # A list of ulimits to be set in containers by default, specified as | ||||||
|  | # "<ulimit name>=<soft limit>:<hard limit>", for example: | ||||||
|  | # "nofile=1024:2048" | ||||||
|  | # See setrlimit(2) for a list of resource names. | ||||||
|  | # Any limit not specified here will be inherited from the process launching the | ||||||
|  | # container engine. | ||||||
|  | # Ulimits has limits for non privileged container engines. | ||||||
|  | # | ||||||
|  | #default_ulimits = [ | ||||||
|  | #  "nofile=1280:2560", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # List of devices. Specified as | ||||||
|  | # "<device-on-host>:<device-on-container>:<permissions>", for example: | ||||||
|  | # "/dev/sdc:/dev/xvdc:rwm". | ||||||
|  | # If it is empty or commented out, only the default devices will be used | ||||||
|  | # | ||||||
|  | #devices = [] | ||||||
|  |  | ||||||
|  | # List of default DNS options to be added to /etc/resolv.conf inside of the container. | ||||||
|  | # | ||||||
|  | #dns_options = [] | ||||||
|  |  | ||||||
|  | # List of default DNS search domains to be added to /etc/resolv.conf inside of the container. | ||||||
|  | # | ||||||
|  | #dns_searches = [] | ||||||
|  |  | ||||||
|  | # Set default DNS servers. | ||||||
|  | # This option can be used to override the DNS configuration passed to the | ||||||
|  | # container. The special value "none" can be specified to disable creation of | ||||||
|  | # /etc/resolv.conf in the container. | ||||||
|  | # The /etc/resolv.conf file in the image will be used without changes. | ||||||
|  | # | ||||||
|  | #dns_servers = [] | ||||||
|  |  | ||||||
|  | # Environment variable list for the conmon process; used for passing necessary | ||||||
|  | # environment variables to conmon or the runtime. | ||||||
|  | # | ||||||
|  | #env = [ | ||||||
|  | #  "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", | ||||||
|  | #  "TERM=xterm", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # Pass all host environment variables into the container. | ||||||
|  | # | ||||||
|  | #env_host = false | ||||||
|  |  | ||||||
|  | # Set the ip for the host.containers.internal entry in the containers /etc/hosts | ||||||
|  | # file. This can be set to "none" to disable adding this entry. By default it | ||||||
|  | # will automatically choose the host ip. | ||||||
|  | # | ||||||
|  | # NOTE: When using podman machine this entry will never be added to the containers | ||||||
|  | # hosts file instead the gvproxy dns resolver will resolve this hostname. Therefore | ||||||
|  | # it is not possible to disable the entry in this case. | ||||||
|  | # | ||||||
|  | #host_containers_internal_ip = "" | ||||||
|  |  | ||||||
|  | # Default proxy environment variables passed into the container. | ||||||
|  | # The environment variables passed in include: | ||||||
|  | # http_proxy, https_proxy, ftp_proxy, no_proxy, and the upper case versions of | ||||||
|  | # these. This option is needed when host system uses a proxy but container | ||||||
|  | # should not use proxy. Proxy environment variables specified for the container | ||||||
|  | # in any other way will override the values passed from the host. | ||||||
|  | # | ||||||
|  | #http_proxy = true | ||||||
|  |  | ||||||
|  | # Run an init inside the container that forwards signals and reaps processes. | ||||||
|  | # | ||||||
|  | #init = false | ||||||
|  |  | ||||||
|  | # Container init binary, if init=true, this is the init binary to be used for containers. | ||||||
|  | # | ||||||
|  | #init_path = "/usr/libexec/podman/catatonit" | ||||||
|  |  | ||||||
|  | # Default way to to create an IPC namespace (POSIX SysV IPC) for the container | ||||||
|  | # Options are: | ||||||
|  | #  "host"     Share host IPC Namespace with the container. | ||||||
|  | #  "none"     Create shareable IPC Namespace for the container without a private /dev/shm. | ||||||
|  | #  "private"  Create private IPC Namespace for the container, other containers are not allowed to share it. | ||||||
|  | #  "shareable" Create shareable IPC Namespace for the container. | ||||||
|  | # | ||||||
|  | #ipcns = "shareable" | ||||||
|  |  | ||||||
|  | # keyring tells the container engine whether to create | ||||||
|  | # a kernel keyring for use within the container. | ||||||
|  | # | ||||||
|  | #keyring = true | ||||||
|  |  | ||||||
|  | # label tells the container engine whether to use container separation using | ||||||
|  | # MAC(SELinux) labeling or not. | ||||||
|  | # The label flag is ignored on label disabled systems. | ||||||
|  | # | ||||||
|  | #label = true | ||||||
|  |  | ||||||
|  | # label_users indicates whether to enforce confined users in containers on | ||||||
|  | # SELinux systems. This option causes containers to maintain the current user | ||||||
|  | # and role field of the calling process. By default SELinux containers run with | ||||||
|  | # the user system_u, and the role system_r. | ||||||
|  | #label_users = false | ||||||
|  |  | ||||||
|  | # Logging driver for the container. Available options: k8s-file and journald. | ||||||
|  | # | ||||||
|  | #log_driver = "k8s-file" | ||||||
|  |  | ||||||
|  | # Maximum size allowed for the container log file. Negative numbers indicate | ||||||
|  | # that no size limit is imposed. If positive, it must be >= 8192 to match or | ||||||
|  | # exceed conmon's read buffer. The file is truncated and re-opened so the | ||||||
|  | # limit is never exceeded. | ||||||
|  | # | ||||||
|  | #log_size_max = -1 | ||||||
|  |  | ||||||
|  | # Specifies default format tag for container log messages. | ||||||
|  | # This is useful for creating a specific tag for container log messages. | ||||||
|  | # Containers logs default to truncated container ID as a tag. | ||||||
|  | # | ||||||
|  | #log_tag = "" | ||||||
|  |  | ||||||
|  | # Default way to to create a Network namespace for the container | ||||||
|  | # Options are: | ||||||
|  | # `private` Create private Network Namespace for the container. | ||||||
|  | # `host`    Share host Network Namespace with the container. | ||||||
|  | # `none`    Containers do not use the network | ||||||
|  | # | ||||||
|  | #netns = "private" | ||||||
|  |  | ||||||
|  | # Create /etc/hosts for the container.  By default, container engine manage | ||||||
|  | # /etc/hosts, automatically adding  the container's  own  IP  address. | ||||||
|  | # | ||||||
|  | #no_hosts = false | ||||||
|  |  | ||||||
|  | # Tune the host's OOM preferences for containers | ||||||
|  | # (accepts values from -1000 to 1000). | ||||||
|  | #oom_score_adj = 0 | ||||||
|  |  | ||||||
|  | # Default way to to create a PID namespace for the container | ||||||
|  | # Options are: | ||||||
|  | # `private` Create private PID Namespace for the container. | ||||||
|  | # `host`    Share host PID Namespace with the container. | ||||||
|  | # | ||||||
|  | #pidns = "private" | ||||||
|  |  | ||||||
|  | # Maximum number of processes allowed in a container. | ||||||
|  | # | ||||||
|  | #pids_limit = 2048 | ||||||
|  |  | ||||||
|  | # Copy the content from the underlying image into the newly created volume | ||||||
|  | # when the container is created instead of when it is started. If false, | ||||||
|  | # the container engine will not copy the content until the container is started. | ||||||
|  | # Setting it to true may have negative performance implications. | ||||||
|  | # | ||||||
|  | #prepare_volume_on_create = false | ||||||
|  |  | ||||||
|  | # Run all containers with root file system mounted read-only | ||||||
|  | # | ||||||
|  | # read_only = false | ||||||
|  |  | ||||||
|  | # Path to the seccomp.json profile which is used as the default seccomp profile | ||||||
|  | # for the runtime. | ||||||
|  | # | ||||||
|  | #seccomp_profile = "/usr/share/containers/seccomp.json" | ||||||
|  |  | ||||||
|  | # Size of /dev/shm. Specified as <number><unit>. | ||||||
|  | # Unit is optional, values: | ||||||
|  | # b (bytes), k (kilobytes), m (megabytes), or g (gigabytes). | ||||||
|  | # If the unit is omitted, the system uses bytes. | ||||||
|  | # | ||||||
|  | #shm_size = "65536k" | ||||||
|  |  | ||||||
|  | # Set timezone in container. Takes IANA timezones as well as "local", | ||||||
|  | # which sets the timezone in the container to match the host machine. | ||||||
|  | # | ||||||
|  | #tz = "" | ||||||
|  |  | ||||||
|  | # Set umask inside the container | ||||||
|  | # | ||||||
|  | #umask = "0022" | ||||||
|  |  | ||||||
|  | # Default way to to create a User namespace for the container | ||||||
|  | # Options are: | ||||||
|  | # `auto`        Create unique User Namespace for the container. | ||||||
|  | # `host`    Share host User Namespace with the container. | ||||||
|  | # | ||||||
|  | #userns = "host" | ||||||
|  |  | ||||||
|  | # Default way to to create a UTS namespace for the container | ||||||
|  | # Options are: | ||||||
|  | # `private`        Create private UTS Namespace for the container. | ||||||
|  | # `host`    Share host UTS Namespace with the container. | ||||||
|  | # | ||||||
|  | #utsns = "private" | ||||||
|  |  | ||||||
|  | # List of volumes. Specified as | ||||||
|  | # "<directory-on-host>:<directory-in-container>:<options>", for example: | ||||||
|  | # "/db:/var/lib/db:ro". | ||||||
|  | # If it is empty or commented out, no volumes will be added | ||||||
|  | # | ||||||
|  | #volumes = [] | ||||||
|  | # | ||||||
|  | #[engine.platform_to_oci_runtime] | ||||||
|  | #"wasi/wasm" = ["crun-wasm"] | ||||||
|  | #"wasi/wasm32" = ["crun-wasm"] | ||||||
|  | #"wasi/wasm64" = ["crun-wasm"] | ||||||
|  |  | ||||||
|  | [secrets] | ||||||
|  | #driver = "file" | ||||||
|  |  | ||||||
|  | [secrets.opts] | ||||||
|  | #root = "/example/directory" | ||||||
|  |  | ||||||
|  | [network] | ||||||
|  |  | ||||||
|  | # Network backend determines what network driver will be used to set up and tear down container networks. | ||||||
|  | # Valid values are "cni" and "netavark". | ||||||
|  | # The default value is empty which means that it will automatically choose CNI or netavark. If there are | ||||||
|  | # already containers/images or CNI networks preset it will choose CNI. | ||||||
|  | # | ||||||
|  | # Before changing this value all containers must be stopped otherwise it is likely that | ||||||
|  | # iptables rules and network interfaces might leak on the host. A reboot will fix this. | ||||||
|  | # | ||||||
|  | #network_backend = "" | ||||||
|  |  | ||||||
|  | # Path to directory where CNI plugin binaries are located. | ||||||
|  | # | ||||||
|  | #cni_plugin_dirs = [ | ||||||
|  | #  "/usr/local/libexec/cni", | ||||||
|  | #  "/usr/libexec/cni", | ||||||
|  | #  "/usr/local/lib/cni", | ||||||
|  | #  "/usr/lib/cni", | ||||||
|  | #  "/opt/cni/bin", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # List of directories that will be searched for netavark plugins. | ||||||
|  | # | ||||||
|  | #netavark_plugin_dirs = [ | ||||||
|  | #  "/usr/local/libexec/netavark", | ||||||
|  | #  "/usr/libexec/netavark", | ||||||
|  | #  "/usr/local/lib/netavark", | ||||||
|  | #  "/usr/lib/netavark", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # The network name of the default network to attach pods to. | ||||||
|  | # | ||||||
|  | #default_network = "podman" | ||||||
|  |  | ||||||
|  | # The default subnet for the default network given in default_network. | ||||||
|  | # If a network with that name does not exist, a new network using that name and | ||||||
|  | # this subnet will be created. | ||||||
|  | # Must be a valid IPv4 CIDR prefix. | ||||||
|  | # | ||||||
|  | #default_subnet = "10.88.0.0/16" | ||||||
|  |  | ||||||
|  | # DefaultSubnetPools is a list of subnets and size which are used to | ||||||
|  | # allocate subnets automatically for podman network create. | ||||||
|  | # It will iterate through the list and will pick the first free subnet | ||||||
|  | # with the given size. This is only used for ipv4 subnets, ipv6 subnets | ||||||
|  | # are always assigned randomly. | ||||||
|  | # | ||||||
|  | #default_subnet_pools = [ | ||||||
|  | #  {"base" = "10.89.0.0/16", "size" = 24}, | ||||||
|  | #  {"base" = "10.90.0.0/15", "size" = 24}, | ||||||
|  | #  {"base" = "10.92.0.0/14", "size" = 24}, | ||||||
|  | #  {"base" = "10.96.0.0/11", "size" = 24}, | ||||||
|  | #  {"base" = "10.128.0.0/9", "size" = 24}, | ||||||
|  | #] | ||||||
|  |  | ||||||
|  |  | ||||||
|  |  | ||||||
|  | # Configure which rootless network program to use by default. Valid options are | ||||||
|  | # `slirp4netns` (default) and `pasta`. | ||||||
|  | # | ||||||
|  | #default_rootless_network_cmd = "slirp4netns" | ||||||
|  |  | ||||||
|  | # Path to the directory where network configuration files are located. | ||||||
|  | # For the CNI backend the default is "/etc/cni/net.d" as root | ||||||
|  | # and "$HOME/.config/cni/net.d" as rootless. | ||||||
|  | # For the netavark backend "/etc/containers/networks" is used as root | ||||||
|  | # and "$graphroot/networks" as rootless. | ||||||
|  | # | ||||||
|  | #network_config_dir = "/etc/cni/net.d/" | ||||||
|  |  | ||||||
|  | # Port to use for dns forwarding daemon with netavark in rootful bridge | ||||||
|  | # mode and dns enabled. | ||||||
|  | # Using an alternate port might be useful if other dns services should | ||||||
|  | # run on the machine. | ||||||
|  | # | ||||||
|  | #dns_bind_port = 53 | ||||||
|  |  | ||||||
|  | #	A list of default pasta options that should be used running pasta. | ||||||
|  | # It accepts the pasta cli options, see pasta(1) for the full list of options. | ||||||
|  | # | ||||||
|  | #pasta_options = [] | ||||||
|  |  | ||||||
|  | [engine] | ||||||
|  | # Index to the active service | ||||||
|  | # | ||||||
|  | #active_service = "production" | ||||||
|  |  | ||||||
|  | # The compression format to use when pushing an image. | ||||||
|  | # Valid options are: `gzip`, `zstd` and `zstd:chunked`. | ||||||
|  | # | ||||||
|  | #compression_format = "gzip" | ||||||
|  |  | ||||||
|  | # The compression level to use when pushing an image. | ||||||
|  | # Valid options depend on the compression format used. | ||||||
|  | # For gzip, valid options are 1-9, with a default of 5. | ||||||
|  | # For zstd, valid options are 1-20, with a default of 3. | ||||||
|  | # | ||||||
|  | #compression_level = 5 | ||||||
|  |  | ||||||
|  | # Cgroup management implementation used for the runtime. | ||||||
|  | # Valid options "systemd" or "cgroupfs" | ||||||
|  | # | ||||||
|  | #cgroup_manager = "systemd" | ||||||
|  |  | ||||||
|  | # Environment variables to pass into conmon | ||||||
|  | # | ||||||
|  | #conmon_env_vars = [ | ||||||
|  | #  "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # Paths to look for the conmon container manager binary | ||||||
|  | # | ||||||
|  | #conmon_path = [ | ||||||
|  | #  "/usr/libexec/podman/conmon", | ||||||
|  | #  "/usr/local/libexec/podman/conmon", | ||||||
|  | #  "/usr/local/lib/podman/conmon", | ||||||
|  | #  "/usr/bin/conmon", | ||||||
|  | #  "/usr/sbin/conmon", | ||||||
|  | #  "/usr/local/bin/conmon", | ||||||
|  | #  "/usr/local/sbin/conmon" | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # Enforces using docker.io for completing short names in Podman's compatibility | ||||||
|  | # REST API. Note that this will ignore unqualified-search-registries and | ||||||
|  | # short-name aliases defined in containers-registries.conf(5). | ||||||
|  | #compat_api_enforce_docker_hub = true | ||||||
|  |  | ||||||
|  | # The database backend of Podman.  Supported values are "boltdb" (default) and | ||||||
|  | # "sqlite". Please run `podman-system-reset` prior to changing the database | ||||||
|  | # backend of an existing deployment, to make sure Podman can operate correctly. | ||||||
|  | #database_backend="boltdb" | ||||||
|  |  | ||||||
|  | # Specify the keys sequence used to detach a container. | ||||||
|  | # Format is a single character [a-Z] or a comma separated sequence of | ||||||
|  | # `ctrl-<value>`, where `<value>` is one of: | ||||||
|  | # `a-z`, `@`, `^`, `[`, `\`, `]`, `^` or `_` | ||||||
|  | # Specifying "" disables this feature. | ||||||
|  | #detach_keys = "ctrl-p,ctrl-q" | ||||||
|  |  | ||||||
|  | # Determines whether engine will reserve ports on the host when they are | ||||||
|  | # forwarded to containers. When enabled, when ports are forwarded to containers, | ||||||
|  | # ports are held open by as long as the container is running, ensuring that | ||||||
|  | # they cannot be reused by other programs on the host. However, this can cause | ||||||
|  | # significant memory usage if a container has many ports forwarded to it. | ||||||
|  | # Disabling this can save memory. | ||||||
|  | # | ||||||
|  | #enable_port_reservation = true | ||||||
|  |  | ||||||
|  | # Environment variables to be used when running the container engine (e.g., Podman, Buildah). | ||||||
|  | # For example "http_proxy=internal.proxy.company.com". | ||||||
|  | # Note these environment variables will not be used within the container. | ||||||
|  | # Set the env section under [containers] table, if you want to set environment variables for the container. | ||||||
|  | # | ||||||
|  | #env = [] | ||||||
|  |  | ||||||
|  | # Define where event logs will be stored, when events_logger is "file". | ||||||
|  | #events_logfile_path="" | ||||||
|  |  | ||||||
|  | # Sets the maximum size for events_logfile_path. | ||||||
|  | # The size can be b (bytes), k (kilobytes), m (megabytes), or g (gigabytes). | ||||||
|  | # The format for the size is `<number><unit>`, e.g., `1b` or `3g`. | ||||||
|  | # If no unit is included then the size will be read in bytes. | ||||||
|  | # When the limit is exceeded, the logfile will be rotated and the old one will be deleted. | ||||||
|  | # If the maximum size is set to 0, then no limit will be applied, | ||||||
|  | # and the logfile will not be rotated. | ||||||
|  | #events_logfile_max_size = "1m" | ||||||
|  |  | ||||||
|  | # Selects which logging mechanism to use for container engine events. | ||||||
|  | # Valid values are `journald`, `file` and `none`. | ||||||
|  | # | ||||||
|  | #events_logger = "journald" | ||||||
|  |  | ||||||
|  | # Creates a more verbose container-create event which includes a JSON payload | ||||||
|  | # with detailed information about the container. | ||||||
|  | #events_container_create_inspect_data = false | ||||||
|  |  | ||||||
|  | # A is a list of directories which are used to search for helper binaries. | ||||||
|  | # | ||||||
|  | #helper_binaries_dir = [ | ||||||
|  | #  "/usr/local/libexec/podman", | ||||||
|  | #  "/usr/local/lib/podman", | ||||||
|  | #  "/usr/libexec/podman", | ||||||
|  | #  "/usr/lib/podman", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # Path to OCI hooks directories for automatically executed hooks. | ||||||
|  | # | ||||||
|  | #hooks_dir = [ | ||||||
|  | #  "/usr/share/containers/oci/hooks.d", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # Manifest Type (oci, v2s2, or v2s1) to use when pulling, pushing, building | ||||||
|  | # container images. By default image pulled and pushed match the format of the | ||||||
|  | # source image. Building/committing defaults to OCI. | ||||||
|  | # | ||||||
|  | #image_default_format = "" | ||||||
|  |  | ||||||
|  | # Default transport method for pulling and pushing for images | ||||||
|  | # | ||||||
|  | #image_default_transport = "docker://" | ||||||
|  |  | ||||||
|  | # Maximum number of image layers to be copied (pulled/pushed) simultaneously. | ||||||
|  | # Not setting this field, or setting it to zero, will fall back to containers/image defaults. | ||||||
|  | # | ||||||
|  | #image_parallel_copies = 0 | ||||||
|  |  | ||||||
|  | # Tells container engines how to handle the built-in image volumes. | ||||||
|  | #   * bind: An anonymous named volume will be created and mounted | ||||||
|  | #     into the container. | ||||||
|  | #   * tmpfs: The volume is mounted onto the container as a tmpfs, | ||||||
|  | #     which allows users to create content that disappears when | ||||||
|  | #     the container is stopped. | ||||||
|  | #   * ignore: All volumes are just ignored and no action is taken. | ||||||
|  | # | ||||||
|  | #image_volume_mode = "" | ||||||
|  |  | ||||||
|  | # Default command to run the infra container | ||||||
|  | # | ||||||
|  | #infra_command = "/pause" | ||||||
|  |  | ||||||
|  | # Infra (pause) container image name for pod infra containers.  When running a | ||||||
|  | # pod, we start a `pause` process in a container to hold open the namespaces | ||||||
|  | # associated with the  pod.  This container does nothing other than sleep, | ||||||
|  | # reserving the pod's resources for the lifetime of the pod. By default container | ||||||
|  | # engines run a built-in container using the pause executable. If you want override | ||||||
|  | # specify an image to pull. | ||||||
|  | # | ||||||
|  | #infra_image = "" | ||||||
|  |  | ||||||
|  | # Default Kubernetes kind/specification of the kubernetes yaml generated with the `podman kube generate` command. | ||||||
|  | # The possible options are `pod` and `deployment`. | ||||||
|  | #kube_generate_type = "pod" | ||||||
|  |  | ||||||
|  | # Specify the locking mechanism to use; valid values are "shm" and "file". | ||||||
|  | # Change the default only if you are sure of what you are doing, in general | ||||||
|  | # "file" is useful only on platforms where cgo is not available for using the | ||||||
|  | # faster "shm" lock type. You may need to run "podman system renumber" after | ||||||
|  | # you change the lock type. | ||||||
|  | # | ||||||
|  | #lock_type = "shm" | ||||||
|  |  | ||||||
|  | # MultiImageArchive - if true, the container engine allows for storing archives | ||||||
|  | # (e.g., of the docker-archive transport) with multiple images.  By default, | ||||||
|  | # Podman creates single-image archives. | ||||||
|  | # | ||||||
|  | #multi_image_archive = false | ||||||
|  |  | ||||||
|  | # Default engine namespace | ||||||
|  | # If engine is joined to a namespace, it will see only containers and pods | ||||||
|  | # that were created in the same namespace, and will create new containers and | ||||||
|  | # pods in that namespace. | ||||||
|  | # The default namespace is "", which corresponds to no namespace. When no | ||||||
|  | # namespace is set, all containers and pods are visible. | ||||||
|  | # | ||||||
|  | #namespace = "" | ||||||
|  |  | ||||||
|  | # Path to the slirp4netns binary | ||||||
|  | # | ||||||
|  | #network_cmd_path = "" | ||||||
|  |  | ||||||
|  | # Default options to pass to the slirp4netns binary. | ||||||
|  | # Valid options values are: | ||||||
|  | # | ||||||
|  | # - allow_host_loopback=true|false: Allow the slirp4netns to reach the host loopback IP (`10.0.2.2`). | ||||||
|  | #   Default is false. | ||||||
|  | # - mtu=MTU: Specify the MTU to use for this network. (Default is `65520`). | ||||||
|  | # - cidr=CIDR: Specify ip range to use for this network. (Default is `10.0.2.0/24`). | ||||||
|  | # - enable_ipv6=true|false: Enable IPv6. Default is true. (Required for `outbound_addr6`). | ||||||
|  | # - outbound_addr=INTERFACE: Specify the outbound interface slirp should bind to (ipv4 traffic only). | ||||||
|  | # - outbound_addr=IPv4: Specify the outbound ipv4 address slirp should bind to. | ||||||
|  | # - outbound_addr6=INTERFACE: Specify the outbound interface slirp should bind to (ipv6 traffic only). | ||||||
|  | # - outbound_addr6=IPv6: Specify the outbound ipv6 address slirp should bind to. | ||||||
|  | # - port_handler=rootlesskit: Use rootlesskit for port forwarding. Default. | ||||||
|  | #   Note: Rootlesskit changes the source IP address of incoming packets to a IP address in the container | ||||||
|  | #   network namespace, usually `10.0.2.100`. If your application requires the real source IP address, | ||||||
|  | #   e.g. web server logs, use the slirp4netns port handler. The rootlesskit port handler is also used for | ||||||
|  | #   rootless containers when connected to user-defined networks. | ||||||
|  | # - port_handler=slirp4netns: Use the slirp4netns port forwarding, it is slower than rootlesskit but | ||||||
|  | #   preserves the correct source IP address. This port handler cannot be used for user-defined networks. | ||||||
|  | # | ||||||
|  | #network_cmd_options = [] | ||||||
|  |  | ||||||
|  | # Whether to use chroot instead of pivot_root in the runtime | ||||||
|  | # | ||||||
|  | #no_pivot_root = false | ||||||
|  |  | ||||||
|  | # Number of locks available for containers and pods. | ||||||
|  | # If this is changed, a lock renumber must be performed (e.g. with the | ||||||
|  | # 'podman system renumber' command). | ||||||
|  | # | ||||||
|  | #num_locks = 2048 | ||||||
|  |  | ||||||
|  | # Set the exit policy of the pod when the last container exits. | ||||||
|  | #pod_exit_policy = "continue" | ||||||
|  |  | ||||||
|  | # Whether to pull new image before running a container | ||||||
|  | # | ||||||
|  | #pull_policy = "missing" | ||||||
|  |  | ||||||
|  | # Indicates whether the application should be running in remote mode. This flag modifies the | ||||||
|  | # --remote option on container engines. Setting the flag to true will default | ||||||
|  | # `podman --remote=true` for access to the remote Podman service. | ||||||
|  | # | ||||||
|  | #remote = false | ||||||
|  |  | ||||||
|  | # Default OCI runtime | ||||||
|  | # | ||||||
|  | #runtime = "crun" | ||||||
|  |  | ||||||
|  | # List of the OCI runtimes that support --format=json. When json is supported | ||||||
|  | # engine will use it for reporting nicer errors. | ||||||
|  | # | ||||||
|  | #runtime_supports_json = ["crun", "runc", "kata", "runsc", "youki", "krun"] | ||||||
|  |  | ||||||
|  | # List of the OCI runtimes that supports running containers with KVM Separation. | ||||||
|  | # | ||||||
|  | #runtime_supports_kvm = ["kata", "krun"] | ||||||
|  |  | ||||||
|  | # List of the OCI runtimes that supports running containers without cgroups. | ||||||
|  | # | ||||||
|  | #runtime_supports_nocgroups = ["crun", "krun"] | ||||||
|  |  | ||||||
|  | # Default location for storing temporary container image content. Can be overridden with the TMPDIR environment | ||||||
|  | # variable. If you specify "storage", then the location of the | ||||||
|  | # container/storage tmp directory will be used. | ||||||
|  | # image_copy_tmp_dir="/var/tmp" | ||||||
|  |  | ||||||
|  | # Number of seconds to wait without a connection | ||||||
|  | # before the `podman system service` times out and exits | ||||||
|  | # | ||||||
|  | #service_timeout = 5 | ||||||
|  |  | ||||||
|  | # Directory for persistent engine files (database, etc) | ||||||
|  | # By default, this will be configured relative to where the containers/storage | ||||||
|  | # stores containers | ||||||
|  | # Uncomment to change location from this default | ||||||
|  | # | ||||||
|  | #static_dir = "/var/lib/containers/storage/libpod" | ||||||
|  |  | ||||||
|  | # Number of seconds to wait for containerto exit before sending kill signal. | ||||||
|  | # | ||||||
|  | #stop_timeout = 10 | ||||||
|  |  | ||||||
|  | # Number of seconds to wait before exit command in API process is given to. | ||||||
|  | # This mimics Docker's exec cleanup behaviour, where the default is 5 minutes (value is in seconds). | ||||||
|  | # | ||||||
|  | #exit_command_delay = 300 | ||||||
|  |  | ||||||
|  | # map of service destinations | ||||||
|  | # | ||||||
|  | # [engine.service_destinations] | ||||||
|  | #  [engine.service_destinations.production] | ||||||
|  | #     URI to access the Podman service | ||||||
|  | #     Examples: | ||||||
|  | #       rootless "unix://run/user/$UID/podman/podman.sock" (Default) | ||||||
|  | #       rootful "unix://run/podman/podman.sock (Default) | ||||||
|  | #       remote rootless ssh://engineering.lab.company.com/run/user/1000/podman/podman.sock | ||||||
|  | #       remote rootful ssh://root@10.10.1.136:22/run/podman/podman.sock | ||||||
|  | # | ||||||
|  | #    uri = "ssh://user@production.example.com/run/user/1001/podman/podman.sock" | ||||||
|  | #    Path to file containing ssh identity key | ||||||
|  | #    identity = "~/.ssh/id_rsa" | ||||||
|  |  | ||||||
|  | # Directory for temporary files. Must be tmpfs (wiped after reboot) | ||||||
|  | # | ||||||
|  | #tmp_dir = "/run/libpod" | ||||||
|  |  | ||||||
|  | # Directory for libpod named volumes. | ||||||
|  | # By default, this will be configured relative to where containers/storage | ||||||
|  | # stores containers. | ||||||
|  | # Uncomment to change location from this default. | ||||||
|  | # | ||||||
|  | #volume_path = "/var/lib/containers/storage/volumes" | ||||||
|  |  | ||||||
|  | # Default timeout (in seconds) for volume plugin operations. | ||||||
|  | # Plugins are external programs accessed via a REST API; this sets a timeout | ||||||
|  | # for requests to that API. | ||||||
|  | # A value of 0 is treated as no timeout. | ||||||
|  | #volume_plugin_timeout = 5 | ||||||
|  |  | ||||||
|  | # Paths to look for a valid OCI runtime (crun, runc, kata, runsc, krun, etc) | ||||||
|  | [engine.runtimes] | ||||||
|  | #crun = [ | ||||||
|  | #  "/usr/bin/crun", | ||||||
|  | #  "/usr/sbin/crun", | ||||||
|  | #  "/usr/local/bin/crun", | ||||||
|  | #  "/usr/local/sbin/crun", | ||||||
|  | #  "/sbin/crun", | ||||||
|  | #  "/bin/crun", | ||||||
|  | #  "/run/current-system/sw/bin/crun", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | #kata = [ | ||||||
|  | #  "/usr/bin/kata-runtime", | ||||||
|  | #  "/usr/sbin/kata-runtime", | ||||||
|  | #  "/usr/local/bin/kata-runtime", | ||||||
|  | #  "/usr/local/sbin/kata-runtime", | ||||||
|  | #  "/sbin/kata-runtime", | ||||||
|  | #  "/bin/kata-runtime", | ||||||
|  | #  "/usr/bin/kata-qemu", | ||||||
|  | #  "/usr/bin/kata-fc", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | #runc = [ | ||||||
|  | #  "/usr/bin/runc", | ||||||
|  | #  "/usr/sbin/runc", | ||||||
|  | #  "/usr/local/bin/runc", | ||||||
|  | #  "/usr/local/sbin/runc", | ||||||
|  | #  "/sbin/runc", | ||||||
|  | #  "/bin/runc", | ||||||
|  | #  "/usr/lib/cri-o-runc/sbin/runc", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | #runsc = [ | ||||||
|  | #  "/usr/bin/runsc", | ||||||
|  | #  "/usr/sbin/runsc", | ||||||
|  | #  "/usr/local/bin/runsc", | ||||||
|  | #  "/usr/local/sbin/runsc", | ||||||
|  | #  "/bin/runsc", | ||||||
|  | #  "/sbin/runsc", | ||||||
|  | #  "/run/current-system/sw/bin/runsc", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | #youki = [ | ||||||
|  | #  "/usr/local/bin/youki", | ||||||
|  | #  "/usr/bin/youki", | ||||||
|  | #  "/bin/youki", | ||||||
|  | #  "/run/current-system/sw/bin/youki", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | #krun = [ | ||||||
|  | #  "/usr/bin/krun", | ||||||
|  | #  "/usr/local/bin/krun", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | [engine.volume_plugins] | ||||||
|  | #testplugin = "/run/podman/plugins/test.sock" | ||||||
|  |  | ||||||
|  | [machine] | ||||||
|  | # Number of CPU's a machine is created with. | ||||||
|  | # | ||||||
|  | #cpus=1 | ||||||
|  |  | ||||||
|  | # The size of the disk in GB created when init-ing a podman-machine VM. | ||||||
|  | # | ||||||
|  | #disk_size=10 | ||||||
|  |  | ||||||
|  | # Default image URI when creating a new VM using `podman machine init`. | ||||||
|  | # Options: On Linux/Mac, `testing`, `stable`, `next`. On Windows, the major | ||||||
|  | # version of the OS (e.g `36`) for Fedora 36. For all platforms you can | ||||||
|  | # alternatively specify a custom download URL to an image. Container engines | ||||||
|  | # translate URIs $OS and $ARCH to the native OS and ARCH. URI | ||||||
|  | # "https://example.com/$OS/$ARCH/foobar.ami" becomes | ||||||
|  | # "https://example.com/linux/amd64/foobar.ami" on a Linux AMD machine. | ||||||
|  | # The default value is `testing`. | ||||||
|  | # | ||||||
|  | #image = "testing" | ||||||
|  |  | ||||||
|  | # Memory in MB a machine is created with. | ||||||
|  | # | ||||||
|  | #memory=2048 | ||||||
|  |  | ||||||
|  | # The username to use and create on the podman machine OS for rootless | ||||||
|  | # container access. | ||||||
|  | # | ||||||
|  | #user = "core" | ||||||
|  |  | ||||||
|  | # Host directories to be mounted as volumes into the VM by default. | ||||||
|  | # Environment variables like $HOME as well as complete paths are supported for | ||||||
|  | # the source and destination. An optional third field `:ro` can be used to | ||||||
|  | # tell the container engines to mount the volume readonly. | ||||||
|  | # | ||||||
|  | #volumes = [ | ||||||
|  | #  "$HOME:$HOME", | ||||||
|  | #] | ||||||
|  |  | ||||||
|  | # Virtualization provider used to run Podman machine. | ||||||
|  | # If it is empty or commented out, the default provider will be used. | ||||||
|  | # | ||||||
|  | #provider = "" | ||||||
|  |  | ||||||
|  | # The [machine] table MUST be the last entry in this file. | ||||||
|  | # (Unless another table is added) | ||||||
|  | # TOML does not provide a way to end a table other than a further table being | ||||||
|  | # defined, so every key hereafter will be part of [machine] and not the | ||||||
|  | # main config. | ||||||
| @@ -0,0 +1,32 @@ | |||||||
|  | { | ||||||
|  |     "default": [ | ||||||
|  |         { | ||||||
|  |             "type": "insecureAcceptAnything" | ||||||
|  |         } | ||||||
|  |     ], | ||||||
|  |     "transports": { | ||||||
|  |         "docker": { | ||||||
|  | 	    "registry.access.redhat.com": [ | ||||||
|  | 		{ | ||||||
|  | 		    "type": "signedBy", | ||||||
|  | 		    "keyType": "GPGKeys", | ||||||
|  | 		    "keyPath": "/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release" | ||||||
|  | 		} | ||||||
|  | 	    ], | ||||||
|  | 	    "registry.redhat.io": [ | ||||||
|  | 		{ | ||||||
|  | 		    "type": "signedBy", | ||||||
|  | 		    "keyType": "GPGKeys", | ||||||
|  | 		    "keyPath": "/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release" | ||||||
|  | 		} | ||||||
|  | 	    ] | ||||||
|  | 	}, | ||||||
|  |         "docker-daemon": { | ||||||
|  | 	    "": [ | ||||||
|  | 		{ | ||||||
|  | 		    "type": "insecureAcceptAnything" | ||||||
|  | 		} | ||||||
|  | 	    ] | ||||||
|  | 	} | ||||||
|  |     } | ||||||
|  | } | ||||||
							
								
								
									
										1051
									
								
								buildroot-external/rootfs-overlay/usr/share/containers/seccomp.json
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										1051
									
								
								buildroot-external/rootfs-overlay/usr/share/containers/seccomp.json
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because it is too large
												Load Diff
											
										
									
								
							| @@ -0,0 +1,239 @@ | |||||||
|  | # This file is the configuration file for all tools | ||||||
|  | # that use the containers/storage library. The storage.conf file | ||||||
|  | # overrides all other storage.conf files. Container engines using the | ||||||
|  | # container/storage library do not inherit fields from other storage.conf | ||||||
|  | # files. | ||||||
|  | # | ||||||
|  | #  Note: The storage.conf file overrides other storage.conf files based on this precedence: | ||||||
|  | #      /usr/containers/storage.conf | ||||||
|  | #      /etc/containers/storage.conf | ||||||
|  | #      $HOME/.config/containers/storage.conf | ||||||
|  | #      $XDG_CONFIG_HOME/containers/storage.conf (If XDG_CONFIG_HOME is set) | ||||||
|  | # See man 5 containers-storage.conf for more information | ||||||
|  | # The "container storage" table contains all of the server options. | ||||||
|  | [storage] | ||||||
|  |  | ||||||
|  | # Default Storage Driver, Must be set for proper operation. | ||||||
|  | driver = "overlay" | ||||||
|  |  | ||||||
|  | # Temporary storage location | ||||||
|  | runroot = "/run/containers/storage" | ||||||
|  |  | ||||||
|  | # Primary Read/Write location of container storage | ||||||
|  | # When changing the graphroot location on an SELINUX system, you must | ||||||
|  | # ensure  the labeling matches the default locations labels with the | ||||||
|  | # following commands: | ||||||
|  | # semanage fcontext -a -e /var/lib/containers/storage /NEWSTORAGEPATH | ||||||
|  | # restorecon -R -v /NEWSTORAGEPATH | ||||||
|  | graphroot = "/opt/containers/storage" | ||||||
|  |  | ||||||
|  |  | ||||||
|  | # Storage path for rootless users | ||||||
|  | # | ||||||
|  | rootless_storage_path = "$HOME/.local/share/containers/storage" | ||||||
|  |  | ||||||
|  | # Transient store mode makes all container metadata be saved in temporary storage | ||||||
|  | # (i.e. runroot above). This is faster, but doesn't persist across reboots. | ||||||
|  | # Additional garbage collection must also be performed at boot-time, so this | ||||||
|  | # option should remain disabled in most configurations. | ||||||
|  | # transient_store = true | ||||||
|  |  | ||||||
|  | [storage.options] | ||||||
|  | # Storage options to be passed to underlying storage drivers | ||||||
|  |  | ||||||
|  | # AdditionalImageStores is used to pass paths to additional Read/Only image stores | ||||||
|  | # Must be comma separated list. | ||||||
|  | additionalimagestores = [ | ||||||
|  | ] | ||||||
|  |  | ||||||
|  | # Allows specification of how storage is populated when pulling images. This | ||||||
|  | # option can speed the pulling process of images compressed with format | ||||||
|  | # zstd:chunked. Containers/storage looks for files within images that are being | ||||||
|  | # pulled from a container registry that were previously pulled to the host.  It | ||||||
|  | # can copy or create a hard link to the existing file when it finds them, | ||||||
|  | # eliminating the need to pull them from the container registry. These options | ||||||
|  | # can deduplicate pulling of content, disk storage of content and can allow the | ||||||
|  | # kernel to use less memory when running containers. | ||||||
|  |  | ||||||
|  | # containers/storage supports three keys | ||||||
|  | #   * enable_partial_images="true" | "false" | ||||||
|  | #     Tells containers/storage to look for files previously pulled in storage | ||||||
|  | #     rather then always pulling them from the container registry. | ||||||
|  | #   * use_hard_links = "false" | "true" | ||||||
|  | #     Tells containers/storage to use hard links rather then create new files in | ||||||
|  | #     the image, if an identical file already existed in storage. | ||||||
|  | #   * ostree_repos = "" | ||||||
|  | #     Tells containers/storage where an ostree repository exists that might have | ||||||
|  | #     previously pulled content which can be used when attempting to avoid | ||||||
|  | #     pulling content from the container registry | ||||||
|  | pull_options = {enable_partial_images = "false", use_hard_links = "false", ostree_repos=""} | ||||||
|  |  | ||||||
|  | # Remap-UIDs/GIDs is the mapping from UIDs/GIDs as they should appear inside of | ||||||
|  | # a container, to the UIDs/GIDs as they should appear outside of the container, | ||||||
|  | # and the length of the range of UIDs/GIDs.  Additional mapped sets can be | ||||||
|  | # listed and will be heeded by libraries, but there are limits to the number of | ||||||
|  | # mappings which the kernel will allow when you later attempt to run a | ||||||
|  | # container. | ||||||
|  | # | ||||||
|  | # remap-uids = "0:1668442479:65536" | ||||||
|  | # remap-gids = "0:1668442479:65536" | ||||||
|  |  | ||||||
|  | # Remap-User/Group is a user name which can be used to look up one or more UID/GID | ||||||
|  | # ranges in the /etc/subuid or /etc/subgid file.  Mappings are set up starting | ||||||
|  | # with an in-container ID of 0 and then a host-level ID taken from the lowest | ||||||
|  | # range that matches the specified name, and using the length of that range. | ||||||
|  | # Additional ranges are then assigned, using the ranges which specify the | ||||||
|  | # lowest host-level IDs first, to the lowest not-yet-mapped in-container ID, | ||||||
|  | # until all of the entries have been used for maps. This setting overrides the | ||||||
|  | # Remap-UIDs/GIDs setting. | ||||||
|  | # | ||||||
|  | # remap-user = "containers" | ||||||
|  | # remap-group = "containers" | ||||||
|  |  | ||||||
|  | # Root-auto-userns-user is a user name which can be used to look up one or more UID/GID | ||||||
|  | # ranges in the /etc/subuid and /etc/subgid file.  These ranges will be partitioned | ||||||
|  | # to containers configured to create automatically a user namespace.  Containers | ||||||
|  | # configured to automatically create a user namespace can still overlap with containers | ||||||
|  | # having an explicit mapping set. | ||||||
|  | # This setting is ignored when running as rootless. | ||||||
|  | # root-auto-userns-user = "storage" | ||||||
|  | # | ||||||
|  | # Auto-userns-min-size is the minimum size for a user namespace created automatically. | ||||||
|  | # auto-userns-min-size=1024 | ||||||
|  | # | ||||||
|  | # Auto-userns-max-size is the maximum size for a user namespace created automatically. | ||||||
|  | # auto-userns-max-size=65536 | ||||||
|  |  | ||||||
|  | [storage.options.overlay] | ||||||
|  | # ignore_chown_errors can be set to allow a non privileged user running with | ||||||
|  | # a single UID within a user namespace to run containers. The user can pull | ||||||
|  | # and use any image even those with multiple uids.  Note multiple UIDs will be | ||||||
|  | # squashed down to the default uid in the container.  These images will have no | ||||||
|  | # separation between the users in the container. Only supported for the overlay | ||||||
|  | # and vfs drivers. | ||||||
|  | #ignore_chown_errors = "false" | ||||||
|  |  | ||||||
|  | # Inodes is used to set a maximum inodes of the container image. | ||||||
|  | # inodes = "" | ||||||
|  |  | ||||||
|  | # Path to an helper program to use for mounting the file system instead of mounting it | ||||||
|  | # directly. | ||||||
|  | mount_program = "/usr/bin/fuse-overlayfs" | ||||||
|  |  | ||||||
|  | # mountopt specifies comma separated list of extra mount options | ||||||
|  | mountopt = "nodev" | ||||||
|  |  | ||||||
|  | # Set to skip a PRIVATE bind mount on the storage home directory. | ||||||
|  | # skip_mount_home = "false" | ||||||
|  |  | ||||||
|  | # Size is used to set a maximum size of the container image. | ||||||
|  | # size = "" | ||||||
|  |  | ||||||
|  | # ForceMask specifies the permissions mask that is used for new files and | ||||||
|  | # directories. | ||||||
|  | # | ||||||
|  | # The values "shared" and "private" are accepted. | ||||||
|  | # Octal permission masks are also accepted. | ||||||
|  | # | ||||||
|  | #  "": No value specified. | ||||||
|  | #     All files/directories, get set with the permissions identified within the | ||||||
|  | #     image. | ||||||
|  | #  "private": it is equivalent to 0700. | ||||||
|  | #     All files/directories get set with 0700 permissions.  The owner has rwx | ||||||
|  | #     access to the files. No other users on the system can access the files. | ||||||
|  | #     This setting could be used with networked based homedirs. | ||||||
|  | #  "shared": it is equivalent to 0755. | ||||||
|  | #     The owner has rwx access to the files and everyone else can read, access | ||||||
|  | #     and execute them. This setting is useful for sharing containers storage | ||||||
|  | #     with other users.  For instance have a storage owned by root but shared | ||||||
|  | #     to rootless users as an additional store. | ||||||
|  | #     NOTE:  All files within the image are made readable and executable by any | ||||||
|  | #     user on the system. Even /etc/shadow within your image is now readable by | ||||||
|  | #     any user. | ||||||
|  | # | ||||||
|  | #   OCTAL: Users can experiment with other OCTAL Permissions. | ||||||
|  | # | ||||||
|  | #  Note: The force_mask Flag is an experimental feature, it could change in the | ||||||
|  | #  future.  When "force_mask" is set the original permission mask is stored in | ||||||
|  | #  the "user.containers.override_stat" xattr and the "mount_program" option must | ||||||
|  | #  be specified. Mount programs like "/usr/bin/fuse-overlayfs" present the | ||||||
|  | #  extended attribute permissions to processes within containers rather than the | ||||||
|  | #  "force_mask"  permissions. | ||||||
|  | # | ||||||
|  | # force_mask = "" | ||||||
|  |  | ||||||
|  | [storage.options.thinpool] | ||||||
|  | # Storage Options for thinpool | ||||||
|  |  | ||||||
|  | # autoextend_percent determines the amount by which pool needs to be | ||||||
|  | # grown. This is specified in terms of % of pool size. So a value of 20 means | ||||||
|  | # that when threshold is hit, pool will be grown by 20% of existing | ||||||
|  | # pool size. | ||||||
|  | # autoextend_percent = "20" | ||||||
|  |  | ||||||
|  | # autoextend_threshold determines the pool extension threshold in terms | ||||||
|  | # of percentage of pool size. For example, if threshold is 60, that means when | ||||||
|  | # pool is 60% full, threshold has been hit. | ||||||
|  | # autoextend_threshold = "80" | ||||||
|  |  | ||||||
|  | # basesize specifies the size to use when creating the base device, which | ||||||
|  | # limits the size of images and containers. | ||||||
|  | # basesize = "10G" | ||||||
|  |  | ||||||
|  | # blocksize specifies a custom blocksize to use for the thin pool. | ||||||
|  | # blocksize="64k" | ||||||
|  |  | ||||||
|  | # directlvm_device specifies a custom block storage device to use for the | ||||||
|  | # thin pool. Required if you setup devicemapper. | ||||||
|  | # directlvm_device = "" | ||||||
|  |  | ||||||
|  | # directlvm_device_force wipes device even if device already has a filesystem. | ||||||
|  | # directlvm_device_force = "True" | ||||||
|  |  | ||||||
|  | # fs specifies the filesystem type to use for the base device. | ||||||
|  | # fs="xfs" | ||||||
|  |  | ||||||
|  | # log_level sets the log level of devicemapper. | ||||||
|  | # 0: LogLevelSuppress 0 (Default) | ||||||
|  | # 2: LogLevelFatal | ||||||
|  | # 3: LogLevelErr | ||||||
|  | # 4: LogLevelWarn | ||||||
|  | # 5: LogLevelNotice | ||||||
|  | # 6: LogLevelInfo | ||||||
|  | # 7: LogLevelDebug | ||||||
|  | # log_level = "7" | ||||||
|  |  | ||||||
|  | # min_free_space specifies the min free space percent in a thin pool require for | ||||||
|  | # new device creation to succeed. Valid values are from 0% - 99%. | ||||||
|  | # Value 0% disables | ||||||
|  | # min_free_space = "10%" | ||||||
|  |  | ||||||
|  | # mkfsarg specifies extra mkfs arguments to be used when creating the base | ||||||
|  | # device. | ||||||
|  | # mkfsarg = "" | ||||||
|  |  | ||||||
|  | # metadata_size is used to set the `pvcreate --metadatasize` options when | ||||||
|  | # creating thin devices. Default is 128k | ||||||
|  | # metadata_size = "" | ||||||
|  |  | ||||||
|  | # Size is used to set a maximum size of the container image. | ||||||
|  | # size = "" | ||||||
|  |  | ||||||
|  | # use_deferred_removal marks devicemapper block device for deferred removal. | ||||||
|  | # If the thinpool is in use when the driver attempts to remove it, the driver | ||||||
|  | # tells the kernel to remove it as soon as possible. Note this does not free | ||||||
|  | # up the disk space, use deferred deletion to fully remove the thinpool. | ||||||
|  | # use_deferred_removal = "True" | ||||||
|  |  | ||||||
|  | # use_deferred_deletion marks thinpool device for deferred deletion. | ||||||
|  | # If the device is busy when the driver attempts to delete it, the driver | ||||||
|  | # will attempt to delete device every 30 seconds until successful. | ||||||
|  | # If the program using the driver exits, the driver will continue attempting | ||||||
|  | # to cleanup the next time the driver is used. Deferred deletion permanently | ||||||
|  | # deletes the device and all data stored in device will be lost. | ||||||
|  | # use_deferred_deletion = "True" | ||||||
|  |  | ||||||
|  | # xfs_nospace_max_retries specifies the maximum number of retries XFS should | ||||||
|  | # attempt to complete IO when ENOSPC (no space) error is returned by | ||||||
|  | # underlying storage device. | ||||||
|  | # xfs_nospace_max_retries = "0" | ||||||
		Reference in New Issue
	
	Block a user