Podman_io, to opensource
@Podman_io@fosstodon.org avatar

Podman v5.0 Release annoucement is here! Updates and speed-ups for running on macOS and Windows, Apple Hypervisor support, stability fixes, performance improvements, and more! Details: https://blog.podman.io/2024/03/podman-5-0-has-been-released/

linuxiac, to random
@linuxiac@mastodon.social avatar
Podman_io, to opensource
@Podman_io@fosstodon.org avatar

A few changes in Podman v5.0 can cause some gotchas. Paul Holzinger shows you the breaking changes between the Podman v4.0 and v5.0 environments in this article:
https://blog.podman.io/2024/03/podman-5-0-breaking-changes-in-detail

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

Podman v5 Tests days are happening on March 21->26. If you like to beat on bugs, we'd love to have you! Info here: https://fedoraproject.org/wiki/Test_Day:2024-03-21_Podman_5

Ede, to NixOS German
@Ede@chaos.social avatar

Hallo Fedi,

kann mir sagen wie ich cap-add unter konfigurieren muss, damit ich in Containern /dev/tun/tap verwenden kann? Mir würde ein snippet oder howto reichen.

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

Do you want to know how to migrate from Podman 4 machines to Podman 5 machines? @bbaude
walks you through the process in this blog: https://blog.podman.io/2024/03/migration-of-podman-4-to-podman-5-machines/

gbraad, to fedora
@gbraad@mastodon.social avatar

Podman 5.0 is now available!

https://github.com/containers/podman/releases/tag/v5.0.0

One very notable change:

  • VMs created by podman machine can now use the native Apple hypervisor (applehv) when run on MacOS.

which uses the vfkit driver as used by CRC/OpenShift Local. In future versions we will converge even more.

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

Hot off the presses! There's a new release in town! Podman v5.0 just landed. Off to Fedora and other distros shortly. https://github.com/containers/podman/releases/tag/v5.0.0 More info coming soon!

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

Want to know what's in store for containers.conf in Podman v5.0? Paul Holzinger shares the highlights in this article: https://blog.podman.io/2024/03/podman-5-0-containers-conf-changes/

linuxiac, to random
@linuxiac@mastodon.social avatar
Podman_io, to opensource
@Podman_io@fosstodon.org avatar

The next Podman Community Cabal meeting is starting at the top of the hour! (Tues Mar 19, 11:00 am EDT UTC-5) Hope to see you there. Video meeting link in the Agenda: https://hackmd.io/gQCfskDuRLm7iOsWgH2yrg?both

Podman_io, to opensource
@Podman_io@fosstodon.org avatar
fedora, to fedora
@fedora@fosstodon.org avatar

Starting tomorrow we have a series of Test Days coming for different projects. Maybe contribute with testing for the ones that pique your interest?

  • Mar 20-26: @Podman_io Desktop (for Windows and macOS as well)
  • Mar 21-26: Podman 5
  • Mar 25 - Apr 1: Fedora CoreOS
  • Mar 27: (Toolbx) @containertoolbx

Get started: https://fedoramagazine.org/contribute-at-fedora-coreos-podman-and-toolbx-test-days/

larsmb, to random
@larsmb@mastodon.online avatar

Ah, obviously. only gets along with if the latter is using the iptables backend (not the higher performing nftables default).
The backend is depreciated and slated for removal.

And of course there's no error message if configured "incorrectly", just random breakage that one then gets to debug!

I hate computers. I wish I was good enough at something else.

larsmb,
@larsmb@mastodon.online avatar

I'm only dealing with because 's all-in-one container deployment requires it (it can't natively talk to ).

And yes, most of this (not docker) is true open source and I could fix it myself ...

But I wish there was a good collective bug/feature bounty program so we could all pool resources, you know?

Sometimes, I don't want to get dragged down yet another rabbit hole.

vintprox, to fedora
@vintprox@techhub.social avatar

Was working today on kind of an entry piece for Community Design Team: a logo and new mascot for (special type of container).

His name is Bootseef and he's ready to fly through updates! 🚀🚀 Thanks to Madeline Peck and Design Team for the sketches, sources and color choices that inspired me. 👋 I enjoyed doing this particular mascot the most.

@fedora.design@peertube.linuxrocks.online and have lots of work on their plate, so I invite aspiring and designers by trade to have a looksie-look in their GitLab issues. @fedora has engineering and other teams worth their gold, making software great, as well.

necrosis, to ArtificialIntelligence German
@necrosis@chaos.social avatar

Wie kann ich ein Skript (z.B my_script.sh), das im Container in /home/user5/production/bin liegt mit

docker exec container my_script.sh

ausführen?

Muss ich im Dockerfile vor dem Build einen Entrypoint für das Skript erstellen?

Also

ENTRYPOINT („bash“, „my_script.sh“) ?


Podman_io, to opensource
@Podman_io@fosstodon.org avatar

If you missed the Cabal meeting today, the video is up on YouTube: https://youtu.be/1wOoZ5qPeII. We talked about podman compose, Kubernetes and Podman image/container volumes, and more!

UniversalBlue, to linux
@UniversalBlue@fosstodon.org avatar

Containers are a big part of how uBlue and atomic systems work. Let your OS install be a stable host and use containers to cleanly tinker or manage applications no matter what distro it's packaged for.

Here's a primer on how container images work: https://www.youtube.com/watch?v=J0NuOlA2xDc

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

The next Podman Community Cabal meeting is happening tomorrow, Feb 20, 2024, at 11:00am EST (UTC-5). We will be talking about podman compose, image/container volumes, and Podman kube to handle VMs. Agenda with video link: https://hackmd.io/gQCfskDuRLm7iOsWgH2yrg?both

governa, to linux
@governa@fosstodon.org avatar
Podman_io, to opensource
@Podman_io@fosstodon.org avatar

The Podman Community Meeting is happening in just under 3 hours from now at 11:00am EST (UTC-5). Demos on Podman at Home, New Build Farm multi-arch functions, Apple hypervisor updates, and Podman v5.0 changes. Agenda with video link: https://hackmd.io/fc1zraYdS0-klJ2KJcfC7w?both

jan, to random
@jan@kcore.org avatar

https://thehackernews.com/2024/02/runc-flaws-enable-container-escapes.html

I completely missed this.

I guess it's time to migrate from rootless containers under one user to a user per container?

codewiz, to random
@codewiz@mstdn.io avatar

Flying to Bruxelles for #Fosdem2024 !

codewiz,
@codewiz@mstdn.io avatar

TIL that you can just do this:

dnf install qemu-user-static-riscv slirp4netns podman

podman run --platform=linux/riscv64 -it docker.io/riscv64/ubuntu bash
root@88bb76ac7391:/# uname -a
Linux 88bb76ac7391 6.8.0-0.rc0.20240112git70d201a40823.5.fc40.x86_64 #1 SMP PREEMPT_DYNAMIC Fri Jan 12 16:56:17 UTC 2024 riscv64 riscv64 riscv64 GNU/Linux

Note the weird combo of Fedora Rawhide kerneland riscv64 emulated by qemu 🤨

codewiz,
@codewiz@mstdn.io avatar

slirp4netns is this weird thing for unprivileged network namespaces:

https://github.com/rootless-containers/slirp4netns

It's required by because it runs without root privs.

The in thing also works with classic , but I'd rather use Podman for improved isolation.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • mdbf
  • everett
  • tacticalgear
  • magazineikmin
  • thenastyranch
  • rosin
  • tester
  • Youngstown
  • khanakhh
  • slotface
  • ngwrru68w68
  • kavyap
  • DreamBathrooms
  • megavids
  • InstantRegret
  • osvaldo12
  • GTA5RPClips
  • ethstaker
  • normalnudes
  • Durango
  • cisconetworking
  • anitta
  • modclub
  • cubers
  • Leos
  • provamag3
  • lostlight
  • All magazines