mirror of
https://github.com/containers/podman.git
synced 2025-05-31 15:42:48 +08:00
docs: symlink to host device is resolved
Also apply changes from commit 3fd9f0c028f9dab7c8923629d4dc5d38e594db1a to the other two commands that have the --device option. Documents #4550 Signed-off-by: Stefan Becker <chemobejk@gmail.com>
This commit is contained in:
@ -172,13 +172,20 @@ The [username[:password]] to use to authenticate with the registry if required.
|
||||
If one or both values are not supplied, a command line prompt will appear and the
|
||||
value can be entered. The password is entered without echo.
|
||||
|
||||
**--device**=*device*
|
||||
**--device**=_host-device_[**:**_container-device_][**:**_permissions_]
|
||||
|
||||
Add a host device to the container. The format is `<device-on-host>[:<device-on-container>][:<permissions>]` (e.g. --device=/dev/sdc:/dev/xvdc:rwm)
|
||||
Add a host device to the container. Optional *permissions* parameter
|
||||
can be used to specify device permissions, it is combination of
|
||||
**r** for read, **w** for write, and **m** for **mknod**(2).
|
||||
|
||||
Note: if the user only has access rights via a group then accessing the device
|
||||
from inside a rootless container will fail. The `crun` runtime offers a
|
||||
workaround for this by adding the option `--annotation run.oci.keep_original_groups=1`.
|
||||
Example: **--device=/dev/sdc:/dev/xvdc:rwm**.
|
||||
|
||||
Note: if _host_device_ is a symbolic link then it will be resolved first.
|
||||
The container will only store the major and minor numbers of the host device.
|
||||
|
||||
Note: if the user only has access rights via a group, accessing the device
|
||||
from inside a rootless container will fail. The **crun**(1) runtime offers a
|
||||
workaround for this by adding the option **--annotation run.oci.keep_original_groups=1**.
|
||||
|
||||
**--disable-compression, -D**
|
||||
|
||||
|
@ -201,13 +201,20 @@ it in the **libpod.conf** file: see **libpod.conf(5)** for more information.
|
||||
|
||||
Specify the key sequence for detaching a container. Format is a single character `[a-Z]` or one or more `ctrl-<value>` characters where `<value>` is one of: `a-z`, `@`, `^`, `[`, `,` or `_`. Specifying "" will disable this feature. The default is *ctrl-p,ctrl-q*.
|
||||
|
||||
**--device**=*device*
|
||||
**--device**=_host-device_[**:**_container-device_][**:**_permissions_]
|
||||
|
||||
Add a host device to the container. The format is `<device-on-host>[:<device-on-container>][:<permissions>]` (e.g. --device=/dev/sdc:/dev/xvdc:rwm)
|
||||
Add a host device to the container. Optional *permissions* parameter
|
||||
can be used to specify device permissions, it is combination of
|
||||
**r** for read, **w** for write, and **m** for **mknod**(2).
|
||||
|
||||
Note: if the user only has access rights via a group then accessing the device
|
||||
from inside a rootless container will fail. The `crun` runtime offers a
|
||||
workaround for this by adding the option `--annotation run.oci.keep_original_groups=1`.
|
||||
Example: **--device=/dev/sdc:/dev/xvdc:rwm**.
|
||||
|
||||
Note: if _host_device_ is a symbolic link then it will be resolved first.
|
||||
The container will only store the major and minor numbers of the host device.
|
||||
|
||||
Note: if the user only has access rights via a group, accessing the device
|
||||
from inside a rootless container will fail. The **crun**(1) runtime offers a
|
||||
workaround for this by adding the option **--annotation run.oci.keep_original_groups=1**.
|
||||
|
||||
**--device-cgroup-rule**="type major:minor mode"
|
||||
|
||||
|
@ -218,6 +218,9 @@ can be used to specify device permissions, it is combination of
|
||||
|
||||
Example: **--device=/dev/sdc:/dev/xvdc:rwm**.
|
||||
|
||||
Note: if _host_device_ is a symbolic link then it will be resolved first.
|
||||
The container will only store the major and minor numbers of the host device.
|
||||
|
||||
Note: if the user only has access rights via a group, accessing the device
|
||||
from inside a rootless container will fail. The **crun**(1) runtime offers a
|
||||
workaround for this by adding the option **--annotation run.oci.keep_original_groups=1**.
|
||||
|
Reference in New Issue
Block a user