mirror of
				https://github.com/containers/podman.git
				synced 2025-10-30 17:38:27 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			110 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			110 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
| % podman-unshare 1
 | |
| 
 | |
| ## NAME
 | |
| podman\-unshare - Run a command inside of a modified user namespace
 | |
| 
 | |
| ## SYNOPSIS
 | |
| **podman unshare** [*options*] [*command*]
 | |
| 
 | |
| ## DESCRIPTION
 | |
| Launches a process (by default, *$SHELL*) in a new user namespace. The user
 | |
| namespace is configured so that the invoking user's UID and primary GID appear
 | |
| to be UID 0 and GID 0, respectively.  Any ranges which match that user and
 | |
| group in `/etc/subuid` and `/etc/subgid` are also mapped in as themselves with the
 | |
| help of the *newuidmap(1)* and *newgidmap(1)* helpers.
 | |
| 
 | |
| **podman unshare** is useful for troubleshooting unprivileged operations and for
 | |
| manually clearing storage and other data related to images and containers.
 | |
| 
 | |
| It is also useful to use the **podman mount** command.  If an unprivileged user wants to mount and work with a container, then they need to execute
 | |
| **podman unshare**.  Executing **podman mount** fails for unprivileged users unless the user is running inside a **podman unshare** session.
 | |
| 
 | |
| The unshare session defines two environment variables:
 | |
| 
 | |
| - **CONTAINERS_GRAPHROOT**: the path to the persistent container's data.
 | |
| - **CONTAINERS_RUNROOT**: the path to the volatile container's data.
 | |
| 
 | |
| *IMPORTANT: This command is not available with the remote Podman client.*
 | |
| 
 | |
| ## OPTIONS
 | |
| 
 | |
| #### **--help**, **-h**
 | |
| 
 | |
| Print usage statement
 | |
| 
 | |
| #### **--rootless-netns**
 | |
| 
 | |
| Join the rootless network namespace used for netavark networking. It can be used to
 | |
| connect to a rootless container via IP address (bridge networking). This is otherwise
 | |
| not possible from the host network namespace.
 | |
| 
 | |
| ## Exit Codes
 | |
| 
 | |
| The exit code from `podman unshare` gives information about why the container
 | |
| failed to run or why it exited.  When `podman unshare` commands exit with a non-zero code,
 | |
| the exit codes follow the `chroot` standard, see below:
 | |
| 
 | |
|   **125** The error is with podman **_itself_**
 | |
| 
 | |
|     $ podman unshare --foo; echo $?
 | |
|     Error: unknown flag: --foo
 | |
|     125
 | |
| 
 | |
|   **126** Executing a _contained command_ and the _command_ cannot be invoked
 | |
| 
 | |
|     $ podman unshare /etc; echo $?
 | |
|     Error: fork/exec /etc: permission denied
 | |
|     126
 | |
| 
 | |
|   **127** Executing a _contained command_ and the _command_ cannot be found
 | |
| 
 | |
|     $ podman unshare foo; echo $?
 | |
|     Error: fork/exec /usr/bin/bogus: no such file or directory
 | |
|     127
 | |
| 
 | |
|   **Exit code** _contained command_ exit code
 | |
| 
 | |
|     $ podman unshare /bin/sh -c 'exit 3'; echo $?
 | |
|     3
 | |
| 
 | |
| ## EXAMPLE
 | |
| 
 | |
| Execute specified command in rootless user namespace:
 | |
| ```
 | |
| $ podman unshare id
 | |
| uid=0(root) gid=0(root) groups=0(root),65534(nobody)
 | |
| ```
 | |
| 
 | |
| Show user namespace mappings for rootless containers:
 | |
| ```
 | |
| $ podman unshare cat /proc/self/uid_map /proc/self/gid_map
 | |
|          0       1000          1
 | |
|          1      10000      65536
 | |
|          0       1000          1
 | |
|          1      10000      65536
 | |
| ```
 | |
| 
 | |
| 
 | |
| Show rootless netns information in user namespace for rootless containers:
 | |
| ```
 | |
| $ podman unshare --rootless-netns ip addr
 | |
| 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
 | |
|     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
 | |
|     inet 127.0.0.1/8 scope host lo
 | |
|        valid_lft forever preferred_lft forever
 | |
|     inet6 ::1/128 scope host
 | |
|        valid_lft forever preferred_lft forever
 | |
| 2: tap0: <BROADCAST,UP,LOWER_UP> mtu 65520 qdisc fq_codel state UNKNOWN group default qlen 1000
 | |
|     link/ether aa:8c:0b:73:98:f6 brd ff:ff:ff:ff:ff:ff
 | |
|     inet 10.0.2.100/24 brd 10.0.2.255 scope global tap0
 | |
|        valid_lft forever preferred_lft forever
 | |
|     inet6 fd00::a88c:bff:fe73:98f6/64 scope global dynamic mngtmpaddr
 | |
|        valid_lft 86389sec preferred_lft 14389sec
 | |
|     inet6 fe80::a88c:bff:fe73:98f6/64 scope link
 | |
|        valid_lft forever preferred_lft forever
 | |
| ```
 | |
| 
 | |
| 
 | |
| ## SEE ALSO
 | |
| **[podman(1)](podman.1.md)**, **[podman-mount(1)](podman-mount.1.md)**, **namespaces(7)**, **newuidmap(1)**, **newgidmap(1)**, **user\_namespaces(7)**
 | 
