Img
Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder.
Install / Use
/learn @genuinetools/ImgREADME
img
Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder.
img is more cache-efficient than Docker and can also execute multiple build stages concurrently,
as it internally uses BuildKit's DAG solver.
The commands/UX are the same as docker {build,tag,push,pull,login,logout,save} so all you
have to do is replace docker with img in your scripts, command line, and/or life.
Table of Contents
- Goals - Upstream Patches - Benchmarks
- Installation
- Usage
- How It Works
- Contributing
- Acknowledgements
Goals
This a glorified cli tool built on top of buildkit. The goal of this project is to be able to build container images as an unprivileged user.
Running unprivileged allows companies who use LDAP and other login mechanisms
to use img without needing root. This is very important in HPC environments
and academia as well.
Currently this works out of the box on a Linux machine if you install via
the directions covered in installing from binaries. This
installation will ensure you have the correct version of img and also runc.
Upstream Patches
The ultimate goal is to also have this work inside a container. There are patches being made to container runtimes and Kubernetes to make this possible. For the on-going work toward getting patches into container runtimes and Kubernetes, see:
- moby/moby#36644 merged
- docker/cli#1347 merged
- kubernetes/community#1934 merged
- kubernetes/kubernetes#64283 merged
The patches for runc has been merged into the upstream since ecd55a4135e0a26de884ce436442914f945b1e76 (May 30, 2018).
The upstream BuildKit can also run in rootless mode since 65b526438b86a17cf35042011051ce15c8bfb92a (June 1, 2018).
You might also be interested in reading:
Benchmarks
If you are curious about benchmarks comparing various container builders, check out @AkihiroSuda's buildbench results.
Installation
You need to have newuidmap installed. On Ubuntu, newuidmap is provided by the uidmap package.
You also need to have seccomp installed. On Ubuntu, seccomp is provided by the libseccomp-dev package.
runc will be installed on start from an embedded binary if it is not already
available locally. If you would like to disable the embedded runc you can use BUILDTAGS="seccomp noembed" while building from source with make. Or the environment variable
IMG_DISABLE_EMBEDDED_RUNC=1 on execution of the img binary.
NOTE: These steps work only for Linux. Compile and run in a container (explained below) if you're on Windows or MacOS.
Binaries
For installation instructions from binaries please visit the Releases Page.
From Source
$ mkdir -p $GOPATH/src/github.com/genuinetools
$ git clone https://github.com/genuinetools/img $GOPATH/src/github.com/genuinetools/img
$ cd !$
$ make
$ sudo make install
# For packagers if you would like to disable the embedded `runc`, please use:
$ make BUILDTAGS="seccomp noembed"
Alpine Linux
There is an APKBUILD.
$ apk add img
Arch Linux
There is an AUR build.
# Use whichever AUR helper you prefer
$ yay -S img
# Or build from the source PKGBUILD
$ git clone https://aur.archlinux.org/packages/img.git
$ cd img
$ makepkg -si
Gentoo
There is an ebuild.
$ sudo emerge -a app-emulation/img
Running with Docker
Docker image r.j3ss.co/img is configured to be executed as an unprivileged user with UID 1000 and it does not need --privileged since img v0.5.11.
$ docker run --rm -it \
--name img \
--volume $(pwd):/home/user/src:ro \ # for the build context and dockerfile, can be read-only since we won't modify it
--workdir /home/user/src \ # set the builder working directory
--volume "${HOME}/.docker:/root/.docker:ro" \ # for credentials to push to docker hub or a registry
--security-opt seccomp=unconfined --security-opt apparmor=unconfined \ # required by runc
r.j3ss.co/img build -t user/myimage .
To enable PID namespace isolation (which disallows build containers to kill(2) the img process), you need to specify
--privileged so that build containers can mount /proc with unshared PID namespaces.
Note that even with --privileged, img works as an unprivileged user with UID 1000.
See docker/cli patch for how to allow mounting /proc without --privileged.
Running with Kubernetes
Since img v0.5.11, you don't need to specify any securityContext for running img as a Kubernetes container.
However the following security annotations are needed:
container.apparmor.security.beta.kubernetes.io/img: unconfined
container.seccomp.security.alpha.kubernetes.io/img: unconfined
To enable PID namespace isolation, you need to set securityContext.procMount to Unmasked (or simply set
securityContext.privileged to true).
securityContext.procMount is available since Kubernetes 1.12 with Docker 18.06/containerd 1.2/CRI-O 1.12.
Usage
Make sure you have user namespace support enabled. On some distros (Debian and
Arch Linux) this requires running echo 1 > /proc/sys/kernel/unprivileged_userns_clone.
$ img -h
img - Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder
Usage: img [OPTIONS] COMMAND [ARG...]
Flags:
-b, --backend string backend for snapshots ([auto native overlayfs fuse-overlayfs]) (default "auto")
-d, --debug enable debug logging
-h, --help help for img
-s, --state string directory to hold the global state (default "/home/user/.local/share/img")
-v, --version Print version information and quit
Commands:
build Build an image from a Dockerfile
du Show image disk usage.
help Help about any command
login Log in to a Docker registry.
logout Log out from a Docker registry.
ls List images and digests.
prune Prune and clean up the build cache.
pull Pull an image or a repository from a registry.
push Push an image or a repository to a registry.
rm Remove one or more images.
save Save an image to a tar archive (streamed to STDOUT by default).
tag Create a tag TARGET_IMAGE that refers to SOURCE_IMAGE.
unpack Unpack an image to a rootfs directory.
version Show the version information.
Use "img [command] --help" for more information about a command.
Build an Image
$ img build -h
build - Build an image from a Dockerfile
Usage: img build [OPTIONS] PATH
Flags:
--build-arg list Set build-time variables
--cache-from list Buildkit import-cache or Buildx cache-from specification
--cache-to list Buildx cache-to specification
-f, --file s
