- create a working container, either from scratch or using an image as a starting point
- create an image, either from a working container or via the instructions in a Dockerfile
- images can be built in either the OCI image format or the traditional upstream docker image format
- mount a working container's root filesystem for manipulation
- unmount a working container's root filesystem
- use the updated contents of a container's root filesystem as a filesystem layer to create a new image
- delete a working container or an image
- rename a local container
The most widely known alternative for building containers is docker. Do note that Buildah does not run containers, for that you may want to consider .
Install the and packages or, for the development version, the AUR package.
If you want to run as non-root user, also install for better performance and storage space efficiency.
Enable support to build unprivileged containers
Users wishing to use Buildah to build unprivileged containers need to complete additional setup steps before running podman for the first time.
Firstly, a kernel is required that has support for User Namespaces (a kernel with
CONFIG_USER_NS). All Arch Linux kernels have support for
Finally, create both
/etc/subgid to contain the mapping to the containerized uid/gid pairs for each user who shall be able to run the containers. The example below is for the root user (and systemd system unit) and an example user
If you did run podman before applying the changes above, you will get errors when trying to pull images as an unprivileged user. Run
podman system migrate to fix it.
If everything went well then after logging out and logging back in
buildah images should not result in error