Navigate:
Podman
~$PODMA0.3%

Podman: Container and pod management tool

Daemonless OCI container management with Docker-compatible CLI and rootless execution support.

LIVE RANKINGS • 10:20 AM • STEADY
OVERALL
#174
42
CLOUD & DEVOPS
#9
3
30 DAY RANKING TREND
ovr#174
·Cloud#9
STARS
30.8K
FORKS
3.0K
7D STARS
+107
7D FORKS
+15
See Repo:
Share:

Learn more about Podman

Podman is a container management tool that handles OCI containers, images, and pods without requiring a background daemon. It is built on libpod, a library for container lifecycle management, and uses OCI-compliant runtimes like crun and runc for container execution. The tool supports both rootful and rootless operation, with rootless containers running in user namespaces for improved security. Podman is commonly used as a Docker alternative for local development, CI/CD pipelines, and production container workloads.

Podman

1

Daemonless Architecture

Operates without a background daemon process, reducing security attack surface and resource consumption when idle. Each container runs as a direct child process of the Podman command.

2

Rootless Containers

Runs containers as unprivileged users through user namespaces, providing container isolation without requiring root privileges. Containers cannot gain more privileges than the user who started them.

3

Pod Support

Natively manages pods as groups of containers that share resources like network and storage. Provides Kubernetes-compatible pod functionality for local development and testing.



vv5.7.1

Fixed a bug where adding devices to emulated Linux containers on FreeBSD did not work.

  • Fixed a bug where adding devices to emulated Linux containers on FreeBSD did not work.
  • Fixed a bug where the podman system migrate command could panic under certain circumstances when run rootless.
  • Fixed a bug where Podman would sometimes not correctly recreate the rootless user namespace when Conmon and the rootless pause process were unexpectedly killed.
  • Fixed a bug where the podman kube play command could leak file descriptors.
  • Updated Buildah to v1.42.2
vv5.7.0

This release addresses CVE-2025-52881 and adds TLS/mTLS encryption support for remote connections with new authentication options.

  • This release addresses CVE-2025-52881, where arbitrary write gadgets and procfs write redirects allowed runc container escape and denial of service.
  • The remote Podman client and podman system service API server now support encrypting connections with TLS and mTLS, including client authentication by certificate.
  • The podman system connection add command can now create connections to TCP sockets with TLS and mTLS encryption.
  • The podman run and podman create commands now support two new options, --creds and --cert-dir, to manage logging into registries to pull images.
  • The podman kube play and podman kube down commands can now accept multiple files as input, creating or removing more than one pod or deployment with the same command.
vv5.7.0-rc3

This release adds TLS/mTLS encryption support for remote connections, multiple file input for Kubernetes commands, and various new options for container management.

  • The remote Podman client and podman system service API server now support encrypting connections with TLS and mTLS, including client authentication by certificate.
  • The podman system connection add command can now create connections to TCP sockets with TLS and mTLS encryption.
  • The podman run and podman create commands now support two new options, --creds and --cert-dir, to manage logging into registries to pull images.
  • The podman kube play and podman kube down commands can now accept multiple files as input, creating or removing more than one pod or deployment with the same command.
  • A default location for container log files when using the k8s-file log driver can now be specified with the log_path option in containers.conf.


[ EXPLORE MORE ]

Related Repositories

Discover similar tools and frameworks used by developers