github.com/DaoCloud/dao@v0.0.0-20161212064103-c3dbfd13ee36/man/docker-build.1.md (about)

     1  % DOCKER(1) Docker User Manuals
     2  % Docker Community
     3  % JUNE 2014
     4  # NAME
     5  docker-build - Build a new image from the source code at PATH
     6  
     7  # SYNOPSIS
     8  **docker build**
     9  [**--build-arg**[=*[]*]]
    10  [**--cpu-shares**[=*0*]]
    11  [**--cgroup-parent**[=*CGROUP-PARENT*]]
    12  [**--help**]
    13  [**-f**|**--file**[=*PATH/Dockerfile*]]
    14  [**--force-rm**]
    15  [**--isolation**[=*default*]]
    16  [**--label**[=*[]*]]
    17  [**--no-cache**]
    18  [**--pull**]
    19  [**-q**|**--quiet**]
    20  [**--rm**[=*true*]]
    21  [**-t**|**--tag**[=*[]*]]
    22  [**-m**|**--memory**[=*MEMORY*]]
    23  [**--memory-swap**[=*LIMIT*]]
    24  [**--shm-size**[=*SHM-SIZE*]]
    25  [**--cpu-period**[=*0*]]
    26  [**--cpu-quota**[=*0*]]
    27  [**--cpuset-cpus**[=*CPUSET-CPUS*]]
    28  [**--cpuset-mems**[=*CPUSET-MEMS*]]
    29  [**--ulimit**[=*[]*]]
    30  PATH | URL | -
    31  
    32  # DESCRIPTION
    33  This will read the Dockerfile from the directory specified in **PATH**.
    34  It also sends any other files and directories found in the current
    35  directory to the Docker daemon. The contents of this directory would
    36  be used by **ADD** commands found within the Dockerfile.
    37  
    38  Warning, this will send a lot of data to the Docker daemon depending
    39  on the contents of the current directory. The build is run by the Docker
    40  daemon, not by the CLI, so the whole context must be transferred to the daemon. 
    41  The Docker CLI reports "Sending build context to Docker daemon" when the context is sent to
    42  the daemon.
    43  
    44  When the URL to a tarball archive or to a single Dockerfile is given, no context is sent from
    45  the client to the Docker daemon. In this case, the Dockerfile at the root of the archive and
    46  the rest of the archive will get used as the context of the build.  When a Git repository is
    47  set as the **URL**, the repository is cloned locally and then sent as the context.
    48  
    49  # OPTIONS
    50  **-f**, **--file**=*PATH/Dockerfile*
    51     Path to the Dockerfile to use. If the path is a relative path and you are
    52     building from a local directory, then the path must be relative to that
    53     directory. If you are building from a remote URL pointing to either a
    54     tarball or a Git repository, then the path must be relative to the root of
    55     the remote context. In all cases, the file must be within the build context.
    56     The default is *Dockerfile*.
    57  
    58  **--build-arg**=*variable*
    59     name and value of a **buildarg**.
    60  
    61     For example, if you want to pass a value for `http_proxy`, use
    62     `--build-arg=http_proxy="http://some.proxy.url"`
    63  
    64     Users pass these values at build-time. Docker uses the `buildargs` as the
    65     environment context for command(s) run via the Dockerfile's `RUN` instruction
    66     or for variable expansion in other Dockerfile instructions. This is not meant
    67     for passing secret values. [Read more about the buildargs instruction](/reference/builder/#arg)
    68  
    69  **--force-rm**=*true*|*false*
    70     Always remove intermediate containers, even after unsuccessful builds. The default is *false*.
    71  
    72  **--isolation**="*default*"
    73     Isolation specifies the type of isolation technology used by containers. 
    74  
    75  **--label**=*label*
    76     Set metadata for an image
    77  
    78  **--no-cache**=*true*|*false*
    79     Do not use cache when building the image. The default is *false*.
    80  
    81  **--help**
    82    Print usage statement
    83  
    84  **--pull**=*true*|*false*
    85     Always attempt to pull a newer version of the image. The default is *false*.
    86  
    87  **-q**, **--quiet**=*true*|*false*
    88     Suppress the build output and print image ID on success. The default is *false*.
    89  
    90  **--rm**=*true*|*false*
    91     Remove intermediate containers after a successful build. The default is *true*.
    92  
    93  **-t**, **--tag**=""
    94     Repository names (and optionally with tags) to be applied to the resulting 
    95     image in case of success. Refer to **docker-tag(1)** for more information
    96     about valid tag names.
    97  
    98  **-m**, **--memory**=*MEMORY*
    99    Memory limit
   100  
   101  **--memory-swap**=*LIMIT*
   102     A limit value equal to memory plus swap. Must be used with the  **-m**
   103  (**--memory**) flag. The swap `LIMIT` should always be larger than **-m**
   104  (**--memory**) value.
   105  
   106     The format of `LIMIT` is `<number>[<unit>]`. Unit can be `b` (bytes),
   107  `k` (kilobytes), `m` (megabytes), or `g` (gigabytes). If you don't specify a
   108  unit, `b` is used. Set LIMIT to `-1` to enable unlimited swap.
   109  
   110  **--shm-size**=*SHM-SIZE*
   111    Size of `/dev/shm`. The format is `<number><unit>`. `number` must be greater than `0`.
   112    Unit is optional and can be `b` (bytes), `k` (kilobytes), `m` (megabytes), or `g` (gigabytes). If you omit the unit, the system uses bytes.
   113    If you omit the size entirely, the system uses `64m`.
   114  
   115  **--cpu-shares**=*0*
   116    CPU shares (relative weight).
   117  
   118    By default, all containers get the same proportion of CPU cycles.
   119    CPU shares is a 'relative weight', relative to the default setting of 1024.
   120    This default value is defined here: 
   121    ```
   122     cat /sys/fs/cgroup/cpu/cpu.shares
   123     1024
   124    ```
   125    You can change this proportion by adjusting the container's CPU share 
   126    weighting relative to the weighting of all other running containers.
   127  
   128    To modify the proportion from the default of 1024, use the **--cpu-shares**
   129    flag to set the weighting to 2 or higher.
   130  
   131        Container   CPU share    Flag             
   132        {C0}        60% of CPU  --cpu-shares=614 (614 is 60% of 1024)
   133        {C1}        40% of CPU  --cpu-shares=410 (410 is 40% of 1024)
   134  
   135    The proportion is only applied when CPU-intensive processes are running.
   136    When tasks in one container are idle, the other containers can use the
   137    left-over CPU time. The actual amount of CPU time used varies depending on
   138    the number of containers running on the system.
   139  
   140    For example, consider three containers, where one has **--cpu-shares=1024** and
   141    two others have **--cpu-shares=512**. When processes in all three
   142    containers attempt to use 100% of CPU, the first container would receive
   143    50% of the total CPU time. If you add a fourth container with **--cpu-shares=1024**,
   144    the first container only gets 33% of the CPU. The remaining containers
   145    receive 16.5%, 16.5% and 33% of the CPU.
   146  
   147  
   148        Container   CPU share   Flag                CPU time            
   149        {C0}        100%        --cpu-shares=1024   33%
   150        {C1}        50%         --cpu-shares=512    16.5%
   151        {C2}        50%         --cpu-shares=512    16.5%
   152        {C4}        100%        --cpu-shares=1024   33%
   153  
   154  
   155    On a multi-core system, the shares of CPU time are distributed across the CPU
   156    cores. Even if a container is limited to less than 100% of CPU time, it can
   157    use 100% of each individual CPU core.
   158  
   159    For example, consider a system with more than three cores. If you start one
   160    container **{C0}** with **--cpu-shares=512** running one process, and another container
   161    **{C1}** with **--cpu-shares=1024** running two processes, this can result in the following
   162    division of CPU shares:
   163  
   164        PID    container    CPU    CPU share
   165        100    {C0}         0      100% of CPU0
   166        101    {C1}         1      100% of CPU1
   167        102    {C1}         2      100% of CPU2
   168  
   169  **--cpu-period**=*0*
   170    Limit the CPU CFS (Completely Fair Scheduler) period.
   171  
   172    Limit the container's CPU usage. This flag causes the kernel to restrict the
   173    container's CPU usage to the period you specify.
   174  
   175  **--cpu-quota**=*0*
   176    Limit the CPU CFS (Completely Fair Scheduler) quota. 
   177  
   178    By default, containers run with the full CPU resource. This flag causes the
   179  kernel to restrict the container's CPU usage to the quota you specify.
   180  
   181  **--cpuset-cpus**=*CPUSET-CPUS*
   182    CPUs in which to allow execution (0-3, 0,1).
   183  
   184  **--cpuset-mems**=*CPUSET-MEMS*
   185    Memory nodes (MEMs) in which to allow execution (0-3, 0,1). Only effective on
   186    NUMA systems.
   187  
   188    For example, if you have four memory nodes on your system (0-3), use `--cpuset-mems=0,1`
   189  to ensure the processes in your Docker container only use memory from the first
   190  two memory nodes.
   191  
   192  **--cgroup-parent**=*CGROUP-PARENT*
   193    Path to `cgroups` under which the container's `cgroup` are created.
   194  
   195    If the path is not absolute, the path is considered relative to the `cgroups` path of the init process.
   196  Cgroups are created if they do not already exist.
   197  
   198  **--ulimit**=[]
   199    Ulimit options
   200  
   201    For more information about `ulimit` see [Setting ulimits in a 
   202  container](https://docs.docker.com/reference/commandline/run/#setting-ulimits-in-a-container)
   203  
   204  # EXAMPLES
   205  
   206  ## Building an image using a Dockerfile located inside the current directory
   207  
   208  Docker images can be built using the build command and a Dockerfile:
   209  
   210      docker build .
   211  
   212  During the build process Docker creates intermediate images. In order to
   213  keep them, you must explicitly set `--rm=false`.
   214  
   215      docker build --rm=false .
   216  
   217  A good practice is to make a sub-directory with a related name and create
   218  the Dockerfile in that directory. For example, a directory called mongo may
   219  contain a Dockerfile to create a Docker MongoDB image. Likewise, another
   220  directory called httpd may be used to store Dockerfiles for Apache web
   221  server images.
   222  
   223  It is also a good practice to add the files required for the image to the
   224  sub-directory. These files will then be specified with the `COPY` or `ADD`
   225  instructions in the `Dockerfile`.
   226  
   227  Note: If you include a tar file (a good practice), then Docker will
   228  automatically extract the contents of the tar file specified within the `ADD`
   229  instruction into the specified target.
   230  
   231  ## Building an image and naming that image
   232  
   233  A good practice is to give a name to the image you are building. Note that 
   234  only a-z0-9-_. should be used for consistency.  There are no hard rules here but it is best to give the names consideration. 
   235  
   236  The **-t**/**--tag** flag is used to rename an image. Here are some examples:
   237  
   238  Though it is not a good practice, image names can be arbitrary:
   239  
   240      docker build -t myimage .
   241  
   242  A better approach is to provide a fully qualified and meaningful repository,
   243  name, and tag (where the tag in this context means the qualifier after 
   244  the ":"). In this example we build a JBoss image for the Fedora repository 
   245  and give it the version 1.0:
   246  
   247      docker build -t fedora/jboss:1.0 .
   248  
   249  The next example is for the "whenry" user repository and uses Fedora and
   250  JBoss and gives it the version 2.1 :
   251  
   252      docker build -t whenry/fedora-jboss:v2.1 .
   253  
   254  If you do not provide a version tag then Docker will assign `latest`:
   255  
   256      docker build -t whenry/fedora-jboss .
   257  
   258  When you list the images, the image above will have the tag `latest`.
   259  
   260  You can apply multiple tags to an image. For example, you can apply the `latest`
   261  tag to a newly built image and add another tag that references a specific
   262  version.
   263  For example, to tag an image both as `whenry/fedora-jboss:latest` and
   264  `whenry/fedora-jboss:v2.1`, use the following:
   265  
   266      docker build -t whenry/fedora-jboss:latest -t whenry/fedora-jboss:v2.1 .
   267  
   268  So renaming an image is arbitrary but consideration should be given to 
   269  a useful convention that makes sense for consumers and should also take
   270  into account Docker community conventions.
   271  
   272  
   273  ## Building an image using a URL
   274  
   275  This will clone the specified GitHub repository from the URL and use it
   276  as context. The Dockerfile at the root of the repository is used as
   277  Dockerfile. This only works if the GitHub repository is a dedicated
   278  repository.
   279  
   280      docker build github.com/scollier/purpletest
   281  
   282  Note: You can set an arbitrary Git repository via the `git://` scheme.
   283  
   284  ## Building an image using a URL to a tarball'ed context
   285  
   286  This will send the URL itself to the Docker daemon. The daemon will fetch the
   287  tarball archive, decompress it and use its contents as the build context.  The 
   288  Dockerfile at the root of the archive and the rest of the archive will get used
   289  as the context of the build. If you pass an **-f PATH/Dockerfile** option as well,
   290  the system will look for that file inside the contents of the tarball.
   291  
   292      docker build -f dev/Dockerfile https://10.10.10.1/docker/context.tar.gz
   293  
   294  Note: supported compression formats are 'xz', 'bzip2', 'gzip' and 'identity' (no compression).
   295  
   296  ## Specify isolation technology for container (--isolation)
   297  
   298  This option is useful in situations where you are running Docker containers on
   299  Windows. The `--isolation=<value>` option sets a container's isolation
   300  technology. On Linux, the only supported is the `default` option which uses
   301  Linux namespaces. On Microsoft Windows, you can specify these values:
   302  
   303  * `default`: Use the value specified by the Docker daemon's `--exec-opt` . If the `daemon` does not specify an isolation technology, Microsoft Windows uses `process` as its default value.
   304  * `process`: Namespace isolation only.
   305  * `hyperv`: Hyper-V hypervisor partition-based isolation.
   306  
   307  Specifying the `--isolation` flag without a value is the same as setting `--isolation="default"`.
   308  
   309  # HISTORY
   310  March 2014, Originally compiled by William Henry (whenry at redhat dot com)
   311  based on docker.com source material and internal work.
   312  June 2014, updated by Sven Dowideit <SvenDowideit@home.org.au>
   313  June 2015, updated by Sally O'Malley <somalley@redhat.com>