github.com/gunjan5/docker@v1.8.2/man/docker-build.1.md (about) 1 % DOCKER(1) Docker User Manuals 2 % Docker Community 3 % JUNE 2014 4 # NAME 5 docker-build - Build a new image from the source code at PATH 6 7 # SYNOPSIS 8 **docker build** 9 [**--help**] 10 [**-f**|**--file**[=*PATH/Dockerfile*]] 11 [**--force-rm**[=*false*]] 12 [**--no-cache**[=*false*]] 13 [**--pull**[=*false*]] 14 [**-q**|**--quiet**[=*false*]] 15 [**--rm**[=*true*]] 16 [**-t**|**--tag**[=*TAG*]] 17 [**-m**|**--memory**[=*MEMORY*]] 18 [**--memory-swap**[=*MEMORY-SWAP*]] 19 [**-c**|**--cpu-shares**[=*0*]] 20 [**--cpu-period**[=*0*]] 21 [**--cpu-quota**[=*0*]] 22 [**--cpuset-cpus**[=*CPUSET-CPUS*]] 23 [**--cpuset-mems**[=*CPUSET-MEMS*]] 24 [**--cgroup-parent**[=*CGROUP-PARENT*]] 25 [**--ulimit**[=*[]*]] 26 27 PATH | URL | - 28 29 # DESCRIPTION 30 This will read the Dockerfile from the directory specified in **PATH**. 31 It also sends any other files and directories found in the current 32 directory to the Docker daemon. The contents of this directory would 33 be used by **ADD** commands found within the Dockerfile. 34 35 Warning, this will send a lot of data to the Docker daemon depending 36 on the contents of the current directory. The build is run by the Docker 37 daemon, not by the CLI, so the whole context must be transferred to the daemon. 38 The Docker CLI reports "Sending build context to Docker daemon" when the context is sent to 39 the daemon. 40 41 When the URL to a tarball archive or to a single Dockerfile is given, no context is sent from 42 the client to the Docker daemon. When a Git repository is set as the **URL**, the repository is 43 cloned locally and then sent as the context. 44 45 # OPTIONS 46 **-f**, **--file**=*PATH/Dockerfile* 47 Path to the Dockerfile to use. If the path is a relative path and you are 48 building from a local directory, then the path must be relative to that 49 directory. If you are building from a remote URL pointing to either a 50 tarball or a Git repository, then the path must be relative to the root of 51 the remote context. In all cases, the file must be within the build context. 52 The default is *Dockerfile*. 53 54 **--force-rm**=*true*|*false* 55 Always remove intermediate containers, even after unsuccessful builds. The default is *false*. 56 57 **--no-cache**=*true*|*false* 58 Do not use cache when building the image. The default is *false*. 59 60 **--help** 61 Print usage statement 62 63 **--pull**=*true*|*false* 64 Always attempt to pull a newer version of the image. The default is *false*. 65 66 **-q**, **--quiet**=*true*|*false* 67 Suppress the verbose output generated by the containers. The default is *false*. 68 69 **--rm**=*true*|*false* 70 Remove intermediate containers after a successful build. The default is *true*. 71 72 **-t**, **--tag**="" 73 Repository name (and optionally a tag) to be applied to the resulting image in case of success 74 75 **-m**, **--memory**=*MEMORY* 76 Memory limit 77 78 **--memory-swap**=*MEMORY-SWAP* 79 Total memory (memory + swap), '-1' to disable swap. 80 81 **-c**, **--cpu-shares**=*0* 82 CPU shares (relative weight). 83 84 By default, all containers get the same proportion of CPU cycles. You can 85 change this proportion by adjusting the container's CPU share weighting 86 relative to the weighting of all other running containers. 87 88 To modify the proportion from the default of 1024, use the **-c** or 89 **--cpu-shares** flag to set the weighting to 2 or higher. 90 91 The proportion is only applied when CPU-intensive processes are running. 92 When tasks in one container are idle, the other containers can use the 93 left-over CPU time. The actual amount of CPU time used varies depending on 94 the number of containers running on the system. 95 96 For example, consider three containers, one has a cpu-share of 1024 and 97 two others have a cpu-share setting of 512. When processes in all three 98 containers attempt to use 100% of CPU, the first container would receive 99 50% of the total CPU time. If you add a fourth container with a cpu-share 100 of 1024, the first container only gets 33% of the CPU. The remaining containers 101 receive 16.5%, 16.5% and 33% of the CPU. 102 103 On a multi-core system, the shares of CPU time are distributed across the CPU 104 cores. Even if a container is limited to less than 100% of CPU time, it can 105 use 100% of each individual CPU core. 106 107 For example, consider a system with more than three cores. If you start one 108 container **{C0}** with **-c=512** running one process, and another container 109 **{C1}** with **-c=1024** running two processes, this can result in the following 110 division of CPU shares: 111 112 PID container CPU CPU share 113 100 {C0} 0 100% of CPU0 114 101 {C1} 1 100% of CPU1 115 102 {C1} 2 100% of CPU2 116 117 **--cpu-period**=*0* 118 Limit the CPU CFS (Completely Fair Scheduler) period. 119 120 Limit the container's CPU usage. This flag causes the kernel to restrict the 121 container's CPU usage to the period you specify. 122 123 **--cpu-quota**=*0* 124 Limit the CPU CFS (Completely Fair Scheduler) quota. 125 126 By default, containers run with the full CPU resource. This flag causes the 127 kernel to restrict the container's CPU usage to the quota you specify. 128 129 **--cpuset-cpus**=*CPUSET-CPUS* 130 CPUs in which to allow execution (0-3, 0,1). 131 132 **--cpuset-mems**=*CPUSET-MEMS* 133 Memory nodes (MEMs) in which to allow execution (-1-3, 0,1). Only effective on 134 NUMA systems. 135 136 For example, if you have four memory nodes on your system (0-3), use `--cpuset-mems=0,1` 137 to ensure the processes in your Docker container only use memory from the first 138 two memory nodes. 139 140 **--cgroup-parent**=*CGROUP-PARENT* 141 Path to `cgroups` under which the container's `cgroup` are created. 142 143 If the path is not absolute, the path is considered relative to the `cgroups` path of the init process. 144 Cgroups are created if they do not already exist. 145 146 **--ulimit**=[] 147 Ulimit options 148 149 For more information about `ulimit` see [Setting ulimits in a 150 container](https://docs.docker.com/reference/commandline/run/#setting-ulimits-in-a-container) 151 152 # EXAMPLES 153 154 ## Building an image using a Dockerfile located inside the current directory 155 156 Docker images can be built using the build command and a Dockerfile: 157 158 docker build . 159 160 During the build process Docker creates intermediate images. In order to 161 keep them, you must explicitly set `--rm=false`. 162 163 docker build --rm=false . 164 165 A good practice is to make a sub-directory with a related name and create 166 the Dockerfile in that directory. For example, a directory called mongo may 167 contain a Dockerfile to create a Docker MongoDB image. Likewise, another 168 directory called httpd may be used to store Dockerfiles for Apache web 169 server images. 170 171 It is also a good practice to add the files required for the image to the 172 sub-directory. These files will then be specified with the `COPY` or `ADD` 173 instructions in the `Dockerfile`. 174 175 Note: If you include a tar file (a good practice), then Docker will 176 automatically extract the contents of the tar file specified within the `ADD` 177 instruction into the specified target. 178 179 ## Building an image and naming that image 180 181 A good practice is to give a name to the image you are building. Note that 182 only a-z0-9-_. should be used for consistency. There are no hard rules here but it is best to give the names consideration. 183 184 The **-t**/**--tag** flag is used to rename an image. Here are some examples: 185 186 Though it is not a good practice, image names can be arbitrary: 187 188 docker build -t myimage . 189 190 A better approach is to provide a fully qualified and meaningful repository, 191 name, and tag (where the tag in this context means the qualifier after 192 the ":"). In this example we build a JBoss image for the Fedora repository 193 and give it the version 1.0: 194 195 docker build -t fedora/jboss:1.0 196 197 The next example is for the "whenry" user repository and uses Fedora and 198 JBoss and gives it the version 2.1 : 199 200 docker build -t whenry/fedora-jboss:v2.1 201 202 If you do not provide a version tag then Docker will assign `latest`: 203 204 docker build -t whenry/fedora-jboss 205 206 When you list the images, the image above will have the tag `latest`. 207 208 So renaming an image is arbitrary but consideration should be given to 209 a useful convention that makes sense for consumers and should also take 210 into account Docker community conventions. 211 212 213 ## Building an image using a URL 214 215 This will clone the specified GitHub repository from the URL and use it 216 as context. The Dockerfile at the root of the repository is used as 217 Dockerfile. This only works if the GitHub repository is a dedicated 218 repository. 219 220 docker build github.com/scollier/Fedora-Dockerfiles/tree/master/apache 221 222 Note: You can set an arbitrary Git repository via the `git://` schema. 223 224 ## Building an image using a URL to a tarball'ed context 225 226 This will send the URL itself to the Docker daemon. The daemon will fetch the 227 tarball archive, decompress it and use its contents as the build context. If you 228 pass an *-f PATH/Dockerfile* option as well, the system will look for that file 229 inside the contents of the tarball. 230 231 docker build -f dev/Dockerfile https://10.10.10.1/docker/context.tar.gz 232 233 Note: supported compression formats are 'xz', 'bzip2', 'gzip' and 'identity' (no compression). 234 235 # HISTORY 236 March 2014, Originally compiled by William Henry (whenry at redhat dot com) 237 based on docker.com source material and internal work. 238 June 2014, updated by Sven Dowideit <SvenDowideit@home.org.au> 239 June 2015, updated by Sally O'Malley <somalley@redhat.com>