Provided by: podman_5.0.3+ds1-5ubuntu1_amd64 bug

NAME

       podman-auto-update - Auto update containers according to their auto-update policy

SYNOPSIS

       podman auto-update [options]

DESCRIPTION

       podman  auto-update pulls down new container images and restarts containers configured for
       auto updates.  To make use of auto updates, the container or Kubernetes workloads must run
       inside  a  systemd  unit.  After a successful update of an image, the containers using the
       image get updated by restarting the systemd units they run in.  Please refer to quadlet(5)
       on how to run Podman under systemd.

       To   configure   a   container   for   auto   updates,   it   must  be  created  with  the
       io.containers.autoupdate label or the AutoUpdate field  in  quadlet(5)  with  one  of  the
       following two values:

              • registry:  If the label is present and set to registry, Podman reaches out to the
                corresponding registry to check if the image has been updated.  The  label  image
                is  an  alternative to registry maintained for backwards compatibility.  An image
                is considered updated if the digest in the local storage is  different  than  the
                one  of  the remote image.  If an image must be updated, Podman pulls it down and
                restarts the systemd unit executing the container.  The registry policy  requires
                a fully-qualified image reference (e.g., quay.io/podman/stable:latest) to be used
                to create the container.  This enforcement is necessary to know  which  image  to
                actually  check  and  pull.  If an image ID was used, Podman would not know which
                image to check/pull anymore.

              • local: If the autoupdate label is set to local, Podman compares the image  digest
                of  the container to the one in the local container storage.  If they differ, the
                local image is considered to be newer and the systemd unit gets restarted.

   Auto Updates and Kubernetes YAML
       Podman supports auto updates for Kubernetes workloads.   The  auto-update  policy  can  be
       configured  directly via quadlet(5) or inside the Kubernetes YAML with the Podman-specific
       annotations mentioned below:

              • io.containers.autoupdate: "registry|local" to apply the auto-update policy to all
                containers

              • io.containers.autoupdate/$container:  "registry|local"  to  apply the auto-update
                policy to $container only

              • io.containers.sdnotify: "conmon|container" to apply the sdnotify  policy  to  all
                containers

              • io.containers.sdnotify/$container:   "conmon|container"  to  apply  the  sdnotify
                policy to $container only

       By default, the autoupdate policy is set to "disabled", the  sdnotify  policy  is  set  to
       "conmon".

   Systemd Unit and Timer
       Podman  ships with a podman-auto-update.service systemd unit. This unit is triggered daily
       at midnight by the podman-auto-update.timer systemd timer.  The timer can be  altered  for
       custom  time-based  updates  if desired.  The unit can further be invoked by other systemd
       units (e.g., via the  dependency  tree)  or  manually  via  systemctl  start  podman-auto-
       update.service.

OPTIONS

   --authfile=path
       Path  of  the  authentication  file. Default is ${XDG_RUNTIME_DIR}/containers/auth.json on
       Linux, and $HOME/.config/containers/auth.json on Windows/macOS.  The file  is  created  by
       podman  login. If the authorization state is not found there, $HOME/.docker/config.json is
       checked, which is set using docker login.

       Note: There is also the option to override the default path of the authentication file  by
       setting  the  REGISTRY_AUTH_FILE  environment  variable.  This  can  be  done  with export
       REGISTRY_AUTH_FILE=path.

       Alternatively, the io.containers.autoupdate.authfile container label  can  be  configured.
       In that case, Podman will use the specified label's value instead.

   --dry-run
       Check  for the availability of new images but do not perform any pull operation or restart
       any service or container.  The UPDATED field indicates the availability  of  a  new  image
       with "pending".

   --format=format
       Change  the  default  output  format.  This can be of a supported type like 'json' or a Go
       template.  Valid placeholders for the Go template are listed below:

       ┌───────────────┬──────────────────────────────────┐
       │PlaceholderDescription                      │
       ├───────────────┼──────────────────────────────────┤
       │.ContainerID and name of the container     │
       ├───────────────┼──────────────────────────────────┤
       │.ContainerIDID of the container              │
       ├───────────────┼──────────────────────────────────┤
       │.ContainerNameName of the container            │
       ├───────────────┼──────────────────────────────────┤
       │.ImageName of the image                │
       ├───────────────┼──────────────────────────────────┤
       │.Policy        │ Auto-update   policy   of    the │
       │               │ container                        │
       ├───────────────┼──────────────────────────────────┤
       │.UnitName of the systemd unit         │
       ├───────────────┼──────────────────────────────────┤
       │.Updated       │ Update status: true,false,failed │
       └───────────────┴──────────────────────────────────┘

   --rollback
       If  restarting  a  systemd unit after updating the image has failed, rollback to using the
       previous image and restart the unit another time.  Default is true.

       Note that detecting if a systemd unit has failed is best done by the container sending the
       READY message via SDNOTIFY.  This way, restarting the unit waits until having received the
       message or a timeout kicked in.  Without that, restarting the  systemd  unit  may  succeed
       even if the container has failed shortly after.

       For  a  container  to  send  the  READY  message  via SDNOTIFY it must be created with the
       --sdnotify=container option (see  podman-run(1)).   The  application  running  inside  the
       container  can then execute systemd-notify --ready when ready or use the sdnotify bindings
       of the specific programming language (e.g., sd_notify(3)).

   --tls-verify
       Require HTTPS and verify certificates when  contacting  registries  (default:  true).   If
       explicitly  set  to  true, TLS verification is used.  If set to false, TLS verification is
       not used.  If not specified, TLS verification is used unless the target registry is listed
       as an insecure registry in containers-registries.conf(5)

EXAMPLES

       Create a Quadlet file configured for auto updates:

       $ cat ~/.config/containers/systemd/sleep.container
       [Container]
       Image=registry.fedoraproject.org/fedora:latest
       Exec=sleep infinity
       AutoUpdate=registry

       Generate a systemd service from the Quadlet file by reloading the systemd user daemon:

       $ systemctl --user daemon-reload

       Start the systemd service and make sure the container is running

       $ systemctl --user start sleep.service
       $ podman ps
       CONTAINER ID  IMAGE                                     COMMAND         CREATED        STATUS        PORTS       NAMES
       f8e4759798d4  registry.fedoraproject.org/fedora:latest  sleep infinity  2 seconds ago  Up 2 seconds              systemd-sleep

       Check if a new image is available via --dry-run:

       $ podman auto-update --dry-run --format "{{.Image}} {{.Updated}}"
       registry.fedoraproject.org/fedora:latest   pending

       Update the service:

       $ podman auto-update
       UNIT           CONTAINER                     IMAGE                                     POLICY      UPDATED
       sleep.service  f8e4759798d4 (systemd-sleep)  registry.fedoraproject.org/fedora:latest  registry    true

SEE ALSO

       podman(1),      podman-generate-systemd(1),     podman-run(1),     podman-systemd.unit(5),
       sd_notify(3), systemd.unit(5)

                                                                            podman-auto-update(1)