man/docker-build.1.md
0a0dd116
 % DOCKER(1) Docker User Manuals
b07f1938
 % Docker Community
 % JUNE 2014
0a0dd116
 # NAME
b07f1938
 docker-build - Build a new image from the source code at PATH
0a0dd116
 
 # SYNOPSIS
b07f1938
 **docker build**
14e88986
 [**--build-arg**[=*[]*]]
d1064bd4
 [**--cpu-shares**[=*0*]]
14e88986
 [**--cgroup-parent**[=*CGROUP-PARENT*]]
a2b529ea
 [**--help**]
1b46248a
 [**-f**|**--file**[=*PATH/Dockerfile*]]
e6115a6c
 [**--force-rm**]
38ec5d86
 [**--isolation**[=*default*]]
e6115a6c
 [**--no-cache**]
 [**--pull**]
 [**-q**|**--quiet**]
b07f1938
 [**--rm**[=*true*]]
c2eb37f9
 [**-t**|**--tag**[=*[]*]]
e6ae89a4
 [**-m**|**--memory**[=*MEMORY*]]
c68a483e
 [**--memory-swap**[=*LIMIT*]]
5aeaf2a0
 [**--shm-size**[=*SHM-SIZE*]]
a85b09d8
 [**--cpu-period**[=*0*]]
5f4fb8be
 [**--cpu-quota**[=*0*]]
e6ae89a4
 [**--cpuset-cpus**[=*CPUSET-CPUS*]]
a85b09d8
 [**--cpuset-mems**[=*CPUSET-MEMS*]]
877dbbbd
 [**--ulimit**[=*[]*]]
e01baa6b
 PATH | URL | -
0a0dd116
 
 # DESCRIPTION
1b2b783b
 This will read the Dockerfile from the directory specified in **PATH**.
 It also sends any other files and directories found in the current
 directory to the Docker daemon. The contents of this directory would
 be used by **ADD** commands found within the Dockerfile.
0a0dd116
 
1b2b783b
 Warning, this will send a lot of data to the Docker daemon depending
14e88986
 on the contents of the current directory. The build is run by the Docker
bbde4298
 daemon, not by the CLI, so the whole context must be transferred to the daemon. 
14e88986
 The Docker CLI reports "Sending build context to Docker daemon" when the context is sent to
bbde4298
 the daemon.
1b2b783b
 
d48bface
 When the URL to a tarball archive or to a single Dockerfile is given, no context is sent from
a2bc8049
 the client to the Docker daemon. In this case, the Dockerfile at the root of the archive and
 the rest of the archive will get used as the context of the build.  When a Git repository is
 set as the **URL**, the repository is cloned locally and then sent as the context.
0a0dd116
 
 # OPTIONS
1b46248a
 **-f**, **--file**=*PATH/Dockerfile*
d48bface
    Path to the Dockerfile to use. If the path is a relative path and you are
    building from a local directory, then the path must be relative to that
    directory. If you are building from a remote URL pointing to either a
    tarball or a Git repository, then the path must be relative to the root of
    the remote context. In all cases, the file must be within the build context.
    The default is *Dockerfile*.
eb3ea3b4
 
54240f8d
 **--build-arg**=*variable*
8cfcd873
    name and value of a **buildarg**.
54240f8d
 
8cfcd873
    For example, if you want to pass a value for `http_proxy`, use
3a4775cb
    `--build-arg=http_proxy="http://some.proxy.url"`
8cfcd873
 
    Users pass these values at build-time. Docker uses the `buildargs` as the
    environment context for command(s) run via the Dockerfile's `RUN` instruction
    or for variable expansion in other Dockerfile instructions. This is not meant
    for passing secret values. [Read more about the buildargs instruction](/reference/builder/#arg)
54240f8d
 
b07f1938
 **--force-rm**=*true*|*false*
    Always remove intermediate containers, even after unsuccessful builds. The default is *false*.
 
38ec5d86
 **--isolation**="*default*"
    Isolation specifies the type of isolation technology used by containers. 
 
b07f1938
 **--no-cache**=*true*|*false*
    Do not use cache when building the image. The default is *false*.
0a0dd116
 
a2b529ea
 **--help**
   Print usage statement
 
18a2c774
 **--pull**=*true*|*false*
    Always attempt to pull a newer version of the image. The default is *false*.
 
0a0dd116
 **-q**, **--quiet**=*true*|*false*
60b4db7e
    Suppress the build output and print image ID on success. The default is *false*.
0a0dd116
 
 **--rm**=*true*|*false*
b07f1938
    Remove intermediate containers after a successful build. The default is *true*.
0a0dd116
 
b07f1938
 **-t**, **--tag**=""
c2eb37f9
    Repository names (and optionally with tags) to be applied to the resulting image in case of success.
0a0dd116
 
a85b09d8
 **-m**, **--memory**=*MEMORY*
   Memory limit
 
c68a483e
 **--memory-swap**=*LIMIT*
    A limit value equal to memory plus swap. Must be used with the  **-m**
 (**--memory**) flag. The swap `LIMIT` should always be larger than **-m**
 (**--memory**) value.
 
    The format of `LIMIT` is `<number>[<unit>]`. Unit can be `b` (bytes),
 `k` (kilobytes), `m` (megabytes), or `g` (gigabytes). If you don't specify a
 unit, `b` is used. Set LIMIT to `-1` to enable unlimited swap.
a85b09d8
 
5aeaf2a0
 **--shm-size**=*SHM-SIZE*
   Size of `/dev/shm`. The format is `<number><unit>`. `number` must be greater than `0`.
   Unit is optional and can be `b` (bytes), `k` (kilobytes), `m` (megabytes), or `g` (gigabytes). If you omit the unit, the system uses bytes.
   If you omit the size entirely, the system uses `64m`.
 
d1064bd4
 **--cpu-shares**=*0*
a85b09d8
   CPU shares (relative weight).
 
a2bc8049
   By default, all containers get the same proportion of CPU cycles.
   CPU shares is a 'relative weight', relative to the default setting of 1024.
   This default value is defined here: 
   ```
    cat /sys/fs/cgroup/cpu/cpu.shares
    1024
   ```
   You can change this proportion by adjusting the container's CPU share 
   weighting relative to the weighting of all other running containers.
a85b09d8
 
a2bc8049
   To modify the proportion from the default of 1024, use the **--cpu-shares**
   flag to set the weighting to 2 or higher.
 
       Container   CPU share    Flag             
       {C0}        60% of CPU  --cpu-shares=614 (614 is 60% of 1024)
       {C1}        40% of CPU  --cpu-shares=410 (410 is 40% of 1024)
a85b09d8
 
   The proportion is only applied when CPU-intensive processes are running.
   When tasks in one container are idle, the other containers can use the
   left-over CPU time. The actual amount of CPU time used varies depending on
   the number of containers running on the system.
 
a2bc8049
   For example, consider three containers, where one has **--cpu-shares=1024** and
   two others have **--cpu-shares=512**. When processes in all three
a85b09d8
   containers attempt to use 100% of CPU, the first container would receive
a2bc8049
   50% of the total CPU time. If you add a fourth container with **--cpu-shares=1024**,
   the first container only gets 33% of the CPU. The remaining containers
a85b09d8
   receive 16.5%, 16.5% and 33% of the CPU.
 
a2bc8049
 
       Container   CPU share   Flag                CPU time            
       {C0}        100%        --cpu-shares=1024   33%
       {C1}        50%         --cpu-shares=512    16.5%
       {C2}        50%         --cpu-shares=512    16.5%
       {C4}        100%        --cpu-shares=1024   33%
 
 
a85b09d8
   On a multi-core system, the shares of CPU time are distributed across the CPU
   cores. Even if a container is limited to less than 100% of CPU time, it can
   use 100% of each individual CPU core.
 
   For example, consider a system with more than three cores. If you start one
a2bc8049
   container **{C0}** with **--cpu-shares=512** running one process, and another container
   **{C1}** with **--cpu-shares=1024** running two processes, this can result in the following
a85b09d8
   division of CPU shares:
 
       PID    container    CPU    CPU share
       100    {C0}         0      100% of CPU0
       101    {C1}         1      100% of CPU1
       102    {C1}         2      100% of CPU2
 
 **--cpu-period**=*0*
   Limit the CPU CFS (Completely Fair Scheduler) period.
 
   Limit the container's CPU usage. This flag causes the kernel to restrict the
   container's CPU usage to the period you specify.
 
 **--cpu-quota**=*0*
   Limit the CPU CFS (Completely Fair Scheduler) quota. 
 
   By default, containers run with the full CPU resource. This flag causes the
 kernel to restrict the container's CPU usage to the quota you specify.
 
 **--cpuset-cpus**=*CPUSET-CPUS*
   CPUs in which to allow execution (0-3, 0,1).
 
 **--cpuset-mems**=*CPUSET-MEMS*
a2bc8049
   Memory nodes (MEMs) in which to allow execution (0-3, 0,1). Only effective on
a85b09d8
   NUMA systems.
 
   For example, if you have four memory nodes on your system (0-3), use `--cpuset-mems=0,1`
 to ensure the processes in your Docker container only use memory from the first
 two memory nodes.
 
 **--cgroup-parent**=*CGROUP-PARENT*
   Path to `cgroups` under which the container's `cgroup` are created.
 
   If the path is not absolute, the path is considered relative to the `cgroups` path of the init process.
 Cgroups are created if they do not already exist.
 
877dbbbd
 **--ulimit**=[]
   Ulimit options
 
   For more information about `ulimit` see [Setting ulimits in a 
 container](https://docs.docker.com/reference/commandline/run/#setting-ulimits-in-a-container)
 
0a0dd116
 # EXAMPLES
 
dcfa881a
 ## Building an image using a Dockerfile located inside the current directory
0a0dd116
 
1b2b783b
 Docker images can be built using the build command and a Dockerfile:
0a0dd116
 
     docker build .
 
1b2b783b
 During the build process Docker creates intermediate images. In order to
bbde4298
 keep them, you must explicitly set `--rm=false`.
0a0dd116
 
     docker build --rm=false .
 
1b2b783b
 A good practice is to make a sub-directory with a related name and create
 the Dockerfile in that directory. For example, a directory called mongo may
 contain a Dockerfile to create a Docker MongoDB image. Likewise, another
 directory called httpd may be used to store Dockerfiles for Apache web
 server images.
0a0dd116
 
1b2b783b
 It is also a good practice to add the files required for the image to the
f21f9f85
 sub-directory. These files will then be specified with the `COPY` or `ADD`
 instructions in the `Dockerfile`.
 
 Note: If you include a tar file (a good practice), then Docker will
 automatically extract the contents of the tar file specified within the `ADD`
 instruction into the specified target.
0a0dd116
 
2cb184ad
 ## Building an image and naming that image
 
05a86905
 A good practice is to give a name to the image you are building. Note that 
 only a-z0-9-_. should be used for consistency.  There are no hard rules here but it is best to give the names consideration. 
2cb184ad
 
a14a88e5
 The **-t**/**--tag** flag is used to rename an image. Here are some examples:
2cb184ad
 
f0c9818e
 Though it is not a good practice, image names can be arbitrary:
2cb184ad
 
     docker build -t myimage .
 
e471a87f
 A better approach is to provide a fully qualified and meaningful repository,
 name, and tag (where the tag in this context means the qualifier after 
 the ":"). In this example we build a JBoss image for the Fedora repository 
 and give it the version 1.0:
2cb184ad
 
a2bc8049
     docker build -t fedora/jboss:1.0 .
2cb184ad
 
a14a88e5
 The next example is for the "whenry" user repository and uses Fedora and
e471a87f
 JBoss and gives it the version 2.1 :
2cb184ad
 
a2bc8049
     docker build -t whenry/fedora-jboss:v2.1 .
2cb184ad
 
e471a87f
 If you do not provide a version tag then Docker will assign `latest`:
2cb184ad
 
a2bc8049
     docker build -t whenry/fedora-jboss .
e471a87f
 
 When you list the images, the image above will have the tag `latest`.
2cb184ad
 
c2eb37f9
 You can apply multiple tags to an image. For example, you can apply the `latest`
 tag to a newly built image and add another tag that references a specific
 version.
 For example, to tag an image both as `whenry/fedora-jboss:latest` and
 `whenry/fedora-jboss:v2.1`, use the following:
 
     docker build -t whenry/fedora-jboss:latest -t whenry/fedora-jboss:v2.1 .
 
2cb184ad
 So renaming an image is arbitrary but consideration should be given to 
 a useful convention that makes sense for consumers and should also take
 into account Docker community conventions.
 
 
0a0dd116
 ## Building an image using a URL
 
cd440188
 This will clone the specified GitHub repository from the URL and use it
1b2b783b
 as context. The Dockerfile at the root of the repository is used as
cd440188
 Dockerfile. This only works if the GitHub repository is a dedicated
1b2b783b
 repository.
0a0dd116
 
a2bc8049
     docker build github.com/scollier/purpletest
0a0dd116
 
1b2b783b
 Note: You can set an arbitrary Git repository via the `git://` schema.
0a0dd116
 
d48bface
 ## Building an image using a URL to a tarball'ed context
 
 This will send the URL itself to the Docker daemon. The daemon will fetch the
a2bc8049
 tarball archive, decompress it and use its contents as the build context.  The 
 Dockerfile at the root of the archive and the rest of the archive will get used
 as the context of the build. If you pass an **-f PATH/Dockerfile** option as well,
 the system will look for that file inside the contents of the tarball.
d48bface
 
     docker build -f dev/Dockerfile https://10.10.10.1/docker/context.tar.gz
 
 Note: supported compression formats are 'xz', 'bzip2', 'gzip' and 'identity' (no compression).
 
38ec5d86
 ## Specify isolation technology for container (--isolation)
 
 This option is useful in situations where you are running Docker containers on
 Windows. The `--isolation=<value>` option sets a container's isolation
 technology. On Linux, the only supported is the `default` option which uses
 Linux namespaces. On Microsoft Windows, you can specify these values:
 
 * `default`: Use the value specified by the Docker daemon's `--exec-opt` . If the `daemon` does not specify an isolation technology, Microsoft Windows uses `process` as its default value.
 * `process`: Namespace isolation only.
 * `hyperv`: Hyper-V hypervisor partition-based isolation.
 
 Specifying the `--isolation` flag without a value is the same as setting `--isolation="default"`.
 
0a0dd116
 # HISTORY
1b2b783b
 March 2014, Originally compiled by William Henry (whenry at redhat dot com)
fa29b1f0
 based on docker.com source material and internal work.
b07f1938
 June 2014, updated by Sven Dowideit <SvenDowideit@home.org.au>
05a86905
 June 2015, updated by Sally O'Malley <somalley@redhat.com>