mirror of
https://github.com/zyclonite/zerotier-docker.git
synced 2025-01-07 22:19:22 +01:00
Update README.md
This commit is contained in:
parent
398a312876
commit
029c147c3e
@ -4,11 +4,11 @@
|
|||||||
|
|
||||||
#### Description
|
#### Description
|
||||||
|
|
||||||
This is a container with a lightweight Alpine Linux image and a copy of ZeroTier One built for that image. It's designed to allow you to run ZeroTier One as a service on container-oriented distributions like CoreOS, though it should work on any Linux system with Docker.
|
This is a container based on a lightweight Alpine Linux image and a copy of ZeroTier One. It's designed to allow you to run ZeroTier One as a service on container-oriented distributions like Fedora CoreOS, though it should work on any Linux system with Docker or Podman.
|
||||||
|
|
||||||
#### Run
|
#### Run
|
||||||
|
|
||||||
To run this container in the correct way requires some special options to give it special permissions and allow it to persist its files. Here's an example (tested on CoreOS):
|
To run this container in the correct way requires some special options to give it special permissions and allow it to persist its files. Here's an example (tested on Fedora CoreOS):
|
||||||
|
|
||||||
docker run --name zerotier-one --device=/dev/net/tun --net=host \
|
docker run --name zerotier-one --device=/dev/net/tun --net=host \
|
||||||
--cap-add=NET_ADMIN --cap-add=SYS_ADMIN \
|
--cap-add=NET_ADMIN --cap-add=SYS_ADMIN \
|
||||||
@ -17,7 +17,7 @@ To run this container in the correct way requires some special options to give i
|
|||||||
|
|
||||||
This runs zyclonite/zerotier in a container with special network admin permissions and with access to the host's network stack (no network isolation) and /dev/net/tun to create tun/tap devices. This will allow it to create zt# interfaces on the host the way a copy of ZeroTier One running on the host would normally be able to.
|
This runs zyclonite/zerotier in a container with special network admin permissions and with access to the host's network stack (no network isolation) and /dev/net/tun to create tun/tap devices. This will allow it to create zt# interfaces on the host the way a copy of ZeroTier One running on the host would normally be able to.
|
||||||
|
|
||||||
In other words that basically does the same thing that running zerotier-one directly on the host would do, except it runs in a container. Since CoreOS has no package management this is the preferred way of distributing software for it.
|
In other words that basically does the same thing that running zerotier-one directly on the host would do, except it runs in a container. Since Fedora CoreOS has no package management this is the preferred way of distributing software for it.
|
||||||
|
|
||||||
It also mounts /var/lib/zerotier-one to /var/lib/zerotier-one inside the container, allowing your service container to persist its state across restarts of the container itself. If you don't do this it'll generate a new identity every time. You can put the actual data somewhere other than /var/lib/zerotier-one if you want.
|
It also mounts /var/lib/zerotier-one to /var/lib/zerotier-one inside the container, allowing your service container to persist its state across restarts of the container itself. If you don't do this it'll generate a new identity every time. You can put the actual data somewhere other than /var/lib/zerotier-one if you want.
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user