All Projects → opencontainers → Artifacts

opencontainers / Artifacts

Licence: apache-2.0
OCI Artifacts

Projects that are alternatives of or similar to Artifacts

Pouch
An Efficient Enterprise-class Container Engine
Stars: ✭ 4,483 (+5236.9%)
Mutual labels:  containers, oci
Rkt
[Project ended] rkt is a pod-native container engine for Linux. It is composable, secure, and built on standards.
Stars: ✭ 8,870 (+10459.52%)
Mutual labels:  containers, oci
Runtime
OCI (Open Containers Initiative) compatible runtime using Virtual Machines
Stars: ✭ 588 (+600%)
Mutual labels:  containers, oci
Buildkit
concurrent, cache-efficient, and Dockerfile-agnostic builder toolkit
Stars: ✭ 4,537 (+5301.19%)
Mutual labels:  containers, oci
Runc
CLI tool for spawning and running containers according to the OCI specification
Stars: ✭ 8,729 (+10291.67%)
Mutual labels:  containers, oci
Grype
A vulnerability scanner for container images and filesystems
Stars: ✭ 362 (+330.95%)
Mutual labels:  containers, oci
Distribution
The toolkit to pack, ship, store, and deliver container content
Stars: ✭ 6,445 (+7572.62%)
Mutual labels:  containers, oci
Runj
runj is an experimental, proof-of-concept OCI-compatible runtime for FreeBSD jails.
Stars: ✭ 211 (+151.19%)
Mutual labels:  containers, oci
Clair
Vulnerability Static Analysis for Containers
Stars: ✭ 8,356 (+9847.62%)
Mutual labels:  containers, oci
Crun
A fast and lightweight fully featured OCI runtime and C library for running containers
Stars: ✭ 990 (+1078.57%)
Mutual labels:  containers, oci
Umoci
umoci modifies Open Container images
Stars: ✭ 349 (+315.48%)
Mutual labels:  containers, oci
Containerd
An open and reliable container runtime
Stars: ✭ 9,956 (+11752.38%)
Mutual labels:  containers, oci
Dockerfile
Dockerfile best-practices for writing production-worthy Docker images.
Stars: ✭ 3,506 (+4073.81%)
Mutual labels:  containers, oci
Cc Oci Runtime
OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
Stars: ✭ 418 (+397.62%)
Mutual labels:  containers, oci
Distribution Spec
OCI Distribution Specification
Stars: ✭ 250 (+197.62%)
Mutual labels:  containers, oci
Tectonic Installer
Install a Kubernetes cluster the CoreOS Tectonic Way: HA, self-hosted, RBAC, etcd Operator, and more
Stars: ✭ 599 (+613.1%)
Mutual labels:  containers, oci
Box
A mruby-based Builder for Docker Images
Stars: ✭ 236 (+180.95%)
Mutual labels:  containers, oci
Containership
A simple container management platform
Stars: ✭ 241 (+186.9%)
Mutual labels:  containers, oci
Runv
Hypervisor-based Runtime for OCI
Stars: ✭ 798 (+850%)
Mutual labels:  containers, oci
Kata Containers
Kata Containers version 2.x repository. Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. https://katacontainers.io/
Stars: ✭ 1,053 (+1153.57%)
Mutual labels:  containers, oci

OCI Artifacts

Artifact Guidance Documents

  1. Artifact Author Guidance

Supporting Documents

Project Introduction and Scope

Container registries, implementing the distribution-spec, provide reliable, highly scalable, secured storage services for container images. Customers either use a cloud provider implementation, vendor implementations, or instance the open source implementation of distribution. They configure security and networking to assure the images in the registry are locked down and accessible by the resources required. Cloud providers and vendors often provide additional values atop their registry implementations from security to productivity features.

Applications and services typically require additional artifacts to deploy and manage, including helm for deployment and Open Policy Agent (OPA) for policy enforcement.

Utilizing the manifest and index definitions, new artifacts, such as the Singularity project, can be stored and served using the distribution-spec.

This repository provides a reference for artifact authors and registry implementors for supporting new artifact types with the existing implementations of distribution. More particularly this repository has been tasked by the OCI TOB to serve 3 primary goals:

  1. artifact authors - guidance for authoring new artifact types. Including a clearing house for well known artifact types.
  2. registry operators and vendors - guidance for how operators and vendors can support new artifact types, including how they can opt-in or out of well known artifact types. Registry operators that already implement media-type filtering will not have to change. The artifact repo will provide context on how new media-types can be used, and how media-types can be associated with a type of artifact.
  3. clearing house for well known artifacts - artifact authors can submit their artifact definitions, providing registry operators a list by which they can easily support.

By providing an OCI artifact definition, the community can continue to innovate, focusing on new artifact types without having to build yet another storage solution (YASS).

Project Governance and License

Code of Conduct

This project incorporates (by reference) the OCI Code of Conduct.

Governance and Releases

This project incorporates the Governance and Releases processes from the OCI project template: https://github.com/opencontainers/project-template.

Project Communications

This project would continue to use existing channels in use by the OCI developer community for communication

Versioning / Roadmap

Artifacts will reference specific distribution, index and manifest versions in its examples, identifying any dependencies required.

Frequently Asked Questions (FAQ)

Q: Does this change the OCI Charter or Scope Table?

A: No. Artifacts are a prescriptive means of storing index and manifest within distribution implementations.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].