All Projects → opencontainers → Distribution Spec

opencontainers / Distribution Spec

Licence: apache-2.0
OCI Distribution Specification

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to Distribution Spec

Selinux
common selinux implementation
Stars: ✭ 107 (-57.2%)
Mutual labels:  containers, oci
Runj
runj is an experimental, proof-of-concept OCI-compatible runtime for FreeBSD jails.
Stars: ✭ 211 (-15.6%)
Mutual labels:  containers, oci
Ignite
Ignite a Firecracker microVM
Stars: ✭ 1,954 (+681.6%)
Mutual labels:  containers, oci
Artifacts
OCI Artifacts
Stars: ✭ 84 (-66.4%)
Mutual labels:  containers, oci
Runtime
Kata Containers version 1.x runtime (for version 2.x see https://github.com/kata-containers/kata-containers).
Stars: ✭ 2,103 (+741.2%)
Mutual labels:  containers, oci
Go Digest
Common digest package used across the container ecosystem
Stars: ✭ 99 (-60.4%)
Mutual labels:  containers, oci
Gvisor
Application Kernel for Containers
Stars: ✭ 12,012 (+4704.8%)
Mutual labels:  containers, oci
Kata Containers
Kata Containers version 2.x repository. Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. https://katacontainers.io/
Stars: ✭ 1,053 (+321.2%)
Mutual labels:  containers, oci
Runtime Spec
OCI Runtime Specification
Stars: ✭ 2,316 (+826.4%)
Mutual labels:  containers, oci
Image Tools
OCI Image Tooling
Stars: ✭ 167 (-33.2%)
Mutual labels:  containers, oci
Rkt
[Project ended] rkt is a pod-native container engine for Linux. It is composable, secure, and built on standards.
Stars: ✭ 8,870 (+3448%)
Mutual labels:  containers, oci
Box
A mruby-based Builder for Docker Images
Stars: ✭ 236 (-5.6%)
Mutual labels:  containers, oci
Firecracker Containerd
firecracker-containerd enables containerd to manage containers as Firecracker microVMs
Stars: ✭ 1,130 (+352%)
Mutual labels:  containers, oci
Image Spec
OCI Image Format
Stars: ✭ 1,851 (+640.4%)
Mutual labels:  containers, oci
Containerd
An open and reliable container runtime
Stars: ✭ 9,956 (+3882.4%)
Mutual labels:  containers, oci
Jib
🏗 Build container images for your Java applications.
Stars: ✭ 11,370 (+4448%)
Mutual labels:  containers, oci
Clair
Vulnerability Static Analysis for Containers
Stars: ✭ 8,356 (+3242.4%)
Mutual labels:  containers, oci
Runc
CLI tool for spawning and running containers according to the OCI specification
Stars: ✭ 8,729 (+3391.6%)
Mutual labels:  containers, oci
Orca Build
Build OCI images from Dockerfiles.
Stars: ✭ 159 (-36.4%)
Mutual labels:  containers, oci
Syft
CLI tool and library for generating a Software Bill of Materials from container images and filesystems
Stars: ✭ 196 (-21.6%)
Mutual labels:  containers, oci

OCI Distribution Specification

The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content.

The specification can be found here.

This repository also provides Go types, and registry conformance tooling. The Go types and validation should be compatible with the current Go release; earlier Go releases are not supported.

Additional documentation about how this group operates:

The optional and base layers of all OCI projects are tracked in the OCI Scope Table.

Distributing OCI Images and other content

The OCI Distribution Spec is closely related to the OCI Image Format Specification project, the OCI Runtime Specification project, and the OCI Artifacts project.

The OCI Image Format Specification strictly defines the requirements for an OCI Image (container image), which consists of a manifest, an optional image index, a set of filesystem layers, and a configuration. The schema for OCI Image components is fully supported by the APIs defined in the OCI Distribution Specification.

The OCI Runtime Specification defines how to properly run a container "filesystem bundle" which fully adheres to the OCI Image Format Specification. The OCI Runtime Specification is relevant to the OCI Distribution Specification in that they both support OCI Images, and that container runtimes use the APIs defined in the OCI Distribution Specification to fetch pre-built container images and run them.

The OCI Distribution Specification (this project) is also designed generically enough to be leveraged as a distribution mechanism for any type of content. The format of uploaded manifests, for example, need not necessarily adhere to the OCI Image Format Specification so long as it references the blobs which comprise a given artifact.

The OCI Artifacts project is an effort to provide guidance on how to properly define and distribute content using the OCI Distribution Specification for artifacts which are not container filesystem bundles, in a way that is mostly compatible with the existing schemas defined in the OCI Image Format Specification.

FAQ

For questions about the OCI Distribution Specification, please see the FAQ.

For general questions about OCI, please see the FAQ on the OCI site.

Roadmap

The GitHub milestones lay out the path to the future improvements.

Contributing

Development happens on GitHub for the spec. Issues are used for bugs and actionable items and longer discussions can happen on the mailing list.

The specification and code is licensed under the Apache 2.0 license found in the LICENSE file of this repository.

Discuss your design

The project welcomes submissions, but please let everyone know what you are working on.

Before undertaking a nontrivial change to this specification, send mail to the mailing list to discuss what you plan to do. This gives everyone a chance to validate the design, helps prevent duplication of effort, and ensures that the idea fits. It also guarantees that the design is sound before code is written; a GitHub pull-request is not the place for high-level discussions.

Typos and grammatical errors can go straight to a pull-request. When in doubt, start on the mailing-list.

Meetings

Please see the OCI org repository README for the most up-to-date information on OCI contributor and maintainer meeting schedules. You can also find links to meeting agendas and minutes for all prior meetings.

Mailing List

You can subscribe and join the mailing list on Google Groups.

Chat

OCI discussion happens in the following chat rooms, which are all bridged together:

  • #general channel on OCI Slack
  • #opencontainers:matrix.org
  • #opencontainers on freenode.net

Markdown style

To keep consistency throughout the Markdown files in the Open Container spec all files should be formatted one sentence per line. This fixes two things: it makes diffing easier with git and it resolves fights about line wrapping length. For example, this paragraph will span three lines in the Markdown source.

Git commit

Sign your work

The sign-off is a simple line at the end of the explanation for the patch, which certifies that you wrote it or otherwise have the right to pass it on as an open-source patch. The rules are pretty simple: if you can certify the below (from developercertificate.org):

Developer Certificate of Origin
Version 1.1

Copyright (C) 2004, 2006 The Linux Foundation and its contributors.
660 York Street, Suite 102,
San Francisco, CA 94110 USA

Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.


Developer's Certificate of Origin 1.1

By making a contribution to this project, I certify that:

(a) The contribution was created in whole or in part by me and I
    have the right to submit it under the open source license
    indicated in the file; or

(b) The contribution is based upon previous work that, to the best
    of my knowledge, is covered under an appropriate open source
    license and I have the right under that license to submit that
    work with modifications, whether created in whole or in part
    by me, under the same open source license (unless I am
    permitted to submit under a different license), as indicated
    in the file; or

(c) The contribution was provided directly to me by some other
    person who certified (a), (b) or (c) and I have not modified
    it.

(d) I understand and agree that this project and the contribution
    are public and that a record of the contribution (including all
    personal information I submit with it, including my sign-off) is
    maintained indefinitely and may be redistributed consistent with
    this project or the open source license(s) involved.

then you just add a line to every git commit message:

Signed-off-by: Jane Smith <[email protected]>

using your real name (sorry, no pseudonyms or anonymous contributions.)

You can add the sign off when creating the git commit via git commit -s.

Commit Style

Simple house-keeping for clean git history. Read more on How to Write a Git Commit Message or the Discussion section of git-commit(1).

  1. Separate the subject from body with a blank line
  2. Limit the subject line to 50 characters
  3. Capitalize the subject line
  4. Do not end the subject line with a period
  5. Use the imperative mood in the subject line
  6. Wrap the body at 72 characters
  7. Use the body to explain what and why vs. how
  • If there was important/useful/essential conversation or information, copy or include a reference
  1. When possible, one keyword to scope the change in the subject (i.e. "README: ...", "runtime: ...")
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].