All Projects → opencontainers → Image Tools

opencontainers / Image Tools

Licence: apache-2.0
OCI Image Tooling

Programming Languages

go
31211 projects - #10 most used programming language

Projects that are alternatives of or similar to Image Tools

Kata Containers
Kata Containers version 2.x repository. Kata Containers is an open source project and community working to build a standard implementation of lightweight Virtual Machines (VMs) that feel and perform like containers, but provide the workload isolation and security advantages of VMs. https://katacontainers.io/
Stars: ✭ 1,053 (+530.54%)
Mutual labels:  containers, oci
Orca Build
Build OCI images from Dockerfiles.
Stars: ✭ 159 (-4.79%)
Mutual labels:  containers, oci
Containerd
An open and reliable container runtime
Stars: ✭ 9,956 (+5861.68%)
Mutual labels:  containers, oci
Crun
A fast and lightweight fully featured OCI runtime and C library for running containers
Stars: ✭ 990 (+492.81%)
Mutual labels:  containers, oci
Selinux
common selinux implementation
Stars: ✭ 107 (-35.93%)
Mutual labels:  containers, oci
Clair
Vulnerability Static Analysis for Containers
Stars: ✭ 8,356 (+4903.59%)
Mutual labels:  containers, oci
Rkt
[Project ended] rkt is a pod-native container engine for Linux. It is composable, secure, and built on standards.
Stars: ✭ 8,870 (+5211.38%)
Mutual labels:  containers, oci
Runtime
OCI (Open Containers Initiative) compatible runtime using Virtual Machines
Stars: ✭ 588 (+252.1%)
Mutual labels:  containers, oci
Image Spec
OCI Image Format
Stars: ✭ 1,851 (+1008.38%)
Mutual labels:  containers, oci
Go Digest
Common digest package used across the container ecosystem
Stars: ✭ 99 (-40.72%)
Mutual labels:  containers, oci
Runv
Hypervisor-based Runtime for OCI
Stars: ✭ 798 (+377.84%)
Mutual labels:  containers, oci
Jib
🏗 Build container images for your Java applications.
Stars: ✭ 11,370 (+6708.38%)
Mutual labels:  containers, oci
Distribution
The toolkit to pack, ship, store, and deliver container content
Stars: ✭ 6,445 (+3759.28%)
Mutual labels:  containers, oci
Runc
CLI tool for spawning and running containers according to the OCI specification
Stars: ✭ 8,729 (+5126.95%)
Mutual labels:  containers, oci
Tectonic Installer
Install a Kubernetes cluster the CoreOS Tectonic Way: HA, self-hosted, RBAC, etcd Operator, and more
Stars: ✭ 599 (+258.68%)
Mutual labels:  containers, oci
Firecracker Containerd
firecracker-containerd enables containerd to manage containers as Firecracker microVMs
Stars: ✭ 1,130 (+576.65%)
Mutual labels:  containers, oci
Cc Oci Runtime
OCI (Open Containers Initiative) compatible runtime for Intel® Architecture
Stars: ✭ 418 (+150.3%)
Mutual labels:  containers, oci
Pouch
An Efficient Enterprise-class Container Engine
Stars: ✭ 4,483 (+2584.43%)
Mutual labels:  containers, oci
Artifacts
OCI Artifacts
Stars: ✭ 84 (-49.7%)
Mutual labels:  containers, oci
Ignite
Ignite a Firecracker microVM
Stars: ✭ 1,954 (+1070.06%)
Mutual labels:  containers, oci

oci-image-tool Build StatusGo Report Card

oci-image-tool is a collection of tools for working with the OCI image format specification. To build from source code, image-tools requires Go 1.7.x or above.

Install

It is recommended that use go get to download a single command tools.

$ go get -d github.com/opencontainers/image-tools/cmd/oci-image-tool
$ cd $GOPATH/src/github.com/opencontainers/image-tools/
$ make all
$ sudo make install

Uninstall

$ sudo make uninstall

Example

Obtaining an image

The following examples assume you have a image-layout tar archive at busybox-oci. One way to acquire that image is with skopeo:

$ skopeo copy docker://busybox oci:busybox-oci:latest

oci-image-tool-create

More information about oci-image-tool-create can be found in its man page

$ mkdir busybox-bundle
$ oci-image-tool create --ref latest busybox-oci busybox-bundle
$ cd busybox-bundle && sudo runc run busybox

oci-image-tool-validate

More information about oci-image-tool-validate can be found in its man page

$ oci-image-tool validate --type imageLayout --ref latest busybox-oci
busybox-oci: OK

oci-image-tool-unpack

More information about oci-image-tool-unpack can be found in its man page

$ mkdir busybox-bundle
$ oci-image-tool unpack --ref latest busybox-oci busybox-bundle
$ tree busybox-bundle
busybox-bundle
├── bin
│   ├── [
│   ├── [[
│   ├── acpid
│   ├── addgroup
│   ├── add-shell
[...]

Contributing

Development happens on GitHub. Issues are used for bugs and actionable items and longer discussions can happen on the mailing list.

The code is licensed under the Apache 2.0 license found in the LICENSE file of this repository.

Code of Conduct

Participation in the OpenContainers community is governed by OpenContainer's Code of Conduct.

Discuss your design

The project welcomes submissions, but please let everyone know what you are working on.

Before undertaking a nontrivial change to this repository, send mail to the mailing list to discuss what you plan to do. This gives everyone a chance to validate the design, helps prevent duplication of effort, and ensures that the idea fits. It also guarantees that the design is sound before code is written; a GitHub pull-request is not the place for high-level discussions.

Typos and grammatical errors can go straight to a pull-request. When in doubt, start on the mailing-list.

Weekly Call

The contributors and maintainers of all OCI projects have a weekly meeting Wednesdays at 2:00 PM (USA Pacific.) Everyone is welcome to participate via UberConference web or audio-only: 888-587-9088 or 860-706-8529 (no PIN needed.) An initial agenda will be posted to the mailing list earlier in the week, and everyone is welcome to propose additional topics or suggest other agenda alterations there. Minutes are posted to the mailing list and minutes from past calls are archived to the wiki for those who are unable to join the call.

Mailing List

You can subscribe and join the mailing list on Google Groups.

IRC

OCI discussion happens on #opencontainers on Freenode (logs).

Git commit

Sign your work

The sign-off is a simple line at the end of the explanation for the patch, which certifies that you wrote it or otherwise have the right to pass it on as an open-source patch. The rules are pretty simple: if you can certify the below (from developercertificate.org):

Developer Certificate of Origin
Version 1.1

Copyright (C) 2004, 2006 The Linux Foundation and its contributors.
660 York Street, Suite 102,
San Francisco, CA 94110 USA

Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.


Developer's Certificate of Origin 1.1

By making a contribution to this project, I certify that:

(a) The contribution was created in whole or in part by me and I
    have the right to submit it under the open source license
    indicated in the file; or

(b) The contribution is based upon previous work that, to the best
    of my knowledge, is covered under an appropriate open source
    license and I have the right under that license to submit that
    work with modifications, whether created in whole or in part
    by me, under the same open source license (unless I am
    permitted to submit under a different license), as indicated
    in the file; or

(c) The contribution was provided directly to me by some other
    person who certified (a), (b) or (c) and I have not modified
    it.

(d) I understand and agree that this project and the contribution
    are public and that a record of the contribution (including all
    personal information I submit with it, including my sign-off) is
    maintained indefinitely and may be redistributed consistent with
    this project or the open source license(s) involved.

then you just add a line to every git commit message:

Signed-off-by: Joe Smith <[email protected]>

using your real name (sorry, no pseudonyms or anonymous contributions.)

You can add the sign off when creating the git commit via git commit -s.

Commit Style

Simple house-keeping for clean git history. Read more on How to Write a Git Commit Message or the Discussion section of git-commit(1).

  1. Separate the subject from body with a blank line
  2. Limit the subject line to 50 characters
  3. Capitalize the subject line
  4. Do not end the subject line with a period
  5. Use the imperative mood in the subject line
  6. Wrap the body at 72 characters
  7. Use the body to explain what and why vs. how
  • If there was important/useful/essential conversation or information, copy or include a reference
  1. When possible, one keyword to scope the change in the subject (i.e. "README: ...", "runtime: ...")
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].