|over 1 year ago||2 days ago|
|MIT License||Apache License 2.0|
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Fly.io: The Reclaimer of Heroku's Magic
5 projects | news.ycombinator.com | 15 May 2022
Unless they’ve changed things, there is no containerization within the VM a la kata. They run their own custom init inside the VM and use it to start the entry point. https://github.com/superfly/init-snapshot is the source.
Docker without Docker
5 projects | dev.to | 2 Jun 2021
Jerome wrote our init in Rust, and, after being cajoled by Josh Triplett, [we released the code (https://github.com/superfly/init-snapshot), which you can go read.
The cloud-agnostic-architecture illusion
5 projects | dev.to | 19 Aug 2022
We build all services as containerized workloads, i.e., OCI images - sometimes called Docker images. We deploy these to the Kubernetes product offered by the cloud vendor. Whenever we need some capability, containers are the answer. This insulates our applications from the vendor. In principle, we could switch providers as long as Kubernetes is available.
Containerd... Do I use Docker to build the container image? I miss the Docker Shim
5 projects | reddit.com/r/kubernetes | 25 Jun 2022
Build images with anything that makes OCI compliant images, push, and profit.
Opensource Server Hosting/Management Web Panel
3 projects | reddit.com/r/admincraft | 22 Jun 2022
it's funny that you mention this because it is actually the thing that is next on my agenda for the image, as you can probably see already I bake in OCI image annotations in our image, which is great for including some core pieces of meta data. In addition to this though I will soon be including custom labels for Base64 encoded YAMLs for Kubernetes deployments using this image. I will look at including helm configuration as well. Then it should be just as easy as: $ docker pull registry.gitlab.com/crafty-controller/crafty-4:latest $ docker image inspect registry.gitlab.com/crafty-controller/crafty-4:latest | jq -r "..Config.Labels.\"org.arcadiatech.crafty.k8s.deployment\"" | base64 -d | kubectl apply -f -
My director is mad that I accepted another internal position for a 26% raise when he was told he could only give me a 10%
6 projects | reddit.com/r/antiwork | 15 May 2022
They still don't do anything really of substance, they're just gateways to their vendor's world - booking systems, payment systems, etc. You learn those as you go along. Yes, as a potential employee, you need to be able to tick those boxes on your CV, but if you understand the underlying technology, it's mostly a matter of booking your own AWS or Azure server for $5-10 a month for a few weeks, and fooling around. (Docker is a bit different in the sense that they were the first to popularize today's de-facto container image standard, the "Docker container", which has since been accepted as a proper standard and renamed to "OCI image format"; but at the end of the day, at this point in time, Docker in itself is still just a company out for the money, and the multi-GB installation of their product can, for the essential functionality part, be replaced by a few hundred lines of Bash code. The cool boys today don't use Docker, they use [Podman(https://podman.io/), which is essentially a much more lightweight drop-in replacement ;-) )
`COPY –chmod` reduced the size of my container image by 35%
7 projects | news.ycombinator.com | 25 Mar 2022
I think the OP is confusing the runtime and image format a bit here. At runtime OverlayFS can use metadata-only copy up to describe changed files, but the container image is still defined as a sequence of layers where each layer is a tar file. There's no special handling for metadata-only changes of a file from a parent layer. As the OCI image spec puts it :
> Additions and Modifications are represented the same in the changeset tar archive.
Criticize My Dockerfile
2 projects | reddit.com/r/docker | 27 Nov 2021
You don't have any LABELs. Consider the OCI spec: https://github.com/opencontainers/image-spec/blob/main/annotations.md
After a couple of months of tinkering and coding, my own self-coded dashboard!
4 projects | reddit.com/r/selfhosted | 1 Oct 2021
Great app. I'd really like to see it developed and improved. Docker image is quite properly done: multi-stage build and user (not root) running application. Just add LABELs according to OCI Image Format Specification and maybe a HEALTHCHECK, and it will be a perfect model.
A Git repository with 2^28 commits—one for every 7-character shorthash
2 projects | news.ycombinator.com | 9 Jul 2021
I generally use the build number from ci for the tag, and add the git commit and repo URL as a label/annotation (following https://github.com/opencontainers/image-spec/blob/main/annot...)
Building Production Grade Container Images
3 projects | dev.to | 28 Jun 2021
The Open Container Initiative has label suggestions which are commonly known and accepted. OCI Annotations. The older deprecated version of the spec has better explanations in my opinion and since many labels were basically just renamed its can be useful too check out label-schema.org documentation as well.
Keeping Up with Docker Official Images
5 projects | news.ycombinator.com | 8 Jun 2021
Incidentally, I've proposed official image annotations that would let an image tell you what its base image is, both by immutable digest and by mutable tag, so you could detect this drift automatically.
Automated tooling could look at these annotations and notify maintainers, or proactively rebuild/rebase when base images change.
By having this information on the images themselves, you don't have to deal with as much source repo churn, though you might want that too.
If your app layers have a strong enough contract with your base layers (buildpacks is really good for this!), then you can rebase instead of rebuilding from source.
 OCI spec proposal: https://github.com/opencontainers/image-spec/pull/822
What are some alternatives?
skopeo - Work with remote images registries - retrieving information, images, signing content
nixpacks - App source + Nix packages + Docker = Image
ovh-ipxe-customer-script - Boot OVH server with your own iPXE script
flyctl - Command line tools for fly.io services
distroless - 🥑 Language focused docker images, minus the operating system.
asmttpd - Web server for Linux written in amd64 assembly.
fpm - Effing package management! Build packages for multiple platforms (deb, rpm, etc) with great ease and sanity.
dive - A tool for exploring each layer in a docker image
go-containerregistry - Go library and CLIs for working with container registries
docker-lock - Automatically manage image digests in Dockerfiles, docker-compose files, and Kubernetes manifests by tracking them in a separate Lockfile
bocker - Docker implemented in around 100 lines of bash