singularity
runtime-tools
Our great sponsors
singularity | runtime-tools | |
---|---|---|
6 | 4 | |
2,495 | 413 | |
0.6% | 0.7% | |
0.0 | 3.3 | |
over 1 year ago | 7 months ago | |
Go | Go | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
singularity
-
Just a warning about typos
Old Singularity repo: https://github.com/apptainer/singularity
- Singularity – Open Source Container System for Secure High Performance Computing
- Singularity – Open-Source Container System for Secure High Performance Computing
-
Podman: A tool for managing OCI containers and pods
This sounds exactly like Singularity http://singularity.hpcng.org/
-
What is a singularity container and how do I use it?
never used it but a very popular example of a container is docker (that link says what a container is) and singularity just looks like another container flavour (maybe specific to HPCs?)
-
Youki, a container runtime in Rust, passed all the default tests provided by opencontainers.
The re-exec pattern is not the only way you can solve this in Go. I actually rebuilt a container runtime from C to Go (for the HPC market) and we had to solve this problem. We did it by essentially forking before any Go code gets run. Here’s the code for the main binary that actually spawns the container process. It’s half C, half Go. https://github.com/hpcng/singularity/tree/master/cmd/starter
runtime-tools
-
Podman/buildah oci bundle
But there is another issue - machinectl doesn't know how to start oci-bundle. It would be nice to have a tool which would generate .nspawn file from config.json (apparrently, there is an open issue for that https://github.com/opencontainers/runtime-tools/issues/669)
-
Youki, a container runtime in Rust, passed all the default tests provided by opencontainers.
I think you might be looking at the gitignore for https://github.com/opencontainers/runtime-tools/blob/master/.gitignore , which is NOT the repo made by /u/utam0k. That's a large repo from opencontainers that includes many different things, so that .gitignore is bigger but by no means unreasonable.
youki, a container runtime in Rust I'm implementing, passed all the default tests provided by opencontainers. There are still many issues that need to be implemented, but it's getting fun. I think Rust to be a good choice for implementing container utilities. If you are interested, please refer to the motivation section of README for more details. I'd like to hear your opinions.
-
Crun: Fully featured OCI runtime and C library for running containers
crun runs the OCI validations tests on each PR.
The tests are maintained here: https://github.com/opencontainers/runtime-tools/tree/master/...
I guess this is the closest to be "certified compliant", but that is not enough for working with existing container engines as everyone just assumes runc is used
What are some alternatives?
podman - Podman: A tool for managing OCI containers and pods.
crun - A fast and lightweight fully featured OCI runtime and C library for running containers
apptainer - Apptainer: Application containers for Linux
umoci - umoci modifies Open Container images
warewulf - Warewulf is a stateless and diskless container operating system provisioning system for large clusters of bare metal and/or virtual systems.
image-tools - OCI Image Tooling
gitlab-runner
runtime-spec - OCI Runtime Specification
kaniko - Build Container Images In Kubernetes
runc - CLI tool for spawning and running containers according to the OCI specification
cockpit-podman - Cockpit UI for podman containers
ignite - Ignite a Firecracker microVM