SaaSHub helps you find the best software and product alternatives Learn more →
Go-containerregistry Alternatives
Similar projects and alternatives to go-containerregistry
-
-
InfluxDB
InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
-
-
Moby
The Moby Project - a collaborative project for the container ecosystem to assemble container-based systems
-
-
-
-
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
-
-
-
-
-
-
-
-
-
-
crane
A Nix library for building cargo projects. Never build twice thanks to incremental artifact caching.
-
-
-
docker-lock
Discontinued Automatically manage image digests in Dockerfiles, docker-compose files, and Kubernetes manifests by tracking them in a separate Lockfile
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
go-containerregistry discussion
go-containerregistry reviews and mentions
- Crane: Tool for interacting with remote images and registries
-
A gopher’s journey to the center of container images
I also explored another module, go-containerregistry, in order to build images without root privileges. The approach is completely different, and we can manipulate each component of the container image separately. This can present an advantage, if you're looking for a way to fine tune things.
-
Skip build if "${CI_REGISTRY_IMAGE}:${CI_COMMIT_SHORT_SHA}" exists on container registry
Use crane ls in a different job to check the tags in the registry. Create an artifact from its output that you evaluate in your kaniko job to check if the build should run or not.
-
Docker: We’re No Longer Sunsetting the Free Team Plan
Multi-arch builds are easy to "transfer" IMHO
crane cp docker.io/openfaas/gateway:0.10.0 ghcr.io/openfaas/gateway:0.10.0
If you've not used it yet - do take a look. Crane doesn't pull the images into a local Docker library for re-tagging and re-pushing.
https://github.com/google/go-containerregistry/blob/main/cmd...
-
Weekly: This Week I Learned (TWIL?) thread
crane - tool to copy images from one repo to another - https://github.com/google/go-containerregistry/blob/main/cmd/crane/doc/crane.md
- Dockerhub to (likely?) delete a lot of organizations.
-
FYI: Docker is deleting Open Source organisations
pretty sure the crane being referred by alex is this one: https://github.com/google/go-containerregistry/tree/main/cmd/crane
-
Docker's deleting Open Source images and here's what you need to know
https://github.com/google/go-containerregistry/tree/main/cmd...
It was recommended in this article:
- Crafting container images without Dockerfiles
-
ImagePullPolicy: IfNotPresent - (image doesn’t exist in repo) - Is it possible to pull the micro service image from an EKS node and then push to repo?
Look at using tools like skopeo or crane
-
A note from our sponsor - SaaSHub
www.saashub.com | 15 May 2025
Stats
google/go-containerregistry is an open source project licensed under Apache License 2.0 which is an OSI approved license.
The primary programming language of go-containerregistry is Go.
Popular Comparisons
- go-containerregistry VS skopeo
- go-containerregistry VS image-spec
- go-containerregistry VS crane
- go-containerregistry VS regclient
- go-containerregistry VS kubectl-node-shell
- go-containerregistry VS container-diff
- go-containerregistry VS gcr-cleaner
- go-containerregistry VS docker-lock
- go-containerregistry VS docker-tools
- go-containerregistry VS manifest-tool