From e722d3be7e07e57ee37534cbea5007b3764a771e Mon Sep 17 00:00:00 2001 From: Filipp Frizzy Date: Thu, 7 Jun 2018 16:53:02 +0000 Subject: [PATCH] add links https://github.com/blablacar/dgr https://github.com/hyperhq/runv https://github.com/google/gvisor --- README.md | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 2777ebd..04562ff 100644 --- a/README.md +++ b/README.md @@ -143,6 +143,8 @@ Railcar is a rust implementation of the opencontainers initiative's runtime spec Kata Containers is a new open source project building extremely lightweight virtual machines that seamlessly plug into the containers ecosystem. * [plash](https://github.com/ihucos/plash/) Lightweight, rootless containers. +* [runv](https://github.com/hyperhq/runv) +Hypervisor-based (KVM, Xen, QEMU) Runtime for OCI. Security by isolation. ## Sandboxes @@ -187,9 +189,11 @@ A tool for analyzing and comparing container images. * [buildah](https://github.com/projectatomic/buildah) A tool which facilitates building OCI container images. * [skopeo](https://github.com/projectatomic/skopeo) -Work with remote images registries - retrieving information, images, signing content +Work with remote images registries - retrieving information, images, signing content. * [img](https://github.com/jessfraz/img) Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder. +* [dgr](https://github.com/blablacar/dgr) +Command line utility designed to build and to configure at runtime App Containers Images (ACI) and App Container Pods (POD) based on convention over configuration. ## Dashboard @@ -223,6 +227,8 @@ Security by segmentation for Docker and Kubernetes. Quick and Easy server testing/validation. * [sockguard](https://github.com/buildkite/sockguard) A proxy for docker.sock that enforces access control and isolated privileges. +* [gvisor](https://github.com/google/gvisor) +gVisor is a user-space kernel, written in Go, that implements a substantial portion of the Linux system surface. It includes an Open Container Initiative (OCI) runtime called runsc that provides an isolation boundary between the application and the host kernel. The runsc runtime integrates with Docker and Kubernetes, making it simple to run sandboxed containers. ### Links