{"category":{"categoryid":1494,"name":"app-containers","summary":"The app-containers category contains container related software."},"packages":[{"categoryid":1494,"description":"A container-focused DNS server","firstseen":"2023-05-09T05:43:47.168060","name":"aardvark-dns","packageid":76127,"summary":"Aardvark-dns is an authoritative dns server for A\/AAAA container records. It can forward other requests to configured resolvers."},{"categoryid":1494,"description":"Automatically gets credentials for Amazon ECR on docker push\/docker pull","firstseen":"2025-01-19T07:27:43.541838","name":"amazon-ecr-credential-helper","packageid":78121},{"categoryid":1494,"description":"The container system for secure high-performance computing","firstseen":"2022-03-05T01:56:47.284950","name":"apptainer","packageid":74525},{"categoryid":1494,"description":"A tool that facilitates building OCI images","firstseen":"2021-12-20T09:21:05.969452","name":"buildah","packageid":73842},{"categoryid":1494,"description":"Analyzes resource usage and performance characteristics of running containers","firstseen":"2021-12-20T09:21:05.969452","name":"cadvisor","packageid":73843},{"categoryid":1494,"description":"A container init that is so simple it's effectively brain-dead","firstseen":"2022-03-05T19:21:14.755206","name":"catatonit","packageid":74531},{"categoryid":1494,"description":"Standard networking plugins for container networking","firstseen":"2022-07-16T22:52:41.035165","name":"cni-plugins","packageid":75174},{"categoryid":1494,"description":"An OCI container runtime monitor","firstseen":"2021-12-20T09:21:05.969452","name":"conmon","packageid":73844},{"categoryid":1494,"description":"A daemon to control runC","firstseen":"2021-12-19T07:54:59.136259","name":"containerd","packageid":73824,"summary":"Containerd is a daemon with an API and a command line client, to manage containers on one machine. It uses runC to run containers according to the OCI specification. Containerd has advanced features such as seccomp and user namespace support as well as checkpoint and restore for cloning and live migration of containers."},{"categoryid":1494,"description":"Common config files and docs for Containers stack","firstseen":"2023-09-21T23:37:35.098083","name":"containers-common","packageid":76500},{"categoryid":1494,"description":"Default config and docs related to Containers' images","firstseen":"2023-09-21T23:37:35.098083","name":"containers-image","packageid":76501},{"categoryid":1494,"description":"Configures default shortnames (aliases) for Containers","firstseen":"2023-09-21T23:37:35.098083","name":"containers-shortnames","packageid":76502},{"categoryid":1494,"description":"Default config and docs related to Containers' storage","firstseen":"2021-12-20T09:21:05.969452","name":"containers-storage","packageid":73845},{"categoryid":1494,"description":"container signing utility","firstseen":"2022-01-27T21:31:15.105643","name":"cosign","packageid":74273},{"categoryid":1494,"description":"OCI-based implementation of Kubernetes Container Runtime Interface","firstseen":"2021-12-20T09:21:05.969452","name":"cri-o","packageid":73846,"summary":"CRI-O is meant to provide an integration path between OCI conformant runtimes and the kubelet. Specifically, it implements the Kubelet Container Runtime Interface (CRI) using OCI conformant runtimes. The scope of CRI-O is tied to the scope of the CRI."},{"categoryid":1494,"description":"CLI and validation tools for Kubelet Container Runtime (CRI)","firstseen":"2021-12-20T09:21:05.969452","name":"cri-tools","packageid":73847},{"categoryid":1494,"description":"Fast and low-memory footprint OCI Container Runtime fully written in C","firstseen":"2021-12-20T09:21:05.969452","name":"crun","packageid":73841,"summary":"While most of the tools used in the Linux containers ecosystem are written in Go, crun authors believe C is a better fit for a lower level tool like a container runtime. runc; the most used implementation of the OCI runtime specs written in Go, re-execs itself and use a module written in C for setting up the environment before the container process starts. crun aims to be also usable as a library that can be easily included in programs without requiring an external process for managing OCI containers."},{"categoryid":1494,"description":"Reference implementation of the Development Containers specification","firstseen":"2023-10-07T16:03:29.775949","name":"devcontainer","packageid":76560,"summary":"A Development Container (or Dev Container for short) allows you to use a container as a full-featured development environment. It can be used to run an application, to separate tools, libraries, or runtimes needed for working with a codebase, and to aid in continuous integration and testing. Dev containers can be run locally or remotely, in a private or public cloud, in a variety of supporting tools and editors."},{"categoryid":1494,"description":"Use any Linux distribution inside your terminal (powered by docker\/podman)","firstseen":"2022-09-26T03:12:07.411379","name":"distrobox","packageid":75482,"summary":"Use any Linux distribution inside your terminal. Enable both backward and forward compatibility with software and freedom to use whatever distribution you’re more comfortable with. Distrobox uses podman or docker to create containers using the Linux distribution of your choice. The created container will be tightly integrated with the host, allowing sharing of the HOME directory of the user, external storage, external USB devices and graphical apps (X11\/Wayland), and audio."},{"categoryid":1494,"description":"System container image builder for LXC and incus","firstseen":"2021-12-20T09:21:05.969452","name":"distrobuilder","packageid":73848},{"categoryid":1494,"description":"terminal based UI to manage kubernetes clusters","firstseen":"2025-09-23T11:19:47.502363","name":"dive","packageid":78532},{"categoryid":1494,"description":"The core functions you need to create Docker images and run Docker containers","firstseen":"2021-12-20T09:21:05.969452","name":"docker","packageid":73869,"summary":"Docker is an open-source project to easily create lightweight, portable, self-sufficient containers from any application. The same container that a developer builds and tests on a laptop can run at scale, in production, on VMs, bare metal, OpenStack clusters, public clouds and more."},{"categoryid":1494,"description":"Test for best practices around deploying docker containers","firstseen":"2021-12-20T09:21:05.969452","name":"docker-bench-security","packageid":73849,"summary":"The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production."},{"categoryid":1494,"description":"Docker CLI plugin for extended build capabilities with BuildKit","firstseen":"2022-12-05T03:03:47.316675","name":"docker-buildx","packageid":75645,"summary":"buildx is a Docker CLI plugin for extended build capabilities with BuildKit. BuildKit is a toolkit for converting source code to build artifacts in an efficient, expressive and repeatable manner."},{"categoryid":1494,"description":"the command line binary for docker","firstseen":"2021-12-20T09:21:05.969452","name":"docker-cli","packageid":73868},{"categoryid":1494,"description":"Multi-container orchestration for Docker","firstseen":"2021-12-20T09:21:05.969452","name":"docker-compose","packageid":73850},{"categoryid":1494,"description":"Suite of programs to use native stores to keep Docker credentials safe","firstseen":"2021-12-20T09:21:05.969452","name":"docker-credential-helpers","packageid":73851,"summary":"A suite of programs to use native stores to keep Docker credentials safe. Currently provides docker-credential-secretservice to use the D-Bus secret service APIs, and docker-credential-pass to use the pass framework."},{"categoryid":1494,"description":"Docker CLI plugin to update container repository documentation","firstseen":"2024-09-14T15:27:51.154389","name":"docker-pushrm","packageid":77727,"summary":"docker-pushrm is a Docker CLI plugin that adds a new docker pushrm command to Docker. It pushes the README file from the current working directory to a container registry server where it appears as repo description in the web interface. It currently supports Docker Hub, Red Hat Quay and Harbor v2. For most registry types docker-pushrm uses authentication info from the Docker credentials store - so it \"just works\" for registry servers that you're already logged into with Docker."},{"categoryid":1494,"description":"Docker Registry 2.0","firstseen":"2021-12-20T09:21:05.969452","name":"docker-registry","packageid":73853},{"categoryid":1494,"description":"Swarm Classic: a container clustering system","firstseen":"2021-12-20T09:21:05.969452","name":"docker-swarm","packageid":73854},{"categoryid":1494,"description":"Build automation tool that executes in containers","firstseen":"2023-08-03T20:31:16.798990","name":"earthly","packageid":76370,"summary":"Earthly is a versatile, approachable CI\/CD framework that runs every pipeline inside containers, giving you repeatable builds that you write once and run anywhere. It has a super simple, instantly recognizable syntax that is easy to write and understand – like Dockerfile and Makefile had a baby. And it leverages and augments popular build tools instead of replacing them, so you don’t have to rewrite all your builds no matter what languages you use."},{"categoryid":1494,"description":"An etcd backed network fabric for containers","firstseen":"2021-12-20T09:41:11.294651","name":"flannel","packageid":73871},{"categoryid":1494,"description":"A vulnerability scanner for container images and filesystems","firstseen":"2022-05-11T22:36:52.838166","name":"grype","packageid":74947},{"categoryid":1494,"description":"Standalone daemon-less unprivileged Dockerfile and OCI container image builder","firstseen":"2021-12-20T09:21:05.969452","name":"img","packageid":73862},{"categoryid":1494,"description":"Modern, secure and powerful system container and virtual machine manager","firstseen":"2023-10-13T18:50:11.826457","name":"incus","packageid":76579,"summary":"Incus is a modern, secure and powerful system container and virtual machine manager. Incus is a community fork from Canonical's LXD. It provides a unified experience for running and managing full Linux systems inside containers or virtual machines. Incus supplies images for a wide number of Linux distributions and is built around a very powerful, yet pretty simple, REST API. Incus scales from one instance on a single machine to a cluster in a full data center rack, making it suitable for running workloads both for development and in production. Incus allows you to easily set up a system that feels like a small private cloud. You can run any type of workload in an efficient way while keeping your resources optimized. You should consider using Incus if you want to containerize different environments or run virtual machines, or in general run and manage your infrastructure in a cost-effective way."},{"categoryid":1494,"description":"k3d creates k3s clusters in docker","firstseen":"2021-12-20T09:21:05.969452","name":"k3d","packageid":73858},{"categoryid":1494,"description":"Tool to move from docker-compose to Kubernetes","firstseen":"2021-12-20T09:21:05.969452","name":"kompose","packageid":73863},{"categoryid":1494,"description":"A userspace interface for the Linux kernel containment features","firstseen":"2021-12-21T02:39:19.961620","name":"lxc","packageid":73874},{"categoryid":1494,"description":"Old style template scripts for LXC","firstseen":"2021-12-21T02:39:19.961620","name":"lxc-templates","packageid":73873},{"categoryid":1494,"description":"Modern, secure and powerful system container and virtual machine manager","firstseen":"2021-12-21T02:39:19.961620","name":"lxd","packageid":73872,"summary":"LXD is a modern, secure and powerful system container and virtual machine manager. It provides a unified experience for running and managing full Linux systems inside containers or virtual machines. LXD supplies images for a wide number of Linux distributions and is built around a very powerful, yet pretty simple, REST API. LXD scales from one instance on a single machine to a cluster in a full data center rack, making it suitable for running workloads both for development and in production. LXD allows you to easily set up a system that feels like a small private cloud. You can run any type of workload in an efficient way while keeping your resources optimized. You should consider using LXD if you want to containerize different environments or run virtual machines, or in general run and manage your infrastructure in a cost-effective way."},{"categoryid":1494,"description":"Docker-compatible CLI for containerd, with support for Compose","firstseen":"2021-12-20T09:21:05.969452","name":"nerdctl","packageid":73859},{"categoryid":1494,"description":"A container network stack","firstseen":"2023-02-22T06:51:21.067722","name":"netavark","packageid":75855,"summary":"Netavark is a rust based network stack for containers. It is being designed to work with Podman but is also applicable for other OCI container management applications."},{"categoryid":1494,"description":"NVIDIA container runtime toolkit","firstseen":"2024-12-09T22:48:50.936103","name":"nvidia-container-toolkit","packageid":78030,"summary":"NVIDIA container runtime toolkit, build and run containers leveraging NVIDIA GPUs. tl;dr: nvidia-docker is deprecated because docker now has native gpu support, which this package is required to use. The NVIDIA Container Toolkit (formerly known as NVIDIA Docker) allows containers to access full GPU acceleration. OpenGL, OpenCL and CUDA are supported for production use. Vulkan support is currently in beta. This only works for Linux containers running on Linux host systems with NVIDIA GPUs."},{"categoryid":1494,"description":"A tool for managing OCI containers and pods with Docker-compatible CLI","firstseen":"2021-12-20T09:21:05.969452","name":"podman","packageid":73857,"summary":"Podman (the POD MANager) is a tool for managing containers and images, volumes mounted into those containers, and pods made from groups of containers. Podman is based on libpod, a library for container lifecycle management that is also contained in this repository. The libpod library provides APIs for managing containers, pods, container images, and volumes."},{"categoryid":1494,"description":"A script to run docker-compose.yml using Podman","firstseen":"2024-12-05T22:34:39.515855","name":"podman-compose","packageid":77963},{"categoryid":1494,"description":"Terminal UI frontend for Podman","firstseen":"2023-10-18T20:18:58.635076","name":"podman-tui","packageid":76591},{"categoryid":1494,"description":"Docker registry v2 command line client","firstseen":"2021-12-20T09:41:11.294651","name":"reg","packageid":73870},{"categoryid":1494,"description":"runc container cli tools","firstseen":"2021-12-20T09:21:05.969452","name":"runc","packageid":73864,"summary":"runc is a CLI tool for spawning and running containers according to the OCF (Open Container Format) specification."},{"categoryid":1494,"description":"an s6-based init system for containers","firstseen":"2021-12-20T09:21:05.969452","name":"s6-overlay","packageid":73865},{"categoryid":1494,"description":"Terminal User Interface for docker engine","firstseen":"2021-12-20T09:21:05.969452","name":"sen","packageid":73861},{"categoryid":1494,"description":"Work with remote container images registries","firstseen":"2021-12-20T09:21:05.969452","name":"skopeo","packageid":73860},{"categoryid":1494,"description":"User-mode networking for unprivileged network namespaces","firstseen":"2021-12-20T09:21:05.969452","name":"slirp4netns","packageid":73856},{"categoryid":1494,"description":"Service and tools for management of snap packages","firstseen":"2021-12-20T09:21:05.969452","name":"snapd","packageid":73866},{"categoryid":1494,"description":"Generate a Software Bill of Materials from container images and filesystems","firstseen":"2022-05-11T22:36:52.838166","name":"syft","packageid":74948},{"categoryid":1494,"description":"Manipulation tool for OCI images","firstseen":"2021-12-20T09:21:05.969452","name":"umoci","packageid":73867}]}