|
1 | | -container-inspector is a suite of analysis utilities and command line tools for |
2 | | -Docker images, containers, root filesystems and virtual machine images. |
| 1 | +**container-inspector** is a suite of analysis utilities and command line tools |
| 2 | +for Docker images, containers, root filesystems and virtual machine images. |
| 3 | + |
3 | 4 | For Docker images, it can process layers and how these relate to each other as |
4 | 5 | well as Dockerfiles. |
5 | 6 |
|
6 | | -container-inspector provides utilities to: |
| 7 | +**container-inspector** provides utilities to: |
| 8 | + |
7 | 9 | - identify Docker images in a file system, its layers and the related metadata. |
8 | 10 | - given a Docker image, collect and report its metadata. |
9 | 11 | - given a Docker image, extract the layers used to rebuild what how a runtime |
10 | 12 | rootfs would look. |
11 | 13 | - find and parse Dockerfiles. |
12 | 14 | - find how Dockerfiles relate to actual images and their layers. |
13 | | - - given a Docker image, rootfs or Virtual Machime image collect system packages. |
14 | | - |
15 | | - |
| 15 | + - given a Docker image, rootfs or Virtual Machime image collect inventories of |
| 16 | + packages and files installed in an image or layer or rootfs |
| 17 | + (implemented using a provided callable) |
| 18 | + - detect the "distro" of a rootfs of image using os-release files (and an |
| 19 | + extensive test suite for these) |
| 20 | + - detect the operating system, architecture and |
| 21 | + |
| 22 | + |
16 | 23 | Quick start |
17 | 24 | ----------- |
18 | 25 |
|
@@ -50,24 +57,24 @@ layer (or selected tagged layer) using a union file system (e.g. AUFS). |
50 | 57 | In AUFS, any file or directory prefixed with .wh. are "white outs" files deleting |
51 | 58 | files in the underlying layers. |
52 | 59 |
|
53 | | -See the imaged specifications saved in docs/references/ |
| 60 | +See the image specifications saved in docs/references/ |
54 | 61 |
|
55 | 62 |
|
56 | 63 | Internal data model |
57 | 64 | ------------------- |
58 | | -- Registry: this is a collection of Image Repositories (related or not). |
59 | | -- Repository: this is a collection of related Images, stored in the same base directory. |
60 | 65 | - Image: this is a runnable image composed of metadata and a sequence of layers. |
61 | 66 | - Layer: this is a slice of an image root filesystem with a payload and metadata |
62 | | - |
63 | | -We skip entirely Registry and Repository and only expose Image and Layer |
| 67 | +- Resource: this a file or directory |
64 | 68 |
|
65 | 69 |
|
66 | 70 | Plans |
67 | 71 | ----- |
68 | 72 | - in progress: support OCI image layout |
69 | | - - in progress: fetch Image from remote registry (already available, but not integrated) |
70 | | - - in progress: collect inventories of packages and files installed in an image or layer |
71 | | - (implemented using a provided callable) |
72 | | - - future: given collected Dockerfiles and Images, build a graph |
73 | | - of the relationships between all these elements. |
| 73 | + - improved suport for Windows containers |
| 74 | + |
| 75 | + |
| 76 | +Related tools |
| 77 | +------------- |
| 78 | + - Fetching Image from remote registry is available in ScanCode.io |
| 79 | + - Extracting VM Image filesystems as archives is available in ExtractCode |
| 80 | + |
0 commit comments