Skip to content

Commit 4871738

Browse files
committed
Update README and CHANGELOG for v21.5.25
Signed-off-by: Philippe Ombredanne <[email protected]>
1 parent 71ceca9 commit 4871738

File tree

2 files changed

+26
-16
lines changed

2 files changed

+26
-16
lines changed

CHANGELOG.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,17 @@ The Image and Layer object structures have changed significantly:
1414

1515
- new attributes have been added to correctly track the tarball of an image
1616
or layer and its extracted location:
17+
1718
- "extracted_location" is the absolute path where an image or layer is extracted
1819
- "archive_location" is the absolute path to an image or layer archive
20+
1921
Therefore we have these attribute renames, additions and deletions:
2022
- Image.base_location -> Image.extracted_location
2123
- Image.archive_location: added
2224
- Layer.extracted_to_location -> Layer.extracted_location
2325
- Layer.layer_location -> Layer.archive_location
2426
- Layer.layer_sha256 -> Layer.sha256
27+
2528
Also:
2629
- Layer.layer_id is now the sha256 of the Layer archive
2730
- Image.sha256, os_version, variant: added

README.rst

Lines changed: 23 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,25 @@
1-
container-inspector is a suite of analysis utilities and command line tools for
2-
Docker images, containers, root filesystems and virtual machine images.
1+
**container-inspector** is a suite of analysis utilities and command line tools
2+
for Docker images, containers, root filesystems and virtual machine images.
3+
34
For Docker images, it can process layers and how these relate to each other as
45
well as Dockerfiles.
56

6-
container-inspector provides utilities to:
7+
**container-inspector** provides utilities to:
8+
79
- identify Docker images in a file system, its layers and the related metadata.
810
- given a Docker image, collect and report its metadata.
911
- given a Docker image, extract the layers used to rebuild what how a runtime
1012
rootfs would look.
1113
- find and parse Dockerfiles.
1214
- find how Dockerfiles relate to actual images and their layers.
13-
- given a Docker image, rootfs or Virtual Machime image collect system packages.
14-
15-
15+
- given a Docker image, rootfs or Virtual Machime image collect inventories of
16+
packages and files installed in an image or layer or rootfs
17+
(implemented using a provided callable)
18+
- detect the "distro" of a rootfs of image using os-release files (and an
19+
extensive test suite for these)
20+
- detect the operating system, architecture and
21+
22+
1623
Quick start
1724
-----------
1825

@@ -50,24 +57,24 @@ layer (or selected tagged layer) using a union file system (e.g. AUFS).
5057
In AUFS, any file or directory prefixed with .wh. are "white outs" files deleting
5158
files in the underlying layers.
5259

53-
See the imaged specifications saved in docs/references/
60+
See the image specifications saved in docs/references/
5461

5562

5663
Internal data model
5764
-------------------
58-
- Registry: this is a collection of Image Repositories (related or not).
59-
- Repository: this is a collection of related Images, stored in the same base directory.
6065
- Image: this is a runnable image composed of metadata and a sequence of layers.
6166
- Layer: this is a slice of an image root filesystem with a payload and metadata
62-
63-
We skip entirely Registry and Repository and only expose Image and Layer
67+
- Resource: this a file or directory
6468

6569

6670
Plans
6771
-----
6872
- in progress: support OCI image layout
69-
- in progress: fetch Image from remote registry (already available, but not integrated)
70-
- in progress: collect inventories of packages and files installed in an image or layer
71-
(implemented using a provided callable)
72-
- future: given collected Dockerfiles and Images, build a graph
73-
of the relationships between all these elements.
73+
- improved suport for Windows containers
74+
75+
76+
Related tools
77+
-------------
78+
- Fetching Image from remote registry is available in ScanCode.io
79+
- Extracting VM Image filesystems as archives is available in ExtractCode
80+

0 commit comments

Comments
 (0)