{"id":13461516,"url":"https://github.com/containerd/containerd","last_synced_at":"2026-04-29T09:03:51.249Z","repository":{"id":37270175,"uuid":"46089560","full_name":"containerd/containerd","owner":"containerd","description":"An open and reliable container runtime","archived":false,"fork":false,"pushed_at":"2026-04-28T05:05:25.000Z","size":133733,"stargazers_count":20641,"open_issues_count":569,"forks_count":3882,"subscribers_count":326,"default_branch":"main","last_synced_at":"2026-04-28T05:08:04.339Z","etag":null,"topics":["cncf","containerd","containers","cri","docker","hacktoberfest","kubernetes","oci"],"latest_commit_sha":null,"homepage":"https://containerd.io","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/containerd.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":"code-of-conduct.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":"ROADMAP.md","authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":"NOTICE","maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2015-11-13T00:27:43.000Z","updated_at":"2026-04-28T04:03:43.000Z","dependencies_parsed_at":"2023-09-27T22:16:49.209Z","dependency_job_id":"f346a947-b102-4774-b261-459ed974ef8f","html_url":"https://github.com/containerd/containerd","commit_stats":{"total_commits":8486,"total_committers":696,"mean_commits":"12.192528735632184","dds":0.8971246759368372,"last_synced_commit":"b6d11788da1b00973a361e29ff2694c27d27afbb"},"previous_names":[],"tags_count":293,"template":false,"template_full_name":null,"purl":"pkg:github/containerd/containerd","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/containerd%2Fcontainerd","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/containerd%2Fcontainerd/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/containerd%2Fcontainerd/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/containerd%2Fcontainerd/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/containerd","download_url":"https://codeload.github.com/containerd/containerd/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/containerd%2Fcontainerd/sbom","scorecard":{"id":48470,"data":{"date":"2025-08-11","repo":{"name":"github.com/containerd/containerd","commit":"cbe833eb4d664ac898282cce4c478617850f7aec"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":9,"checks":[{"name":"Maintained","score":10,"reason":"30 commit(s) and 9 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Code-Review","score":10,"reason":"all changesets reviewed","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"CII-Best-Practices","score":5,"reason":"badge detected: Passing","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Token-Permissions","score":10,"reason":"GitHub workflow tokens follow principle of least privilege","details":["Warn: jobLevel 'contents' permission set to 'write': .github/workflows/api-release.yml:62","Warn: jobLevel 'packages' permission set to 'write': .github/workflows/build-test-images.yml:34","Info: jobLevel 'contents' permission set to 'read': .github/workflows/ci.yml:18","Info: jobLevel 'pull-requests' permission set to 'read': .github/workflows/ci.yml:19","Info: jobLevel 'actions' permission set to 'read': .github/workflows/codeql.yml:20","Info: jobLevel 'contents' permission set to 'read': .github/workflows/codeql.yml:21","Warn: jobLevel 'packages' permission set to 'write': .github/workflows/images.yml:22","Warn: jobLevel 'contents' permission set to 'write': .github/workflows/release.yml:136","Info: jobLevel 'contents' permission set to 'read': .github/workflows/windows-hyperv-periodic-trigger.yml:18","Info: jobLevel 'contents' permission set to 'read': .github/workflows/windows-hyperv-periodic.yml:38","Info: jobLevel 'contents' permission set to 'read': .github/workflows/windows-periodic-trigger.yml:18","Info: jobLevel 'contents' permission set to 'read': .github/workflows/windows-periodic.yml:37","Info: topLevel 'contents' permission set to 'read': .github/workflows/api-release.yml:12","Info: topLevel 'contents' permission set to 'read': .github/workflows/build-test-images.yml:23","Info: topLevel 'contents' permission set to 'read': .github/workflows/ci.yml:10","Info: topLevel 'contents' permission set to 'read': .github/workflows/codeql.yml:14","Info: topLevel 'contents' permission set to 'read': .github/workflows/fuzz.yml:4","Info: topLevel 'contents' permission set to 'read': .github/workflows/images.yml:13","Info: topLevel 'contents' permission set to 'read': .github/workflows/links.yml:12","Info: topLevel 'contents' permission set to 'read': .github/workflows/nightly.yml:10","Info: topLevel 'contents' permission set to 'read': .github/workflows/node-e2e.yml:9","Info: topLevel 'contents' permission set to 'read': .github/workflows/release.yml:19","Info: topLevel permissions set to 'read-all': .github/workflows/scorecards.yml:11","Info: topLevel permissions set to 'read-all': .github/workflows/stale.yml:9","Info: topLevel 'contents' permission set to 'read': .github/workflows/windows-hyperv-periodic-trigger.yml:11","Info: topLevel 'contents' permission set to 'read': .github/workflows/windows-hyperv-periodic.yml:32","Info: topLevel 'contents' permission set to 'read': .github/workflows/windows-periodic-trigger.yml:11","Info: topLevel 'contents' permission set to 'read': .github/workflows/windows-periodic.yml:31"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Fuzzing","score":10,"reason":"project is fuzzed","details":["Info: OSSFuzz integration found","Info: GoBuiltInFuzzer integration found: contrib/apparmor/apparmor_fuzzer_test.go:26","Info: GoBuiltInFuzzer integration found: contrib/fuzz/archive_fuzz_test.go:35","Info: GoBuiltInFuzzer integration found: contrib/fuzz/archive_fuzz_test.go:66","Info: GoBuiltInFuzzer integration found: contrib/fuzz/containerd_import_fuzz_test.go:34","Info: GoBuiltInFuzzer integration found: contrib/fuzz/content_fuzz_test.go:97","Info: GoBuiltInFuzzer integration found: contrib/fuzz/content_fuzz_test.go:133","Info: GoBuiltInFuzzer integration found: contrib/fuzz/cri_server_fuzz_test.go:36","Info: GoBuiltInFuzzer integration found: contrib/fuzz/diff_fuzz_test.go:32","Info: GoBuiltInFuzzer integration found: contrib/fuzz/diff_fuzz_test.go:63","Info: GoBuiltInFuzzer integration found: contrib/fuzz/exchange_fuzz_test.go:30","Info: GoBuiltInFuzzer integration found: contrib/fuzz/images_fuzz_test.go:30","Info: GoBuiltInFuzzer integration found: contrib/fuzz/metadata_fuzz_test.go:52","Info: GoBuiltInFuzzer integration found: contrib/fuzz/metadata_fuzz_test.go:111","Info: GoBuiltInFuzzer integration found: contrib/fuzz/metadata_fuzz_test.go:202","Info: GoBuiltInFuzzer integration found: contrib/fuzz/metadata_fuzz_test.go:326","Info: GoBuiltInFuzzer integration found: core/remotes/docker/auth/parse_test.go:89","Info: GoBuiltInFuzzer integration found: core/remotes/docker/config/docker_fuzzer_test.go:25","Info: GoBuiltInFuzzer integration found: core/remotes/docker/converter_fuzz_test.go:29","Info: GoBuiltInFuzzer integration found: core/remotes/docker/fetcher_fuzz_test.go:30","Info: GoBuiltInFuzzer integration found: core/transfer/streaming/stream_test.go:29","Info: GoBuiltInFuzzer integration found: integration/client/container_fuzz_test.go:422","Info: GoBuiltInFuzzer integration found: integration/client/container_fuzz_test.go:438","Info: GoBuiltInFuzzer integration found: integration/client/container_fuzz_test.go:453","Info: GoBuiltInFuzzer integration found: internal/cri/server/images/image_fuzz_test.go:26","Info: GoBuiltInFuzzer integration found: pkg/archive/compression/compression_fuzzer_test.go:24","Info: GoBuiltInFuzzer integration found: pkg/cap/cap_linux_test.go:173","Info: GoBuiltInFuzzer integration found: pkg/filters/filter_test.go:338","Info: GoBuiltInFuzzer integration found: plugins/content/local/content_local_fuzz_test.go:33"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Security-Policy","score":9,"reason":"security policy file detected","details":["Info: security policy file detected: github.com/containerd/.github/SECURITY.md:1","Info: Found linked content: github.com/containerd/.github/SECURITY.md:1","Warn: One or no descriptive hints of disclosure, vulnerability, and/or timelines in security policy","Info: Found text in security policy: github.com/containerd/.github/SECURITY.md:1"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Branch-Protection","score":8,"reason":"branch protection is not maximal on development and all release branches","details":["Info: 'allow deletion' disabled on branch 'main'","Info: 'force pushes' disabled on branch 'main'","Info: required approving review count is 2 on branch 'main'","Warn: codeowners review is not required on branch 'main'","Info: status check found to merge onto on branch 'main'","Info: PRs are required in order to make changes on branch 'main'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Signed-Releases","score":6,"reason":"3 out of the last 5 releases have a total of 3 signed artifacts.","details":["Warn: release artifact v1.7.28 not signed: https://api.github.com/repos/containerd/containerd/releases/235332184","Warn: release artifact v1.6.39 not signed: https://api.github.com/repos/containerd/containerd/releases/234381448","Info: provenance for release artifact: containerd-2.1.4-attestation.intoto.jsonl: https://github.com/containerd/containerd/releases/tag/v2.1.4","Info: provenance for release artifact: containerd-2.0.6-attestation.intoto.jsonl: https://github.com/containerd/containerd/releases/tag/v2.0.6","Warn: release artifact v1.7.28 does not have provenance: https://api.github.com/repos/containerd/containerd/releases/235332184","Warn: release artifact v1.6.39 does not have provenance: https://api.github.com/repos/containerd/containerd/releases/234381448","Info: provenance for release artifact: containerd-2.1.3-attestation.intoto.jsonl: https://github.com/containerd/containerd/releases/tag/v2.1.3"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"SAST","score":10,"reason":"SAST tool is run on all commits","details":["Info: SAST configuration detected: CodeQL","Info: all commits (30) are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Vulnerabilities","score":9,"reason":"1 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2025-3595 / GHSA-vvgc-356p-c3xw"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}},{"name":"Pinned-Dependencies","score":6,"reason":"dependency not pinned by hash detected -- score normalized to 6","details":["Info: Possibly incomplete results: error parsing shell code: a command can only contain words and redirects; encountered (: integration/images/volume-copy-up/Dockerfile_windows:31-33","Info: Possibly incomplete results: error parsing shell code: a command can only contain words and redirects; encountered (: integration/images/volume-ownership/Dockerfile_windows:32-35","Warn: third-party GitHubAction not pinned by hash: .github/workflows/windows-hyperv-periodic-trigger.yml:27: update your workflow using https://app.stepsecurity.io/secureworkflow/containerd/containerd/windows-hyperv-periodic-trigger.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/windows-periodic-trigger.yml:27: update your workflow using https://app.stepsecurity.io/secureworkflow/containerd/containerd/windows-periodic-trigger.yml/main?enable=pin","Warn: containerImage not pinned by hash: .devcontainer/Dockerfile:16: pin your Docker image by updating mcr.microsoft.com/devcontainers/base:1-ubuntu-22.04 to mcr.microsoft.com/devcontainers/base:1-ubuntu-22.04@sha256:e6cac7682e119650eb1d55f403d4f27febee89782ec7eaea2b9100b2c543c39c","Warn: containerImage not pinned by hash: .github/workflows/release/Dockerfile:19","Warn: containerImage not pinned by hash: .github/workflows/release/Dockerfile:22","Warn: containerImage not pinned by hash: .github/workflows/release/Dockerfile:35","Warn: containerImage not pinned by hash: .github/workflows/release/Dockerfile:36","Warn: containerImage not pinned by hash: .github/workflows/release/Dockerfile:41","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:40","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:43","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:55","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:64","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:69","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:75","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:91","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:106","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:118","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:134","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:147","Warn: containerImage not pinned by hash: contrib/Dockerfile.test:163","Warn: containerImage not pinned by hash: integration/images/volume-copy-up/Dockerfile:17","Warn: containerImage not pinned by hash: integration/images/volume-copy-up/Dockerfile_windows:16","Warn: containerImage not pinned by hash: integration/images/volume-ownership/Dockerfile:15: pin your Docker image by updating ubuntu to ubuntu@sha256:7c06e91f61fa88c08cc74f7e1b7c69ae24910d745357e0dfe1d2c0322aaf20f9","Warn: containerImage not pinned by hash: integration/images/volume-ownership/Dockerfile_windows:16","Warn: goCommand not pinned by hash: vendor/github.com/json-iterator/go/build.sh:10","Info:  52 out of  52 GitHub-owned GitHubAction dependencies pinned","Info:  33 out of  35 third-party GitHubAction dependencies pinned","Info:   1 out of  23 containerImage dependencies pinned","Info:  11 out of  12 goCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}}]},"last_synced_at":"2025-08-14T23:14:28.190Z","repository_id":37270175,"created_at":"2025-08-14T23:14:28.190Z","updated_at":"2025-08-14T23:14:28.190Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":32375624,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-28T09:24:15.638Z","status":"ssl_error","status_checked_at":"2026-04-28T09:24:15.071Z","response_time":56,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cncf","containerd","containers","cri","docker","hacktoberfest","kubernetes","oci"],"created_at":"2024-07-31T11:00:41.954Z","updated_at":"2026-04-29T09:03:51.244Z","avatar_url":"https://github.com/containerd.png","language":"Go","funding_links":[],"categories":["Go","Container Support","Misc","HarmonyOS","CRI implementations:","其他__大数据","kubernetes","docker","oci","Repositories","Runtimes \u0026 Platforms"],"sub_categories":["[Jenkins](#jenkins)","Windows Manager","网络服务_其他","Misc"],"readme":"![containerd banner light mode](https://raw.githubusercontent.com/cncf/artwork/master/projects/containerd/horizontal/color/containerd-horizontal-color.png#gh-light-mode-only)\n![containerd banner dark mode](https://raw.githubusercontent.com/cncf/artwork/master/projects/containerd/horizontal/white/containerd-horizontal-white.png#gh-dark-mode-only)\n\n[![PkgGoDev](https://pkg.go.dev/badge/github.com/containerd/containerd/v2)](https://pkg.go.dev/github.com/containerd/containerd/v2)\n[![Build Status](https://github.com/containerd/containerd/actions/workflows/ci.yml/badge.svg?event=merge_group)](https://github.com/containerd/containerd/actions?query=workflow%3ACI+event%3Amerge_group)\n[![Nightlies](https://github.com/containerd/containerd/workflows/Nightly/badge.svg)](https://github.com/containerd/containerd/actions?query=workflow%3ANightly)\n[![Go Report Card](https://goreportcard.com/badge/github.com/containerd/containerd/v2)](https://goreportcard.com/report/github.com/containerd/containerd/v2)\n[![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/1271/badge)](https://bestpractices.coreinfrastructure.org/projects/1271)\n[![OpenSSF Scorecard](https://api.scorecard.dev/projects/github.com/containerd/containerd/badge)](https://scorecard.dev/viewer/?uri=github.com/containerd/containerd)\n[![Check Links](https://github.com/containerd/containerd/actions/workflows/links.yml/badge.svg)](https://github.com/containerd/containerd/actions/workflows/links.yml)\n\ncontainerd is an industry-standard container runtime with an emphasis on simplicity, robustness, and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, low-level storage and network attachments, etc.\n\ncontainerd is a member of CNCF with ['graduated'](https://landscape.cncf.io/?selected=containerd) status.\n\ncontainerd is designed to be embedded into a larger system, rather than being used directly by developers or end-users.\n\n![architecture](docs/historical/design/architecture.png)\n\n## Announcements\n\n### Now Recruiting\n\nWe are a large inclusive OSS project that is welcoming help of any kind shape or form:\n* Documentation help is needed to make the product easier to consume and extend.\n* We need OSS community outreach/organizing help to get the word out; manage\nand create messaging and educational content; and help with social media, community forums/groups, and google groups.\n* We are actively inviting new [security advisors](https://github.com/containerd/project/blob/main/GOVERNANCE.md#security-advisors) to join the team.\n* New subprojects are being created, core and non-core that could use additional development help.\n* Each of the [containerd projects](https://github.com/containerd) has a list of issues currently being worked on or that need help resolving.\n  - If the issue has not already been assigned to someone or has not made recent progress, and you are interested, please inquire.\n  - If you are interested in starting with a smaller/beginner-level issue, look for issues with an `exp/beginner` tag, for example [containerd/containerd beginner issues.](https://github.com/containerd/containerd/issues?q=is%3Aissue+is%3Aopen+label%3Aexp%2Fbeginner)\n\n## Getting Started\n\nSee our documentation on [containerd.io](https://containerd.io):\n* [for ops and admins](docs/ops.md)\n* [namespaces](docs/namespaces.md)\n* [client options](docs/client-opts.md)\n\nTo get started contributing to containerd, see [CONTRIBUTING](CONTRIBUTING.md).\n\nIf you are interested in trying out containerd see our example at [Getting Started](docs/getting-started.md).\n\n## Nightly builds\n\nThere are nightly builds available for download [here](https://github.com/containerd/containerd/actions?query=workflow%3ANightly).\nBinaries are generated from `main` branch every night for `Linux` and `Windows`.\n\nPlease be aware: nightly builds might have critical bugs, it's not recommended for use in production and no support provided.\n\n## Kubernetes (k8s) CI Dashboard Group\n\nThe [k8s CI dashboard group for containerd](https://testgrid.k8s.io/containerd) contains test results regarding\nthe health of kubernetes when run against main and a number of containerd release branches.\n\n- [containerd-periodics](https://testgrid.k8s.io/containerd-periodic)\n\n## Runtime Requirements\n\nRuntime requirements for containerd are very minimal. Most interactions with\nthe Linux and Windows container feature sets are handled via [runc](https://github.com/opencontainers/runc) and/or\nOS-specific libraries (e.g. [hcsshim](https://github.com/Microsoft/hcsshim) for Microsoft).\nThe current required version of `runc` is described in [RUNC.md](docs/RUNC.md).\n\nThere are specific features\nused by containerd core code and snapshotters that will require a minimum kernel\nversion on Linux. With the understood caveat of distro kernel versioning, a\nreasonable starting point for Linux is a minimum 4.x kernel version.\n\nThe overlay filesystem snapshotter, used by default, uses features that were\nfinalized in the 4.x kernel series. If you choose to use btrfs, there may\nbe more flexibility in kernel version (minimum recommended is 3.18), but will\nrequire the btrfs kernel module and btrfs tools to be installed on your Linux\ndistribution.\n\nTo use Linux checkpoint and restore features, you will need `criu` installed on\nyour system. See more details in [Checkpoint and Restore](#checkpoint-and-restore).\n\nBuild requirements for developers are listed in [BUILDING](BUILDING.md).\n\n\n## Supported Registries\n\nAny registry which is compliant with the [OCI Distribution Specification](https://github.com/opencontainers/distribution-spec)\nis supported by containerd.\n\nFor configuring registries, see [registry host configuration documentation](docs/hosts.md)\n\n## Features\n\nFor a detailed overview of containerd's core concepts and the features it supports,\nplease refer to the [FEATURES.MD](./docs/features.md) document.\n\n### Releases and API Stability\n\nPlease see [RELEASES.md](RELEASES.md) for details on versioning and stability\nof containerd components.\n\nDownloadable 64-bit Intel/AMD binaries of all official releases are available on\nour [releases page](https://github.com/containerd/containerd/releases).\n\nFor other architectures and distribution support, you will find that many\nLinux distributions package their own containerd and provide it across several\narchitectures, such as [Canonical's Ubuntu packaging](https://launchpad.net/ubuntu/bionic/+package/containerd).\n\n#### Enabling command auto-completion\n\nStarting with containerd 1.4, the urfave client feature for auto-creation of bash and zsh\nautocompletion data is enabled. To use the autocomplete feature in a bash shell for example, source\nthe autocomplete/ctr file in your `.bashrc`, or manually like:\n\n```\n$ source ./contrib/autocomplete/ctr\n```\n\n#### Distribution of `ctr` autocomplete for bash and zsh\n\nFor bash, copy the `contrib/autocomplete/ctr` script into\n`/etc/bash_completion.d/` and rename it to `ctr`. The `zsh_autocomplete`\nfile is also available and can be used similarly for zsh users.\n\nProvide documentation to users to `source` this file into their shell if\nyou don't place the autocomplete file in a location where it is automatically\nloaded for the user's shell environment.\n\n### CRI\n\n`cri` is a [containerd](https://containerd.io/) plugin implementation of the Kubernetes [container runtime interface (CRI)](https://github.com/kubernetes/cri-api/blob/master/pkg/apis/runtime/v1/api.proto). With it, you are able to use containerd as the container runtime for a Kubernetes cluster.\n\n![cri](./docs/cri/cri.png)\n\n#### CRI Status\n\n`cri` is a native plugin of containerd. Since containerd 1.1, the cri plugin is built into the release binaries and enabled by default.\n\nThe `cri` plugin has reached GA status, representing that it is:\n* Feature complete\n* Works with Kubernetes 1.10 and above\n* Passes all [CRI validation tests](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-node/cri-validation.md).\n* Passes all [node e2e tests](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-node/e2e-node-tests.md).\n* Passes all [e2e tests](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-testing/e2e-tests.md).\n\nSee results on the containerd k8s [test dashboard](https://testgrid.k8s.io/containerd)\n\n#### Validating Your `cri` Setup\nA Kubernetes incubator project, [cri-tools](https://github.com/kubernetes-sigs/cri-tools), includes programs for exercising CRI implementations. More importantly, cri-tools includes the program `critest` which is used for running [CRI Validation Testing](https://github.com/kubernetes/community/blob/master/contributors/devel/sig-node/cri-validation.md).\n\n#### CRI Guides\n* [Installing with Ansible and Kubeadm](contrib/ansible/README.md)\n* [For Non-Ansible Users, Performing a Custom Installation Using the Release Tarball and Kubeadm](docs/getting-started.md)\n* [CRI Plugin Testing Guide](./docs/cri/testing.md)\n* [Debugging Pods, Containers, and Images with `crictl`](./docs/cri/crictl.md)\n* [Configuring `cri` Plugins](./docs/cri/config.md)\n* [Configuring containerd](https://github.com/containerd/containerd/blob/main/docs/man/containerd-config.8.md)\n\n### Communication\n\nFor async communication and long-running discussions please use issues and pull requests on the GitHub repo.\nThis will be the best place to discuss design and implementation.\n\nFor sync communication catch us in the `#containerd` and `#containerd-dev` Slack channels on Cloud Native Computing Foundation's (CNCF) Slack - `cloud-native.slack.com`. Everyone is welcome to join and chat. [Get Invite to CNCF Slack.](https://slack.cncf.io)\n\nJoin our next community meeting hosted on Zoom. The schedule is posted on the [CNCF Calendar](https://www.cncf.io/calendar/) (search 'containerd' to filter).\n\n### Security audit\n\nSecurity audits for the containerd project are hosted on our website. Please see the [security page at containerd.io](https://containerd.io/security/) for more information.\n\n### Reporting security issues\n\nPlease follow the instructions at [containerd/project](https://github.com/containerd/project/blob/main/SECURITY.md#reporting-a-vulnerability)\n\n## Licenses\n\nThe containerd codebase is released under the [Apache 2.0 license](LICENSE).\nThe README.md file and files in the \"docs\" folder are licensed under the\nCreative Commons Attribution 4.0 International License. You may obtain a\ncopy of the license, titled CC-BY-4.0, at http://creativecommons.org/licenses/by/4.0/.\n\n## Project details\n\n**containerd** is the primary open source project within the broader containerd GitHub organization.\nHowever, all projects within the repo have common maintainership, governance, and contributing\nguidelines which are stored in a `project` repository commonly for all containerd projects.\n\nPlease find all these core project documents, including the:\n * [Project governance](https://github.com/containerd/project/blob/main/GOVERNANCE.md),\n * [Maintainers](https://github.com/containerd/project/blob/main/MAINTAINERS),\n * and [Contributing guidelines](https://github.com/containerd/project/blob/main/CONTRIBUTING.md)\n\ninformation in our [`containerd/project`](https://github.com/containerd/project) repository.\n\n## Adoption\n\nInterested to see who is using containerd? Are you using containerd in a project?\nPlease add yourself via pull request to our [ADOPTERS.md](./ADOPTERS.md) file.\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcontainerd%2Fcontainerd","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fcontainerd%2Fcontainerd","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fcontainerd%2Fcontainerd/lists"}