Fact-checked by Grok 2 weeks ago

Open Container Initiative

The Open Container Initiative (OCI) is an open governance project hosted by the , dedicated to developing vendor-neutral industry standards for formats and runtimes to ensure portability, , and in -based . Launched on June 22, 2015, at DockerCon, the OCI was established by a coalition of technology leaders including , Apcera, , CoreOS, , , , , , , , , , Joyent, Mesosphere, , Pivotal, Rancher Labs, , and . contributed its runtime implementation, known as runc, as the foundational reference for the standards. The OCI's core specifications include the Runtime Specification, which defines the configuration and execution of a container's filesystem bundle in a runtime-agnostic manner; the Image Specification, which outlines the structure of container images comprising manifests, configurations, and layered filesystems; and the Distribution Specification, which standardizes for registries to distribute container content, reaching version 1.0 in May 2021. In July 2017, the project released version 1.0 of its runtime and image specifications, providing a stable foundation for cross-vendor container portability and enabling developers to build compatible tools and platforms without proprietary lock-in. These standards have been widely adopted in cloud-native ecosystems, powering tools like and container engines across major providers. The specifications continue to evolve, with the latest versions as of November 2025 being Runtime v1.3.0, Image v1.1.1, and Distribution v1.1.1.

History and Background

Formation and Founding

The Open Container Initiative (OCI) was announced on June 20, 2015, by Docker, Inc., in collaboration with a coalition of industry leaders, under the auspices of the , to establish open standards for container formats and runtimes. This initiative emerged amid the rapid growth of container technologies, which were revolutionizing application portability but risking fragmentation due to competing proprietary and open-source implementations, such as Docker's format and CoreOS's appc specification. As part of the launch, Docker donated its container image format, runtime code (including the runc implementation derived from libcontainer), and related specifications to the project, representing a strategic pivot toward greater openness while retaining development of its client, engine, and orchestration tools. The founding members included , Apcera, , CoreOS, , , , , , , , , , , the , , , Pivotal, , , and , forming a diverse group committed to collaborative . The primary focus was on developing minimal, vendor-neutral specifications to ensure and prevent lock-in, allowing containers to operate seamlessly across operating systems, platforms, and environments. Early challenges included addressing Docker's evolution from a predominantly ecosystem to a more open model, alongside the urgent need for unified standards as container adoption surged, supporting thousands of tools and applications. This effort aimed to preserve the core promise of —portability and innovation—without tying them to any single vendor or technology stack.

Evolution and Key Milestones

Following its formation in 2015, the Open Container Initiative (OCI) rapidly advanced toward standardization with the release of its first Runtime Specification version 1.0 on July 17, 2017, which established a vendor-neutral framework for runtime bundles, defining the lifecycle and for low-level runtimes like runc. This milestone built on contributions from founding members such as and CoreOS, who guided the initial development of portable standards. Concurrently, the Image Specification version 1.0.0 was introduced in July 2017, providing a standardized format for images that includes layers for filesystem changes, manifests for image , and media types for content identification, enabling interoperability across tools and platforms. In 2018, the OCI expanded its scope with the launch of the Distribution Specification project on April 9, aimed at standardizing secure protocols for pushing and pulling container images between registries and clients, addressing interoperability in distributed environments; this specification reached version 1.0 in May 2021. This period also marked deepening integration with Kubernetes starting in 2018, as the Container Runtime Interface (CRI) enabled OCI-compliant runtimes like CRI-O and containerd to serve as drop-in replacements for Docker, facilitating seamless adoption in orchestration workflows. The OCI specifications continued to evolve through iterative updates, with the Runtime Specification reaching version 1.2.0 on February 18, 2024, incorporating security enhancements such as improved ID mapping via idmap and ridmap mount options to mitigate privilege escalation risks in Linux environments, and advancing to version 1.3 on November 4, 2025, with improvements including better support for non-Linux operating systems like FreeBSD. The Image Specification was updated to version 1.1.1 on April 2, 2025. Amid a broader surge in cloud-native adoption during 2020—driven by the shift to remote work and accelerated digital transformation, where container usage in production rose to 92% according to the Cloud Native Computing Foundation survey—the OCI standards solidified their role as the de facto foundation for portable, secure container ecosystems.

Goals and Principles

Core Objectives

The Open Container Initiative (OCI) was established with the primary goal of developing open, universal standards for container images and runtimes, enabling seamless portability across diverse tools, platforms, and vendors without proprietary dependencies. This initiative addresses the need for vendor-neutral specifications that promote and openness in container technology, allowing containers to operate consistently from development environments to production deployments. Key objectives include ensuring with existing implementations, such as through the adoption of reference runtimes like runC, to facilitate smooth transitions for users and developers. OCI standards also support multiple architectures, including x86 and , to accommodate a wide range of and operating systems, thereby enhancing portability across clouds, platforms, and CPU types. Additionally, the specifications emphasize secure and efficient container execution by incorporating pluggable isolation mechanisms and for trust and auditing, minimizing fragmentation that plagued earlier tools like and Docker's proprietary formats. A central aim is to decouple container image formats from runtime execution, fostering independent innovation in both areas while maintaining minimal, stable standards that reduce . By limiting its scope to core image and runtime elements, OCI cultivates an where can be built, distributed, and run uniformly, supporting broader industry adoption and reducing the inconsistencies observed in the pre-OCI container landscape.

Design Principles

The Open Container Initiative (OCI) design principles emphasize minimalism in specification development, focusing on defining only the essential interfaces necessary for container formats and runtimes while allowing for extensibility through annotations and custom configurations. This approach ensures that the standards remain and stable, enabling innovation and experimentation by implementers without imposing overly prescriptive requirements. By prioritizing a few core functions, the specifications avoid unnecessary complexity, fostering widespread adoption across diverse ecosystems. Security is a foundational in OCI standards, with an emphasis on pluggable mechanisms and robust to support trust, image auditing, and application identity verification. The specifications incorporate in image formats to enhance integrity and tamper resistance, while guidelines promote secure without delving into vendor-specific implementations. This security-oriented philosophy aims to provide a solid baseline for environments, mitigating risks in production deployments. Interoperability serves as a core tenet, requiring that OCI standards integrate seamlessly with existing container tools and workflows, such as those from and containerd, thereby avoiding the need for extensive rewrites or migrations. The principles mandate portability across various hardware architectures, operating systems, and environments, ensuring that containers can run consistently regardless of the underlying . This focus on compatibility promotes a unified container ecosystem, reducing fragmentation and enhancing developer productivity. OCI employs a semantic versioning strategy for its specifications to maintain stability and , with clear policies that allow gradual without breaking existing implementations. All specifications are released under the Apache 2.0 license, encouraging open collaboration and contributions from a diverse of stakeholders. This community-driven underscores the principles of and inclusivity, where technical decisions are informed by broad input to refine standards iteratively.

Technical Specifications

Image Specification

The OCI Image Specification defines the standardized format for container images, ensuring interoperability across tools and platforms by specifying how images are packaged, referenced, and verified. An OCI image consists of a manifest that describes its configuration, layers, and architecture, along with optional indexes for multi-platform support. This specification emphasizes content-addressability through cryptographic hashes, enabling secure distribution and immutability. At its core, the image manifest is a JSON document with the media type application/vnd.oci.image.manifest.v1+json, which outlines the image's components. It includes a required descriptor for the image configuration, typically using the media type application/vnd.oci.image.config.v1+json, and an ordered array of layer descriptors representing filesystem changes. Layers use media types such as application/vnd.oci.image.layer.v1.tar for uncompressed tar archives or application/vnd.oci.image.layer.v1.tar+gzip for gzipped variants, encapsulating diffs that build the image's root filesystem incrementally. The manifest also specifies the target architecture and operating system, ensuring compatibility with runtime environments. The layering model treats images as a sequence of immutable, content-addressable layers, where each layer is a archive of filesystem modifications applied atop the previous one. Integrity is maintained via diff IDs—SHA-256 hashes of unpacked layer contents—listed in the to verify the reconstruction of the root filesystem. This approach supports efficient and transfer by allowing shared layers across images. Multi-platform manifests, enabled through an optional image index with media type application/vnd.oci.image.index.v1+json, have been supported since version 1.0.1 in 2018, allowing a single reference to point to architecture-specific variants like amd64 or arm64. Descriptors are fundamental JSON objects that reference image artifacts, each containing a media type, size, and digest—typically a SHA-256 —for unambiguous and . This ensures immutability, as any alteration to the content would change the digest, preventing tampering during or . Annotations, optional key-value pairs in descriptors and manifests, provide such as build timestamps or human-readable descriptions without affecting core functionality. The specification also accommodates extensions like foreign layers through unrecognized media types, which must be preserved without interpretation, and support for referencing external content. The specification's version history began with v1.0.0 in July 2017, establishing the foundational and structure. 1.0.1, released on November 7, 2017, refined multi-platform capabilities. 1.0.2, released on November 17, 2021, provided minor updates and clarifications. The latest v1.1.1, released on April 2, 2025, introduced subject descriptors in —optional references to another for attestation or signing purposes—enhancing security for signed images while maintaining .

Runtime Specification

The OCI Runtime Specification defines the interface and behaviors for container runtimes, standardizing how are created, started, and managed on a host system. It specifies the configuration, execution environment, and lifecycle of , ensuring portability across compliant runtimes such as runc. This enables consistent operation regardless of the underlying container engine, focusing on low-level details like process execution and isolation mechanisms. A core concept in the specification is the runtime bundle, which is a directory containing all files necessary to launch a . This bundle includes a required config.json file that defines the container's configuration in a platform-agnostic format, covering aspects such as the executable process, variables, , mounts, hooks, and resource limits. The bundle also contains a rootfs subdirectory representing the container's root filesystem, which is unpacked from an OCI image and provides the isolated for the application. For example, the root field in config.json points to this rootfs, allowing the to set up the container's filesystem accordingly. The specification includes a hooks system to allow customization at key lifecycle points without modifying the core runtime. Hooks are defined in the hooks section of config.json as an array of objects, each specifying a path to an executable script or binary and optional arguments. There are three types: prestart hooks, which run after container creation but before the process starts (e.g., for setting up networking); poststart hooks, executed after the user process begins but before the start command returns (useful for monitoring or logging); and poststop hooks, invoked after the container stops but before cleanup (e.g., for resource teardown). Hooks receive JSON data via stdin, including annotations from config.json for passing contextual information like container ID or environment details, and must return zero for success to avoid halting the lifecycle. If a poststart or poststop hook fails, the runtime logs a warning but continues, while prestart failures prevent startup. For resource controls, the specification integrates with primitives to enforce isolation and limits, primarily detailed in the Linux-specific configuration schema. (control groups) are used to manage , supporting both v1 and v2 hierarchies; the linux section in config.json includes a cgroupsPath field to specify the cgroup path, along with resources for setting CPU shares, memory limits, and block I/O throttling (e.g., "memory": { "limit": 536870912 } for 512 ). provide , configurable via the namespaces array (e.g., "type": "pid" for namespace), which the must create or join as specified. Capabilities manage privileges, with the capabilities field listing bounding, effective, and permitted sets (e.g., dropping CAP_SYS_ADMIN for ), ensuring the container process runs with minimal elevated rights. These features collectively enable secure, resource-constrained execution. State reporting ensures visibility into container status, with runtimes required to output a JSON object upon operations like create, start, or state. The state JSON includes fields such as ociVersion (the spec version), id (unique container identifier), status (e.g., "created", "running", "stopped"), pid (process ID of the container's init process), bundle (path to the runtime bundle directory), and annotations (key-value pairs from config). For instance, after starting, the output might show "pid": 1234 and "bundle": "/path/to/bundle", allowing higher-level tools to monitor and manage containers programmatically. The specification's versioning follows semantic rules, with v1.0.0 released on July 19, 2017, establishing the foundational elements like bundle structure, basic lifecycle, and Linux-specific isolation. Version 1.1.0, released on July 21, 2023, added support for , time namespaces, ID-mapped mounts, notify, and other enhancements. Subsequent updates have refined these; v1.2.0, released on February 13, 2024, enhanced security through additions like idmap and ridmap mount options for user namespace mappings and introduced potentiallyUnsafeConfigAnnotations to flag risky annotations that could alter behavior. These changes build on prior versions while maintaining for v1.x runtimes.

Distribution Specification

The Open Container Initiative (OCI) Distribution Specification defines a standardized protocol for distributing container images and other content across registries, enabling efficient pushing and pulling operations over HTTP/HTTPS. It builds on the Docker Registry HTTP API V2, providing a content-addressable storage model where resources like manifests, blobs, and tags are fetched and uploaded using cryptographic digests to ensure integrity and deduplication. This specification facilitates among container registries by specifying endpoints, request formats, and response behaviors, while remaining agnostic to the underlying content types beyond basic image structures. The core operates under the /v2/ , supporting operations for cataloging , managing tags, and handling and . For instance, a GET request to /v2/_catalog retrieves a list of available , returning a array of names with a 200 status if successful. Tag listing uses GET /v2/<name>/tags/list?n=<integer>&last=<tag>, which responds with a object containing repository tags and optionally the next batch for pagination. retrieval occurs via GET /v2/<name>/manifests/<reference>, where <reference> can be a digest (e.g., sha256:abc...) or tag, returning the manifest in OCI Image Specification format with a Docker-Content-Digest header for ; uploads use PUT to the same path, yielding 201 Created upon success. operations include GET/HEAD /v2/<name>/blobs/<digest> for downloads (200 or 404 Not Found) and POST/PUT /v2/<name>/blobs/uploads/ for initiating and completing uploads (202 for initiation, 201 Created for completion), enabling resumable transfers. Deletion is supported for via DELETE /v2/<name>/manifests/<digest>, returning 202 to indicate asynchronous processing. These endpoints ensure content-addressable fetches, where digests uniquely identify immutable resources across . Authentication and authorization are handled through standard HTTP mechanisms aligned with the Docker Registry HTTP API V2, requiring clients to respond to 401 Unauthorized challenges via the WWW-Authenticate header. Supported schemes include Basic authentication for simple username/password flows and Bearer tokens for OAuth 2.0-based authorization, with realms specifying the authentication endpoint (e.g., Bearer realm="https://auth.example.com/token",service="registry.example.com"). Registries may enforce scopes for granular access, such as repository:foo/bar:pull for reading or push for writing, ensuring secure interactions without mandating a specific identity provider. To optimize transfers, the specification includes blob mounting for deduplication, allowing clients to reference existing blobs in other repositories via PUT /v2/<name>/blobs/uploads/?mount=<digest>&from=<other_name>, which returns 201 Created if the mount succeeds or 202 Accepted for further upload if needed. This feature reduces bandwidth by reusing shared layers across images. Multi-architecture support is enabled through image manifests and indexes that list platform-specific variants (e.g., amd64, arm64), allowing registries to serve appropriate blobs based on client requests without duplicating common layers. Security is prioritized through mandatory digest verification, where clients must validate the cryptographic (e.g., SHA-256) of fetched content against the requested digest to detect tampering or corruption, with mismatches triggering errors like 400 Bad Request. Optional content signing integrates with standards like in-toto or SLSA for attestation, enabling registries to store and verify signatures as separate artifacts referenced in manifests, though implementation remains registry-specific. The specification was initially released in April 2018 as an extension to standardize image distribution protocols. It achieved version 1.0 in May 2021, formalizing the core API after community review. Subsequent updates include v1.0.1 in November 2021 for minor fixes, v1.1.0 in February 2024 introducing referrer lists (via GET /v2/<name>/referrers/<digest>) for discovering related artifacts like signatures or attestations, along with improved error handling such as detailed JSON error bodies for better diagnostics. The latest version, v1.1.1, was released in March 2025, incorporating refinements to authentication challenges and upload resumption for enhanced reliability.

Governance and Community

Organizational Structure

The Open Container Initiative (OCI) operates as a lightweight, open governance structure under the auspices of the , designed to foster vendor-neutral standards for container technology without direct affiliation as a project under the (CNCF), though it collaborates closely with CNCF initiatives that implement its specifications. This setup ensures broad industry participation while maintaining focus on developing minimal, open specifications for formats and runtimes. At the core of OCI's decision-making is the Technical Oversight Board (TOB), a body composed of vendor-neutral individuals elected by maintainers of OCI projects for staggered two-year terms, with approximately half the seats up for election annually. As of 2025, the TOB consists of nine members, including representatives from AWS, Cisco, Docker, Google, IBM, Microsoft, Red Hat, and SUSE, as well as independent contributors; Samuel Karp (Google) serves as chair. The TOB is responsible for providing high-level oversight of technical leadership, resolving conflicts or procedural violations, approving specification changes, and directing project evolution such as adding or reorganizing initiatives. A chair, elected annually from among the members, coordinates meetings—typically held infrequently via phone, email, or voting tools—and requires a two-thirds majority for decisions, emphasizing consensus-driven processes. The TOB also oversees the Technical Direction Committee (TDC), which handles day-to-day technical coordination across projects. Development of OCI specifications occurs through dedicated efforts analogous to working groups, centered on the three core areas: , , and . These include the Runtime Specification project, maintained primarily by Docker's team but with multi-vendor input for defining container execution behaviors; the Image Specification project, focused on portable container formats; and the Distribution Specification project, established in 2018 to standardize transport and registry interactions. Maintainers from diverse companies collaborate via repositories and mailing lists to propose, review, and iterate on changes, ensuring specifications remain implementation-agnostic. All OCI specifications and related code are licensed under the 2.0, promoting permissive use, modification, and distribution while requiring attribution of original contributions. Contributors must adhere to the 's processes, including a Developer Certificate of Origin (DCO) for each commit to affirm originality. This framework supports open participation while protecting the project's . Key governance milestones include the OCI's formation on June 22, 2015, by and a of leaders to container standards from a Docker-centric model to a multi-vendor, open-source approach under neutral oversight. In December 2015, the project formalized its technical governance structure, including the of the TOB and initial working efforts on and specifications, enhancing collaborative . The release of version 1.0 specifications in July 2017 marked a pivotal achievement in stabilizing core standards, further solidifying OCI's role in promoting across the ecosystem.

Contributions and Participation

The Open Container Initiative (OCI) facilitates contributions primarily through its repositories, where individuals and organizations propose changes via pull requests to key specification projects, including the runtime-spec, image-spec, and distribution-spec. Commits also require a Developer Certificate of Origin (DCO) sign-off, typically added using git commit -s, to certify that the work is original and compliant with project standards. Proposed changes, especially nontrivial ones, are discussed on the OCI mailing list before implementation, followed by review and approval from project maintainers to ensure alignment with OCI goals. OCI projects have engaged over 2,999 contributors globally, with active involvement from more than 100 individuals affiliated with leading organizations such as (through Podman and CRI-O implementations), (via containerd runtime), and (including containerd integrations for hybrid environments). These contributors span diverse roles, from core maintainers like Aleksa Sarai () to engineers enhancing interoperability across platforms. Community engagement extends to events and forums, including presentations and workshops at KubeCon + CloudNativeCon, where OCI members discuss specification evolution and interoperability. Weekly open community meetings for OCI contributors and maintainers, held via Zoom on Thursdays at 10:00 AM US Pacific Time, provide opportunities for real-time collaboration on agendas shared through HackMD. Issue tracking on GitHub repositories supports targeted enhancements, such as ongoing work for Windows container support in the runtime specification to broaden platform compatibility. In 2018, OCI partnered with Docker to sponsor scholarships for underrepresented individuals to attend conferences like DockerCon, covering travel, accommodations, and mentorship to encourage broader participation. The community draws global contributors from international firms, including and , promoting multilingual discussions on and the mailing list to enhance accessibility and worldwide adoption. Notable impacts from contributions include security-focused audits, such as the 2019 Cure53 of —an OCI-compliant —which identified a critical (CVE-2019-19921) related to file path handling, leading to specification refinements for improved container isolation without altering core definitions. Such efforts underscore how input drives iterative enhancements to OCI standards, enhancing overall ecosystem and reliability.

Adoption and Impact

Industry Adoption

The Open Container Initiative (OCI) standards have seen widespread implementation among core container tools, enabling interoperability and portability. Docker achieved full compliance with the OCI specifications in 2017, aligning its and formats to the newly released v1.0 standards. Containerd, a high-level container , uses OCI-compliant runtimes like runc as its default, facilitating robust container management in production environments. CRI-O serves as a lightweight Kubernetes-specific that implements the Container Runtime Interface (CRI) exclusively for OCI-compatible backends, ensuring seamless integration with clusters. Podman, developed by , provides rootless container execution while fully supporting OCI and , allowing daemonless operations without elevated privileges. Major cloud providers have integrated OCI standards into their container services, enhancing scalability and vendor neutrality. AWS Fargate supports OCI images and runtimes, including advanced features like Seekable OCI for faster container startups by enabling of image layers. Google Kubernetes Engine (GKE) relies on OCI-compliant runtimes such as containerd and CRI-O as defaults, allowing users to deploy and orchestrate across 's infrastructure. Azure Container Instances (ACI) pulls and runs OCI-compatible images from public and private registries, supporting serverless container deployments without underlying management. Adoption of OCI standards has grown significantly since their inception, transitioning from a Docker-dominated in to broad industry support. By , over 90% of organizations engaged in cloud-native application development relied on , with notable growth (17-35%) in the use of industry-standard runtimes aligned with OCI specifications. , holding approximately 92% of the container orchestration market share as of 2025, exemplifies this shift by mandating OCI compliance through its CRI for runtimes like containerd and CRI-O. A prominent is Red Hat's migration in (RHEL) 8, where the company deprecated the daemon in favor of Podman to achieve full OCI compliance and enhance through rootless containers. This transition, initiated in 2019, enabled enterprises to build, run, and migrate OCI-standard containers without proprietary dependencies, simplifying deployments in hybrid environments. Early adoption faced challenges related to the maturity of OCI specifications, which were still evolving post-2015 formation and v1.0 release in 2017, leading to issues in diverse toolchains. These hurdles have been largely addressed through the OCI program, which verifies runtimes and images for compliance using tools like runtime-tools and image-tools, resulting in widespread certifications for tools like , containerd, and Podman.

Influence on Ecosystem

The Open Container Initiative (OCI) has established itself as the for container image formats and runtime specifications, enabling interoperability across diverse container ecosystems. This standardization has profoundly influenced (CNCF) projects, particularly , where the Container Runtime Interface (CRI) mandates compliance with OCI specifications to integrate runtimes like containerd and CRI-O. Similarly, leverages OCI-compliant registries for packaging and distributing applications, facilitating seamless deployment in environments. OCI's specifications have spurred the development of extensions and derivatives that extend its reach. Runc serves as the of the OCI Runtime Specification, providing a lightweight CLI tool for spawning and running in compliance with the standard. Buildah, meanwhile, enables the creation of OCI images without requiring a full container like , supporting rootless and daemonless workflows for secure image building. In the realm of and , OCI plays a pivotal role in frameworks such as Supply-chain Levels for Software Artifacts (SLSA), where OCI artifacts and registries are integrated for , signing, and verification to mitigate tampering risks. This has facilitated in regulated industries, including , by enabling secure distribution and with standards for artifact in high-stakes environments. Looking ahead, OCI continues to evolve through ongoing specification updates, with the Runtime Specification reaching version 1.3.0 in November 2025 to incorporate enhancements for modern workloads, including official support for as a platform, enhancing portability for cloud-native workloads. Efforts are underway to support advanced features like , as seen in projects like Confidential Containers that adapt OCI images for encrypted, isolated execution in trusted environments. For 2025 and beyond, OCI standards are poised to drive growth in and deployments, where lightweight, portable containers address resource constraints and enable real-time processing in distributed systems. OCI's contributions underpin a significant portion of the container market, with ' CRI mandating OCI for integrated runtimes, leading to widespread reliance on OCI-compliant runtimes and images in environments.

References

  1. [1]
    About the Open Container Initiative
    The Open Container Initiative is an open governance structure for the express purpose of creating open industry standards around containers.
  2. [2]
    Industry Leaders Unite to Create Project for Open Container Standards
    Jun 20, 2015 · Housed under the Linux Foundation, the OCP's mission is to enable users and companies to continue to innovate and develop container-based ...
  3. [3]
    Open Container Initiative (OCI) Releases v1.0 of Container Standards
    Jul 19, 2017 · OCI v1.0 specifications lay the foundation for container portability across different implementations to make it easier for customers to support portable ...
  4. [4]
    Docker and Broad Industry Coalition Unite to Create Open ...
    Jun 22, 2015 · Docker will be donating both our base container format and runtime, runC, to this project, to help form the cornerstone for the new technology.
  5. [5]
    Open Container Initiative (OCI) Releases v1.0 of Container Standards
    Jul 17, 2017 · OCI began with a specification describing container runtime behavior and expanded a year later to include a container image specification. Since ...
  6. [6]
    Open Container Initiative Announces Distribution Specification Project
    Apr 9, 2018 · The Open Container Initiative is a Collaborative Project at The Linux Foundation. Linux Foundation Collaborative Projects are independently ...
  7. [7]
    CRI-O – How Standards Power a Container Runtime
    Jun 20, 2018 · CRI-O moves in lock-step with Kubernetes' Container Runtime Interface (CRI), the API for container runtimes to integrate with a kubelet.
  8. [8]
    OCI Runtime Spec v1.2 - Open Container Initiative
    Feb 18, 2024 · The OCI Runtime Spec defines the behavior and the configuration interface of low-level container runtimes such as runc.Missing: 2023 | Show results with:2023
  9. [9]
    [PDF] CNCF SURVEY 2020
    The use of containers in production has increased to 92%, up from 84% last year, and up 300% from our first survey in 2016.Missing: OCI | Show results with:OCI
  10. [10]
    FAQ - Open Container Initiative
    How do I join the OCI as an official member? It's very simple, first read the charter for more information and then find the right membership level for you ...
  11. [11]
  12. [12]
    The OpenContainers Image Spec - Open Container Initiative
    Understanding the Specification¶. The OCI Image Media Types document is a starting point to understanding the overall structure of the specification.¶. The high ...
  13. [13]
    The OpenContainers Image Manifest Spec
    ### Summary of OCI Image Manifest Specification
  14. [14]
    The OpenContainers Image Spec Config
    ### Config Media Type and Content Summary
  15. [15]
    The OpenContainers Layer Spec
    This document describes how to serialize a filesystem and filesystem changes like removed files into a blob called a layer.
  16. [16]
    The OpenContainers Image Index Spec
    ### Summary of Image Index for Multi-Platform Support
  17. [17]
    The OpenContainers Descriptor Spec
    ### Summary of Descriptors, Digests, and Immutability from OCI Content Descriptors
  18. [18]
    OCI Image and Distribution Specs v1.1 Releases
    Mar 13, 2024 · The OCI Image Specification and Distribution Specification each had a 1.1.0 release on February 15, 2024. These are the first minor releases since the 1.0.0 ...Missing: introduction | Show results with:introduction
  19. [19]
    Open Container Initiative specifications reach 1.0 - Red Hat
    Jul 19, 2017 · The Open Container Initiative (OCI) has released 1.0 versions of the image format and runtime specifications.
  20. [20]
    opencontainers/runtime-spec: OCI Runtime Specification - GitHub
    Runtime developers can build runtime implementations that run OCI-compliant bundles and container configuration, containing low-level OS and host-specific ...Opencontainers/runtime-spec · Workflow runs · SecurityMissing: 2023 | Show results with:2023
  21. [21]
    runtime-spec/bundle.md at main · opencontainers/runtime-spec
    Insufficient relevant content. The provided text is a partial GitHub page snippet lacking the full `bundle.md` content. It includes navigation, feedback, and footer elements but does not contain the runtime bundle directory structure description, including `config.json` and `rootfs`.
  22. [22]
    The OpenContainers Runtime Spec Config - Open Container Initiative
    The Open Container Initiative Runtime Specification follows semantic versioning and retains forward and backward compatibility within major versions.
  23. [23]
  24. [24]
    The OpenContainers Runtime Config Linux Spec
    The Linux container specification uses various kernel features like namespaces, cgroups, capabilities, LSM, and filesystem jails to fulfill the spec.
  25. [25]
  26. [26]
    The OpenContainers Runtime Spec - Open Container Initiative
    The lifecycle describes the timeline of events that happen from when a container is created to when it ceases to exist.¶. OCI compliant runtime's ... Any updates ...
  27. [27]
    runtime-spec/spec.md at main · opencontainers/runtime-spec
    Insufficient relevant content. The provided URL content is a GitHub page fragment with navigation, feedback, and footer information, lacking the runtime-spec/spec.md details. No specific information on runtime bundle, hooks, resource controls, or state reporting is present.
  28. [28]
    OCI runtime-spec v. 1.2.0 release notice - Open Container Initiative
    Feb 13, 2024 · We are excited to inform you that OCI runtime-spec has released version 1.2.0! The OCI Charter's IP Policy, in Section 8.d., provides for notice of the release.Missing: 2023 | Show results with:2023
  29. [29]
    distribution-spec/spec.md at main · opencontainers/distribution-spec
    Insufficient relevant content. The provided text is a GitHub page header and navigation menu, not the OCI Distribution Specification. No substantive information from the spec is available.
  30. [30]
    OCI Distribution Specification v1.0 - Open Container Initiative
    May 4, 2021 · The OCI Distribution Spec defines an API protocol to facilitate and standardize the distribution of content. It was launched in April 2018.
  31. [31]
    OCI distribution-spec v 1.0.1 release notice - Open Container Initiative
    Nov 17, 2021 · OCI distribution-spec version 1.0.1 was released on 11/17/2021. This release triggers obligations for OCI members 30 days later. GitHub link: ...<|control11|><|separator|>
  32. [32]
    OCI distribution-spec v. 1.1.1 release notice - Open Container Initiative
    Mar 1, 2025 · We are excited to inform you that OCI distribution-spec has released version 1.1.1! The OCI Charter's IP Policy, in Section 8.d., provides for notice of the ...
  33. [33]
    Open Container Initiative Continues Momentum with New Members
    Mar 14, 2018 · Initiative welcomes 99Cloud, Kontena and OpenStack Foundation to collaboratively accelerate industry container specifications.
  34. [34]
    Leadership - Open Container Initiative
    Technical Oversight Board. The Technical Oversight Board (TOB) is responsible for managing conflicts, violations of procedures or guidelines ...Missing: structure groups licensing
  35. [35]
    GitHub - opencontainers/tob: Technical Oversight Board (TOB)
    ### Summary of OCI TOB Governance Document
  36. [36]
    Demystifying the Open Container Initiative (OCI) Specifications
    Jul 19, 2017 · The OCI is an effort under the auspices of the Linux Foundation to develop specifications and standards to support container solutions.
  37. [37]
    GitHub - opencontainers/image-spec: OCI Image Format
    - **License Information**: The OCI Image Format Specification and its code are licensed under the Apache 2.0 license, as stated in the `LICENSE` file of the repository.
  38. [38]
    opencontainers/distribution-spec: OCI Distribution Specification
    The OCI Distribution Spec project defines an API protocol to facilitate and standardize the distribution of content. The specification can be found here.Missing: 2018 | Show results with:2018
  39. [39]
    Open Container Initiative Establishes Technical Governance ...
    Dec 7, 2015 · The Open Container Initiative is an open governance structure for the express purpose of creating open industry standards around container formats and runtime.
  40. [40]
    EasyCLA FAQs | Linux Foundation Documentation - LFX Platform
    May 7, 2025 · Signing a CLA for a project covers all code contributions to that project. You may, however, need to sign additional CLAs if you choose to ...
  41. [41]
    Open Container Initiative (OCI) - LFX Insights - Linux Foundation
    Creates open industry standards around container formats and runtimes to ensure portability and interoperability. 6 projects. 2,953 contributors.
  42. [42]
    KubeCon + CloudNativeCon North America | LF Events
    The Cloud Native Computing Foundation's flagship conference brings together adopters and technologists from leading open source and cloud native communities.About Co-located Events · Register · Venue + Travel · Call For Proposals (CFP)
  43. [43]
  44. [44]
    Teaming up with Docker to Support a Diverse Container Ecosystem
    Apr 18, 2018 · With a commitment to driving inclusivity in the community, OCI is proud to be an official Diversity Scholarship sponsor for DockerCon 2018.Missing: translations | Show results with:translations
  45. [45]
    Open Sourcing runc Security Audit
    Jan 31, 2020 · The runc security audit included general and manual code audits, finding one major issue (CVE-2019-19921) related to file paths and procfs, ...Missing: contributions | Show results with:contributions
  46. [46]
    containerd – Scope and principles
    The best example of this is that containerd will use runc from OCI as the default runtime in the execution layer but other runtimes conforming to the OCI ...
  47. [47]
    cri-o
    CRI-O is an implementation of the Kubernetes CRI (Container Runtime Interface) to enable using OCI (Open Container Initiative) compatible runtimes.
  48. [48]
    Rootless containers with Podman: The basics | Red Hat Developer
    Sep 25, 2020 · Using Podman makes it easy to find, run, build, share, and deploy applications using Open Container Initiative (OCI)-compatible containers and ...Why containers? · Why Podman? · Why rootless containers?
  49. [49]
    Under the hood: Lazy Loading Container Images with Seekable OCI ...
    Jul 18, 2023 · AWS Fargate, a serverless compute engine for containerized workloads, now supports lazy loading container images that have been indexed using Seekable OCI ( ...Creating A Soci Index... · Automating The Generation Of... · Lazy Loading Container...
  50. [50]
    Container Runtimes - Kubernetes
    Jun 30, 2025 · Common container runtimes for Kubernetes include containerd, CRI-O, Docker Engine, and Mirantis Container Runtime.
  51. [51]
    Frequently asked questions about Azure Container Instances
    ACI supports image pulls from ACR and other non-Microsoft OCI compatible container registries such as DockerHub with an endpoint that is publicly exposed to the ...
  52. [52]
    CNCF Annual Survey 2023
    This report is based on a web survey conducted by the Linux Foundation Research and its partners from August through December 2023, comprising 59 questions.Missing: OCI | Show results with:OCI
  53. [53]
    State of Docker and the Container Industry in 2025 - virtualization.info
    Feb 23, 2025 · Kubernetes dominates with ~92% share of the container orchestration market. It is renowned for its extensive community support, broad cloud ...
  54. [54]
    Is the docker package available from Red Hat Enterprise Linux 8
    Aug 31, 2025 · The docker package is not shipped or supported by Red Hat from Red Hat Enterprise Linux (RHEL) 8 onwards. · The podman container engine replaced ...Missing: OCI | Show results with:OCI
  55. [55]
    OCI Certified - Open Container Initiative
    The Open Container Initiative is an open source technical community within which industry participants may easily contribute to building a vendor-neutral, ...
  56. [56]
    Steer OCI to Kubernetes with Artifactory and Helm 3 - JFrog
    Nov 18, 2020 · The Open Container Initiative is a Linux Foundation project to design open standards for containers. These standards establish an image ...Missing: de facto
  57. [57]
  58. [58]
    containers/buildah: A tool that facilitates building OCI images. - GitHub
    Buildah is an efficient way to create OCI images while Podman allows you to manage and maintain those images and containers in a production environment.Missing: extensions derivatives
  59. [59]
    [PDF] Software Supply Chain Security - Why should I care - Red Hat People
    For signing and verification of artifacts and containers, with storage in an Open Container Initiative (OCI) registry, making signatures and in-toto/SLSA ...
  60. [60]
    Tackling Supply-Chain Security in Regulated Industries
    Jun 30, 2022 · OCI Registry - Open Container Initiative registry that is used to store images and other types of artifacts. · Cosign - provides the ability to ...
  61. [61]
  62. [62]
    Design Overview - Confidential Containers
    Jan 23, 2025 · Confidential Containers encloses the workload pod and helper processes, using a pod-centric approach with a small guest API, and a static image.Missing: OCI spec v2
  63. [63]
    [PDF] Edge intelligence | IEC
    Edge intelligence (EI) is edge computing with machine learning (ML) and advanced networking capabilities.
  64. [64]
    2024 Kubernetes Benchmark Report: the latest analysis of ...
    Jan 26, 2024 · Fifty-seven percent of organizations have 10% or fewer workloads in need of rightsizing in 2024. The latest benchmark also shows that 30% of ...