carbon
hadolint
carbon | hadolint | |
---|---|---|
1 | 30 | |
5 | 11,256 | |
- | 3.2% | |
0.0 | 8.4 | |
over 4 years ago | 3 months ago | |
Haskell | Haskell | |
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
carbon
hadolint
-
Stop shipping insecure Dockerfiles: real devs don’t run as root
Hadolint Dockerfile Linter
-
Still Shipping 1GB Docker Images? Here’s How to Crush Them in Half an Hour
Hadolint — Linter for your Dockerfile
-
Dockerfile Best Practices: The Ultimate Guide to Optimizing Your Container Builds
[Source: Hadolint on GitHub]
-
10 Docker Security Best Practices
One such linter is hadolint. It parses a Dockerfile and shows a warning for any errors that do not match its best practice rules.
-
Top FP technologies
Like hadolint: Dockerfile linter, validate inline bash, written in Haskell; Purescript, Unison, Idris languages implemented in Haskell. I recommend to check ideas behinds those projects. Especially Unison's mind-blowing something naive idea about infinite computational resources.
-
Cloud Security and Resilience: DevSecOps Tools and Practices
3. Hadolint: https://github.com/hadolint/hadolint Hadolint is a Dockerfile linter that helps you build best practice Docker images, reducing vulnerabilities in your container configurations.
- Dockerfile Linter
-
Writing a Minecraft server from scratch in Bash (2022)
To skip the "move your scripts to standalone files" step some devs don't like, consider something like https://github.com/hadolint/hadolint which runs Shellcheck over inline scripts within Containerfiles.
-
I reduced the size of my Docker image by 40% – Dockerizing shell scripts
This is neat :)
I love going and making containers smaller and faster to build.
I don't know if it's useful for alpine, but adding a --mount=type=cache argument to the RUN command that `apk add`s might shave a few seconds off rebuilds. Probably not worth it, in your case, unless you're invalidating the cached layer often (adding or removing deps, intentionally building without layer caching to ensure you have the latest packages).
Hadolint is another tool worth checking out if you like spending time messing with Dockerfiles: https://github.com/hadolint/hadolint
-
Top 10 common Dockerfile linting issues
With Depot, we make use of two Dockerfile linters, hadolint and a set of Dockerfile linter rules that Semgrep has written to make a bit of a smarter Dockerfile linter.
What are some alternatives?
ShellCheck - ShellCheck, a static analysis tool for shell scripts
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
pandoc - Universal markup converter
stan - 🕵️ Haskell STatic ANalyser
postgrest - REST API for any Postgres database
dockle - Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start