dockle
hadolint
Our great sponsors
dockle | hadolint | |
---|---|---|
2 | 12 | |
1,897 | 6,917 | |
3.1% | 3.7% | |
6.4 | 8.7 | |
9 days ago | 17 days ago | |
Go | Haskell | |
Apache License 2.0 | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
dockle
-
A beginner's question : am I doing things the right way ?
Check out dockle; https://github.com/goodwithtech/dockle
-
21 Best Practises in 2021 for Dockerfile
Dockle
hadolint
- can you recommend active Haskell open source projects?
-
Just Say No To `:Latest`
Worth noting that Hadolint[1] raises warnings the issues mentioned in the article. Some examples of warnings:
- https://github.com/hadolint/hadolint/wiki/DL3007: Using latest is prone to errors if the image will ever update. Pin the version explicitly to a release tag.
-
Kubernetes Security Checklist 2021
Dockerfile should be checked during development by automated scanners (Kics, Hadolint, Conftest)
-
CONTAINER SECURITY
Linters are an effective way to catch (security) bugs early on in your development process. For most programming languages using linters is pretty standard. Hadolint is a linter for your Dockerfiles and is found on github here.
-
Best Practices for R with Docker
Best practices for writing Dockerfiles are being followed more and more often according to this paper after mining more than 10 million Dockerfiles on Docker Hub and GitHub. However, there is still room for improvement. This is where linters come in as useful tools for static code analysis. Hadolint lists lots of rules for Dockerfiles and is available as a VS Code extension.
-
21 Best Practises in 2021 for Dockerfile
Hadolint
-
Dockerizing Shiny Applications
Switching to the root USER opens up certain security risks if an attacker gets access to the container. In order to mitigate this, switch back to a non privileged user after running the commands you need as root. – Hadolint rule DL3002
-
What do you use for container security, and where do you think there is room for improvement?
Hadolint for more SAST like : https://github.com/hadolint/hadolint
-
ShellCheck: A static analysis tool for shell scripts
Hadolint is another. It's built atop shellcheck.
-
Docker Security Cheat Sheet
I use Hadolint[1] as a CI job to check if my Dockerfiles follow the good "rules". But there is one rule that annoys me the most and which is also present in this article, is the pinned OS package version rule[2]. While I understand its interest, I struggle to handle this problem.
When I build new images and it failed because the pinned version is not available anymore, I have to dig into Debian or Ubuntu packages websites to find the new ones as they don't keep the old packages online.
I know I could ask Hadolint to ignore this rule but I don't like this and I think it's important to stick to a certain version of a package to avoid problems. I'm just trying to find any tip that could make me use pinned version and avoid this search every time. Does apt-get install allows wildcard for example?
What are some alternatives?
trivy - Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues and hard-coded secrets
docker-bench-security - The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
grype - A vulnerability scanner for container images and filesystems
podman - Podman: A tool for managing OCI containers and pods.
syft - CLI tool and library for generating a Software Bill of Materials from container images and filesystems
ormolu - A formatter for Haskell source code
leksah - Haskell IDE
stan - 🕵️ Haskell STatic ANalyser
buildkit - concurrent, cache-efficient, and Dockerfile-agnostic builder toolkit
distroless - 🥑 Language focused docker images, minus the operating system.
diun - Receive notifications when an image is updated on a Docker registry