gomodjail
Moby
gomodjail | Moby | |
---|---|---|
1 | 239 | |
92 | 70,099 | |
- | 0.4% | |
8.3 | 10.0 | |
4 days ago | about 20 hours ago | |
Go | Go | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
gomodjail
Moby
-
Docker Engine v28: Hardening Container Networking by Default
Docker networking defaults have been tightened up but per https://github.com/moby/moby/issues/22054#issuecomment-28714...:
the default binding address is still 0.0.0.0.
There are now rules in raw-PREROUTING to drop packets sent from outside the host to container addresses, and to ports mapped to the loopback address. Rules in the filter-FORWARD chain no longer depend on its default policy.
-
Rust Dependencies Scare Me
Yeah, while I’ve seen some great libraries that follow the practice of minimizing their dependencies, I’m a bit annoyed with the amount of dependencies that docker will bring along [1]. I’ve been on the lookout for alternatives for my docker needs, but the state of podman, buildah and some others that I checked is similar. They all bring in roughly the same number of dependencies… if anyone knows of a stripped down Go lib that can be used to build from a Dockerfile, pull, and run a container, I would be grateful for any suggestions. Heck docker / moby isn’t even using go.mod proper.
[1] https://github.com/moby/moby/blob/master/vendor.mod
-
Dockerfmt: A Dockerfile Formatter
As far as I can tell from https://github.com/moby/moby/issues/4032, as of Debian 12 "bookworm" and Ubuntu 23.04 "Lunar", explicitly setting DEBIAN_FRONTEND is no longer necessary.
- "unexpected EOF" while downloading container layers when built with go 1.24
-
Build a Container Image from Scratch
It's not an alpine layer, it's a Dockerfile construct representing basically an empty tar file layer: <https://docs.docker.com/build/building/base-images/#create-a...> and <https://github.com/moby/moby/pull/8827>
- Update Your Docker
-
Docker limits unauthenticated pulls to 10/HR/IP from Docker Hub, from March 1
Manifests are tacked on afterwards, and have a lot of complexity that I'm not sure most folks have actually thought through.
Ex - lots of refs are to "multi-arch" images, Except... there's no such thing as a multi-arch image, the entire identifier is just a reference to a manifest that then points to a list of images (or other manifests) by arch, and the actual resolved artifact is a single entry in that list.
But it means the manifest needs to be able to reference and resolve other names, and that means including... names.
For a more concrete example, just check https://github.com/moby/moby/issues/44144#issuecomment-12578...
Basically - the digests weren't intended to support image verification across repos, and the tool doesn't treat them that way. The digest was intended to allow tighter specification than a tag (precisely because a publisher might push a different container to the same tag later).
-
Using cURL Inside a Docker Container
If we run the command without -i option (i.e. with only -t option), a pseudo-TTY will be allocated and the shell will start, but no commands can be accepted and we cannot continue the operation because STDIN is disabled. To forcefully exit from a container in this state, we need to send three consecutive SIGINT signals by pressing cmd + . same times. And this exiting does not trigger the automatic container removal provided by --rm option, so we need to trigger it by stopping the container or remove the container directly.
-
A story on home server security
Docker has a known security issue with port exposure in that it punches holes through the firewall without asking your permission, see https://github.com/moby/moby/issues/4737
I usually expose ports like `127.0.0.1:1234:1234` instead of `1234:1234`. As far as I understand, it still punches holes this way but to access the container, the attacker would need to get a packet routed to the host with a spoofed IP SRC set to `127.0.0.1`. All other solutions that are better seem to be much more involved.
-
Which Docker variant am I using and where is the daemon running?
When using the Docker Engine on Linux directly, based on the Moby project, you can run
What are some alternatives?
ollama - Get up and running with Llama 3.3, DeepSeek-R1, Phi-4, Gemma 3, Mistral Small 3.1 and other large language models.
podman - Podman: A tool for managing OCI containers and pods.
go-formatter - A curated list of awesome Go frameworks, libraries and software
Packer - Packer is a tool for creating identical machine images for multiple platforms from a single source configuration.
Caddy - Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS
containerd - An open and reliable container runtime