hadolint
dockle
hadolint | dockle | |
---|---|---|
30 | 2 | |
10,941 | 2,895 | |
1.4% | 1.3% | |
8.4 | 6.1 | |
2 months ago | 5 months ago | |
Haskell | Go | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hadolint
-
Stop shipping insecure Dockerfiles: real devs don’t run as root
Hadolint Dockerfile Linter
-
Still Shipping 1GB Docker Images? Here’s How to Crush Them in Half an Hour
Hadolint — Linter for your Dockerfile
-
Dockerfile Best Practices: The Ultimate Guide to Optimizing Your Container Builds
[Source: Hadolint on GitHub]
-
10 Docker Security Best Practices
One such linter is hadolint. It parses a Dockerfile and shows a warning for any errors that do not match its best practice rules.
-
Top FP technologies
Like hadolint: Dockerfile linter, validate inline bash, written in Haskell; Purescript, Unison, Idris languages implemented in Haskell. I recommend to check ideas behinds those projects. Especially Unison's mind-blowing something naive idea about infinite computational resources.
-
Cloud Security and Resilience: DevSecOps Tools and Practices
3. Hadolint: https://github.com/hadolint/hadolint Hadolint is a Dockerfile linter that helps you build best practice Docker images, reducing vulnerabilities in your container configurations.
- Dockerfile Linter
-
Writing a Minecraft server from scratch in Bash (2022)
To skip the "move your scripts to standalone files" step some devs don't like, consider something like https://github.com/hadolint/hadolint which runs Shellcheck over inline scripts within Containerfiles.
-
I reduced the size of my Docker image by 40% – Dockerizing shell scripts
This is neat :)
I love going and making containers smaller and faster to build.
I don't know if it's useful for alpine, but adding a --mount=type=cache argument to the RUN command that `apk add`s might shave a few seconds off rebuilds. Probably not worth it, in your case, unless you're invalidating the cached layer often (adding or removing deps, intentionally building without layer caching to ensure you have the latest packages).
Hadolint is another tool worth checking out if you like spending time messing with Dockerfiles: https://github.com/hadolint/hadolint
-
Top 10 common Dockerfile linting issues
With Depot, we make use of two Dockerfile linters, hadolint and a set of Dockerfile linter rules that Semgrep has written to make a bit of a smarter Dockerfile linter.
dockle
-
A beginner's question : am I doing things the right way ?
Check out dockle; https://github.com/goodwithtech/dockle
-
21 Best Practises in 2021 for Dockerfile
Dockle
What are some alternatives?
trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
stan - 🕵️ Haskell STatic ANalyser
dnstake - DNSTake — A fast tool to check missing hosted DNS zones that can lead to subdomain takeover
hlint - Haskell source code suggestions
SecretScanner - :unlock: :unlock: Find secrets and passwords in container images and file systems :unlock: :unlock: