Full Code of veggiemonk/awesome-docker for AI

master bba85d05492b cached
48 files
380.4 KB
109.9k tokens
200 symbols
1 requests
Download .txt
Showing preview only (397K chars total). Download the full file or copy to clipboard to get everything.
Repository: veggiemonk/awesome-docker
Branch: master
Commit: bba85d05492b
Files: 48
Total size: 380.4 KB

Directory structure:
gitextract_uu2bikk7/

├── .claude/
│   └── settings.local.json
├── .gitattributes
├── .github/
│   ├── CODEOWNERS
│   ├── CODE_OF_CONDUCT.md
│   ├── CONTRIBUTING.md
│   ├── ISSUE_TEMPLATE/
│   │   └── add-a-project.md
│   ├── MAINTENANCE.md
│   ├── PULL_REQUEST_TEMPLATE.md
│   ├── dependabot.yml
│   └── workflows/
│       ├── broken_links.yml
│       ├── deploy-pages.yml
│       ├── health_report.yml
│       └── pull_request.yml
├── .gitignore
├── AGENTS.md
├── LICENSE
├── Makefile
├── README.md
├── cmd/
│   └── awesome-docker/
│       └── main.go
├── config/
│   ├── exclude.yaml
│   ├── health_cache.yaml
│   └── website.tmpl.html
├── go.mod
├── go.sum
├── index.html
└── internal/
    ├── builder/
    │   ├── builder.go
    │   └── builder_test.go
    ├── cache/
    │   ├── cache.go
    │   └── cache_test.go
    ├── checker/
    │   ├── github.go
    │   ├── github_test.go
    │   ├── http.go
    │   └── http_test.go
    ├── linter/
    │   ├── fixer.go
    │   ├── fixer_test.go
    │   ├── linter.go
    │   ├── linter_test.go
    │   └── rules.go
    ├── parser/
    │   ├── parser.go
    │   ├── parser_test.go
    │   └── types.go
    ├── scorer/
    │   ├── scorer.go
    │   └── scorer_test.go
    └── tui/
        ├── model.go
        ├── styles.go
        ├── tree.go
        ├── tree_test.go
        └── tui.go

================================================
FILE CONTENTS
================================================

================================================
FILE: .claude/settings.local.json
================================================
{
  "permissions": {
    "allow": [
      "mcp__plugin_context-mode_context-mode__ctx_batch_execute",
      "mcp__plugin_context7_context7__resolve-library-id",
      "mcp__plugin_context7_context7__query-docs",
      "Bash(go:*)",
      "Bash(./awesome-docker:*)",
      "Bash(tmux send-keys:*)",
      "Bash(tmux capture-pane:*)",
      "Bash(tmux:*)"
    ]
  }
}


================================================
FILE: .gitattributes
================================================
*.css linguist-vendored
*.* linguist-language=Markdown


================================================
FILE: .github/CODEOWNERS
================================================
* @veggiemonk @agebhar1 @dmitrytokarev @gesellix @mashb1t @moshloop @vegasbrianc @noteed


================================================
FILE: .github/CODE_OF_CONDUCT.md
================================================
# Contributor Covenant Code of Conduct

## Our Pledge

In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to making participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, or sexual identity and orientation.

## Our Standards

Examples of behavior that contributes to creating a positive environment include:

* Using welcoming and inclusive language
* Being respectful of differing viewpoints and experiences
* Gracefully accepting constructive criticism
* Focusing on what is best for the community
* Showing empathy towards other community members

Examples of unacceptable behavior by participants include:

* The use of sexualized language or imagery and unwelcome sexual attention or advances
* Trolling, insulting/derogatory comments, and personal or political attacks
* Public or private harassment
* Publishing others' private information, such as a physical or electronic address, without explicit permission
* Other conduct which could reasonably be considered inappropriate in a professional setting

## Our Responsibilities

Project maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate and fair corrective action in response to any instances of unacceptable behavior.

Project maintainers have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful.

## Scope

This Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers.

## Enforcement

Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at julien.bisconti (at) hotmail.com. The project team will review and investigate all complaints, and will respond in a way that it deems appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.

Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership.

## Attribution

This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4, available at [http://contributor-covenant.org/version/1/4][version]

[homepage]: http://contributor-covenant.org
[version]: http://contributor-covenant.org/version/1/4/


================================================
FILE: .github/CONTRIBUTING.md
================================================
# Contributing to awesome-docker

Thanks for taking the time to contribute.

This repository is a curated list of Docker/container resources plus a Go-based maintenance CLI used by CI. Contributions are welcome for both content and tooling.

Please read and follow the [Code of Conduct](./CODE_OF_CONDUCT.md).

## What We Accept

- New high-quality Docker/container-related projects
- Fixes to descriptions, ordering, or categorization
- Removal of broken, archived, deprecated, or duplicate entries
- Improvements to the Go CLI and GitHub workflows

## README Entry Rules

- Use one link per entry.
- Prefer GitHub project/repository URLs over marketing pages.
- Keep entries alphabetically sorted within their section.
- Keep descriptions concise and concrete.
- Use `:yen:` for paid/commercial services.
- Use `:ice_cube:` for stale projects (2+ years inactive).
- Do not use `:skull:`; archived/deprecated projects should be removed.
- Avoid duplicate links and redirect variants.

## Local Validation

```bash
# Build CLI
make build

# Validate README formatting and content
make lint

# Run code tests (when touching Go code)
make test

# Optional: full external checks (requires GITHUB_TOKEN)
./awesome-docker check
./awesome-docker validate
```

## Pull Request Expectations

- Keep the PR focused to one logical change.
- Explain what changed and why.
- If adding entries, include the target category.
- If removing entries, explain why (archived, broken, duplicate, etc.).
- Fill in the PR template checklist.

## Maintainer Notes

- Changes should be reviewed before merge.
- Prefer helping contributors improve a PR over silently rejecting it.
- Keep `.github` documentation and workflows aligned with current tooling.


================================================
FILE: .github/ISSUE_TEMPLATE/add-a-project.md
================================================
---
name: Add a project
about: Add a new project to the list
title: "add: [PROJECT_NAME] in [SECTION_NAME]"
labels: pending-evaluation
assignees: ''

---

Category:
Repository link:
Description (one sentence):
Author:
Why this should be in the list:
Notes (`:yen:` if relevant):

Or directly write it:

```markdown
[REPO](https://github.com/AUTHOR/REPO) - DESCRIPTION.
```


================================================
FILE: .github/MAINTENANCE.md
================================================
# Maintenance Guide

This guide describes how maintainers keep the list and automation healthy.

## Automated Workflows

### Pull Requests / Weekly QA (`pull_request.yml`)

- Runs on pull requests and weekly on Saturday.
- Builds the Go CLI and runs `./awesome-docker validate`.

### Broken Links Report (`broken_links.yml`)

- Runs weekly on Saturday and on manual trigger.
- Executes `./awesome-docker check`.
- Opens/updates a `broken-links` issue when problems are found.

### Weekly Health Report (`health_report.yml`)

- Runs weekly on Monday and on manual trigger.
- Executes `./awesome-docker health` then `./awesome-docker report`.
- Opens/updates a `health-report` issue.

### Deploy to GitHub Pages (`deploy-pages.yml`)

- Runs on pushes to `master` and manual trigger.
- Builds website with `./awesome-docker build` and publishes `website/`.

## Day-to-Day Commands

```bash
# Build CLI
make build

# README lint/validation
make lint

# Auto-fix formatting issues
./awesome-docker lint --fix

# Link checks and health checks (requires GITHUB_TOKEN)
make check
make health
make report
```

## Content Maintenance Policy

- Remove archived/deprecated projects instead of tagging them.
- Remove broken links that cannot be fixed.
- Keep sections alphabetically sorted.
- Keep descriptions short and actionable.

## Suggested Review Cadence

### Weekly

- Triage open `broken-links` and `health-report` issues.
- Merge straightforward quality PRs.

### Monthly

- Review sections for stale/duplicate entries.
- Re-run `check` and `health` manually if needed.

### Quarterly

- Review `.github` docs and templates for drift.
- Confirm workflows still match repository tooling and policies.

## Contributor Support

When requesting PR changes, be explicit and actionable:

- point to section/order problems,
- explain why a link should be removed,
- suggest exact wording when description quality is the issue.

---

Last updated: 2026-02-27


================================================
FILE: .github/PULL_REQUEST_TEMPLATE.md
================================================
# Summary

Describe what changed and why.

## Scope

- [ ] README entries/content
- [ ] Go CLI/tooling
- [ ] GitHub workflows or `.github` docs

## If This PR Adds/Edits README Entries

- Category/section touched:
- New or updated project links:

## Validation

- [ ] `make lint`
- [ ] `make test` (if Go code changed)
- [ ] `./awesome-docker check` (if `GITHUB_TOKEN` available)

## Contributor Checklist

- [ ] Entries are alphabetically ordered in their section
- [ ] Links point to project repositories (no duplicates or redirects)
- [ ] Descriptions are concise and specific
- [ ] Archived/deprecated projects were removed instead of tagged
- [ ] Used `:yen:` only when applicable


================================================
FILE: .github/dependabot.yml
================================================
version: 2
updates:
  # Enable version updates for Go modules
  - package-ecosystem: "gomod"
    directory: "/"
    schedule:
      interval: "weekly"

  # Enable version updates for GitHub Actions
  - package-ecosystem: "github-actions"
    directory: "/"
    schedule:
      interval: "weekly"


================================================
FILE: .github/workflows/broken_links.yml
================================================
name: Broken Links Report

on:
  schedule:
    - cron: "0 2 * * 6"
  workflow_dispatch:

concurrency:
  group: broken-links-${{ github.ref }}
  cancel-in-progress: false

jobs:
  check-links:
    runs-on: ubuntu-latest
    timeout-minutes: 30
    permissions:
      contents: read
      issues: write

    steps:
      - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # ratchet:actions/checkout@v6

      - uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # ratchet:actions/setup-go@v6
        with:
          go-version-file: go.mod

      - name: Build
        run: go build -o awesome-docker ./cmd/awesome-docker

      - name: Run Link Check
        id: link_check
        run: ./awesome-docker ci broken-links --issue-file broken_links_issue.md --github-output "$GITHUB_OUTPUT"
        env:
          GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

      - name: Create/Update Issue for Broken Links
        if: steps.link_check.outputs.has_errors == 'true'
        uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # ratchet:actions/github-script@v8
        with:
          script: |
            const fs = require('fs');
            const issueBody = fs.readFileSync('broken_links_issue.md', 'utf8');

            const issues = await github.rest.issues.listForRepo({
              owner: context.repo.owner,
              repo: context.repo.repo,
              state: 'open',
              labels: 'broken-links',
              per_page: 1
            });

            if (issues.data.length > 0) {
              await github.rest.issues.update({
                owner: context.repo.owner,
                repo: context.repo.repo,
                issue_number: issues.data[0].number,
                body: issueBody
              });
            } else {
              await github.rest.issues.create({
                owner: context.repo.owner,
                repo: context.repo.repo,
                title: 'Broken Links Detected',
                body: issueBody,
                labels: ['broken-links', 'bug']
              });
            }

      - name: Close Issue if No Errors
        if: steps.link_check.outputs.has_errors == 'false'
        uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # ratchet:actions/github-script@v8
        with:
          script: |
            const issues = await github.rest.issues.listForRepo({
              owner: context.repo.owner,
              repo: context.repo.repo,
              state: 'open',
              labels: 'broken-links',
              per_page: 1
            });
            if (issues.data.length > 0) {
              await github.rest.issues.update({
                owner: context.repo.owner,
                repo: context.repo.repo,
                issue_number: issues.data[0].number,
                state: 'closed',
                state_reason: 'completed'
              });
            }


================================================
FILE: .github/workflows/deploy-pages.yml
================================================
name: Deploy to GitHub Pages

on:
  push:
    branches:
      - master
  workflow_dispatch:

permissions:
  contents: read
  pages: write
  id-token: write

concurrency:
  group: "pages"
  cancel-in-progress: false

jobs:
  build:
    runs-on: ubuntu-latest
    steps:
      - name: Checkout
        uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # ratchet:actions/checkout@v6

      - uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # ratchet:actions/setup-go@v6
        with:
          go-version-file: go.mod

      - name: Build CLI
        run: go build -o awesome-docker ./cmd/awesome-docker

      - name: Build website
        run: make website

      - name: Upload artifact
        uses: actions/upload-pages-artifact@7b1f4a764d45c48632c6b24a0339c27f5614fb0b # ratchet:actions/upload-pages-artifact@v4
        with:
          path: ./website

  deploy:
    environment:
      name: github-pages
      url: ${{ steps.deployment.outputs.page_url }}
    runs-on: ubuntu-latest
    needs: build
    steps:
      - name: Deploy to GitHub Pages
        id: deployment
        uses: actions/deploy-pages@d6db90164ac5ed86f2b6aed7e0febac5b3c0c03e # ratchet:actions/deploy-pages@v4


================================================
FILE: .github/workflows/health_report.yml
================================================
name: Weekly Health Report

on:
  schedule:
    - cron: "0 9 * * 1"
  workflow_dispatch:

concurrency:
  group: health-report-${{ github.ref }}
  cancel-in-progress: false

jobs:
  health-check:
    runs-on: ubuntu-latest
    timeout-minutes: 30
    permissions:
      contents: read
      issues: write

    steps:
      - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # ratchet:actions/checkout@v6

      - uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # ratchet:actions/setup-go@v6
        with:
          go-version-file: go.mod

      - name: Build
        run: go build -o awesome-docker ./cmd/awesome-docker

      - name: Run Health + Report
        id: report
        run: ./awesome-docker ci health-report --issue-file health_report.txt --github-output "$GITHUB_OUTPUT"
        env:
          GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

      - name: Create/Update Issue with Health Report
        if: steps.report.outputs.has_report == 'true'
        uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # ratchet:actions/github-script@v8
        with:
          script: |
            const fs = require('fs');
            const report = fs.readFileSync('health_report.txt', 'utf8');
            const issueBody = report;

            const issues = await github.rest.issues.listForRepo({
              owner: context.repo.owner,
              repo: context.repo.repo,
              state: 'open',
              labels: 'health-report',
              per_page: 1
            });

            if (issues.data.length > 0) {
              await github.rest.issues.update({
                owner: context.repo.owner,
                repo: context.repo.repo,
                issue_number: issues.data[0].number,
                body: issueBody
              });
            } else {
              await github.rest.issues.create({
                owner: context.repo.owner,
                repo: context.repo.repo,
                title: 'Weekly Health Report - Repository Maintenance Needed',
                body: issueBody,
                labels: ['health-report', 'maintenance']
              });
            }


================================================
FILE: .github/workflows/pull_request.yml
================================================
name: Pull Requests / Weekly QA

on:
  pull_request:
    branches:
      - master
  schedule:
    - cron: "0 0 * * 6"

jobs:
  test:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # ratchet:actions/checkout@v6

      - uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # ratchet:actions/setup-go@v6
        with:
          go-version-file: go.mod

      - name: Build
        run: go build -o awesome-docker ./cmd/awesome-docker

      - name: Build website
        run: ./awesome-docker build

      - name: Validate
        run: ./awesome-docker validate
        env:
          GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}


================================================
FILE: .gitignore
================================================
logs
*.log
npm-debug.log*
build
node_modules
.cache
dist
website/index.html
website/table.html

.idea
**/.DS_Store
.worktrees

# Go
/awesome-docker


================================================
FILE: AGENTS.md
================================================
# Agent Guidelines for awesome-docker

## Commands
- Build CLI: `make build` (or `go build -o awesome-docker ./cmd/awesome-docker`)
- Rebuild from scratch: `make rebuild`
- Show local workflows: `make help`
- Format Go code: `make fmt`
- Run tests: `make test` (runs `go test ./internal/... -v`)
- Race tests: `make test-race`
- Lint README rules: `make lint` (runs `./awesome-docker lint`)
- Auto-fix lint issues: `make lint-fix`
- Check links: `make check` (runs `./awesome-docker check`; `GITHUB_TOKEN` enables GitHub repo checks)
- PR-safe link checks: `make check-pr`
- PR validation: `make validate` (lint + external link checks in PR mode)
- Build website: `make website` (generates `website/index.html` from `README.md`)
- Health scoring: `make health` (requires `GITHUB_TOKEN`, refreshes `config/health_cache.yaml`)
- Print health report (Markdown): `make report`
- Print health report (JSON): `make report-json` or `./awesome-docker report --json`
- Generate report files: `make report-file` (`HEALTH_REPORT.md`) and `make report-json-file` (`HEALTH_REPORT.json`)
- Maintenance shortcut: `make workflow-maint` (health + JSON report file)

## Architecture
- **Main content**: `README.md` (curated Docker/container resources)
- **CLI entrypoint**: `cmd/awesome-docker/main.go` (Cobra commands)
- **Core packages**:
  - `internal/parser` - parse README sections and entries
  - `internal/linter` - alphabetical/order/format validation + autofix
  - `internal/checker` - HTTP and GitHub link checks
  - `internal/scorer` - repository health scoring and report generation
  - `internal/cache` - exclude list and health cache read/write
  - `internal/builder` - render README to website HTML from template
- **Config**:
  - `config/exclude.yaml` - known link-check exclusions
  - `config/website.tmpl.html` - HTML template for site generation
  - `config/health_cache.yaml` - persisted health scoring cache
- **Generated outputs**:
  - `awesome-docker` - compiled CLI binary
  - `website/index.html` - generated website
  - `HEALTH_REPORT.md` - generated markdown report
  - `HEALTH_REPORT.json` - generated JSON report

## Code Style
- **Language**: Go
- **Formatting**: Keep code `gofmt`-clean
- **Testing**: Add/adjust table-driven tests in `internal/*_test.go` for behavior changes
- **Error handling**: Return wrapped errors (`fmt.Errorf("context: %w", err)`) from command handlers
- **CLI conventions**: Keep command behavior consistent with existing Cobra commands (`lint`, `check`, `health`, `build`, `report`, `validate`)

## CI/Automation
- **PR + weekly validation**: `.github/workflows/pull_request.yml`
  - Triggers on pull requests to `master` and weekly schedule
  - Builds Go CLI and runs `./awesome-docker validate`
- **Weekly broken links issue**: `.github/workflows/broken_links.yml`
  - Runs `./awesome-docker check`
  - Opens/updates `broken-links` issue when failures are found
- **Weekly health report issue**: `.github/workflows/health_report.yml`
  - Runs `./awesome-docker health` then `./awesome-docker report`
  - Opens/updates `health-report` issue
- **GitHub Pages deploy**: `.github/workflows/deploy-pages.yml`
  - On push to `master`, builds CLI, runs `./awesome-docker build`, deploys `website/`

## Makefile Workflow
- The `Makefile` models file dependencies for generated artifacts (`awesome-docker`, `website/index.html`, `config/health_cache.yaml`, `HEALTH_REPORT.md`, `HEALTH_REPORT.json`).
- Prefer `make` targets over ad-hoc command sequences so dependency and regeneration behavior stays consistent.
- Use:
  - `make workflow-dev` for local iteration
  - `make workflow-pr` before opening/updating a PR
  - `make workflow-maint` for health/report maintenance
  - `make workflow-ci` for CI-equivalent local checks

## Content Guidelines (from CONTRIBUTING.md)
- Use one link per entry
- Prefer project/repository URLs over marketing pages
- Keep entries alphabetically ordered within each section
- Keep descriptions concise and concrete
- Use `:yen:` only for paid/commercial services
- Use `:ice_cube:` for stale projects (2+ years inactive)
- Remove archived/deprecated projects instead of tagging them
- Avoid duplicate links and redirect variants


================================================
FILE: LICENSE
================================================
                                 Apache License
                           Version 2.0, January 2004
                        http://www.apache.org/licenses/

   TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

   1. Definitions.

      "License" shall mean the terms and conditions for use, reproduction,
      and distribution as defined by Sections 1 through 9 of this document.

      "Licensor" shall mean the copyright owner or entity authorized by
      the copyright owner that is granting the License.

      "Legal Entity" shall mean the union of the acting entity and all
      other entities that control, are controlled by, or are under common
      control with that entity. For the purposes of this definition,
      "control" means (i) the power, direct or indirect, to cause the
      direction or management of such entity, whether by contract or
      otherwise, or (ii) ownership of fifty percent (50%) or more of the
      outstanding shares, or (iii) beneficial ownership of such entity.

      "You" (or "Your") shall mean an individual or Legal Entity
      exercising permissions granted by this License.

      "Source" form shall mean the preferred form for making modifications,
      including but not limited to software source code, documentation
      source, and configuration files.

      "Object" form shall mean any form resulting from mechanical
      transformation or translation of a Source form, including but
      not limited to compiled object code, generated documentation,
      and conversions to other media types.

      "Work" shall mean the work of authorship, whether in Source or
      Object form, made available under the License, as indicated by a
      copyright notice that is included in or attached to the work
      (an example is provided in the Appendix below).

      "Derivative Works" shall mean any work, whether in Source or Object
      form, that is based on (or derived from) the Work and for which the
      editorial revisions, annotations, elaborations, or other modifications
      represent, as a whole, an original work of authorship. For the purposes
      of this License, Derivative Works shall not include works that remain
      separable from, or merely link (or bind by name) to the interfaces of,
      the Work and Derivative Works thereof.

      "Contribution" shall mean any work of authorship, including
      the original version of the Work and any modifications or additions
      to that Work or Derivative Works thereof, that is intentionally
      submitted to Licensor for inclusion in the Work by the copyright owner
      or by an individual or Legal Entity authorized to submit on behalf of
      the copyright owner. For the purposes of this definition, "submitted"
      means any form of electronic, verbal, or written communication sent
      to the Licensor or its representatives, including but not limited to
      communication on electronic mailing lists, source code control systems,
      and issue tracking systems that are managed by, or on behalf of, the
      Licensor for the purpose of discussing and improving the Work, but
      excluding communication that is conspicuously marked or otherwise
      designated in writing by the copyright owner as "Not a Contribution."

      "Contributor" shall mean Licensor and any individual or Legal Entity
      on behalf of whom a Contribution has been received by Licensor and
      subsequently incorporated within the Work.

   2. Grant of Copyright License. Subject to the terms and conditions of
      this License, each Contributor hereby grants to You a perpetual,
      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
      copyright license to reproduce, prepare Derivative Works of,
      publicly display, publicly perform, sublicense, and distribute the
      Work and such Derivative Works in Source or Object form.

   3. Grant of Patent License. Subject to the terms and conditions of
      this License, each Contributor hereby grants to You a perpetual,
      worldwide, non-exclusive, no-charge, royalty-free, irrevocable
      (except as stated in this section) patent license to make, have made,
      use, offer to sell, sell, import, and otherwise transfer the Work,
      where such license applies only to those patent claims licensable
      by such Contributor that are necessarily infringed by their
      Contribution(s) alone or by combination of their Contribution(s)
      with the Work to which such Contribution(s) was submitted. If You
      institute patent litigation against any entity (including a
      cross-claim or counterclaim in a lawsuit) alleging that the Work
      or a Contribution incorporated within the Work constitutes direct
      or contributory patent infringement, then any patent licenses
      granted to You under this License for that Work shall terminate
      as of the date such litigation is filed.

   4. Redistribution. You may reproduce and distribute copies of the
      Work or Derivative Works thereof in any medium, with or without
      modifications, and in Source or Object form, provided that You
      meet the following conditions:

      (a) You must give any other recipients of the Work or
          Derivative Works a copy of this License; and

      (b) You must cause any modified files to carry prominent notices
          stating that You changed the files; and

      (c) You must retain, in the Source form of any Derivative Works
          that You distribute, all copyright, patent, trademark, and
          attribution notices from the Source form of the Work,
          excluding those notices that do not pertain to any part of
          the Derivative Works; and

      (d) If the Work includes a "NOTICE" text file as part of its
          distribution, then any Derivative Works that You distribute must
          include a readable copy of the attribution notices contained
          within such NOTICE file, excluding those notices that do not
          pertain to any part of the Derivative Works, in at least one
          of the following places: within a NOTICE text file distributed
          as part of the Derivative Works; within the Source form or
          documentation, if provided along with the Derivative Works; or,
          within a display generated by the Derivative Works, if and
          wherever such third-party notices normally appear. The contents
          of the NOTICE file are for informational purposes only and
          do not modify the License. You may add Your own attribution
          notices within Derivative Works that You distribute, alongside
          or as an addendum to the NOTICE text from the Work, provided
          that such additional attribution notices cannot be construed
          as modifying the License.

      You may add Your own copyright statement to Your modifications and
      may provide additional or different license terms and conditions
      for use, reproduction, or distribution of Your modifications, or
      for any such Derivative Works as a whole, provided Your use,
      reproduction, and distribution of the Work otherwise complies with
      the conditions stated in this License.

   5. Submission of Contributions. Unless You explicitly state otherwise,
      any Contribution intentionally submitted for inclusion in the Work
      by You to the Licensor shall be under the terms and conditions of
      this License, without any additional terms or conditions.
      Notwithstanding the above, nothing herein shall supersede or modify
      the terms of any separate license agreement you may have executed
      with Licensor regarding such Contributions.

   6. Trademarks. This License does not grant permission to use the trade
      names, trademarks, service marks, or product names of the Licensor,
      except as required for reasonable and customary use in describing the
      origin of the Work and reproducing the content of the NOTICE file.

   7. Disclaimer of Warranty. Unless required by applicable law or
      agreed to in writing, Licensor provides the Work (and each
      Contributor provides its Contributions) on an "AS IS" BASIS,
      WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
      implied, including, without limitation, any warranties or conditions
      of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
      PARTICULAR PURPOSE. You are solely responsible for determining the
      appropriateness of using or redistributing the Work and assume any
      risks associated with Your exercise of permissions under this License.

   8. Limitation of Liability. In no event and under no legal theory,
      whether in tort (including negligence), contract, or otherwise,
      unless required by applicable law (such as deliberate and grossly
      negligent acts) or agreed to in writing, shall any Contributor be
      liable to You for damages, including any direct, indirect, special,
      incidental, or consequential damages of any character arising as a
      result of this License or out of the use or inability to use the
      Work (including but not limited to damages for loss of goodwill,
      work stoppage, computer failure or malfunction, or any and all
      other commercial damages or losses), even if such Contributor
      has been advised of the possibility of such damages.

   9. Accepting Warranty or Additional Liability. While redistributing
      the Work or Derivative Works thereof, You may choose to offer,
      and charge a fee for, acceptance of support, warranty, indemnity,
      or other liability obligations and/or rights consistent with this
      License. However, in accepting such obligations, You may act only
      on Your own behalf and on Your sole responsibility, not on behalf
      of any other Contributor, and only if You agree to indemnify,
      defend, and hold each Contributor harmless for any liability
      incurred by, or claims asserted against, such Contributor by reason
      of your accepting any such warranty or additional liability.

   END OF TERMS AND CONDITIONS

   APPENDIX: How to apply the Apache License to your work.

      To apply the Apache License to your work, attach the following
      boilerplate notice, with the fields enclosed by brackets "[]"
      replaced with your own identifying information. (Don't include
      the brackets!)  The text should be enclosed in the appropriate
      comment syntax for the file format. We also recommend that a
      file or class name and description of purpose be included on the
      same "printed page" as the copyright notice for easier
      identification within third-party archives.

   Copyright [yyyy] [name of copyright owner]

   Licensed under the Apache License, Version 2.0 (the "License");
   you may not use this file except in compliance with the License.
   You may obtain a copy of the License at

       http://www.apache.org/licenses/LICENSE-2.0

   Unless required by applicable law or agreed to in writing, software
   distributed under the License is distributed on an "AS IS" BASIS,
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
   See the License for the specific language governing permissions and
   limitations under the License.

================================================
FILE: Makefile
================================================
SHELL := /bin/bash

BINARY ?= awesome-docker
GO ?= go
CMD_PACKAGE := ./cmd/awesome-docker
INTERNAL_PACKAGES := ./internal/...
WEBSITE_OUTPUT := website/index.html
HEALTH_CACHE := config/health_cache.yaml
HEALTH_REPORT_MD := HEALTH_REPORT.md
HEALTH_REPORT_JSON := HEALTH_REPORT.json

GO_SOURCES := $(shell find cmd internal -type f -name '*.go')
BUILD_INPUTS := $(GO_SOURCES) go.mod go.sum
WEBSITE_INPUTS := README.md config/website.tmpl.html
HEALTH_INPUTS := README.md config/exclude.yaml

.DEFAULT_GOAL := help

.PHONY: help \
	build rebuild clean \
	fmt test test-race \
	lint lint-fix check check-pr validate website \
	guard-github-token health health-cache \
	report report-json report-file report-json-file health-report \
	workflow-dev workflow-pr workflow-maint workflow-ci

help: ## Show the full local workflow and available targets
	@echo "awesome-docker Makefile"
	@echo
	@echo "Workflows:"
	@echo "  make workflow-dev    # local iteration (fmt + test + lint + check-pr + website)"
	@echo "  make workflow-pr     # recommended before opening/updating a PR"
	@echo "  make workflow-maint  # repository maintenance (health + JSON report)"
	@echo "  make workflow-ci     # CI-equivalent checks"
	@echo
	@echo "Core targets:"
	@echo "  make build           # build CLI binary"
	@echo "  make test            # run internal Go tests"
	@echo "  make lint            # validate README formatting/content rules"
	@echo "  make check           # check links (uses GITHUB_TOKEN when set)"
	@echo "  make validate        # run PR validation (lint + check --pr)"
	@echo "  make website         # generate website/index.html"
	@echo "  make report-file     # generate HEALTH_REPORT.md"
	@echo "  make report-json-file# generate HEALTH_REPORT.json"
	@echo "  make health          # refresh health cache (requires GITHUB_TOKEN)"
	@echo "  make report          # print markdown health report"
	@echo "  make report-json     # print full JSON health report"
	@echo
	@echo "Generated artifacts:"
	@echo "  $(BINARY)"
	@echo "  $(WEBSITE_OUTPUT)"
	@echo "  $(HEALTH_CACHE)"
	@echo "  $(HEALTH_REPORT_MD)"
	@echo "  $(HEALTH_REPORT_JSON)"

$(BINARY): $(BUILD_INPUTS)
	$(GO) build -o $(BINARY) $(CMD_PACKAGE)

build: $(BINARY) ## Build CLI binary

rebuild: clean build ## Rebuild from scratch

clean: ## Remove generated binary
	rm -f $(BINARY) $(HEALTH_REPORT_MD) $(HEALTH_REPORT_JSON)

fmt: ## Format Go code
	$(GO) fmt ./...

test: ## Run internal unit tests
	$(GO) test $(INTERNAL_PACKAGES) -v

test-race: ## Run internal tests with race detector
	$(GO) test $(INTERNAL_PACKAGES) -race

lint: build ## Validate README formatting/content rules
	./$(BINARY) lint

lint-fix: build ## Auto-fix lint issues when possible
	./$(BINARY) lint --fix

check: build ## Check links (GitHub checks enabled when GITHUB_TOKEN is set)
	./$(BINARY) check

check-pr: build ## Check links in PR mode (external links only)
	./$(BINARY) check --pr

validate: build ## Run PR validation (lint + check --pr)
	./$(BINARY) validate

$(WEBSITE_OUTPUT): $(BINARY) $(WEBSITE_INPUTS)
	./$(BINARY) build

website: $(WEBSITE_OUTPUT) ## Generate website from README

guard-github-token:
	@if [ -z "$$GITHUB_TOKEN" ]; then \
		echo "GITHUB_TOKEN is required for this target."; \
		echo "Set it with: export GITHUB_TOKEN=<token>"; \
		exit 1; \
	fi

$(HEALTH_CACHE): guard-github-token $(BINARY) $(HEALTH_INPUTS)
	./$(BINARY) health

health-cache: $(HEALTH_CACHE) ## Update config/health_cache.yaml

health: ## Refresh health cache from GitHub metadata
	@$(MAKE) --no-print-directory -B health-cache

report: build ## Print markdown health report from cache
	./$(BINARY) report

report-json: build ## Print full health report as JSON
	./$(BINARY) report --json

$(HEALTH_REPORT_MD): $(BINARY) $(HEALTH_CACHE)
	./$(BINARY) report > $(HEALTH_REPORT_MD)

report-file: $(HEALTH_REPORT_MD) ## Generate HEALTH_REPORT.md from cache

$(HEALTH_REPORT_JSON): $(BINARY) $(HEALTH_CACHE)
	./$(BINARY) report --json > $(HEALTH_REPORT_JSON)

report-json-file: $(HEALTH_REPORT_JSON) ## Generate HEALTH_REPORT.json from cache

health-report: health report-file ## Refresh health cache then generate HEALTH_REPORT.md

browse: build ## Launch interactive TUI browser
	./$(BINARY) browse

workflow-dev: fmt test lint check-pr website ## Full local development workflow

workflow-pr: fmt test validate ## Recommended workflow before opening a PR

workflow-maint: health report-json-file ## Weekly maintenance workflow

workflow-ci: test validate ## CI-equivalent validation workflow

update-ga:
	ratchet upgrade .github/workflows/*

update-go:
	go get -u go@latest
	go get -u ./...
	go mod tidy 


================================================
FILE: README.md
================================================
# Awesome Docker [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg)][sindresorhus] [![Track Awesome List](https://www.trackawesomelist.com/badge.svg)](https://www.trackawesomelist.com/veggiemonk/awesome-docker/)[![Last Commit](https://img.shields.io/github/last-commit/veggiemonk/awesome-docker)](https://github.com/veggiemonk/awesome-docker/commits/main)<!-- omit in toc -->

> A curated list of Docker resources and projects

If you would like to contribute, please read [CONTRIBUTING.md][contributing] first.
It contains a lot of tips and guidelines to help keep things organized.
Just click [README.md][editreadme] to submit a [pull request][editreadme].
If this list is not complete, you can [contribute][editreadme] to make it so. Here is a great video tutorial to learn how to [contribute on Github](https://egghead.io/lessons/javascript-identifying-how-to-contribute-to-an-open-source-project-on-github).

> **Please**, help organize these resources so that they are _easy to find_ and _understand_ for newcomers. See how to **[Contribute][contributing]** for tips!

**_If you see a link here that is not (any longer) a good fit, you can fix it by submitting a [pull request][editreadme] to improve this file. Thank you!_**

The creators and maintainers of this list do not receive any form of payment to accept a change made by any contributor. This page is not an official Docker product in any way. It is a list of links to projects and is maintained by volunteers. Everybody is welcome to contribute. The goal of this repo is to index open-source projects, not to advertise for profit.

# Contents <!-- omit in toc -->

<!-- TOC -->

- [Legend](#legend)
- [What is Docker](#what-is-docker)
- [Where to start](#where-to-start)
- [Where to start (Windows)](#where-to-start-windows)
- [Projects](#projects)
  - [Container Operations](#container-operations)
    - [Container Composition](#container-composition)
    - [Deployment and Infrastructure](#deployment-and-infrastructure)
    - [Monitoring](#monitoring)
    - [Networking](#networking)
    - [Orchestration](#orchestration)
    - [PaaS](#paas)
    - [Reverse Proxy](#reverse-proxy)
    - [Runtime](#runtime)
    - [Security](#security)
    - [Service Discovery](#service-discovery)
    - [Volume Management / Data](#volume-management--data)
    - [User Interface](#user-interface)
      - [IDE integrations](#ide-integrations)
      - [Desktop](#desktop)
      - [Terminal](#terminal)
        - [Terminal UI](#terminal-ui)
        - [CLI tools](#cli-tools)
        - [Other](#other)
      - [Web](#web)
  - [Docker Images](#docker-images)
    - [Base Tools](#base-tools)
    - [Builder](#builder)
    - [Dockerfile](#dockerfile)
    - [Linter](#linter)
    - [Metadata](#metadata)
    - [Registry](#registry)
  - [Development with Docker](#development-with-docker)
    - [API Client](#api-client)
    - [CI/CD](#cicd)
    - [Development Environment](#development-environment)
    - [Garbage Collection](#garbage-collection)
    - [Serverless](#serverless)
    - [Testing](#testing)
    - [Wrappers](#wrappers)
  - [Services based on Docker (mostly :yen:)](#services-based-on-docker-mostly-yen)
    - [CI Services](#ci-services)
    - [CaaS](#caas)
    - [Monitoring Services](#monitoring-services)
- [Useful Resources](#useful-resources)
  - [Awesome Lists](#awesome-lists)
  - [Demos and Examples](#demos-and-examples)
  - [Good Tips](#good-tips)
  - [Raspberry Pi \& ARM](#raspberry-pi--arm)
  - [Security](#security-1)
  - [Videos](#videos)
- [Communities and Meetups](#communities-and-meetups)
  - [Brazilian](#brazilian)
  - [English](#english)
  - [Russian](#russian)
  - [Spanish](#spanish)
  - [Stargazers over time](#stargazers-over-time)

<!-- /TOC -->

# Legend

-   Monetized :yen:
-   Stale (2+ years inactive) :ice_cube:

# What is Docker

> Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications. Consisting of Docker Engine, a portable, lightweight runtime and packaging tool, and Docker Hub, a cloud service for sharing applications and automating workflows, Docker enables apps to be quickly assembled from components and eliminates the friction between development, QA, and production environments. As a result, IT can ship faster and run the same app, unchanged, on laptops, data center VMs, and any cloud.

_Source:_ [What is Docker](https://www.docker.com/why-docker/)

# Where to start

-   [Benefits of using Docker](https://semaphore.io/blog/docker-benefits) for development and delivery, with a practical roadmap for adoption.
- [Bootstrapping Microservices](https://www.manning.com/books/bootstrapping-microservices-with-docker-kubernetes-and-terraform) - A practical and project-based guide to building applications with microservices, starts by building a Docker image for a single microservice and publishing it to a private container registry, finishes by deploying a complete microservices application to a production Kubernetes cluster.
-   [Docker Curriculum](https://github.com/prakhar1989/docker-curriculum): A comprehensive tutorial for getting started with Docker. Teaches how to use Docker and deploy dockerized apps on AWS with Elastic Beanstalk and Elastic Container Service.
-   [Docker Documentation](https://docs.docker.com/): the official documentation.
-   [Docker for beginners](https://github.com/groda/big_data/blob/master/docker_for_beginners.md): A tutorial for beginners who need to learn the basics of Docker—from "Hello world!" to basic interactions with containers, with simple explanations of the underlying concepts.
-   [Docker for novices](https://www.youtube.com/watch?v=xsjSadjKXns) An introduction to Docker for developers and testers who have never used it. (Video 1h40, recorded linux.conf.au 2019 — Christchurch, New Zealand) by Alex Clews.

-   [Docker katas](https://github.com/eficode-academy/docker-katas) A series of labs that will take you from "Hello Docker" to deploying a containerized web application to a server.
-   [Docker simplified in 55 seconds](https://www.youtube.com/watch?v=vP_4DlOH1G4): An animated high-level introduction to Docker. Think of it as a visual tl;dr that makes it easier to dive into more complex learning materials.
-   [Docker Training](https://training.mirantis.com) :yen:
-   [Dockerlings](https://github.com/furkan/dockerlings): Learn docker from inside your terminal, with a modern TUI and bite sized exercises (by [furkan](https://github.com/furkan))

-   [Introduction à Docker](https://blog.stephane-robert.info/docs/conteneurs/moteurs-conteneurs/docker/) A dedicated section to master Docker on a French site about DevSecOps: From the basics to best practices, including optimizing, securing your containers...
-   [Learn Docker](https://github.com/dwyl/learn-docker): step-by-step tutorial and more resources (video, articles, cheat sheets) by [dwyl](https://github.com/dwyl)
- [Learn Docker (Visually)](https://pagertree.com/learn/docker/overview) - A beginner-focused high-level overview of all the major components of Docker and how they fit together. Lots of high-quality images, examples, and resources.
-   [Play With Docker](https://training.play-with-docker.com/): PWD is a great way to get started with Docker from beginner to advanced users. Docker runs directly in your browser.
-   [Practical Guide about Docker Commands in Spanish](https://github.com/brunocascio/docker-espanol) This Spanish guide contains the use of basic docker commands with real life examples.
-   [Setting Python Development Environment with VScode and Docker](https://github.com/RamiKrispin/vscode-python): A step-by-step tutorial for setting up a dockerized Python development environment with VScode, Docker, and the Dev Container extension.
-   [The Docker Handbook](https://docker-handbook.farhan.dev/) An open-source book that teaches you the fundamentals, best practices and some intermediate Docker functionalities. The book is hosted on [fhsinchy/the-docker-handbook](https://github.com/fhsinchy/the-docker-handbook) and the projects are hosted on [fhsinchy/docker-handbook-projects](https://github.com/fhsinchy/docker-handbook-projects) repository.

**Cheatsheets** by

-   [eon01](https://github.com/eon01/DockerCheatSheet)
-   [dimonomid](https://github.com/dimonomid/docker-quick-ref) (PDF)
-   [JensPiegsa](https://github.com/JensPiegsa/docker-cheat-sheet)
-   [wsargent](https://github.com/wsargent/docker-cheat-sheet) (Most popular)

# Where to start (Windows)

-   [Docker on Windows behind a firewall](https://toedter.com/2015/05/11/docker-on-windows-behind-a-firewall/) by [kaitoedter](https://twitter.com/kaitoedter)
- [Docker Reference Architecture: Modernizing Traditional .NET Framework Applications](https://docs.mirantis.com/containers/v3.0/dockeree-ref-arch/app-dev/modernize-dotnet-apps.html) - You will learn to identify the types of .NET Framework applications that are good candidates for containerization, the "lift-and-shift" approach to containerization.
-   [Docker with Microsoft SQL 2016 + ASP.NET](https://blog.alexellis.io/docker-does-sql2016-aspnet/) Demonstration running ASP.NET and SQL Server workloads in Docker
-   [Exploring ASP.NET Core with Docker in both Linux and Windows Containers](https://www.hanselman.com/blog/exploring-aspnet-core-with-docker-in-both-linux-and-windows-containers) Running ASP.NET Core apps in Linux and Windows containers, using [Docker for Windows][docker-for-windows]
-   [Running a Legacy ASP.NET App in a Windows Container](https://blog.sixeyed.com/dockerizing-nerd-dinner-part-1-running-a-legacy-asp-net-app-in-a-windows-container/) Steps for Dockerizing a legacy ASP.NET app and running as a Windows container
- [Windows Containers and Docker: The 101](https://www.youtube.com/watch?v=N7SG2wEyQtM) - A 20-minute overview, using Docker to run PowerShell, ASP.NET Core and ASP.NET apps.
-   [Windows Containers Quick Start](https://learn.microsoft.com/en-us/virtualization/windowscontainers/about/) Overview of Windows containers, drilling down to Quick Starts for Windows 10 and Windows Server 2016

---

# Projects

-   Moby = open source development
-   Docker CE = free product release based on Moby
-   Docker EE = commercial product release based on Docker CE.

> Docker EE is on the same code base as Docker CE, so also built from Moby, with commercial components added, such as "docker data center / universal control plane"

-   [Moby](https://github.com/moby/moby)
-   [Docker Images](https://hub.docker.com)
-   [Docker Compose](https://github.com/docker/compose/) (Define and run multi-container applications with Docker)
-   [Docker Registry][distribution] (The Docker toolset to pack, ship, store, and deliver content)

## Container Operations

### Container Composition

- [Capitan](https://github.com/byrnedo/capitan) :ice_cube: - Composable docker orchestration with added scripting support by [byrnedo].
- [Composerize](https://github.com/magicmark/composerize) - Convert docker run commands into docker-compose files.
- [crowdr](https://github.com/polonskiy/crowdr) :ice_cube: - Tool for managing multiple Docker containers (`docker-compose` alternative).
- [ctk](https://github.com/ctk-hq/ctk) - Visual composer for container based workloads. By [corpulent](https://github.com/corpulent).
- [docker-config-update](https://github.com/sudo-bmitch/docker-config-update) :ice_cube: - Utility to update docker configs and secrets for deploying in a compose file.
- [elsy](https://github.com/cisco/elsy) :ice_cube: - An opinionated, multi-language, build tool based on Docker and Docker Compose.
- [habitus](https://github.com/cloud66-oss/habitus) :ice_cube: - A Build Flow Tool for Docker.
- [kompose](https://github.com/kubernetes/kompose) - Go from Docker Compose to Kubernetes.
- [LLM Harbor](https://github.com/av/harbor) - A CLI and companion app to effortlessly run LLM backends, APIs, frontends, and services with one command. By [av](https://github.com/av).
- [plash](https://github.com/ihucos/plash) - A container run and build engine - runs inside docker.
- [podman-compose](https://github.com/containers/podman-compose) - A script to run docker-compose.yml using podman.
-   [Smalte](https://github.com/roquie/smalte) – Dynamically configure applications that require static configuration in docker container. By [roquie](https://github.com/roquie)
- [Stitchocker](https://github.com/alexaandrov/stitchocker) - A lightweight and fast command line utility for conveniently grouping your docker-compose multiple container services. By [alexaandrov](https://github.com/alexaandrov).

### Deployment and Infrastructure

- [awesome-stacks](https://github.com/ethibox/awesome-stacks) - Deploy 150+ open-source web apps with one Docker command.
- [blackfish](https://gitlab.com/blackfish/blackfish) - A CoreOS VM to build swarm clusters for Dev & Production.
- [BosnD](https://gitlab.com/n0r1sk/bosnd) - BosnD, the boatswain daemon - A dynamic configuration file writer & service reloader for dynamically changing container environments.
- [Clocker](https://github.com/brooklyncentral/clocker) :ice_cube: - Clocker creates and manages a Docker cloud infrastructure. Clocker supports single-click deployments and runtime management of multi-node applications that run as containers distributed across multiple hosts, on both Docker and Marathon. It leverages [Calico][calico] and [Weave][weave] for networking and [Brooklyn](https://brooklyn.apache.org/) for application blueprints. By [brooklyncentral](https://github.com/brooklyncentral).
- [Conduit](https://github.com/ehazlett/conduit) :ice_cube: - Experimental deployment system for Docker.
- [depcon](https://github.com/ContainX/depcon) :ice_cube: - Depcon is written in Go and allows you to easily deploy Docker containers to Apache Mesos/Marathon, Amazon ECS and Kubernetes. By [ContainX][containx].
- [docker-to-iac](https://github.com/deploystackio/docker-to-iac) - Translate docker run and commit into Infrastructure as Code templates for AWS, Render.com and DigitalOcean.
- [gitkube](https://github.com/hasura/gitkube) :ice_cube: - Gitkube is a tool for building and deploying docker images on Kubernetes using `git push`. By [Hasura](https://github.com/hasura/).
- [Grafeas](https://github.com/grafeas/grafeas) - A common API for metadata about containers, from image and build details to security vulnerabilities. By [grafeas](https://github.com/grafeas).
- [swarm-ansible](https://github.com/LombardiDaniel/swarm-ansible?tab=readme-ov-file) - Swarm-Ansible bootstraps a production-ready swarm cluster using ansible. Comes with tools to automate CI, help monitoring and traefik pre-configured for SSL certificates and simple-auth. Comes with a private registry and more!.
- [SwarmManagement](https://github.com/hansehe/SwarmManagement) - Swarm Management is a python application, installed with pip. The application makes it easy to manage a Docker Swarm by configuring a single yaml file describing which stacks to deploy, and which networks, configs or secrets to create.
- [werf](https://github.com/werf/werf) - Werf is a CI/CD tool for building Docker images efficiently and deploying them to Kubernetes using GitOps.

### Monitoring

- [ADRG](https://github.com/jaldertech/adrg) - Dynamic Docker resource governor using cgroups v2 to manage system load.
- [Autoheal](https://github.com/willfarrell/docker-autoheal) - Monitor and restart unhealthy docker containers automatically.
- [cAdvisor](https://github.com/google/cadvisor) - Analyzes resource usage and performance characteristics of running containers.
- [Checkmate](https://github.com/bluewave-labs/checkmate) - Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations.
- [DLIA](https://github.com/zorak1103/dlia) - DLIA is an AI-powered Docker log monitoring agent that uses Large Language Models (LLMs) to intelligently analyze container logs, detect anomalies, and provide contextual insights over time. By [zorak1103](https://github.com/zorak1103).
- [Docker-Alertd](https://github.com/deltaskelta/docker-alertd) :ice_cube: - Monitor and send alerts based on docker container resource usage/statistics.
- [Docker-Flow-Monitor](https://github.com/docker-flow/docker-flow-monitor) :ice_cube: - Reconfigures Prometheus when a new service is updated or deployed automatically.
- [DockProbe](https://github.com/deep-on/dockprobe) - Lightweight Docker monitoring dashboard in a single container. Real-time metrics, 6 anomaly detection rules, Telegram alerts, and 16 automated security scans. Zero config, ~50MB RAM. By [DeepOn](https://github.com/deep-on).
- [DockProc](https://gitlab.com/n0r1sk/dockproc) - I/O monitoring for containers on processlevel.
- [dockprom](https://github.com/stefanprodan/dockprom) - Docker hosts and containers monitoring with Prometheus, Grafana, cAdvisor, NodeExporter and AlertManager.
- [Doku](https://github.com/amerkurev/doku) - Doku is a simple web-based application that allows you to monitor Docker disk usage. [amerkurev](https://github.com/amerkurev).
- [Dozzle](dozzle) - Monitor container logs in real-time with a browser or mobile device. [amir20](https://github.com/amir20).
- [Drydock](https://github.com/CodesWhat/drydock) - Container update monitoring with web dashboard, 23 registry providers, 20 notification triggers, and distributed agent architecture. By [CodesWhat](https://github.com/CodesWhat).
- [Dynatrace](https://docs.dynatrace.com/docs/observe/infrastructure-observability/container-platform-monitoring) - :yen: Monitor containerized applications without installing agents or modifying your Run commands.
- [Glances](https://github.com/nicolargo/glances) - A cross-platform curses-based system monitoring tool written in Python.
- [Grafana Docker Dashboard Template](https://grafana.com/grafana/dashboards/179-docker-prometheus-monitoring/) - A template for your Docker, Grafana and Prometheus stack [vegasbrianc][vegasbrianc].
- [HertzBeat](https://github.com/dromara/hertzbeat) - An open-source real-time monitoring system with custom-monitor and agentless.

- [InfluxDB, cAdvisor, Grafana](https://github.com/vegasbrianc/docker-monitoring) :ice_cube: - InfluxDB Time series DB in combination with Grafana and cAdvisor.
- [Logspout](https://github.com/gliderlabs/logspout) :ice_cube: - Log routing for Docker container logs.
- [Maintenant](https://github.com/kolapsis/maintenant) - Self-discovering infrastructure monitoring for Docker and Kubernetes. Auto-detects containers via labels, with endpoint monitoring, heartbeats, TLS certificates, resource metrics, update intelligence, and a built-in status page. Single binary with embedded SPA. By [kolapsis](https://github.com/kolapsis).
- [monit-docker](https://github.com/decryptus/monit-docker) :ice_cube: - Monitor docker containers resources usage or status and execute docker commands or inside containers. [decryptus][decryptus].
- [NexClipper](https://github.com/NexClipper/NexClipper) :ice_cube: - NexClipper is the container monitoring and performance management solution specialized in Docker, Apache Mesos, Marathon, DC/OS, Mesosphere, Kubernetes.
- [Out-of-the-box Host/Container Monitoring/Logging/Alerting Stack](https://github.com/uschtwill/docker_monitoring_logging_alerting) :ice_cube: - Docker host and container monitoring, logging and alerting out of the box using cAdvisor, Prometheus, Grafana for monitoring, Elasticsearch, Kibana and Logstash for logging and elastalert and Alertmanager for alerting. Set up in 5 Minutes. Secure mode for production use with built-in [Automated Nginx Reverse Proxy (jwilder's)][nginxproxy].
- [Sidekick](https://github.com/runsidekick/sidekick) :ice_cube: - Open source live application debugger like Chrome DevTools for your backend. Collect traces and generate logs on-demand without stopping & redeploying your applications.
- [SwarmAlert](https://github.com/gpulido/SwarmAlert) :ice_cube: - Monitors a Docker Swarm and sends Pushover alerts when it finds a container with no healthy service task running.
- [Zabbix Docker](https://github.com/gomex/docker-zabbix) :ice_cube: - Monitor containers automatically using zabbix LLD feature.
- [Zabbix Docker module](https://github.com/monitoringartist/Zabbix-Docker-Monitoring) :ice_cube: - Zabbix module that provides discovery of running containers, CPU/memory/blk IO/net container metrics. Systemd Docker and LXC execution driver is also supported. It's a dynamically linked shared object library, so its performance is (~10x) better, than any script solution.
### Networking

-   [Calico][calico] - Calico is a pure layer 3 virtual network that allows containers over multiple docker-hosts to talk to each other.
- [Flannel](https://github.com/coreos/flannel/) - Flannel is a virtual network that gives a subnet to each host for use with container runtimes. By [coreos][coreos].
- [Freeflow](https://github.com/Microsoft/Freeflow) :ice_cube: - High performance container overlay networks on Linux. Enabling RDMA (on both InfiniBand and RoCE) and accelerating TCP to bare metal performance. By [Microsoft](https://github.com/Microsoft).
- [MyIP](https://github.com/jason5ng32/MyIP) - All in one IP Toolbox. Easy to check all your IPs, IP geolocation, check for DNS leaks, examine WebRTC connections, speed test, ping test, MTR test, check website availability, whois search and more. By [jason5ng32](https://github.com/jason5ng32).
- [netshoot](https://github.com/nicolaka/netshoot) - The netshoot container has a powerful set of networking tools to help troubleshoot Docker networking issues.
- [Pipework](https://github.com/jpetazzo/pipework) - Software-Defined Networking for Linux Containers, Pipework works with "plain" LXC containers, and with the awesome Docker. By [jpetazzo][jpetazzo].

### Orchestration

- [Ansible Linux Docker](https://github.com/Peco602/ansible-linux-docker) :ice_cube: - Run Ansible from a Linux container. By [Peco602][peco602].
- [athena](https://github.com/athena-oss/athena) :ice_cube: - An automation platform with a plugin architecture that allows you to easily create and share services.
- [CloudSlang](https://github.com/CloudSlang/cloud-slang) - CloudSlang is a workflow engine to create Docker process automation.
- [clusterdock](https://github.com/clusterdock/clusterdock) :ice_cube: - Docker container orchestration to enable the testing of long-running cluster deployments.
- [Crane](https://github.com/Dataman-Cloud/crane) :ice_cube: - Control plane based on docker built-in swarm [Dataman-Cloud](https://github.com/Dataman-Cloud).
- [Docker Flow Swarm Listener](https://github.com/docker-flow/docker-flow-swarm-listener) :ice_cube: - Docker Flow Swarm Listener project is to listen to Docker Swarm events and send requests when a change occurs. By [docker-flow][docker-flow].
- [docker rollout](https://github.com/Wowu/docker-rollout) - Zero downtime deployment for Docker Compose services.
- [Haven](https://github.com/codeabovelab/haven-platform) :ice_cube: - Haven is a simplified container management platform that integrates container, application, cluster, image, and registry managements. By [codeabovelab](https://github.com/codeabovelab).
- [Kubernetes](https://github.com/kubernetes/kubernetes) - Open source orchestration system for Docker containers by Google.
- [ManageIQ](https://github.com/ManageIQ/manageiq) - Discover, optimize and control your hybrid IT. By [ManageIQ](https://github.com/ManageIQ).
- [Mesos](https://github.com/apache/mesos) - Resource/Job scheduler for containers, VM's and physical hosts [apache](https://mesos.apache.org/).
- [Nebula](https://github.com/nebula-orchestrator) - A Docker orchestration tool designed to manage massive scale distributed clusters.
- [Nomad](https://github.com/hashicorp/nomad) - Easily deploy applications at any scale. A Distributed, Highly Available, Datacenter-Aware Scheduler.
- [Rancher](https://github.com/rancher/rancher) - An open source project that provides a complete platform for operating Docker in production.
- [RedHerd Framework](https://github.com/redherd-project/redherd-framework) :ice_cube: - RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets capable of simulating complex offensive cyberspace operations. By [RedHerdProject](https://github.com/redherd-project).
- [Swarm-cronjob](https://github.com/crazy-max/swarm-cronjob) - Create jobs on a time-based schedule on Swarm by [crazy-max].

### PaaS

- [caprover](https://github.com/caprover/caprover) - [Previously known as CaptainDuckDuck] Automated Scalable Webserver Package (automated Docker+nginx) - Heroku on Steroids.
- [Convox Rack](https://github.com/convox/rack) - Convox Rack is open source PaaS built on top of expert infrastructure automation and devops best practices.
- [Dcw](https://github.com/pbertera/dcw) :ice_cube: - Docker-compose SSH wrapper: a very poor man PaaS, exposing the docker-compose and custom-container commands defined in container labels.
- [Dokku](https://github.com/dokku/dokku) - Docker powered mini-Heroku that helps you build and manage the lifecycle of applications (originally by [progrium][progrium]).
- [Empire](https://github.com/remind101/empire) :ice_cube: - A PaaS built on top of Amazon EC2 Container Service (ECS).
- [Exoframe](https://github.com/exoframejs/exoframe) - A self-hosted tool that allows simple one-command deployments using Docker.
- [Hephy Workflow](https://github.com/teamhephy/workflow) :ice_cube: - Open source PaaS for Kubernetes that adds a developer-friendly layer to any Kubernetes cluster, making it easy to deploy and manage applications. Fork of [Deis Workflow](https://github.com/deis/workflow).
- [Krane](https://github.com/krane/krane) :ice_cube: - Toolset for managing container workloads on remote servers.
- [Nanobox](https://github.com/nanobox-io/nanobox) :ice_cube: - :yen: An application development platform that creates local environments that can then be deployed and scaled in the cloud.
-   [OpenShift][openshift] - An open source PaaS built on [Kubernetes][kubernetes] and optimized for Dockerized app development and deployment by [Red Hat](https://www.redhat.com/en)
- [Tsuru](https://github.com/tsuru/tsuru) - Tsuru is an extensible and open source Platform as a Service software.

### Reverse Proxy

- [BunkerWeb](https://github.com/bunkerity/bunkerweb) - Open-source and next-gen Web Application Firewall (WAF). By [Bunkerity](https://www.bunkerity.com).
- [caddy-docker-proxy](https://github.com/lucaslorentz/caddy-docker-proxy) - Caddy-based reverse proxy, configured with service or container labels. By [lucaslorentz](https://github.com/lucaslorentz).
- [caddy-docker-upstreams](https://github.com/invzhi/caddy-docker-upstreams) - Docker upstreams module for Caddy, configured with container labels. By [invzhi](https://github.com/invzhi).
- [Docker Dnsmasq Updater](https://github.com/moonbuggy/docker-dnsmasq-updater) - Update a remote dnsmasq server with Docker container hostnames.
- [docker-flow-proxy](https://github.com/docker-flow/docker-flow-proxy) - Reconfigures proxy every time a new service is deployed, or when a service is scaled. By [docker-flow][docker-flow].
- [fabio](https://github.com/fabiolb/fabio) - A fast, modern, zero-conf load balancing HTTP(S) router for deploying microservices managed by consul. By [magiconair](https://github.com/magiconair) (Frank Schroeder).
- [idle-less](https://github.com/tvup/idle-less) - Reverse proxy with automatic Wake-on-LAN — wakes sleeping backend servers when traffic arrives, shows a waiting screen, and redirects when ready. By [tvup](https://github.com/tvup).
- [Let's Encrypt Nginx-proxy Companion](https://github.com/nginx-proxy/docker-letsencrypt-nginx-proxy-companion) - A lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically. By [JrCs](https://github.com/JrCs).
- [mesh-router](https://github.com/Yundera/mesh-router) - Free domain(nsl.sh) provider for Docker containers with automatic HTTPS routing. Uses Wireguard VPN to securely route subdomain requests across networks. Ideal for self-hosted NAS and cloud deployments. By [Yundera](https://github.com/Yundera).
- [Nginx Proxy Manager](https://github.com/jc21/nginx-proxy-manager) - A beautiful web interface for proxying web based services with SSL. By [jc21](https://github.com/jc21).
-   [nginx-proxy][nginxproxy] - Automated nginx proxy for Docker containers using docker-gen by [jwilder][jwilder]
- [OpenResty Manager](https://github.com/Safe3/openresty-manager) - The easiest using, powerful and beautiful OpenResty Manager(Nginx Enhanced Version), open source alternative to OpenResty Edge. By [Safe3](https://github.com/Safe3/).
- [Swarm Router](https://github.com/flavioaiello/swarm-router) - A «zero config» service name based router for docker swarm mode with a fresh and more secure approach. By [flavioaiello](https://github.com/flavioaiello).
- [Træfɪk](https://github.com/containous/traefik) - Automated reverse proxy and load-balancer for Docker, Mesos, Consul, Etcd... By [EmileVauge](https://github.com/emilevauge).

### Runtime

- [cri-o](https://github.com/cri-o/cri-o) - Open Container Initiative-based implementation of Kubernetes Container Runtime Interface by [cri-o](https://github.com/cri-o).
- [lxc](https://github.com/lxc/lxc) - LXC - Linux Containers.
- [podman](https://github.com/containers/libpod) - Libpod is a library used to create container pods. Home of Podman.
- [rlxc](https://github.com/brauner/rlxc) :ice_cube: - LXC binary written in Rust.
- [runtime-tools](https://github.com/opencontainers/runtime-tools) - Oci-runtime-tool is a collection of tools for working with the OCI runtime specification.

### Security

- [Anchor](https://github.com/SongStitch/anchor/) - A tool to ensure reproducible builds by pinning dependencies inside your Dockerfiles [SongStitch](https://github.com/songStitch/).
- [Anchor Enterprise](https://anchore.com/) - :yen: Analyze images for CVE vulnerabilities and against custom security policies.
- [Aqua Security](https://www.aquasec.com) - :yen: Securing container-based applications from Dev to Production on any platform.
- [bane](https://github.com/genuinetools/bane) :ice_cube: - AppArmor profile generator for Docker containers.
- [buildcage](https://github.com/dash14/buildcage) - Restricts outbound network access during Docker builds to prevent supply chain attacks, working as a drop-in BuildKit remote driver for Docker Buildx, with ready-to-use GitHub Actions.
- [CetusGuard](https://github.com/hectorm/cetusguard) - CetusGuard is a tool that protects the Docker daemon socket by filtering calls to its API endpoints.
- [Checkov](https://github.com/bridgecrewio/checkov) - Static analysis for infrastructure as code manifests (Terraform, Kubernetes, Cloudformation, Helm, Dockerfile, Kustomize) find security misconfiguration and fix them. By [bridgecrew](https://github.com/bridgecrewio).
- [CIS Docker Benchmark](https://github.com/dev-sec/cis-docker-benchmark) :ice_cube: - This [InSpec][inspec] compliance profile implement the CIS Docker 1.12.0 Benchmark in an automated way to provide security best-practice tests around Docker daemon and containers in a production environment. By [dev-sec](https://github.com/dev-sec).
- [Clair](https://github.com/quay/clair) - Clair is an open source project for the static analysis of vulnerabilities in appc and docker containers. By [coreos][coreos].
- [crowdsec-blocklist-import](https://github.com/wolffcatskyy/crowdsec-blocklist-import) - Aggregates 36 free threat intelligence feeds into 120k+ malicious IPs for CrowdSec bouncers, providing 10-20x more blocks than default lists. By [wolffcatskyy](https://github.com/wolffcatskyy).
- [Dagda](https://github.com/eliasgranderubio/dagda) :ice_cube: - Dagda is a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities. By [eliasgranderubio](https://github.com/eliasgranderubio).
- [Deepfence Enterprise](https://deepfence.io) - :yen: Full life cycle Cloud Native Workload Protection platform for kubernetes, virtual machines and serverless. By [deepfence][deepfence].
- [Deepfence Threat Mapper](https://github.com/deepfence/ThreatMapper) - Powerful runtime vulnerability scanner for kubernetes, virtual machines and serverless. By [deepfence][deepfence].
- [docker-bench-security](https://github.com/docker/docker-bench-security) - Script that checks for dozens of common best-practices around deploying Docker containers in production. By [docker][docker].
- [docker-explorer](https://github.com/google/docker-explorer) - A tool to help forensicate offline docker acquisitions.
- [dvwassl](https://github.com/Peco602/dvwassl) :ice_cube: - SSL-enabled Damn Vulnerable Web App to test Web Application Firewalls. By [Peco602][peco602].
- [KICS](https://github.com/checkmarx/kics) - An infrastructure-as-code scanning tool, find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle. Can be extended for additional policies. By [Checkmarx](https://github.com/Checkmarx).
- [oscap-docker](https://github.com/OpenSCAP/openscap) - OpenSCAP provides oscap-docker tool which is used to scan Docker containers and images. By [OpenSCAP](https://github.com/OpenSCAP).
- [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud) - :yen: (Previously Twistlock Security Suite) detects vulnerabilities, hardens container images, and enforces security policies across the lifecycle of applications.
- [segspec](https://github.com/dormstern/segspec) - Extracts network dependencies from Docker Compose, Kubernetes manifests, Helm charts, and other config files to generate Kubernetes NetworkPolicies with evidence tracing. By [dormstern](https://github.com/dormstern).
- [Syft](https://github.com/anchore/syft) - CLI tool and library for generating a Software Bill of Materials (SBOM) from container images and filesystems.
- [Sysdig Falco](https://github.com/falcosecurity/falco) - Sysdig Falco is an open source container security monitor. It can monitor application, container, host, and network activity and alert on unauthorized activity.
- [Sysdig Secure](https://www.sysdig.com/solutions/cloud-detection-and-response-cdr) - :yen: Sysdig Secure addresses run-time security through behavioral monitoring and defense, and provides deep forensics based on open source Sysdig for incident response.
- [Trend Micro DeepSecurity](https://www.trendmicro.com/en_us/business/products/hybrid-cloud/deep-security.html) - :yen: Trend Micro DeepSecurity offers runtime protection for container workloads and hosts as well as preruntime scanning of images to identify vulnerabilities, malware and content such as hardcoded secrets.
- [Trivy](https://github.com/aquasecurity/trivy) - Aqua Security's open source simple and comprehensive vulnerability scanner for containers (suitable for CI).

### Service Discovery

-   [docker-consul](https://github.com/gliderlabs/docker-consul) by [progrium][progrium]
- [docker-dns](https://github.com/bytesharky/docker-dns) - Lightweight DNS forwarder for Docker containers, resolves container names with custom suffixes (e.g. `.docker`) on the host to simplify service discovery.
- [etcd](https://github.com/etcd-io/etcd) - Distributed reliable key-value store for the most critical data of a distributed system by [etcd-io](https://github.com/etcd-io) (former part of CoreOS).
- [istio](https://github.com/istio/istio) - An open platform to connect, manage, and secure microservices.
- [registrator](https://github.com/gliderlabs/registrator) - Service registry bridge for Docker by [gliderlabs][gliderlabs] and [progrium][progrium].

### Volume Management / Data

-   [Blockbridge](https://github.com/blockbridge/blockbridge-docker-volume) :yen:- The Blockbridge plugin is a volume plugin that provides access to an extensible set of container-based persistent storage options. It supports single and multi-host Docker environments with features that include tenant isolation, automated provisioning, encryption, secure deletion, snapshots and QoS. By [blockbridge](https://github.com/blockbridge)
-   - [Label Backup](https://github.com/resulgg/label-backup) - A lightweight, Docker-aware backup agent that automatically discovers and backs up containerized databases (PostgreSQL, MySQL, MongoDB, Redis) based on Docker labels. Supports local storage and S3-compatible destinations with flexible scheduling via cron expressions.
-   [Docker Volume Backup](https://github.com/offen/docker-volume-backup) Backup Docker volumes locally or to any S3 compatible storage. By [offen](https://github.com/offen)
-   [duplicacy-cli-cron](https://github.com/GeiserX/duplicacy-cli-cron) - Docker-based encrypted dual-storage backup automation using Duplicacy CLI with cross-site redundancy and Telegram notifications. By [GeiserX](https://github.com/GeiserX).
-   [Netshare](https://github.com/ContainX/docker-volume-netshare) Docker NFS, AWS EFS, Ceph & Samba/CIFS Volume Plugin. By [ContainX][containx]
- [portworx](https://portworx.com) - :yen: Decentralized storage solution for persistent, shared and replicated volumes.
- [quobyte](https://www.quobyte.com/) - :yen: Fully fault-tolerant distributed file system with a docker volume driver.
-   [REX-Ray](https://github.com/rexray/rexray) provides a vendor agnostic storage orchestration engine. The primary design goal is to provide persistent storage for Docker, Kubernetes, and Mesos. By[thecodeteam](https://github.com/thecodeteam) (DELL Technologies)

- [Storidge](https://github.com/Storidge/quick-start) :ice_cube: - :yen: Software-defined Persistent Storage for Kubernetes and Docker Swarm.
### User Interface

#### IDE integrations

-   JetBrains IDEs (IntelliJ IDEA, GoLand, WebStorm, CLion etc.) has [built-in Docker plugin](https://www.jetbrains.com/help/idea/docker.html#managing-images)
-   Eclipse [Docker Tooling plugin](https://www.eclipse.org/community/eclipse_newsletter/2016/july/article2.php)
-   [docker.el](https://github.com/Silex/docker.el) Manage docker from Emacs by [Silex](https://github.com/Silex)

#### Desktop

Native desktop applications for managing and monitoring docker hosts and clusters

- [Docker DB Manager](https://github.com/AbianS/docker-db-manager) - Desktop app for managing Docker database containers with visual interface and one-click operations.
- [Docker Desktop](https://www.docker.com/products/docker-desktop/) - Official native app. Only for Windows and MacOS.
- [Simple Docker UI](https://github.com/felixgborrego/simple-docker-ui) - Built on Electron. By [felixgborrego](https://github.com/felixgborrego/).
- [Stevedore](https://github.com/slonopotamus/stevedore) - Good Docker Desktop replacement for Windows. Both Linux and Windows Containers are supported. [slonopotamus](https://github.com/slonopotamus).

#### Terminal

##### Terminal UI
- [d4s](https://github.com/jr-k/d4s) - A fast, keyboard-driven terminal UI to manage Docker containers, Compose stacks, and Swarm services with the ergonomics of K9s.
- [dive](https://github.com/wagoodman/dive) - A tool for exploring each layer in a docker image. By [wagoodman](https://github.com/wagoodman).
-   [dockdash](https://github.com/byrnedo/dockdash) detailed stats. By [byrnedo]
- [dockly](https://github.com/lirantal/dockly) - An interactive shell UI for managing Docker containers.
- [DockMate](https://github.com/shubh-io/dockmate) - Lightweight terminal-based Docker and Podman manager with a text-based user interface,.
- [DockSTARTer](https://github.com/GhostWriters/DockSTARTer) - DockSTARTer helps you get started with home server apps running in Docker by [GhostWriters](https://github.com/GhostWriters).
- [dprs](https://github.com/durableprogramming/dprs) - A developer-focused TUI for managing Docker containers with real-time log streaming and container management. Built with Rust. By [durableprogramming](https://github.com/durableprogramming).
- [dry](https://github.com/moncho/dry) - An interactive CLI for Docker containers.
- [goManageDocker](https://github.com/ajayd-san/gomanagedocker) - TUI tool to view and manage your docker objects blazingly fast with sensible keybindings, also supports VIM navigation out of the box.
- [lazydocker](https://github.com/jesseduffield/lazydocker) - The lazier way to manage everything docker. A simple terminal UI for both docker and docker-compose, written in Go with the gocui library. By [jesseduffield](https://github.com/jesseduffield).
- [lazyjournal](https://github.com/Lifailon/lazyjournal) - A interface for reading and filtering the logs output of Docker and Podman containers like [Dozzle](dozzle) but for the terminal with support for fuzzy find, regex and output coloring.
- [oxker](https://github.com/mrjackwills/oxker) - A simple tui to view & control docker containers. Written in [Rust](https://rust-lang.org/), making heavy use of [ratatui](https://github.com/tui-rs-revival/ratatui) & [Bollard](https://github.com/fussybeaver/bollard),.

##### CLI tools

- [captain](https://github.com/jenssegers/captain) :ice_cube: - Easily start and stop docker compose projects from any directory. By [jenssegers](https://github.com/jenssegers).
- [dcinja](https://github.com/Falldog/dcinja) - The powerful and smallest binary size of template engine for docker command line environment. By [Falldog](https://github.com/Falldog).
- [dcp](https://github.com/exdx/dcp) :ice_cube: - A simple tool for copying files from container filesystems. By [exdx](https://github.com/exdx).
- [dctl](https://github.com/FabienD/docker-stack) - Dctl is a Cli tool that helps developers by allowing them to execute all docker compose commands anywhere in the terminal, and more. By [FabienD](https://github.com/FabienD).
- [decompose](https://github.com/s0rg/decompose) - Reverse-engineering tool for docker environments. By [s0rg](https://github.com/s0rg).
- [docker pushrm](https://github.com/christian-korneck/docker-pushrm) - A Docker CLI plugin that lets you push the README.md file from the current directory to Docker Hub. Also supports Quay and Harbor. By [christian-korneck](https://github.com/christian-korneck).
- [docker-captain](https://github.com/lucabello/docker-captain) - A friendly CLI to manage multiple Docker Compose deployments with style — powered by Typer, Rich, questionary, and sh.
- [DVM](https://github.com/howtowhale/dvm) :ice_cube: - Docker version manager.
- [goinside](https://github.com/iamsoorena/goinside) :ice_cube: - Get inside a running docker container easily.
- [Pdocker](https://github.com/g31s/Pdocker) :ice_cube: - A simple tool to manage and maintain Docker for personal projects.
- [proco](https://github.com/shiwaforce/poco) - Proco will help you to organise and manage Docker, Docker-Compose, Kubernetes projects of any complexity using simple YAML config files to shorten the route from finding your project to initialising it in your local environment.
- [scuba](https://github.com/JonathonReinhart/scuba) - Transparently use Docker containers to encapsulate software build environments,.
- [skopeo](https://github.com/containers/skopeo) - Work with remote images registries - retrieving information, images, signing content.
- [supdock](https://github.com/segersniels/supdock) - Allows for slightly more visual usage of Docker with an interactive prompt. By [segersniels](https://github.com/segersniels).

- [tsaotun](https://github.com/qazbnm456/tsaotun) :ice_cube: - Python based Assistance for Docker.
##### Other

- [dext-docker-registry-plugin](https://github.com/vutran/dext-docker-registry-plugin) :ice_cube: - Search the Docker Registry with the Dext smart launcher. By [vutran](https://github.com/vutran).
- [docker-ssh](https://github.com/jeroenpeeters/docker-ssh) :ice_cube: - SSH Server for Docker containers ~ Because every container should be accessible. By [jeroenpeeters](https://github.com/jeroenpeeters).
-   [dockerfile-mode](https://github.com/spotify/dockerfile-mode) An emacs mode for handling Dockerfiles by [spotify][spotify]

- [MultiDocker](https://github.com/marty90/multidocker) :ice_cube: - Create a secure multi-user Docker machine, where each user is segregated into an indepentent container.
- [Powerline-Docker](https://github.com/adrianmo/powerline-docker) :ice_cube: - A Powerline segment for showing the status of Docker containers.
#### Web

- [Arcane](https://github.com/getarcaneapp/arcane) - An easy and modern Docker management platform, built with everybody in mind. By [getarcaneapp](https://github.com/getarcaneapp).
- [CASA](https://github.com/knrdl/casa) - Outsource the administration of a handful of containers to your co-workers,.
- [Container Web TTY](https://github.com/wrfly/container-web-tty) - Connect your containers via a web-tty [wrfly](https://github.com/wrfly).
- [dockemon](https://github.com/ProductiveOps/dokemon) :ice_cube: - Docker Container Management GUI.
- [Docker Registry Browser](https://github.com/klausmeyer/docker-registry-browser) - Web Interface for the Docker Registry HTTP API v2.
- [docker-registry-web](https://github.com/mkuchin/docker-registry-web) :ice_cube: - Web UI, authentication service and event recorder for private docker registry v2.
- [docker-swarm-visualizer](https://github.com/dockersamples/docker-swarm-visualizer) - Visualizes Docker services on a Docker Swarm (for running demos).
- [dockge](https://github.com/louislam/dockge) - Easy-to-use and reactive self-hosted docker compose.yaml stack-oriented manager.
- [Komodo](https://github.com/mbecker20/komodo) - A tool to build and deploy software on many servers.
- [Kubevious](https://github.com/kubevious/kubevious) :ice_cube: - A highly visual web UI for Kubernetes which renders configuration and state in an application centric way.
- [Mafl](https://github.com/hywax/mafl) - Minimalistic flexible homepage.
- [netdata](https://github.com/netdata/netdata) - Real-time performance monitoring.
- [OctoLinker](https://github.com/OctoLinker/OctoLinker) :ice_cube: - A browser extension for GitHub that makes the image name in a `Dockerfile` clickable and redirect you to the related Docker Hub page.
- [Portainer](https://github.com/portainer/portainer) - A lightweight management UI for managing your Docker hosts or Docker Swarm clusters.
- [Rapid Dashboard](https://github.com/ozlerhakan/rapid) :ice_cube: - A simple query dashboard to use Docker Remote API.
- [Seagull](https://github.com/tobegit3hub/seagull) :ice_cube: - Friendly Web UI to monitor docker daemon.
- [Swarmpit](https://github.com/swarmpit/swarmpit) - Swarmpit provides simple and easy to use interface for your Docker Swarm cluster. You can manage your stacks, services, secrets, volumes, networks etc.
- [Swirl](https://github.com/cuigh/swirl) :ice_cube: - Swirl is a web management tool for Docker, focused on swarm cluster By [cuigh](https://github.com/cuigh/).
- [Theia](https://github.com/eclipse-theia/theia) - Extensible platform to develop full-fledged multi-language Cloud & Desktop IDE-like products with state-of-the-art web technologies.
- [usulnet](https://github.com/fr4nsys/usulnet) - A complete and modern Docker management platform designed for sysadmin, devops with enterprise grade tools, cve scanner, ssh, rdp on web and much more. By [fr4nsys](https://github.com/fr4nsys).

## Docker Images

### Base Tools

Tools and applications that are either installed inside containers or designed to be run as a [sidecar](https://learn.microsoft.com/en-us/azure/architecture/patterns/sidecar)

- [amicontained](https://github.com/genuinetools/amicontained) :ice_cube: - Container introspection tool. Find out what container runtime is being used as well as features available.
- [Chaperone](https://github.com/garywiz/chaperone) :ice_cube: - A single PID1 process designed for docker containers. Does user management, log management, startup, zombie reaping, all in one small package.
- [ckron](https://github.com/nicomt/ckron) - A cron-style job scheduler for docker,.
-   [CoreOS][coreos] - Linux for Massive Server Deployments
- [distroless](https://github.com/GoogleContainerTools/distroless) - Language focused docker images, minus the operating system,.
- [docker-alpine](https://github.com/gliderlabs/docker-alpine) :ice_cube: - A super small Docker base image _(5MB)_ using Alpine Linux.
- [docker-gen](https://github.com/jwilder/docker-gen) - Generate files from docker container meta-data.
- [dockerize](https://github.com/powerman/dockerize) - Utility to simplify running applications in docker containers by [jwilder][jwilder], [powerman][powerman].
- [GoSu](https://github.com/tianon/gosu) - Run this specific application as this specific user and get out of the pipeline (entrypoint script tool).
- [is-docker](https://github.com/sindresorhus/is-docker) - Check if the process is running inside a Docker container.
- [lstags](https://github.com/ivanilves/lstags) :ice_cube: - Sync Docker images across registries.
- [microcheck](https://github.com/tarampampam/microcheck) - Lightweight health check utilities for Docker containers (75 KB instead of 9.3 MB for httpcheck versus cURL) in pure C - http(s), port checks, and parallel execution are included.
- [Ofelia](https://github.com/mcuadros/ofelia/) - Ofelia is a modern and low footprint job scheduler for docker environments, built on Go. Ofelia aims to be a replacement for the old fashioned cron. Supports configuration from container labels and/or configuration files.
- [SparkView](https://github.com/beyondssl/sparkview-container) - Access VMs, desktops, servers or applications anytime and from anywhere, without complex and costly client roll-outs or user management.
- [su-exec](https://github.com/ncopa/su-exec) - This is a simple tool that will simply execute a program with different privileges. The program will be executed directly and not run as a child, like su and sudo does, which avoids TTY and signal issues. Why reinvent gosu? This does more or less exactly the same thing as gosu but it is only 10kb instead of 1.8MB. By [ncopa](https://github.com/ncopa).
- [sue](https://github.com/theAkito/sue) :ice_cube: - Executes a program as a user different from the user running sue. This is a maintainable alternative to ncopa/su-exec, which is the better tianon/gosu. This one is far better (higher performance, smaller size), than the original gosu, however it is far easier to maintain, than su-exec, which is written in plain C. Made by [Akito][akito].
- [supercronic](https://github.com/aptible/supercronic) - Crontab-compatible job runner, designed specifically to run in containers.

- [TrivialRC](https://github.com/vorakl/TrivialRC) :ice_cube: - A minimalistic Runtime Configuration system and process manager for containers [vorakl](https://github.com/vorakl).
### Builder

Applications designed to help or simplify building **new** images

- [ansible-bender](https://github.com/ansible-community/ansible-bender) - A tool utilising `ansible` and `buildah`.
- [buildah](https://github.com/containers/buildah) - A tool that facilitates building OCI images.
- [BuildKit](https://github.com/moby/buildkit) - Concurrent, cache-efficient, and Dockerfile-agnostic builder toolkit.
- [cekit](https://github.com/cekit/cekit) - A tool used by openshift to build base images using different build engines.
- [container-factory](https://github.com/mutable/container-factory) :ice_cube: - Produces Docker images from tarballs of application source code.
- [copy-docker-image](https://github.com/mdlavin/copy-docker-image) :ice_cube: - Copy a Docker image between registries without a full Docker installation.
- [Derrick](https://github.com/alibaba/derrick) :ice_cube: - A tool help you to automate the generation of Dockerfile and dockerize application by scanning the code. By [alibaba](https://github.com/alibaba).
- [dlayer](https://github.com/orisano/dlayer) - Docker layer analyzer.
- [docker-companion](https://github.com/mudler/docker-companion) - A command line tool written in Golang to squash and unpack docker images.
- [docker-make](https://github.com/CtripCloud/docker-make) :ice_cube: - Build, tag,and push a bunch of related docker images via a single command.
- [docker-repack](https://github.com/orf/docker-repack) - Repacks a Docker image into a smaller, more efficient version that makes it significantly faster to pull. By [orf](https://github.com/orf).
- [docker-replay](https://github.com/bcicen/docker-replay) :ice_cube: - Generate `docker run`command and options from running containers. By [bcicen](https://github.com/bcicen).
-   [DockerSlim](https://github.com/docker-slim/docker-slim) shrinks fat Docker images creating the smallest possible images.
- [Dockly](https://github.com/swipely/dockly) :ice_cube: - Dockly is a gem made to ease the pain of packaging an application in Docker.
- [essex](https://github.com/utensils/essex) - Boilerplate for Docker Based Projects: Essex is a CLI utility written in bash to quickly setup clean and consistent Docker projects with Makefile driven workflows. [jamesbrink](https://github.com/jamesbrink).
- [HPC Container Maker](https://github.com/NVIDIA/hpc-container-maker) - Generates Dockerfiles from a high level Python recipe, including building blocks for High-Performance Computing components.
- [img](https://github.com/genuinetools/img) - Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder.
- [packer](https://developer.hashicorp.com/packer/integrations/hashicorp/docker/latest/components/builder/docker) - Hashicorp tool to build machine images including docker image integrated with configuration management tools like chef, puppet, ansible.
- [portainer](https://github.com/duedil-ltd/portainer) :ice_cube: - Apache Mesos framework for building Docker images.
- [Production-Ready Python Containers :yen:](https://pythonspeed.com/products/pythoncontainer/) - A template for creating production-ready Docker images for Python applications.
- [RAUDI](https://github.com/cybersecsi/RAUDI) - A tool to automatically update (and optionally push to Docker Hub) Docker Images for 3rd party software whenever theres is a new release/update/commit. By [SecSI](https://github.com/cybersecsi).
- [runlike](https://github.com/lavie/runlike) - Generate `docker run`command and options from running containers.
- [userdef](https://github.com/theAkito/userdef) :ice_cube: - An advanced `adduser` for your Alpine based Docker images. Made by [Akito][akito].
- [Whaler](https://github.com/P3GLEG/Whaler) - Program to reverse Docker images into Dockerfiles.

- [Whales](https://github.com/Gueils/whales) :ice_cube: - A tool to automatically dockerize your applications.
### Dockerfile

- [chaperone-docker](https://github.com/garywiz/chaperone-docker) :ice_cube: - A set of images using the Chaperone process manager, including a lean Alpine image, LAMP, LEMP, and bare-bones base kits.
-   [Dockerfile Generator](https://github.com/ozankasikci/dockerfile-generator) `dfg` is both a Go library and an executable that produces valid Dockerfiles using various input channels.
- [Dockerfile Project](https://dockerfile.github.io/) - Trusted Automated Docker Builds. Dockerfile Project maintains a central repository of Dockerfile for various popular open source software services runnable on a Docker container.
- [dockerfilegraph](https://github.com/patrickhoefler/dockerfilegraph) - Visualize your multi-stage Dockerfiles. By [PatrickHoefler](https://github.com/patrickhoefler).
- [Dockershelf](https://github.com/Dockershelf/dockershelf) - A repository that serves as a collector for docker recipes that are universal, efficient and slim. Images are updated, tested and published daily via a Travis cron job.
- [Vektorcloud](https://github.com/vektorcloud) - A collection of minimal, Alpine-based Docker images.

Examples by:

-   [0xy](https://gitlab.com/0xy/dockerfiles)
-   [arun-gupta](https://github.com/arun-gupta/docker-images)
-   [awesome-startup](https://github.com/awesome-startup/docker-compose)
-   [crosbymichael](https://github.com/crosbymichael/Dockerfiles)
-   [jessfraz](https://github.com/jessfraz/dockerfiles)
-   [komljen](https://github.com/komljen/dockerfile-examples)
-   [kstaken](https://github.com/kstaken/dockerfile-examples)
-   [ondrejmo](https://github.com/ondrejmo/Dockerfiles)
-   [vimagick](https://github.com/vimagick/dockerfiles)

### Linter

- [Dockadvisor](https://github.com/deckrun/dockadvisor) - Lightweight Dockerfile linter with 60+ rules, quality scoring, and security checks.
- [docker-image-size-limit](https://github.com/wemake-services/docker-image-size-limit) - A tool to keep an eye on your docker images size.
- [Dockerfile Linter action](https://github.com/buddy-works/dockerfile-linter) :ice_cube: - The linter lets you verify Dockerfile syntax to make sure it follows the best practices for building efficient Docker images.
- [FROM:latest](https://github.com/replicatedhq/dockerfilelint) :ice_cube: - An opinionated Dockerfile linter.
- [Hadolint](https://github.com/hadolint/hadolint) - A Dockerfile linter that checks for best practices, common mistakes, and is also able to lint any bash written in `RUN` instructions;.

### Metadata

- [opencontainer](https://github.com/opencontainers/image-spec/blob/main/annotations.md) - A convention and shared namespace for Docker labels defined by OCI Image Spec.

### Registry

Services to securely store your Docker images.

- [Amazon Elastic Container Registry :yen:](https://aws.amazon.com/ecr/) - Amazon Elastic Container Registry (ECR) is a fully-managed Docker container registry that makes it easy for developers to store, manage, and deploy Docker container images.
- [Azure Container Registry :yen:](https://azure.microsoft.com/en-us/products/container-registry/#overview) - Manage a Docker private registry as a first-class Azure resource.
- [CargoOS](https://github.com/RedCoolBeans/cargos-buildroot) :ice_cube: - A bare essential OS for running the Docker Engine on bare metal or Cloud. By [RedCoolBeans](https://github.com/RedCoolBeans).
- [cleanreg](https://github.com/hcguersoy/cleanreg) :ice_cube: - A small tool to delete image manifests from a Docker Registry implementing the API v2, dereferencing them for the GC.
- [Cloudsmith :yen:](https://cloudsmith.com/product/formats/docker-registry) - A fully managed package management SaaS, with first-class support for public and private Docker registries (and many others, incl. Helm charts for the Kubernetes ecosystem). Has a generous free-tier and is also completely free for open-source.
- [Container Registry Service :yen:](https://container-registry.com/) - Harbor based Container Management Solution as a Service for teams and organizations. Free tier offers 1 GB storage for private repositories.
- [Cycle.io :yen:](https://cycle.io/) - Bare-metal container hosting.
- [DigitalOcean :yen:](https://www.digitalocean.com/products/container-registry) - DigitalOcean Container Registry.
-   [Docker Hub](https://hub.docker.com/) provided by Docker Inc.
-   [Docker Registry v2][distribution] - The Docker toolset to pack, ship, store, and deliver content
- [Docket](https://github.com/netvarun/docket) :ice_cube: - Custom docker registry that allows for lightning fast deploys through bittorrent.
- [Dragonfly](https://github.com/dragonflyoss/Dragonfly2) - Provide efficient, stable and secure file distribution and image acceleration based on p2p technology.
-   [GCP Artifact Registry :yen:](https://cloud.google.com/artifact-registry/docs) Fast, private Docker image storage on Google Cloud Platform.
- [Gitea Container Registry](https://docs.gitea.com/usage/packages/container) - Integrated Docker registry in Gitea, ideal for private, small-scale image hosting.
- [GitHub Container Registry](https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry) - GitHub's solution for storing and managing Docker images, with tight integration into GitHub Actions.
- [GitLab Container Registry](https://docs.gitlab.com/user/packages/container_registry/) - Registry focused on using its images in GitLab CI.
-   [Harbor](https://github.com/goharbor/harbor) An open source trusted cloud native registry project that stores, signs, and scans content. Supports replication, user management, access control and activity auditing. By [CNCF](https://www.cncf.io) formerly [VMWare][vmware]
- [JFrog Artifactory :yen:](https://jfrog.com/artifactory/) - Artifact Repository Manager, can be used as private Docker Registry as well.
- [Kraken](https://github.com/uber/kraken) - Uber's Highly scalable P2P docker registry, capable of distributing TBs of data in seconds.
- [nscr](https://github.com/jhstatewide/nscr) - A light-weight, self-contained container registry that's easy to run and maintain.
- [Quay.io :yen:](https://quay.io/) - Secure hosting for private Docker repositories.
- [Registryo](https://github.com/inmagik/registryo) - UI and token based authentication server for onpremise docker registry.
- [RepoFlow](https://www.repoflow.io) - A simple and easy-to-use package management platform with Docker support alongside other formats like PyPI, Maven, npm, and Helm. Includes smart search, built-in Docker image scanning, and a great free option for both self-hosted and cloud use.
- [Rescoyl](https://github.com/noteed/rescoyl) :ice_cube: - Private Docker registry (free and open source).
- [Sonatype Nexus Repository](https://www.sonatype.com/products/sonatype-nexus-repository) - Manage binaries and build artifacts across your software supply chain.

## Development with Docker

### API Client

- [ahab](https://github.com/instacart/ahab) :ice_cube: - Docker event handling with Python.
- [contajners](https://github.com/lispyclouds/contajners) - An idiomatic, data-driven, REPL friendly Clojure client for OCI container engines. By [lispyclouds][lispyclouds].
- [Docker Client for JVM](https://github.com/gesellix/docker-client) - A Docker remote api client library for the JVM, written in Groovy.
- [Docker Client TypeScript](https://gitlab.com/masaeedu/docker-client) - Docker API client for JavaScript, automatically generated from Swagger API definition from moby repository. By [masaeedu](https://github.com/masaeedu).
- [docker-controller-bot](https://github.com/dgongut/docker-controller-bot) - Telegram bot to control docker containers. By [dgongut](https://github.com/dgongut/).
- [docker-it-scala](https://github.com/whisklabs/docker-it-scala) :ice_cube: - Docker integration testing kit with Scala.
- [docker-java-api](https://github.com/amihaiemil/docker-java-api) :ice_cube: - Lightweight, truly object-oriented, Java client for Docker's API. By [amihaiemil](https://github.com/amihaiemil).
- [docker-maven-plugin](https://github.com/fabric8io/docker-maven-plugin) - A Maven plugin for running and creating Docker images.
- [Docker.DotNet](https://github.com/Microsoft/Docker.DotNet) - C#/.NET HTTP client for the Docker remote API.
- [Docker.Registry.DotNet](https://github.com/ChangemakerStudios/Docker.Registry.DotNet) - .NET (C#) Client Library for interacting with a Docker Registry API (v2) [rquackenbush](https://github.com/rquackenbush).
- [dockerode](https://github.com/apocas/dockerode) - Docker Remote API node.js module.
- [DoMonit](https://github.com/eon01/DoMonit) :ice_cube: - A simple Docker Monitoring wrapper For Docker API.
- [go-dockerclient](https://github.com/fsouza/go-dockerclient/) - Go HTTP client for the Docker remote API.
- [Gradle Docker plugin](https://github.com/gesellix/gradle-docker-plugin) - A Docker remote api plugin for Gradle.
- [Portainer stack utils](https://github.com/greenled/portainer-stack-utils) - Bash script to deploy/update/undeploy Docker stacks in a Portainer instance from a docker-compose yaml file. By [greenled](https://github.com/greenled).
- [sbt-docker](https://github.com/marcuslonnberg/sbt-docker) - Create Docker images directly from sbt.

### CI/CD

- [Buddy :yen:](https://buddy.works) - The best of Git, build & deployment tools combined into one powerful tool that supercharged our development.
- [Captain](https://github.com/harbur/captain) - Convert your Git workflow to Docker containers ready for Continuous Delivery.
- [Cyclone](https://github.com/caicloud/cyclone) :ice_cube: - Powerful workflow engine and end-to-end pipeline solutions implemented with native Kubernetes resources.
- [Defang](https://github.com/DefangLabs/defang) - Deploy Docker Compose to your favorite cloud in minutes.
- [Depot :yen:](https://depot.dev) - Build Docker images fast, in the cloud. Blazing fast compute, automatic intelligent caching, and zero configuration. [Done in seconds](https://depot.dev/#benchmarks).
- [Diun](https://github.com/crazy-max/diun) - Receive notifications when an image or repository is updated on a Docker registry by [crazy-max].
- [dockcheck](https://github.com/mag37/dockcheck) - A script checking updates for docker images without pulling then auto-update selected/all containers. With notifications, pruning and more.
- [Docker plugin for Jenkins](https://github.com/jenkinsci/docker-plugin/) - The aim of the docker plugin is to be able to use a docker host to dynamically provision a slave, run a single build, then tear-down that slave.
- [Drone](https://github.com/drone/drone) - Continuous integration server built on Docker and configured using YAML files.
- [Gantry](https://github.com/shizunge/gantry) - Automatically update selected Docker swarm services.
- [GitLab Runner](https://gitlab.com/gitlab-org/gitlab-runner) - GitLab has integrated CI to test, build and deploy your code with the use of GitLab runners.
- [Jaypore CI](https://github.com/theSage21/jaypore_ci) - Simple, very flexible, powerful CI / CD / automation system configured in Python. Offline and local first.
- [Kraken CI](https://github.com/Kraken-CI/kraken) - Modern CI/CD, open-source, on-premise system that is highly scalable and focused on testing. One of its executors is Docker. Developed.
- [Microservices Continuous Deployment](https://github.com/francescou/docker-continuous-deployment) :ice_cube: - Continuous deployment of a microservices application.
- [mu](https://github.com/stelligent/mu) :ice_cube: - Tool to configure CI/CD of your container applications via AWS CodePipeline, CodeBuild and ECS [Stelligent](https://github.com/stelligent).
- [Popper](https://github.com/systemslab/popper) :ice_cube: - Github actions workflow (HCL syntax) execution engine.
- [Screwdriver :yen:](https://screwdriver.cd/) - Yahoo's OpenSource buildplatform designed for Continous Delivery.
- [Skipper](https://github.com/Stratoscale/skipper) - Easily dockerize your Git repository.
- [SwarmCI](https://github.com/ghostsquad/swarmci) :ice_cube: - Create a distributed, isolated task pipeline in your Docker Swarm.
- [Tekton CD](https://tekton.dev/) - A cloud-native pipeline resource.

### Development Environment

- [Binci](https://github.com/binci/binci) :ice_cube: - Containerize your development workflow. (formerly DevLab by [TechnologyAdvice](https://github.com/TechnologyAdvice)).
- [coder](https://github.com/coder/coder) - Remote development machines powered by Terraform or Docker.
- [construi](https://github.com/lstephen/construi) :ice_cube: - Run your builds inside a Docker defined environment.
- [dde](https://github.com/whatwedo/dde) - Local development environment toolset based on Docker. By [whatwedo](https://github.com/whatwedo).
- [DIP](https://github.com/bibendi/dip) - CLI utility for straightforward provisioning and interacting with an application configured by docker-compose. By [bibendi](https://github.com/bibendi).
- [dobi](https://github.com/dnephin/dobi) :ice_cube: - A build automation tool for Docker applications. By [dnephin](https://github.com/dnephin).
- [Docker Missing Tools](https://github.com/nandoquintana/docker-missing-tools) :ice_cube: - A set of bash commands to shortcut typical docker dev-ops. An alternative to creating typical helper scripts like "build.sh" and "deploy.sh" inside code repositories. By [NandoQuintana](https://github.com/nandoquintana).
- [Docker-Arch](https://github.com/Ph3nol/Docker-Arch) :ice_cube: - Generate Web/CLI projects Dockerized development environments, from 1 simple YAML file. By [Ph3nol](https://github.com/ph3nol).
- [Docker-sync](https://github.com/EugenMayer/docker-sync) - Drastically improves performance ([50-70x](https://github.com/EugenMayer/docker-sync/wiki/4.-Performance)) when using Docker for development on Mac OS X/Windows and Linux while sharing code to the container. By [EugenMayer](https://github.com/EugenMayer).
- [docker-vm](https://github.com/shyiko/docker-vm) :ice_cube: - Simple and transparent alternative to boot2docker (backed by Vagrant).
- [DockerDL](https://github.com/matifali/dockerdl) - Deep Learning Docker Images. Don't waste time setting up a deep learning env when you can get a deep learning environment with everything pre-installed.
- [Eclipse Che](https://github.com/eclipse/che) - Developer workspace server with Docker runtimes, cloud IDE, next-generation Eclipse IDE.
- [EnvCLI](https://github.com/EnvCLI/EnvCLI) - Replace your local installation of Node, Go, ... with project-specific docker containers. By [EnvCLI](https://github.com/EnvCLI).
- [ESP32 Linux - Docker builder](https://github.com/hpsaturn/esp32s3-linux) - Container solution to compile Linux and develop it for ESP32 microcontrollers - By [Hpsaturn](https://github.com/hpsaturn).
- [Gebug](https://github.com/moshebe/gebug) - A tool that makes debugging of Dockerized Go applications super easy by enabling Debugger and Hot-Reload features, seamlessly.
- [Kitt](https://github.com/senges/kitt) :ice_cube: - A portable and disposable Shell environment, based on Docker and Nix. By [senges](https://github.com/senges).
- [Lando](https://github.com/lando/lando) - Lando is for developers who want to quickly specify and painlessly spin up the services and tools needed to develop their projects. By [Tandem](https://www.thinktandem.io/).
- [Rust Universal Compiler](https://github.com/Peco602/rust-universal-compiler) :ice_cube: - Container solution to compile Rust projects for Linux, macOS and Windows. By [Peco602][peco602].
- [uniget](https://github.com/uniget-org/cli) - Uni(versal)get, the installer and updater for container tools and beyond (formerly docker-setup). By [nicholasdille](https://github.com/nicholasdille).
- [Vagga](https://github.com/tailhook/vagga) :ice_cube: - Vagga is a containerisation tool without daemons. It is a fully-userspace container engine inspired by Vagrant and Docker, specialized for development environments.
- [Zsh-in-Docker](https://github.com/deluan/zsh-in-docker) - Install Zsh, Oh-My-Zsh and plugins inside a Docker container with one line! By [Deluan](https://www.deluan.com).

### Garbage Collection

- [caduc](https://github.com/tjamet/caduc) :ice_cube: - A docker garbage collector cleaning stuff you did not use recently.
- [Docker Clean](https://github.com/ZZROTDesign/docker-clean) :ice_cube: - A script that cleans Docker containers, images and volumes.
- [docker-custodian](https://github.com/Yelp/docker-custodian) - Keep docker hosts tidy. By [Yelp](https://github.com/Yelp).
- [docker_gc](https://github.com/pdacity/docker_gc) :ice_cube: - Image for automatic removing unused Docker Swarm objects. Also works just as Docker Service.
- [Docuum](https://github.com/stepchowfun/docuum) - Least recently used (LRU) eviction of Docker images.

### Serverless

- [Apache OpenWhisk](https://github.com/apache/openwhisk) - A serverless, open source cloud platform that executes functions in response to events at any scale. By [apache](https://github.com/apache).
- [Funker](https://github.com/bfirsh/funker-example-voting-app) :ice_cube: - Functions as Docker containers example voting app. By [bfirsh](https://github.com/bfirsh).
- [IronFunctions](https://github.com/iron-io/functions) :ice_cube: - The serverless microservices platform FaaS (Functions as a Service) which uses Docker containers to run Any language or AWS Lambda functions.
- [Koyeb](https://www.koyeb.com/) - :yen: Koyeb is a developer-friendly serverless platform to deploy apps globally. Seamlessly run Docker containers, web apps, and APIs with git-based deployment, native autoscaling, a global edge network, and built-in service mesh and discovery.
- [OpenFaaS](https://github.com/openfaas/faas) - A complete serverless functions framework for Docker and Kubernetes. By [OpenFaaS](https://github.com/openfaas).

- [SCAR](https://github.com/grycap/scar) :ice_cube: - Serverless Container-aware Architectures (SCAR) is a serverless framework that allows easy deployment and execution of containers (e.g. Docker) in Serverless environments (e.g. Lambda).
### Testing

- [Container Structure Test](https://github.com/GoogleContainerTools/container-structure-test) - A framework to validate the structure of an image by checking the outputs of commands or the contents of the filesystem. By [GoogleContainerTools][googlecontainertools].
- [dgoss](https://github.com/goss-org/goss/tree/master/extras/dgoss) - A fast YAML based tool for validating docker containers.
- [DockerSpec](https://github.com/zuazo/dockerspec) :ice_cube: - A small Ruby Gem to run RSpec and Serverspec, Infrataster and Capybara tests against Dockerfiles or Docker images easily. By [zuazo](https://github.com/zuazo).
- [EZDC](https://github.com/lynchborg/ezdc) :ice_cube: - Golang test harness for easily setting up tests that rely on services in a docker-compose.yml. By [byrnedo].
-   [InSpec][inspec] - InSpec is an open-source testing framework for infrastructure with a human- and machine-readable language for specifying compliance, security and policy requirements. By [chef](https://github.com/chef)
- [Kurtosis](https://github.com/kurtosis-tech/kurtosis) - A composable build system for multi-container test environments that provides developers with: a powerful Python-like SDK for environment configuration, a compile-time validator to verify environment behavior & setup, and a runtime for environment execution, monitoring, & debugging capabilities. By [Kurtosis](https://www.kurtosis.com/).
- [Pull Dog](https://github.com/apps/pull-dog) - A GitHub app that automatically creates Docker-based test environments for your pull requests, from your docker-compose files. Not open source.
- [Pumba](https://github.com/alexei-led/pumba) - Chaos testing tool for Docker. Can be deployed on kubernetes and CoreOS cluster. By [alexei-led](https://github.com/alexei-led).

### Wrappers

- [Ansible](https://docs.ansible.com/projects/ansible/latest/collections/community/general/docker_container_module.html) - Manage the life cycle of Docker containers. By RedHat.
- [dexec](https://github.com/docker-exec/dexec) :ice_cube: - Command line interface written in Go for running code with Docker Exec images.
- [dockerized](https://github.com/benzaita/dockerized-cli) :ice_cube: - Seamlessly execute commands in a container.
- [Dray](https://github.com/CenturyLinkLabs/dray) :ice_cube: - An engine for managing the execution of container-based workflows.
- [Hokusai](https://github.com/artsy/hokusai) - A Docker + Kubernetes CLI for application developers; used to containerize an application and to manage its lifecycle throughout development, testing, and release cycles. From [artsy](https://github.com/artsy).
- [Preevy](https://github.com/livecycle/preevy) - Preview environments for Docker and Docker Compose projects. Test your changes and get feedback from devs and non-devs (Product/Design) by deploying pull requests to the your cloud provider as part of your CI pipeline.
- [Shutit](https://github.com/ianmiell/shutit) :ice_cube: - Tool for building and maintaining complex Docker deployments.
- [subuser](https://github.com/subuser-security/subuser) - Makes it easy to securely and portably run graphical desktop applications in Docker.
- [Terraform cloud-init config](https://github.com/christippett/terraform-cloudinit-container-server) :ice_cube: - Terraform module for deploying a single Docker image or `docker-compose.yaml` file to any Cloud™ VM.
- [Turbo](https://github.com/ramitsurana/turbo) :ice_cube: - Simple and Powerful utility for docker. By [ramitsurana][ramitsurana].
- [udocker](https://github.com/indigo-dc/udocker) - A tool to execute simple docker containers in batch or interactive systems without root privileges.
- [Vagrant - Docker provider](https://developer.hashicorp.com/vagrant/docs/providers/docker/basics) - Good starting point is [vagrant-docker-example](https://github.com/bubenkoff/vagrant-docker-example).

## Services based on Docker (mostly :yen:)

### CI Services

- [CircleCI](https://circleci.com/) - :yen: Push or pull Docker images from your build environment, or build and run containers right on CircleCI.
- [CodeFresh](https://codefresh.io) - :yen: Everything you need to build, test, and share your Docker applications. Provides automated end to end testing.
- [CodeShip](https://www.cloudbees.com/blog/how-to-run-codeship-parallel-test-pipelines-efficiently-for-optimal-ci-parallelization) - :yen: Work with your established Docker workflows while automating your testing and deployment tasks with our hosted platform dedicated to speed and security.
- [ConcourseCI](https://concourse-ci.org) - :yen: A CI SaaS platform for developers and DevOps teams pipeline oriented.
-   [Semaphore CI](https://semaphore.io/) :yen: — A high-performance cloud solution that makes it easy to build, test and ship your containers to production.
- [TravisCI](https://www.travis-ci.com/) - :yen: A Free github projects continuous integration Saas platform for developers and Devops.

### CaaS

- [Amazon ECS](https://aws.amazon.com/ecs/) - :yen: A management service on EC2 that supports Docker containers.
- [Appfleet](https://appfleet.com/) - :yen: Edge platform to deploy and manage containerized services globally. The system will route the traffic to the closest location for lower latency.
- [Azure AKS](https://azure.microsoft.com/en-us/products/kubernetes-service/) - :yen: Simplify Kubernetes management, deployment, and operations. Use a fully managed Kubernetes container orchestration service.
- [Cloud 66](https://www.cloud66.com) - :yen: Full-stack hosted container management as a service.
- [Giant Swarm](https://www.giantswarm.io/) - :yen: Simple microservice infrastructure. Deploy your containers in seconds.
- [Google Container Engine](https://docs.cloud.google.com/kubernetes-engine/docs) - :yen: Docker containers on Google Cloud Computing powered by [Kubernetes][kubernetes].
- [Mesosphere DC/OS Platform](https://d2iq.com/products/dcos) - :yen: Integrated platform for data and containers built on Apache Mesos.
- [Red Hat OpenShift Dedicated](https://www.redhat.com/en/technologies/cloud-computing/openshift/dedicated) - :yen: Fully-managed Red Hat® OpenShift® service on Amazon Web Services and Google Cloud.
- [Triton](https://www.joyent.com/) - :yen: Elastic container-native infrastructure by Joyent.

### Monitoring Services

- [AppDynamics](https://github.com/Appdynamics/docker-monitoring-extension) - Docker Monitoring extension gathers metrics from the Docker Remote API, either using Unix Socket or TCP.
- [Better Stack](https://betterstack.com/community/guides/scaling-docker/) - :yen: A Docker-compatible observability stack that delivers robust log aggregation and uptime monitoring capabilities for various software application.
- [Broadcom Docker Monitoring](https://www.broadcom.com/info/aiops/docker-monitoring) - :yen: Agile Operations solutions from Broadcom deliver the modern Docker monitoring businesses need to accelerate and optimize the performance of microservices and the dynamic Docker environments running them. Monitor both the Docker environment and apps that run inside them. (former CA Technologies).
-   [Collecting docker logs and stats with Splunk](https://www.splunk.com/en_us/blog/tips-and-tricks/collecting-docker-logs-and-stats-with-splunk.html)
- [Datadog](https://www.datadoghq.com/) - :yen: Datadog is a full-stack monitoring service for large-scale cloud environments that aggregates metrics/events from servers, databases, and applications. It includes support for Docker, Kubernetes, and Mesos.
- [Prometheus](https://prometheus.io/) - :yen: Open-source service monitoring system and time series database.
- [Site24x7](https://www.site24x7.com/docker-monitoring.html) - :yen: Docker Monitoring for DevOps and IT is a SaaS Pay per Host model.
- [SPM for Docker](https://github.com/sematext/sematext-agent-docker) :ice_cube: - :yen: Monitoring of host and container metrics, Docker events and logs. Automatic log parser. Anomaly Detection and alerting for metrics and logs. [sematext](https://github.com/sematext).
- [Sysdig Monitor](https://www.sysdig.com/products/monitor) - :yen: Sysdig Monitor can be used as either software or a SaaS service to monitor, alert, and troubleshoot containers using system calls. It has container-specific features for Docker and Kubernetes.

# Useful Resources

-   **[Valuable Docker Links](http://nane.kratzke.pages.mylab.th-luebeck.de/about/blog/2014/08/24/valuable-docker-links/)** High quality articles about docker! **MUST SEE**
-   [Cloud Native Landscape](https://github.com/cncf/landscape)
- [Docker Blog](https://www.docker.com/blog/) - Regular updates about Docker, the community and tools.
-   [Docker Certification](https://intellipaat.com/docker-training-course/?US) :yen: will help you to will Learn Docker containerization, running Docker containers, Image creation, Dockerfile, Docker orchestration, security best practices, and more through hands-on projects and case studies and helps to clear Docker Certified Associate.

- [Docker dev bookmarks](https://www.codever.dev/search?q=docker) - Use the tag [docker](https://www.codever.dev/bookmarks/t/docker).
-   [Docker in Action, Second Edition](https://www.manning.com/books/docker-in-action-second-edition)
-   [Docker in Practice, Second Edition](https://www.manning.com/books/docker-in-practice-second-edition)
- [Docker packaging guide for Python](https://pythonspeed.com/docker/) - A series of detailed articles on the specifics of Docker packaging for Python.
-   [Learn Docker in a Month of Lunches](https://www.manning.com/books/learn-docker-in-a-month-of-lunches)
- [Learn Docker](https://coursesity.com/blog/best-docker-tutorials/) - Learn Docker - curated list of the top online docker tutorials and courses.
-   [Programming Community Curated Resources for learning Docker](https://hackr.io/tutorials/learn-docker)

## Awesome Lists

- [Awesome CI/CD](https://github.com/cicdops/awesome-ciandcd) :ice_cube: - Not specific to docker but relevant.
- [Awesome Compose](https://github.com/docker/awesome-compose) - Docker Compose samples.
-   [Awesome Kubernetes](https://github.com/ramitsurana/awesome-kubernetes) by [ramitsurana][ramitsurana]
-   [Awesome Linux Container](https://github.com/Friz-zy/awesome-linux-containers) more general about container than this repo, by [Friz-zy](https://github.com/Friz-zy).
-   [Awesome Selfhosted](https://github.com/awesome-selfhosted/awesome-selfhosted) list of Free Software network services and web applications which can be hosted locally by running in a classical way (setup local web server and run applications from there) or in a Docker container. By [Kickball](https://github.com/Kickball)
-   [Awesome Sysadmin](https://github.com/n1trux/awesome-sysadmin) by [n1trux](https://github.com/n1trux)
-   [ToolsOfTheTrade](https://github.com/cjbarber/ToolsOfTheTrade) a list of SaaS and On premise applications by [cjbarber](https://github.com/cjbarber)

## Demos and Examples

-   [An Annotated Docker Config for Frontend Web Development](https://nystudio107.com/blog/an-annotated-docker-config-for-frontend-web-development) A local development environment with Docker allows you to shrink-wrap the devops your project needs as config, making onboarding frictionless.
-   [Local Docker DB](https://github.com/alexmacarthur/local-docker-db) a list of docker-compose samples for a lot of databases by [alexmacarthur](https://github.com/alexmacarthur)
-   [Webstack-micro](https://github.com/ferbs/webstack-micro) Demo web app showing how Docker Compose might be used to set up an API Gateway, centralized authentication, background workers, and WebSockets as containerized services.

## Good Tips

-   [Docker Caveats](http://docker-saigon.github.io/post/Docker-Caveats/) What You Should Know About Running Docker In Production (written 11 APRIL 2016) **MUST SEE**
- [Docker Containers on the Desktop](https://blog.jessfraz.com/post/docker-containers-on-the-desktop/) - The **funniest way** to learn about docker by [jessfraz][jessfraz] who also gave a [presentation](https://www.youtube.com/watch?v=1qlLUf7KtAw) about it @ DockerCon 2015.
-   [Docker vs. VMs? Combining Both for Cloud Portability Nirvana](https://www.flexera.com/blog/finops/)
- [Dockerfile best practices](https://github.com/hexops/dockerfile) :ice_cube: - This repository has best-practices for writing Dockerfiles.
-   [Don't Repeat Yourself with Anchors, Aliases and Extensions in Docker Compose Files](https://medium.com/@kinghuang/docker-compose-anchors-aliases-extensions-a1e4105d70bd) by [King Chung Huang](https://github.com/kinghuang)
-   [GUI Apps with Docker](http://fabiorehm.com/blog/2014/09/11/running-gui-apps-with-docker/) by [fgrehm][fgrehm]

## Raspberry Pi & ARM

-   [Docker Pirates ARMed with explosive stuff](https://blog.hypriot.com/) Huge resource on clustering, swarm, docker, pre-installed image for SD card on Raspberry Pi
-   [Get Docker up and running on the RaspberryPi in three steps](https://github.com/umiddelb/armhf/wiki/Get-Docker-up-and-running-on-the-RaspberryPi-%28ARMv6%29-in-three-steps)
-   [git push docker containers to linux devices](https://www.balena.io) Modern DevOps for IoT, leveraging git and Docker.
-   [Installing, running, using Docker on armhf (ARMv7) devices](https://github.com/umiddelb/armhf/wiki/Installing,-running,-using-docker-on-armhf-%28ARMv7%29-devices)

## Security

-   [Bringing new security features to Docker](https://opensource.com/business/14/9/security-for-docker)
-   [CVE Scanning Alpine images with Multi-stage builds in Docker 17.05](https://github.com/tomwillfixit/alpine-cvecheck) by [tomwillfixit](https://twitter.com/tomwillfixit)
-   [Docker Secure Deployment Guidelines](https://github.com/AonCyberLabs/Docker-Secure-Deployment-Guidelines)
-   [Docker Security - Quick Reference](https://binarymist.io/publication/docker-security/)
-   [Docker Security: Are Your Containers Tightly Secured to the Ship? SlideShare](https://www.slideshare.net/slideshow/docker-security-are-your-containers-tightly-secured-to-the-ship/43834790)
-   [How CVE's are handled on Offical Docker Images](https://github.com/docker-library/official-images/issues/1448)
-   [Lynis is an open source security auditing tool including Docker auditing](https://cisofy.com/lynis/)
-   [Security Best Practices for Building Docker Images](https://linux-audit.com/tags/docker/)
-   [Software Engineering Radio interview of Docker Security Team Lead (Diogo Mónica)](https://www.se-radio.net/2017/05/se-radio-episode-290-diogo-monica-on-docker-security/)
-   [Ten Docker Image Security Best Practices Cheat Sheet](https://snyk.io/blog/10-docker-image-security-best-practices/)
-   [Top ten most popular docker images each contain at least 30 vulnerabilities](https://snyk.io/blog/top-ten-most-popular-docker-images-each-contain-at-least-30-vulnerabilities/)
-   [Tuning Docker with the newest security enhancements](https://opensource.com/business/15/3/docker-security-tuning)
-   [10 best practices to containerize Node.js web applications with Docker](https://snyk.io/blog/10-best-practices-to-containerize-nodejs-web-applications-with-docker/)

## Videos

-   [Contributing to Docker by Andrew "Tianon" Page (InfoSiftr)](https://www.youtube.com/watch?v=1jwo8-1HYYg) (34:31)
-   [Deploying and scaling applications with Docker, Swarm, and a tiny bit of Python magic](https://www.youtube.com/watch?v=GpHMTR7P2Ms) (3:11:06) by [jpetazzo][jpetazzo]
-   [Docker and SELinux by Daniel Walsh from Red Hat](https://www.youtube.com/watch?v=zWGFqMuEHdw) (40:23)
-   [Docker Course](https://www.youtube.com/watch?v=UZpyvK6UGFo) (Spanish) by [pablokbs](https://github.com/pablokbs)
-   [Docker for Developers](https://www.youtube.com/watch?v=FdkNAjjO5yQ) (54:26) by [jpetazzo][jpetazzo] <== Good introduction, context, demo
-   [Docker from scratch](https://www.youtube.com/playlist?list=PLLhEJK7fQIxD-btrjrqdEfQHbkZnQrmqE) (1:22:01) on YouTube by Paris Nakita Kejser
-   [Docker: How to Use Your Own Private Registry](https://www.youtube.com/watch?v=CAewZCBT4PI) (15:01)
-   [Docker in Production](https://www.youtube.com/watch?v=Glk5d5WP6MI) by [jpetazzo][jpetazzo] (36:05)
-   [Docker Primer to Docker Compose](https://www.youtube.com/watch?v=G-s2GXGAjTk) (1:56:45) on YouTube by LoginRadius
-   [Docker Registry from scratch](https://www.youtube.com/playlist?list=PLLhEJK7fQIxAz3d4Fj3edq7UcxEhdTCBm) (44:40) on YouTube by Paris Nakita Kejser
-   [Docker Swarm from scratch](https://www.youtube.com/playlist?list=PLLhEJK7fQIxAY4gZd1Wl-GsLvg-e9Ap1e) (1:41:28) on YouTube by Paris Nakita Kejser
-   [Extending Docker with Plugins](https://vimeo.com/110835013) (15:21)
-   [From Local Docker Development to Production Deployments](https://www.youtube.com/watch?v=7CZFpHUPqXw) by [jpetazzo][jpetazzo] @ AWS re:Invent 2015
-   [Immutable Infrastructure with Docker and EC2 by Michael Bryzek (Gilt)](https://www.youtube.com/watch?v=GaHzdqFithc) (42:04)
-   [Introduction to Docker and containers](https://www.youtube.com/watch?v=ZVaRK10HBjo) (3:09:00) by [jpetazzo][jpetazzo]
-   [Logging on Docker: What You Need to Know](https://vimeo.com/123341629) (51:27)
-   [Performance Analysis of Docker - Jeremy Eder](https://www.youtube.com/watch?v=6f2E6PKYb0w) (1:36:58)
-   [Scalable Microservices with Kubernetes](https://www.udacity.com/course/scalable-microservices-with-kubernetes--ud615) Free Udacity course
-   [State of containers: a debate with CoreOS, VMware and Google](https://www.youtube.com/watch?v=IiITP3yIRd8) (27:38)

# Communities and Meetups

## Brazilian

-   [Docker BR on Telegram](https://telegram.me/dockerbr)

## English

-   [Docker Community](https://www.docker.com/community/)
-   [Docker Events](https://www.docker.com/events/)
-   [Docker Online Meetup](https://www.meetup.com/en-AU/Docker-Online-Meetup/)
-   [Docker Reddit Community](https://www.reddit.com/r/docker/)

## Russian

-   [Docker Russian-speaking Community](https://t.me/docker_ru)

## Spanish

-   [Docker Tips](https://dockertips.com/)

## Stargazers over time

[![Stargazers over time](https://starchart.cc/veggiemonk/awesome-docker.svg?variant=adaptive)](https://starchart.cc/veggiemonk/awesome-docker)

[contributing]: https://github.com/veggiemonk/awesome-docker/blob/master/.github/CONTRIBUTING.md
[calico]: https://github.com/projectcalico/calico
[containx]: https://github.com/ContainX
[coreos]: https://github.com/coreos
[deepfence]: https://github.com/deepfence
[distribution]: https://github.com/docker/distribution
[docker-flow]: https://github.com/docker-flow
[docker-for-windows]: https://docs.docker.com/desktop/setup/install/windows-install/
[docker]: https://github.com/docker
[dozzle]: https://github.com/amir20/dozzle
[editreadme]: https://github.com/veggiemonk/awesome-docker/edit/master/README.md
[fgrehm]: https://github.com/fgrehm
[gliderlabs]: https://github.com/gliderlabs
[googlecontainertools]: https://github.com/GoogleContainerTools
[inspec]: https://github.com/inspec/inspec
[jessfraz]: https://github.com/jessfraz
[jpetazzo]: https://github.com/jpetazzo
[jwilder]: https://github.com/jwilder
[kubernetes]: https://kubernetes.io
[lispyclouds]: https://github.com/lispyclouds
[nginxproxy]: https://github.com/nginx-proxy/nginx-proxy
[openshift]: https://okd.io/
[powerman]: https://github.com/powerman
[progrium]: https://github.com/progrium
[ramitsurana]: https://github.com/ramitsurana
[sindresorhus]: https://github.com/sindresorhus/awesome
[spotify]: https://github.com/spotify
[vegasbrianc]: https://github.com/vegasbrianc
[vmware]: https://github.com/vmware
[byrnedo]: https://github.com/byrnedo
[crazy-max]: https://github.com/crazy-max
[skanehira]: https://github.com/skanehira
[akito]: https://github.com/theAkito
[peco602]: https://github.com/Peco602
[weave]: https://github.com/weaveworks/weave


================================================
FILE: cmd/awesome-docker/main.go
================================================
package main

import (
	"context"
	"fmt"
	"os"
	"strconv"
	"strings"

	"github.com/spf13/cobra"
	"github.com/veggiemonk/awesome-docker/internal/builder"
	"github.com/veggiemonk/awesome-docker/internal/cache"
	"github.com/veggiemonk/awesome-docker/internal/checker"
	"github.com/veggiemonk/awesome-docker/internal/linter"
	"github.com/veggiemonk/awesome-docker/internal/parser"
	"github.com/veggiemonk/awesome-docker/internal/scorer"
	"github.com/veggiemonk/awesome-docker/internal/tui"
)

const (
	readmePath      = "README.md"
	excludePath     = "config/exclude.yaml"
	templatePath    = "config/website.tmpl.html"
	healthCachePath = "config/health_cache.yaml"
	websiteOutput   = "website/index.html"
	version         = "0.1.0"
)

type checkSummary struct {
	ExternalTotal int
	GitHubTotal   int
	Broken        []checker.LinkResult
	Redirected    []checker.LinkResult
	GitHubErrors  []error
	GitHubSkipped bool
}

func main() {
	root := &cobra.Command{
		Use:   "awesome-docker",
		Short: "Quality tooling for the awesome-docker curated list",
	}

	root.AddCommand(
		versionCmd(),
		lintCmd(),
		checkCmd(),
		healthCmd(),
		buildCmd(),
		reportCmd(),
		validateCmd(),
		ciCmd(),
		browseCmd(),
	)

	if err := root.Execute(); err != nil {
		os.Exit(1)
	}
}

func versionCmd() *cobra.Command {
	return &cobra.Command{
		Use:   "version",
		Short: "Print version",
		Run:   func(cmd *cobra.Command, args []string) { fmt.Printf("awesome-docker v%s\n", version) },
	}
}

func parseReadme() (parser.Document, error) {
	f, err := os.Open(readmePath)
	if err != nil {
		return parser.Document{}, err
	}
	defer f.Close()
	return parser.Parse(f)
}

func collectURLs(sections []parser.Section, urls *[]string) {
	for _, s := range sections {
		for _, e := range s.Entries {
			*urls = append(*urls, e.URL)
		}
		collectURLs(s.Children, urls)
	}
}

type entryMeta struct {
	Category    string
	Description string
}

func collectEntriesWithCategory(sections []parser.Section, parentPath string, out map[string]entryMeta) {
	for _, s := range sections {
		path := s.Title
		if parentPath != "" {
			path = parentPath + " > " + s.Title
		}
		for _, e := range s.Entries {
			out[e.URL] = entryMeta{Category: path, Description: e.Description}
		}
		collectEntriesWithCategory(s.Children, path, out)
	}
}

func runLinkChecks(prMode bool) (checkSummary, error) {
	doc, err := parseReadme()
	if err != nil {
		return checkSummary{}, fmt.Errorf("parse: %w", err)
	}

	var urls []string
	collectURLs(doc.Sections, &urls)

	exclude, err := cache.LoadExcludeList(excludePath)
	if err != nil {
		return checkSummary{}, fmt.Errorf("load exclude list: %w", err)
	}

	ghURLs, extURLs := checker.PartitionLinks(urls)

	summary := checkSummary{
		ExternalTotal: len(extURLs),
		GitHubTotal:   len(ghURLs),
	}

	results := checker.CheckLinks(extURLs, 10, exclude)
	for _, r := range results {
		if !r.OK {
			summary.Broken = append(summary.Broken, r)
		}
		if r.Redirected {
			summary.Redirected = append(summary.Redirected, r)
		}
	}

	if prMode {
		summary.GitHubSkipped = true
		return summary, nil
	}

	token := os.Getenv("GITHUB_TOKEN")
	if token == "" {
		summary.GitHubSkipped = true
		return summary, nil
	}

	gc := checker.NewGitHubChecker(token)
	_, errs := gc.CheckRepos(context.Background(), ghURLs, 50)
	summary.GitHubErrors = errs
	return summary, nil
}

func runHealth(ctx context.Context) error {
	token := os.Getenv("GITHUB_TOKEN")
	if token == "" {
		return fmt.Errorf("GITHUB_TOKEN environment variable is required")
	}

	doc, err := parseReadme()
	if err != nil {
		return fmt.Errorf("parse: %w", err)
	}

	var urls []string
	collectURLs(doc.Sections, &urls)
	ghURLs, _ := checker.PartitionLinks(urls)

	fmt.Printf("Scoring %d GitHub repositories...\n", len(ghURLs))
	gc := checker.NewGitHubChecker(token)
	infos, errs := gc.CheckRepos(ctx, ghURLs, 50)
	for _, e := range errs {
		fmt.Printf("  error: %v\n", e)
	}
	if len(infos) == 0 {
		if len(errs) > 0 {
			return fmt.Errorf("failed to fetch GitHub metadata for all repositories (%d errors); check network/DNS and GITHUB_TOKEN", len(errs))
		}
		return fmt.Errorf("no GitHub repositories found in README")
	}

	scored := scorer.ScoreAll(infos)

	meta := make(map[string]entryMeta)
	collectEntriesWithCategory(doc.Sections, "", meta)
	for i := range scored {
		if m, ok := meta[scored[i].URL]; ok {
			scored[i].Category = m.Category
			scored[i].Description = m.Description
		}
	}

	cacheEntries := scorer.ToCacheEntries(scored)

	hc, err := cache.LoadHealthCache(healthCachePath)
	if err != nil {
		return fmt.Errorf("load cache: %w", err)
	}
	hc.Merge(cacheEntries)
	if err := cache.SaveHealthCache(healthCachePath, hc); err != nil {
		return fmt.Errorf("save cache: %w", err)
	}

	fmt.Printf("Cache updated: %d entries in %s\n", len(hc.Entries), healthCachePath)
	return nil
}

func scoredFromCache() ([]scorer.ScoredEntry, error) {
	hc, err := cache.LoadHealthCache(healthCachePath)
	if err != nil {
		return nil, fmt.Errorf("load cache: %w", err)
	}
	if len(hc.Entries) == 0 {
		return nil, fmt.Errorf("no cache data, run 'health' first")
	}

	scored := make([]scorer.ScoredEntry, 0, len(hc.Entries))
	for _, e := range hc.Entries {
		scored = append(scored, scorer.ScoredEntry{
			URL:         e.URL,
			Name:        e.Name,
			Status:      scorer.Status(e.Status),
			Stars:       e.Stars,
			Forks:       e.Forks,
			HasLicense:  e.HasLicense,
			LastPush:    e.LastPush,
			Category:    e.Category,
			Description: e.Description,
		})
	}
	return scored, nil
}

func markdownReportFromCache() (string, error) {
	scored, err := scoredFromCache()
	if err != nil {
		return "", err
	}
	return scorer.GenerateReport(scored), nil
}

func writeGitHubOutput(path, key, value string) error {
	if path == "" {
		return nil
	}
	f, err := os.OpenFile(path, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0o644)
	if err != nil {
		return fmt.Errorf("open github output file: %w", err)
	}
	defer f.Close()
	if _, err := fmt.Fprintf(f, "%s=%s\n", key, value); err != nil {
		return fmt.Errorf("write github output: %w", err)
	}
	return nil
}

func sanitizeOutputValue(v string) string {
	v = strings.ReplaceAll(v, "\n", " ")
	v = strings.ReplaceAll(v, "\r", " ")
	return strings.TrimSpace(v)
}

func buildBrokenLinksIssueBody(summary checkSummary, runErr error) string {
	var b strings.Builder
	b.WriteString("# Broken Links Detected\n\n")

	if runErr != nil {
		b.WriteString("The link checker failed to execute cleanly.\n\n")
		b.WriteString("## Failure\n\n")
		fmt.Fprintf(&b, "- %s\n\n", runErr)
	} else {
		fmt.Fprintf(&b, "- Broken links: %d\n", len(summary.Broken))
		fmt.Fprintf(&b, "- Redirected links: %d\n", len(summary.Redirected))
		fmt.Fprintf(&b, "- GitHub API errors: %d\n\n", len(summary.GitHubErrors))

		if len(summary.Broken) > 0 {
			b.WriteString("## Broken Links\n\n")
			for _, r := range summary.Broken {
				fmt.Fprintf(&b, "- `%s` -> `%d %s`\n", r.URL, r.StatusCode, strings.TrimSpace(r.Error))
			}
			b.WriteString("\n")
		}

		if len(summary.GitHubErrors) > 0 {
			b.WriteString("## GitHub API Errors\n\n")
			for _, e := range summary.GitHubErrors {
				fmt.Fprintf(&b, "- `%s`\n", e)
			}
			b.WriteString("\n")
		}
	}

	b.WriteString("## Action Required\n\n")
	b.WriteString("- Update the URL if the resource moved\n")
	b.WriteString("- Remove the entry if permanently unavailable\n")
	b.WriteString("- Add to `config/exclude.yaml` if a known false positive\n")
	b.WriteString("- Investigate GitHub API/auth failures when present\n\n")
	b.WriteString("---\n")
	b.WriteString("*Auto-generated by awesome-docker ci broken-links*\n")
	return b.String()
}

func buildHealthReportIssueBody(report string, healthErr error) string {
	var b strings.Builder
	if healthErr != nil {
		b.WriteString("WARNING: health refresh failed in this run; showing latest cached report.\n\n")
		fmt.Fprintf(&b, "Error: `%s`\n\n", healthErr)
	}
	b.WriteString(report)
	if !strings.HasSuffix(report, "\n") {
		b.WriteString("\n")
	}
	b.WriteString("\n---\n")
	b.WriteString("*Auto-generated weekly by awesome-docker ci health-report*\n")
	return b.String()
}

func lintCmd() *cobra.Command {
	var fix bool
	cmd := &cobra.Command{
		Use:   "lint",
		Short: "Validate README formatting",
		RunE: func(cmd *cobra.Command, args []string) error {
			doc, err := parseReadme()
			if err != nil {
				return fmt.Errorf("parse: %w", err)
			}

			result := linter.Lint(doc)
			for _, issue := range result.Issues {
				fmt.Println(issue)
			}

			if result.Errors > 0 {
				fmt.Printf("\n%d errors, %d warnings\n", result.Errors, result.Warnings)
				if !fix {
					return fmt.Errorf("lint failed with %d errors", result.Errors)
				}
				count, err := linter.FixFile(readmePath)
				if err != nil {
					return fmt.Errorf("fix: %w", err)
				}
				fmt.Printf("Fixed %d lines in %s\n", count, readmePath)
			} else {
				fmt.Printf("OK: %d warnings\n", result.Warnings)
			}

			return nil
		},
	}
	cmd.Flags().BoolVar(&fix, "fix", false, "Auto-fix formatting issues")
	return cmd
}

func checkCmd() *cobra.Command {
	var prMode bool
	cmd := &cobra.Command{
		Use:   "check",
		Short: "Check links for reachability",
		RunE: func(cmd *cobra.Command, args []string) error {
			summary, err := runLinkChecks(prMode)
			if err != nil {
				return err
			}

			fmt.Printf("Checking %d external links...\n", summary.ExternalTotal)
			if !prMode {
				if summary.GitHubSkipped {
					fmt.Println("GITHUB_TOKEN not set, skipping GitHub repo checks")
				} else {
					fmt.Printf("Checking %d GitHub repositories...\n", summary.GitHubTotal)
				}
			}

			for _, e := range summary.GitHubErrors {
				fmt.Printf("  GitHub error: %v\n", e)
			}

			if len(summary.Redirected) > 0 {
				fmt.Printf("\n%d redirected links (consider updating):\n", len(summary.Redirected))
				for _, r := range summary.Redirected {
					fmt.Printf("  %s -> %s\n", r.URL, r.RedirectURL)
				}
			}

			if len(summary.Broken) > 0 {
				fmt.Printf("\n%d broken links:\n", len(summary.Broken))
				for _, r := range summary.Broken {
					fmt.Printf("  %s -> %d %s\n", r.URL, r.StatusCode, r.Error)
				}
			}
			if len(summary.Broken) > 0 && len(summary.GitHubErrors) > 0 {
				return fmt.Errorf("found %d broken links and %d GitHub API errors", len(summary.Broken), len(summary.GitHubErrors))
			}
			if len(summary.Broken) > 0 {
				return fmt.Errorf("found %d broken links", len(summary.Broken))
			}
			if len(summary.GitHubErrors) > 0 {
				return fmt.Errorf("github checks failed with %d errors", len(summary.GitHubErrors))
			}

			fmt.Println("All links OK")
			return nil
		},
	}
	cmd.Flags().BoolVar(&prMode, "pr", false, "PR mode: skip GitHub API checks")
	return cmd
}

func healthCmd() *cobra.Command {
	return &cobra.Command{
		Use:   "health",
		Short: "Score repository health and update cache",
		RunE: func(cmd *cobra.Command, args []string) error {
			return runHealth(context.Background())
		},
	}
}

func buildCmd() *cobra.Command {
	return &cobra.Command{
		Use:   "build",
		Short: "Generate website from README",
		RunE: func(cmd *cobra.Command, args []string) error {
			if err := builder.Build(readmePath, templatePath, websiteOutput); err != nil {
				return err
			}
			fmt.Printf("Website built: %s\n", websiteOutput)
			return nil
		},
	}
}

func reportCmd() *cobra.Command {
	var jsonOutput bool
	cmd := &cobra.Command{
		Use:   "report",
		Short: "Generate health report from cache",
		RunE: func(cmd *cobra.Command, args []string) error {
			scored, err := scoredFromCache()
			if err != nil {
				return err
			}

			if jsonOutput {
				payload, err := scorer.GenerateJSONReport(scored)
				if err != nil {
					return fmt.Errorf("json report: %w", err)
				}
				fmt.Println(string(payload))
				return nil
			}

			report := scorer.GenerateReport(scored)
			fmt.Print(report)
			return nil
		},
	}

	cmd.Flags().BoolVar(&jsonOutput, "json", false, "Output full health report as JSON")
	return cmd
}

func validateCmd() *cobra.Command {
	return &cobra.Command{
		Use:   "validate",
		Short: "PR validation: lint + check --pr",
		RunE: func(cmd *cobra.Command, args []string) error {
			fmt.Println("=== Linting ===")
			doc, err := parseReadme()
			if err != nil {
				return fmt.Errorf("parse: %w", err)
			}

			result := linter.Lint(doc)
			for _, issue := range result.Issues {
				fmt.Println(issue)
			}
			if result.Errors > 0 {
				fmt.Printf("\n%d errors, %d warnings\n", result.Errors, result.Warnings)
				return fmt.Errorf("lint failed with %d errors", result.Errors)
			}
			fmt.Printf("Lint OK: %d warnings\n", result.Warnings)

			fmt.Println("\n=== Checking links (PR mode) ===")
			summary, err := runLinkChecks(true)
			if err != nil {
				return err
			}
			fmt.Printf("Checking %d external links...\n", summary.ExternalTotal)
			if len(summary.Broken) > 0 {
				fmt.Printf("\n%d broken links:\n", len(summary.Broken))
				for _, r := range summary.Broken {
					fmt.Printf("  %s -> %d %s\n", r.URL, r.StatusCode, r.Error)
				}
				return fmt.Errorf("found %d broken links", len(summary.Broken))
			}

			fmt.Println("\nValidation passed")
			return nil
		},
	}
}

func ciCmd() *cobra.Command {
	cmd := &cobra.Command{
		Use:   "ci",
		Short: "CI-oriented helper commands",
	}
	cmd.AddCommand(
		ciBrokenLinksCmd(),
		ciHealthReportCmd(),
	)
	return cmd
}

func ciBrokenLinksCmd() *cobra.Command {
	var issueFile string
	var githubOutput string
	var strict bool

	cmd := &cobra.Command{
		Use:   "broken-links",
		Short: "Run link checks and emit CI outputs/artifacts",
		RunE: func(cmd *cobra.Command, args []string) error {
			summary, runErr := runLinkChecks(false)

			hasErrors := runErr != nil || len(summary.Broken) > 0 || len(summary.GitHubErrors) > 0
			exitCode := 0
			if hasErrors {
				exitCode = 1
			}
			if runErr != nil {
				exitCode = 2
			}

			if issueFile != "" && hasErrors {
				body := buildBrokenLinksIssueBody(summary, runErr)
				if err := os.WriteFile(issueFile, []byte(body), 0o644); err != nil {
					return fmt.Errorf("write issue file: %w", err)
				}
			}

			if err := writeGitHubOutput(githubOutput, "has_errors", strconv.FormatBool(hasErrors)); err != nil {
				return err
			}
			if err := writeGitHubOutput(githubOutput, "check_exit_code", strconv.Itoa(exitCode)); err != nil {
				return err
			}
			if err := writeGitHubOutput(githubOutput, "broken_count", strconv.Itoa(len(summary.Broken))); err != nil {
				return err
			}
			if err := writeGitHubOutput(githubOutput, "github_error_count", strconv.Itoa(len(summary.GitHubErrors))); err != nil {
				return err
			}
			if runErr != nil {
				if err := writeGitHubOutput(githubOutput, "run_error", sanitizeOutputValue(runErr.Error())); err != nil {
					return err
				}
			}

			if runErr != nil {
				fmt.Printf("CI broken-links run error: %v\n", runErr)
			}
			if hasErrors {
				fmt.Printf("CI broken-links found %d broken links and %d GitHub errors\n", len(summary.Broken), len(summary.GitHubErrors))
			} else {
				fmt.Println("CI broken-links found no errors")
			}

			if strict {
				if runErr != nil {
					return runErr
				}
				if hasErrors {
					return fmt.Errorf("found %d broken links and %d GitHub API errors", len(summary.Broken), len(summary.GitHubErrors))
				}
			}
			return nil
		},
	}

	cmd.Flags().StringVar(&issueFile, "issue-file", "broken_links_issue.md", "Path to write issue markdown body")
	cmd.Flags().StringVar(&githubOutput, "github-output", "", "Path to GitHub output file (typically $GITHUB_OUTPUT)")
	cmd.Flags().BoolVar(&strict, "strict", false, "Return non-zero when errors are found")
	return cmd
}

func ciHealthReportCmd() *cobra.Command {
	var issueFile string
	var githubOutput string
	var strict bool

	cmd := &cobra.Command{
		Use:   "health-report",
		Short: "Refresh health cache, render report, and emit CI outputs/artifacts",
		RunE: func(cmd *cobra.Command, args []string) error {
			healthErr := runHealth(context.Background())
			report, reportErr := markdownReportFromCache()

			healthOK := healthErr == nil
			reportOK := reportErr == nil
			hasReport := reportOK && strings.TrimSpace(report) != ""
			hasErrors := !healthOK || !reportOK

			if hasReport && issueFile != "" {
				body := buildHealthReportIssueBody(report, healthErr)
				if err := os.WriteFile(issueFile, []byte(body), 0o644); err != nil {
					return fmt.Errorf("write issue file: %w", err)
				}
			}

			if err := writeGitHubOutput(githubOutput, "has_report", strconv.FormatBool(hasReport)); err != nil {
				return err
			}
			if err := writeGitHubOutput(githubOutput, "health_ok", strconv.FormatBool(healthOK)); err != nil {
				return err
			}
			if err := writeGitHubOutput(githubOutput, "report_ok", strconv.FormatBool(reportOK)); err != nil {
				return err
			}
			if err := writeGitHubOutput(githubOutput, "has_errors", strconv.FormatBool(hasErrors)); err != nil {
				return err
			}
			if healthErr != nil {
				if err := writeGitHubOutput(githubOutput, "health_error", sanitizeOutputValue(healthErr.Error())); err != nil {
					return err
				}
			}
			if reportErr != nil {
				if err := writeGitHubOutput(githubOutput, "report_error", sanitizeOutputValue(reportErr.Error())); err != nil {
					return err
				}
			}

			if healthErr != nil {
				fmt.Printf("CI health-report health error: %v\n", healthErr)
			}
			if reportErr != nil {
				fmt.Printf("CI health-report report error: %v\n", reportErr)
			}
			if hasReport {
				fmt.Println("CI health-report generated report artifact")
			} else {
				fmt.Println("CI health-report has no report artifact")
			}

			if strict {
				if healthErr != nil {
					return healthErr
				}
				if reportErr != nil {
					return reportErr
				}
			}
			return nil
		},
	}

	cmd.Flags().StringVar(&issueFile, "issue-file", "health_report.txt", "Path to write health issue markdown body")
	cmd.Flags().StringVar(&githubOutput, "github-output", "", "Path to GitHub output file (typically $GITHUB_OUTPUT)")
	cmd.Flags().BoolVar(&strict, "strict", false, "Return non-zero when health/report fails")
	return cmd
}

func browseCmd() *cobra.Command {
	var cachePath string
	cmd := &cobra.Command{
		Use:   "browse",
		Short: "Interactive TUI browser for awesome-docker resources",
		RunE: func(cmd *cobra.Command, args []string) error {
			hc, err := cache.LoadHealthCache(cachePath)
			if err != nil {
				return fmt.Errorf("load cache: %w", err)
			}
			if len(hc.Entries) == 0 {
				return fmt.Errorf("no cache data; run 'awesome-docker health' first")
			}
			return tui.Run(hc.Entries)
		},
	}
	cmd.Flags().StringVar(&cachePath, "cache", healthCachePath, "Path to health cache YAML")
	return cmd
}


================================================
FILE: config/exclude.yaml
================================================
# URLs or URL prefixes to skip during link checking.
# These are known false positives or rate-limited domains.
domains:
  - https://vimeo.com
  - https://travis-ci.org/veggiemonk/awesome-docker.svg
  - https://github.com/apps/
  - https://twitter.com
  - https://www.meetup.com/
  - https://cycle.io/
  - https://www.manning.com/
  - https://deepfence.io
  - https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg
  - https://www.se-radio.net/2017/05/se-radio-episode-290-diogo-monica-on-docker-security
  - https://www.reddit.com/r/docker/
  - https://www.udacity.com/course/scalable-microservices-with-kubernetes--ud615
  - https://www.youtube.com/playlist
  - https://www.aquasec.com
  - https://cloudsmith.com


================================================
FILE: config/health_cache.yaml
================================================
entries:
    - url: https://github.com/byrnedo/capitan
      name: byrnedo/capitan
      status: stale
      stars: 31
      last_push: 2017-06-07T09:46:56Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: Composable docker orchestration with added scripting support by [byrnedo].
    - url: https://github.com/magicmark/composerize
      name: magicmark/composerize
      status: healthy
      stars: 3703
      forks: 247
      last_push: 2026-01-17T12:14:28Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: Convert docker run commands into docker-compose files.
    - url: https://github.com/polonskiy/crowdr
      name: polonskiy/crowdr
      status: stale
      stars: 98
      forks: 9
      last_push: 2020-10-09T07:57:52Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: Tool for managing multiple Docker containers (`docker-compose` alternative).
    - url: https://github.com/ctk-hq/ctk
      name: ctk-hq/ctk
      status: healthy
      stars: 298
      forks: 27
      last_push: 2026-02-15T22:53:00Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: Visual composer for container based workloads. By [corpulent](https://github.com/corpulent).
    - url: https://github.com/sudo-bmitch/docker-config-update
      name: sudo-bmitch/docker-config-update
      status: stale
      stars: 51
      forks: 8
      last_push: 2023-03-30T13:03:12Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: Utility to update docker configs and secrets for deploying in a compose file.
    - url: https://github.com/cisco/elsy
      name: cisco/elsy
      status: stale
      stars: 80
      forks: 22
      last_push: 2022-01-18T13:38:49Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: An opinionated, multi-language, build tool based on Docker and Docker Compose.
    - url: https://github.com/cloud66-oss/habitus
      name: cloud66-oss/habitus
      status: stale
      stars: 1392
      forks: 81
      last_push: 2020-02-05T17:10:30Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: A Build Flow Tool for Docker.
    - url: https://github.com/kubernetes/kompose
      name: kubernetes/kompose
      status: healthy
      stars: 10464
      forks: 794
      last_push: 2026-02-27T14:23:27Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: Go from Docker Compose to Kubernetes.
    - url: https://github.com/av/harbor
      name: av/harbor
      status: healthy
      stars: 2485
      forks: 166
      last_push: 2026-03-08T14:30:46Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: A CLI and companion app to effortlessly run LLM backends, APIs, frontends, and services with one command. By [av](https://github.com/av).
    - url: https://github.com/ihucos/plash
      name: ihucos/plash
      status: healthy
      stars: 387
      forks: 15
      last_push: 2025-03-20T15:47:21Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: A container run and build engine - runs inside docker.
    - url: https://github.com/containers/podman-compose
      name: containers/podman-compose
      status: healthy
      stars: 5990
      forks: 577
      last_push: 2026-03-05T16:25:54Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: A script to run docker-compose.yml using podman.
    - url: https://github.com/alexaandrov/stitchocker
      name: alexaandrov/stitchocker
      status: inactive
      stars: 30
      forks: 2
      last_push: 2024-03-14T13:50:30Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Container Composition
      description: A lightweight and fast command line utility for conveniently grouping your docker-compose multiple container services. By [alexaandrov](https://github.com/alexaandrov).
    - url: https://github.com/ethibox/awesome-stacks
      name: ethibox/awesome-stacks
      status: healthy
      stars: 1250
      forks: 162
      last_push: 2026-03-08T14:40:12Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: Deploy 150+ open-source web apps with one Docker command.
    - url: https://github.com/newrelic/centurion
      name: newrelic/centurion
      status: archived
      stars: 1757
      forks: 112
      last_push: 2025-09-11T20:47:50Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: Centurion is a mass deployment tool for Docker fleets. It takes containers from a Docker registry and runs them on a fleet of hosts with the correct environment variables, host volume mappings, and port mappings. By [newrelic](https://github.com/newrelic).
    - url: https://github.com/brooklyncentral/clocker
      name: brooklyncentral/clocker
      status: stale
      stars: 429
      forks: 64
      last_push: 2018-10-24T15:29:12Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: Clocker creates and manages a Docker cloud infrastructure. Clocker supports single-click deployments and runtime management of multi-node applications that run as containers distributed across multiple hosts, on both Docker and Marathon. It leverages [Calico][calico] and [Weave][weave] for networking and [Brooklyn](https://brooklyn.apache.org/) for application blueprints. By [brooklyncentral](https://github.com/brooklyncentral).
    - url: https://github.com/ehazlett/conduit
      name: ehazlett/conduit
      status: stale
      stars: 108
      forks: 11
      last_push: 2016-11-07T18:20:56Z
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: Experimental deployment system for Docker.
    - url: https://github.com/ContainX/depcon
      name: ContainX/depcon
      status: stale
      stars: 93
      forks: 15
      last_push: 2018-06-05T04:40:23Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: Depcon is written in Go and allows you to easily deploy Docker containers to Apache Mesos/Marathon, Amazon ECS and Kubernetes. By [ContainX][containx].
    - url: https://github.com/deploystackio/docker-to-iac
      name: deploystackio/docker-to-iac
      status: healthy
      stars: 23
      last_push: 2026-03-02T06:11:33Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: Translate docker run and commit into Infrastructure as Code templates for AWS, Render.com and DigitalOcean.
    - url: https://github.com/hasura/gitkube
      name: hasura/gitkube
      status: stale
      stars: 3850
      forks: 203
      last_push: 2023-08-31T07:48:24Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: Gitkube is a tool for building and deploying docker images on Kubernetes using `git push`. By [Hasura](https://github.com/hasura/).
    - url: https://github.com/grafeas/grafeas
      name: grafeas/grafeas
      status: healthy
      stars: 1564
      forks: 307
      last_push: 2026-02-13T21:53:15Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: A common API for metadata about containers, from image and build details to security vulnerabilities. By [grafeas](https://github.com/grafeas).
    - url: https://github.com/LombardiDaniel/swarm-ansible
      name: LombardiDaniel/swarm-ansible
      status: healthy
      stars: 59
      forks: 4
      last_push: 2026-01-24T22:01:08Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
    - url: https://github.com/hansehe/SwarmManagement
      name: hansehe/SwarmManagement
      status: healthy
      stars: 21
      forks: 1
      last_push: 2025-05-13T15:24:25Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: Swarm Management is a python application, installed with pip. The application makes it easy to manage a Docker Swarm by configuring a single yaml file describing which stacks to deploy, and which networks, configs or secrets to create.
    - url: https://github.com/werf/werf
      name: werf/werf
      status: healthy
      stars: 4661
      forks: 230
      last_push: 2026-03-06T15:47:09Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Deployment and Infrastructure
      description: Werf is a CI/CD tool for building Docker images efficiently and deploying them to Kubernetes using GitOps.
    - url: https://github.com/willfarrell/docker-autoheal
      name: willfarrell/docker-autoheal
      status: healthy
      stars: 1801
      forks: 254
      last_push: 2025-09-09T16:33:25Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Monitor and restart unhealthy docker containers automatically.
    - url: https://github.com/google/cadvisor
      name: google/cadvisor
      status: healthy
      stars: 18952
      forks: 2461
      last_push: 2026-03-02T18:35:32Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Analyzes resource usage and performance characteristics of running containers.
    - url: https://github.com/bluewave-labs/checkmate
      name: bluewave-labs/checkmate
      status: healthy
      stars: 9372
      forks: 680
      last_push: 2026-03-07T01:22:01Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations.
    - url: https://github.com/zorak1103/dlia
      name: zorak1103/dlia
      status: healthy
      stars: 3
      last_push: 2026-03-07T04:03:52Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: DLIA is an AI-powered Docker log monitoring agent that uses Large Language Models (LLMs) to intelligently analyze container logs, detect anomalies, and provide contextual insights over time. By [zorak1103](https://github.com/zorak1103).
    - url: https://github.com/deltaskelta/docker-alertd
      name: deltaskelta/docker-alertd
      status: stale
      stars: 108
      forks: 12
      last_push: 2017-11-15T04:40:06Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Monitor and send alerts based on docker container resource usage/statistics.
    - url: https://github.com/docker-flow/docker-flow-monitor
      name: docker-flow/docker-flow-monitor
      status: stale
      stars: 88
      forks: 38
      last_push: 2021-03-17T14:33:01Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Reconfigures Prometheus when a new service is updated or deployed automatically.
    - url: https://github.com/stefanprodan/dockprom
      name: stefanprodan/dockprom
      status: healthy
      stars: 6488
      forks: 1768
      last_push: 2026-03-06T05:28:07Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Docker hosts and containers monitoring with Prometheus, Grafana, cAdvisor, NodeExporter and AlertManager.
    - url: https://github.com/amerkurev/doku
      name: amerkurev/doku
      status: healthy
      stars: 410
      forks: 18
      last_push: 2025-12-26T09:13:21Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Doku is a simple web-based application that allows you to monitor Docker disk usage. [amerkurev](https://github.com/amerkurev).
    - url: https://github.com/nicolargo/glances
      name: nicolargo/glances
      status: healthy
      stars: 31995
      forks: 1695
      last_push: 2026-03-07T15:24:35Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: A cross-platform curses-based system monitoring tool written in Python.
    - url: https://github.com/dromara/hertzbeat
      name: dromara/hertzbeat
      status: healthy
      stars: 7114
      forks: 1255
      last_push: 2026-03-08T12:09:09Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: An open-source real-time monitoring system with custom-monitor and agentless.
    - url: https://github.com/vegasbrianc/docker-monitoring
      name: vegasbrianc/docker-monitoring
      status: stale
      stars: 473
      forks: 129
      last_push: 2018-06-10T20:53:49Z
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: InfluxDB Time series DB in combination with Grafana and cAdvisor.
    - url: https://github.com/gliderlabs/logspout
      name: gliderlabs/logspout
      status: stale
      stars: 4701
      forks: 668
      last_push: 2023-07-11T20:36:12Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Log routing for Docker container logs.
    - url: https://github.com/decryptus/monit-docker
      name: decryptus/monit-docker
      status: stale
      stars: 34
      forks: 5
      last_push: 2023-01-16T11:31:14Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Monitor docker containers resources usage or status and execute docker commands or inside containers. [decryptus][decryptus].
    - url: https://github.com/NexClipper/NexClipper
      name: NexClipper/NexClipper
      status: stale
      stars: 565
      forks: 72
      last_push: 2023-05-05T02:21:24Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: NexClipper is the container monitoring and performance management solution specialized in Docker, Apache Mesos, Marathon, DC/OS, Mesosphere, Kubernetes.
    - url: https://github.com/uschtwill/docker_monitoring_logging_alerting
      name: uschtwill/docker_monitoring_logging_alerting
      status: stale
      stars: 539
      forks: 119
      last_push: 2018-09-13T07:36:45Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Docker host and container monitoring, logging and alerting out of the box using cAdvisor, Prometheus, Grafana for monitoring, Elasticsearch, Kibana and Logstash for logging and elastalert and Alertmanager for alerting. Set up in 5 Minutes. Secure mode for production use with built-in [Automated Nginx Reverse Proxy (jwilder's)][nginxproxy].
    - url: https://github.com/runsidekick/sidekick
      name: runsidekick/sidekick
      status: stale
      stars: 1611
      forks: 67
      last_push: 2023-06-29T12:18:38Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Open source live application debugger like Chrome DevTools for your backend. Collect traces and generate logs on-demand without stopping & redeploying your applications.
    - url: https://github.com/gpulido/SwarmAlert
      name: gpulido/SwarmAlert
      status: stale
      stars: 22
      forks: 2
      last_push: 2019-11-27T12:17:14Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Monitors a Docker Swarm and sends Pushover alerts when it finds a container with no healthy service task running.
    - url: https://github.com/gomex/docker-zabbix
      name: gomex/docker-zabbix
      status: stale
      stars: 53
      forks: 12
      last_push: 2017-07-28T14:29:08Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Monitor containers automatically using zabbix LLD feature.
    - url: https://github.com/monitoringartist/Zabbix-Docker-Monitoring
      name: monitoringartist/Zabbix-Docker-Monitoring
      status: stale
      stars: 1197
      forks: 265
      last_push: 2022-02-22T17:01:39Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Monitoring
      description: Zabbix module that provides discovery of running containers, CPU/memory/blk IO/net container metrics. Systemd Docker and LXC execution driver is also supported. It's a dynamically linked shared object library, so its performance is (~10x) better, than any script solution.
    - url: https://github.com/coreos/flannel
      name: coreos/flannel
      status: healthy
      stars: 9410
      forks: 2902
      last_push: 2026-03-06T12:10:23Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
    - url: https://github.com/Microsoft/Freeflow
      name: Microsoft/Freeflow
      status: stale
      stars: 632
      forks: 96
      last_push: 2023-06-12T19:30:22Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Networking
      description: High performance container overlay networks on Linux. Enabling RDMA (on both InfiniBand and RoCE) and accelerating TCP to bare metal performance. By [Microsoft](https://github.com/Microsoft).
    - url: https://github.com/jason5ng32/MyIP
      name: jason5ng32/MyIP
      status: healthy
      stars: 9895
      forks: 1072
      last_push: 2026-02-10T07:38:47Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Networking
      description: All in one IP Toolbox. Easy to check all your IPs, IP geolocation, check for DNS leaks, examine WebRTC connections, speed test, ping test, MTR test, check website availability, whois search and more. By [jason5ng32](https://github.com/jason5ng32).
    - url: https://github.com/nicolaka/netshoot
      name: nicolaka/netshoot
      status: healthy
      stars: 10445
      forks: 1085
      last_push: 2026-03-05T17:23:33Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Networking
      description: The netshoot container has a powerful set of networking tools to help troubleshoot Docker networking issues.
    - url: https://github.com/jpetazzo/pipework
      name: jpetazzo/pipework
      status: inactive
      stars: 4252
      forks: 727
      last_push: 2024-11-04T17:31:57Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Networking
      description: Software-Defined Networking for Linux Containers, Pipework works with "plain" LXC containers, and with the awesome Docker. By [jpetazzo][jpetazzo].
    - url: https://github.com/Peco602/ansible-linux-docker
      name: Peco602/ansible-linux-docker
      status: stale
      stars: 37
      forks: 4
      last_push: 2023-06-21T09:34:02Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Run Ansible from a Linux container. By [Peco602][peco602].
    - url: https://github.com/athena-oss/athena
      name: athena-oss/athena
      status: stale
      stars: 96
      forks: 25
      last_push: 2017-07-06T08:26:12Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: An automation platform with a plugin architecture that allows you to easily create and share services.
    - url: https://github.com/CloudSlang/cloud-slang
      name: CloudSlang/cloud-slang
      status: healthy
      stars: 240
      forks: 83
      last_push: 2026-03-04T10:56:48Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: CloudSlang is a workflow engine to create Docker process automation.
    - url: https://github.com/clusterdock/clusterdock
      name: clusterdock/clusterdock
      status: stale
      stars: 29
      forks: 8
      last_push: 2023-05-16T18:05:45Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Docker container orchestration to enable the testing of long-running cluster deployments.
    - url: https://github.com/Dataman-Cloud/crane
      name: Dataman-Cloud/crane
      status: stale
      stars: 748
      forks: 164
      last_push: 2023-08-31T09:46:38Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Control plane based on docker built-in swarm [Dataman-Cloud](https://github.com/Dataman-Cloud).
    - url: https://github.com/docker-flow/docker-flow-swarm-listener
      name: docker-flow/docker-flow-swarm-listener
      status: stale
      stars: 69
      forks: 50
      last_push: 2019-05-20T19:40:37Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Docker Flow Swarm Listener project is to listen to Docker Swarm events and send requests when a change occurs. By [docker-flow][docker-flow].
    - url: https://github.com/Wowu/docker-rollout
      name: Wowu/docker-rollout
      status: healthy
      stars: 3111
      forks: 93
      last_push: 2025-07-25T17:57:48Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Zero downtime deployment for Docker Compose services.
    - url: https://github.com/codeabovelab/haven-platform
      name: codeabovelab/haven-platform
      status: stale
      stars: 297
      forks: 41
      last_push: 2018-07-06T11:21:20Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Haven is a simplified container management platform that integrates container, application, cluster, image, and registry managements. By [codeabovelab](https://github.com/codeabovelab).
    - url: https://github.com/kubernetes/kubernetes
      name: kubernetes/kubernetes
      status: healthy
      stars: 120996
      forks: 42620
      last_push: 2026-03-07T08:41:59Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Open source orchestration system for Docker containers by Google.
    - url: https://github.com/ManageIQ/manageiq
      name: ManageIQ/manageiq
      status: healthy
      stars: 1392
      forks: 922
      last_push: 2026-03-05T20:13:05Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Discover, optimize and control your hybrid IT. By [ManageIQ](https://github.com/ManageIQ).
    - url: https://github.com/apache/mesos
      name: apache/mesos
      status: inactive
      stars: 5364
      forks: 1669
      last_push: 2024-08-23T18:59:16Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Resource/Job scheduler for containers, VM's and physical hosts [apache](https://mesos.apache.org/).
    - url: https://github.com/hashicorp/nomad
      name: hashicorp/nomad
      status: healthy
      stars: 16262
      forks: 2059
      last_push: 2026-03-08T09:06:18Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Easily deploy applications at any scale. A Distributed, Highly Available, Datacenter-Aware Scheduler.
    - url: https://github.com/rancher/rancher
      name: rancher/rancher
      status: healthy
      stars: 25400
      forks: 3173
      last_push: 2026-03-06T22:49:23Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: An open source project that provides a complete platform for operating Docker in production.
    - url: https://github.com/redherd-project/redherd-framework
      name: redherd-project/redherd-framework
      status: stale
      stars: 74
      forks: 17
      last_push: 2023-04-25T18:54:33Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets capable of simulating complex offensive cyberspace operations. By [RedHerdProject](https://github.com/redherd-project).
    - url: https://github.com/crazy-max/swarm-cronjob
      name: crazy-max/swarm-cronjob
      status: healthy
      stars: 861
      forks: 74
      last_push: 2026-03-06T07:02:33Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Orchestration
      description: Create jobs on a time-based schedule on Swarm by [crazy-max].
    - url: https://github.com/caprover/caprover
      name: caprover/caprover
      status: healthy
      stars: 14892
      forks: 966
      last_push: 2026-01-31T15:42:45Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: '[Previously known as CaptainDuckDuck] Automated Scalable Webserver Package (automated Docker+nginx) - Heroku on Steroids.'
    - url: https://github.com/convox/rack
      name: convox/rack
      status: healthy
      stars: 1892
      forks: 177
      last_push: 2026-02-12T19:55:53Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: Convox Rack is open source PaaS built on top of expert infrastructure automation and devops best practices.
    - url: https://github.com/pbertera/dcw
      name: pbertera/dcw
      status: stale
      stars: 17
      forks: 3
      last_push: 2017-03-29T07:55:37Z
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: 'Docker-compose SSH wrapper: a very poor man PaaS, exposing the docker-compose and custom-container commands defined in container labels.'
    - url: https://github.com/dokku/dokku
      name: dokku/dokku
      status: healthy
      stars: 31896
      forks: 2022
      last_push: 2026-03-07T18:31:36Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: Docker powered mini-Heroku that helps you build and manage the lifecycle of applications (originally by [progrium][progrium]).
    - url: https://github.com/remind101/empire
      name: remind101/empire
      status: stale
      stars: 2681
      forks: 156
      last_push: 2023-11-25T17:16:08Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: A PaaS built on top of Amazon EC2 Container Service (ECS).
    - url: https://github.com/exoframejs/exoframe
      name: exoframejs/exoframe
      status: healthy
      stars: 1146
      forks: 59
      last_push: 2026-02-22T16:24:52Z
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: A self-hosted tool that allows simple one-command deployments using Docker.
    - url: https://github.com/teamhephy/workflow
      name: teamhephy/workflow
      status: stale
      stars: 419
      forks: 36
      last_push: 2023-09-27T17:30:49Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: Open source PaaS for Kubernetes that adds a developer-friendly layer to any Kubernetes cluster, making it easy to deploy and manage applications. Fork of [Deis Workflow](https://github.com/deis/workflow).
    - url: https://github.com/krane/krane
      name: krane/krane
      status: stale
      stars: 80
      forks: 8
      last_push: 2023-05-11T20:39:00Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: Toolset for managing container workloads on remote servers.
    - url: https://github.com/nanobox-io/nanobox
      name: nanobox-io/nanobox
      status: stale
      stars: 1625
      forks: 90
      last_push: 2019-10-21T20:03:10Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: An application development platform that creates local environments that can then be deployed and scaled in the cloud.
    - url: https://github.com/tsuru/tsuru
      name: tsuru/tsuru
      status: healthy
      stars: 5259
      forks: 550
      last_push: 2026-03-05T03:11:24Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > PaaS
      description: Tsuru is an extensible and open source Platform as a Service software.
    - url: https://github.com/bunkerity/bunkerweb
      name: bunkerity/bunkerweb
      status: healthy
      stars: 10112
      forks: 568
      last_push: 2026-03-06T17:15:47Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: Open-source and next-gen Web Application Firewall (WAF). By [Bunkerity](https://www.bunkerity.com).
    - url: https://github.com/lucaslorentz/caddy-docker-proxy
      name: lucaslorentz/caddy-docker-proxy
      status: healthy
      stars: 4315
      forks: 211
      last_push: 2026-03-08T07:04:18Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: Caddy-based reverse proxy, configured with service or container labels. By [lucaslorentz](https://github.com/lucaslorentz).
    - url: https://github.com/invzhi/caddy-docker-upstreams
      name: invzhi/caddy-docker-upstreams
      status: healthy
      stars: 36
      forks: 8
      last_push: 2025-09-08T05:17:01Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: Docker upstreams module for Caddy, configured with container labels. By [invzhi](https://github.com/invzhi).
    - url: https://github.com/moonbuggy/docker-dnsmasq-updater
      name: moonbuggy/docker-dnsmasq-updater
      status: inactive
      stars: 35
      forks: 2
      last_push: 2025-02-09T00:21:52Z
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: Update a remote dnsmasq server with Docker container hostnames.
    - url: https://github.com/docker-flow/docker-flow-proxy
      name: docker-flow/docker-flow-proxy
      status: healthy
      stars: 320
      forks: 189
      last_push: 2025-12-05T02:29:16Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: Reconfigures proxy every time a new service is deployed, or when a service is scaled. By [docker-flow][docker-flow].
    - url: https://github.com/fabiolb/fabio
      name: fabiolb/fabio
      status: healthy
      stars: 7333
      forks: 624
      last_push: 2026-02-23T02:48:11Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: A fast, modern, zero-conf load balancing HTTP(S) router for deploying microservices managed by consul. By [magiconair](https://github.com/magiconair) (Frank Schroeder).
    - url: https://github.com/nginx-proxy/docker-letsencrypt-nginx-proxy-companion
      name: nginx-proxy/docker-letsencrypt-nginx-proxy-companion
      status: healthy
      stars: 7698
      forks: 834
      last_push: 2026-03-02T17:04:31Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: A lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically. By [JrCs](https://github.com/JrCs).
    - url: https://github.com/Yundera/mesh-router
      name: Yundera/mesh-router
      status: healthy
      stars: 8
      last_push: 2026-03-02T15:37:53Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: Free domain(nsl.sh) provider for Docker containers with automatic HTTPS routing. Uses Wireguard VPN to securely route subdomain requests across networks. Ideal for self-hosted NAS and cloud deployments. By [Yundera](https://github.com/Yundera).
    - url: https://github.com/jc21/nginx-proxy-manager
      name: jc21/nginx-proxy-manager
      status: healthy
      stars: 32001
      forks: 3639
      last_push: 2026-03-06T14:15:08Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: A beautiful web interface for proxying web based services with SSL. By [jc21](https://github.com/jc21).
    - url: https://github.com/Safe3/openresty-manager
      name: Safe3/openresty-manager
      status: healthy
      stars: 1322
      forks: 98
      last_push: 2026-01-25T10:38:42Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: The easiest using, powerful and beautiful OpenResty Manager(Nginx Enhanced Version), open source alternative to OpenResty Edge. By [Safe3](https://github.com/Safe3/).
    - url: https://github.com/flavioaiello/swarm-router
      name: flavioaiello/swarm-router
      status: healthy
      stars: 73
      forks: 12
      last_push: 2025-09-15T06:12:30Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: A «zero config» service name based router for docker swarm mode with a fresh and more secure approach. By [flavioaiello](https://github.com/flavioaiello).
    - url: https://github.com/containous/traefik
      name: containous/traefik
      status: healthy
      stars: 62086
      forks: 5865
      last_push: 2026-03-06T16:16:05Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Reverse Proxy
      description: Automated reverse proxy and load-balancer for Docker, Mesos, Consul, Etcd... By [EmileVauge](https://github.com/emilevauge).
    - url: https://github.com/cri-o/cri-o
      name: cri-o/cri-o
      status: healthy
      stars: 5588
      forks: 1151
      last_push: 2026-03-08T00:16:02Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Runtime
      description: Open Container Initiative-based implementation of Kubernetes Container Runtime Interface by [cri-o](https://github.com/cri-o).
    - url: https://github.com/lxc/lxc
      name: lxc/lxc
      status: healthy
      stars: 5126
      forks: 1162
      last_push: 2026-03-02T14:26:30Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Runtime
      description: LXC - Linux Containers.
    - url: https://github.com/containers/libpod
      name: containers/libpod
      status: healthy
      stars: 30937
      forks: 3006
      last_push: 2026-03-06T15:57:05Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Runtime
      description: Libpod is a library used to create container pods. Home of Podman.
    - url: https://github.com/brauner/rlxc
      name: brauner/rlxc
      status: stale
      stars: 18
      forks: 3
      last_push: 2021-06-30T13:12:28Z
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Runtime
      description: LXC binary written in Rust.
    - url: https://github.com/opencontainers/runtime-tools
      name: opencontainers/runtime-tools
      status: healthy
      stars: 473
      forks: 159
      last_push: 2025-12-05T00:49:12Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Runtime
      description: Oci-runtime-tool is a collection of tools for working with the OCI runtime specification.
    - url: https://github.com/SongStitch/anchor
      name: SongStitch/anchor
      status: inactive
      stars: 24
      last_push: 2025-01-15T23:09:06Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
    - url: https://github.com/genuinetools/bane
      name: genuinetools/bane
      status: stale
      stars: 1224
      forks: 91
      last_push: 2020-09-17T20:10:45Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: AppArmor profile generator for Docker containers.
    - url: https://github.com/dash14/buildcage
      name: dash14/buildcage
      status: healthy
      stars: 4
      last_push: 2026-03-08T16:59:17Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Restricts outbound network access during Docker builds to prevent supply chain attacks, working as a drop-in BuildKit remote driver for Docker Buildx, with ready-to-use GitHub Actions.
    - url: https://github.com/hectorm/cetusguard
      name: hectorm/cetusguard
      status: healthy
      stars: 82
      forks: 2
      last_push: 2026-03-01T11:42:56Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: CetusGuard is a tool that protects the Docker daemon socket by filtering calls to its API endpoints.
    - url: https://github.com/bridgecrewio/checkov
      name: bridgecrewio/checkov
      status: healthy
      stars: 8510
      forks: 1307
      last_push: 2026-03-08T07:40:01Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Static analysis for infrastructure as code manifests (Terraform, Kubernetes, Cloudformation, Helm, Dockerfile, Kustomize) find security misconfiguration and fix them. By [bridgecrew](https://github.com/bridgecrewio).
    - url: https://github.com/dev-sec/cis-docker-benchmark
      name: dev-sec/cis-docker-benchmark
      status: stale
      stars: 524
      forks: 118
      last_push: 2023-05-02T12:59:10Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: This [InSpec][inspec] compliance profile implement the CIS Docker 1.12.0 Benchmark in an automated way to provide security best-practice tests around Docker daemon and containers in a production environment. By [dev-sec](https://github.com/dev-sec).
    - url: https://github.com/quay/clair
      name: quay/clair
      status: healthy
      stars: 10940
      forks: 1195
      last_push: 2026-03-06T23:17:06Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Clair is an open source project for the static analysis of vulnerabilities in appc and docker containers. By [coreos][coreos].
    - url: https://github.com/wolffcatskyy/crowdsec-blocklist-import
      name: wolffcatskyy/crowdsec-blocklist-import
      status: healthy
      stars: 179
      forks: 4
      last_push: 2026-03-07T18:44:39Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Aggregates 36 free threat intelligence feeds into 120k+ malicious IPs for CrowdSec bouncers, providing 10-20x more blocks than default lists. By [wolffcatskyy](https://github.com/wolffcatskyy).
    - url: https://github.com/eliasgranderubio/dagda
      name: eliasgranderubio/dagda
      status: stale
      stars: 1220
      forks: 169
      last_push: 2023-05-23T02:03:43Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Dagda is a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities. By [eliasgranderubio](https://github.com/eliasgranderubio).
    - url: https://github.com/deepfence/ThreatMapper
      name: deepfence/ThreatMapper
      status: healthy
      stars: 5235
      forks: 640
      last_push: 2026-03-08T03:35:58Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Powerful runtime vulnerability scanner for kubernetes, virtual machines and serverless. By [deepfence][deepfence].
    - url: https://github.com/docker/docker-bench-security
      name: docker/docker-bench-security
      status: inactive
      stars: 9600
      forks: 1038
      last_push: 2024-10-21T07:26:06Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Script that checks for dozens of common best-practices around deploying Docker containers in production. By [docker][docker].
    - url: https://github.com/google/docker-explorer
      name: google/docker-explorer
      status: inactive
      stars: 553
      forks: 45
      last_push: 2024-10-04T07:44:31Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: A tool to help forensicate offline docker acquisitions.
    - url: https://github.com/Peco602/dvwassl
      name: Peco602/dvwassl
      status: stale
      stars: 6
      forks: 4
      last_push: 2023-04-30T17:03:01Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: SSL-enabled Damn Vulnerable Web App to test Web Application Firewalls. By [Peco602][peco602].
    - url: https://github.com/checkmarx/kics
      name: checkmarx/kics
      status: healthy
      stars: 2581
      forks: 361
      last_push: 2026-03-06T15:34:55Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: An infrastructure-as-code scanning tool, find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle. Can be extended for additional policies. By [Checkmarx](https://github.com/Checkmarx).
    - url: https://github.com/theupdateframework/notary
      name: theupdateframework/notary
      status: archived
      stars: 3287
      forks: 520
      last_push: 2024-08-07T19:02:32Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: A server and a client for running and interacting with trusted collections. By [TUF](https://github.com/theupdateframework).
    - url: https://github.com/OpenSCAP/openscap
      name: OpenSCAP/openscap
      status: healthy
      stars: 1676
      forks: 424
      last_push: 2026-02-27T12:44:50Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: OpenSCAP provides oscap-docker tool which is used to scan Docker containers and images. By [OpenSCAP](https://github.com/OpenSCAP).
    - url: https://github.com/dormstern/segspec
      name: dormstern/segspec
      status: healthy
      stars: 15
      last_push: 2026-02-23T11:39:00Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Extracts network dependencies from Docker Compose, Kubernetes manifests, Helm charts, and other config files to generate Kubernetes NetworkPolicies with evidence tracing. By [dormstern](https://github.com/dormstern).
    - url: https://github.com/anchore/syft
      name: anchore/syft
      status: healthy
      stars: 8454
      forks: 779
      last_push: 2026-03-08T08:12:44Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: CLI tool and library for generating a Software Bill of Materials (SBOM) from container images and filesystems.
    - url: https://github.com/falcosecurity/falco
      name: falcosecurity/falco
      status: healthy
      stars: 8712
      forks: 990
      last_push: 2026-03-02T17:54:20Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Sysdig Falco is an open source container security monitor. It can monitor application, container, host, and network activity and alert on unauthorized activity.
    - url: https://github.com/aquasecurity/trivy
      name: aquasecurity/trivy
      status: healthy
      stars: 33020
      forks: 76
      last_push: 2026-03-06T06:42:06Z
      has_license: true
      checked_at: 2026-03-08T18:26:00.233336Z
      category: Projects > Container Operations > Security
      description: Aqua Security's open source simple and comprehensive vulnerability scanner for containers (suitable for CI).
    - 
Download .txt
gitextract_uu2bikk7/

├── .claude/
│   └── settings.local.json
├── .gitattributes
├── .github/
│   ├── CODEOWNERS
│   ├── CODE_OF_CONDUCT.md
│   ├── CONTRIBUTING.md
│   ├── ISSUE_TEMPLATE/
│   │   └── add-a-project.md
│   ├── MAINTENANCE.md
│   ├── PULL_REQUEST_TEMPLATE.md
│   ├── dependabot.yml
│   └── workflows/
│       ├── broken_links.yml
│       ├── deploy-pages.yml
│       ├── health_report.yml
│       └── pull_request.yml
├── .gitignore
├── AGENTS.md
├── LICENSE
├── Makefile
├── README.md
├── cmd/
│   └── awesome-docker/
│       └── main.go
├── config/
│   ├── exclude.yaml
│   ├── health_cache.yaml
│   └── website.tmpl.html
├── go.mod
├── go.sum
├── index.html
└── internal/
    ├── builder/
    │   ├── builder.go
    │   └── builder_test.go
    ├── cache/
    │   ├── cache.go
    │   └── cache_test.go
    ├── checker/
    │   ├── github.go
    │   ├── github_test.go
    │   ├── http.go
    │   └── http_test.go
    ├── linter/
    │   ├── fixer.go
    │   ├── fixer_test.go
    │   ├── linter.go
    │   ├── linter_test.go
    │   └── rules.go
    ├── parser/
    │   ├── parser.go
    │   ├── parser_test.go
    │   └── types.go
    ├── scorer/
    │   ├── scorer.go
    │   └── scorer_test.go
    └── tui/
        ├── model.go
        ├── styles.go
        ├── tree.go
        ├── tree_test.go
        └── tui.go
Download .txt
SYMBOL INDEX (200 symbols across 24 files)

FILE: cmd/awesome-docker/main.go
  constant readmePath (line 21) | readmePath      = "README.md"
  constant excludePath (line 22) | excludePath     = "config/exclude.yaml"
  constant templatePath (line 23) | templatePath    = "config/website.tmpl.html"
  constant healthCachePath (line 24) | healthCachePath = "config/health_cache.yaml"
  constant websiteOutput (line 25) | websiteOutput   = "website/index.html"
  constant version (line 26) | version         = "0.1.0"
  type checkSummary (line 29) | type checkSummary struct
  function main (line 38) | func main() {
  function versionCmd (line 61) | func versionCmd() *cobra.Command {
  function parseReadme (line 69) | func parseReadme() (parser.Document, error) {
  function collectURLs (line 78) | func collectURLs(sections []parser.Section, urls *[]string) {
  type entryMeta (line 87) | type entryMeta struct
  function collectEntriesWithCategory (line 92) | func collectEntriesWithCategory(sections []parser.Section, parentPath st...
  function runLinkChecks (line 105) | func runLinkChecks(prMode bool) (checkSummary, error) {
  function runHealth (line 153) | func runHealth(ctx context.Context) error {
  function scoredFromCache (line 207) | func scoredFromCache() ([]scorer.ScoredEntry, error) {
  function markdownReportFromCache (line 233) | func markdownReportFromCache() (string, error) {
  function writeGitHubOutput (line 241) | func writeGitHubOutput(path, key, value string) error {
  function sanitizeOutputValue (line 256) | func sanitizeOutputValue(v string) string {
  function buildBrokenLinksIssueBody (line 262) | func buildBrokenLinksIssueBody(summary checkSummary, runErr error) string {
  function buildHealthReportIssueBody (line 302) | func buildHealthReportIssueBody(report string, healthErr error) string {
  function lintCmd (line 317) | func lintCmd() *cobra.Command {
  function checkCmd (line 354) | func checkCmd() *cobra.Command {
  function healthCmd (line 409) | func healthCmd() *cobra.Command {
  function buildCmd (line 419) | func buildCmd() *cobra.Command {
  function reportCmd (line 433) | func reportCmd() *cobra.Command {
  function validateCmd (line 463) | func validateCmd() *cobra.Command {
  function ciCmd (line 504) | func ciCmd() *cobra.Command {
  function ciBrokenLinksCmd (line 516) | func ciBrokenLinksCmd() *cobra.Command {
  function ciHealthReportCmd (line 588) | func ciHealthReportCmd() *cobra.Command {
  function browseCmd (line 665) | func browseCmd() *cobra.Command {

FILE: internal/builder/builder.go
  function Build (line 17) | func Build(markdownPath, templatePath, outputPath string) error {

FILE: internal/builder/builder_test.go
  function TestBuild (line 10) | func TestBuild(t *testing.T) {
  function TestBuildWithSectionPlaceholder (line 49) | func TestBuildWithSectionPlaceholder(t *testing.T) {
  function TestBuildRealREADME (line 88) | func TestBuildRealREADME(t *testing.T) {
  function TestBuildFailsWithoutPlaceholder (line 115) | func TestBuildFailsWithoutPlaceholder(t *testing.T) {
  function TestBuildAddsHeadingIDs (line 135) | func TestBuildAddsHeadingIDs(t *testing.T) {

FILE: internal/cache/cache.go
  type ExcludeList (line 12) | type ExcludeList struct
    method IsExcluded (line 17) | func (e *ExcludeList) IsExcluded(url string) bool {
  function LoadExcludeList (line 27) | func LoadExcludeList(path string) (*ExcludeList, error) {
  type HealthEntry (line 40) | type HealthEntry struct
  type HealthCache (line 55) | type HealthCache struct
    method Merge (line 85) | func (hc *HealthCache) Merge(entries []HealthEntry) {
  function LoadHealthCache (line 60) | func LoadHealthCache(path string) (*HealthCache, error) {
  function SaveHealthCache (line 76) | func SaveHealthCache(path string, hc *HealthCache) error {

FILE: internal/cache/cache_test.go
  function TestLoadExcludeList (line 10) | func TestLoadExcludeList(t *testing.T) {
  function TestHealthCacheRoundTrip (line 36) | func TestHealthCacheRoundTrip(t *testing.T) {
  function TestLoadHealthCacheMissing (line 71) | func TestLoadHealthCacheMissing(t *testing.T) {
  function TestLoadHealthCacheInvalidYAML (line 81) | func TestLoadHealthCacheInvalidYAML(t *testing.T) {
  function TestMerge (line 97) | func TestMerge(t *testing.T) {
  function TestMergeDeduplicatesIncomingBatch (line 123) | func TestMergeDeduplicatesIncomingBatch(t *testing.T) {

FILE: internal/checker/github.go
  type RepoInfo (line 15) | type RepoInfo struct
  function ExtractGitHubRepo (line 30) | func ExtractGitHubRepo(rawURL string) (owner, name string, ok bool) {
  function isHTTPURL (line 61) | func isHTTPURL(raw string) bool {
  function isGitHubAuthError (line 69) | func isGitHubAuthError(err error) bool {
  function PartitionLinks (line 80) | func PartitionLinks(urls []string) (github, external []string) {
  type GitHubChecker (line 92) | type GitHubChecker struct
    method CheckRepo (line 104) | func (gc *GitHubChecker) CheckRepo(ctx context.Context, owner, name st...
    method CheckRepos (line 144) | func (gc *GitHubChecker) CheckRepos(ctx context.Context, urls []string...
  function NewGitHubChecker (line 97) | func NewGitHubChecker(token string) *GitHubChecker {

FILE: internal/checker/github_test.go
  function TestExtractGitHubRepo (line 8) | func TestExtractGitHubRepo(t *testing.T) {
  function TestPartitionLinks (line 43) | func TestPartitionLinks(t *testing.T) {
  function TestIsGitHubAuthError (line 61) | func TestIsGitHubAuthError(t *testing.T) {

FILE: internal/checker/http.go
  constant defaultTimeout (line 13) | defaultTimeout     = 30 * time.Second
  constant defaultConcurrency (line 14) | defaultConcurrency = 10
  constant userAgent (line 15) | userAgent          = "awesome-docker-checker/1.0"
  type LinkResult (line 19) | type LinkResult struct
  function shouldFallbackToGET (line 28) | func shouldFallbackToGET(statusCode int) bool {
  function CheckLink (line 38) | func CheckLink(url string, client *http.Client) LinkResult {
  function CheckLinks (line 94) | func CheckLinks(urls []string, concurrency int, exclude *cache.ExcludeLi...

FILE: internal/checker/http_test.go
  function TestCheckLinkOK (line 9) | func TestCheckLinkOK(t *testing.T) {
  function TestCheckLink404 (line 21) | func TestCheckLink404(t *testing.T) {
  function TestCheckLinkRedirect (line 36) | func TestCheckLinkRedirect(t *testing.T) {
  function TestCheckLinks (line 56) | func TestCheckLinks(t *testing.T) {
  function TestCheckLinkFallbackToGETOnMethodNotAllowed (line 82) | func TestCheckLinkFallbackToGETOnMethodNotAllowed(t *testing.T) {
  function TestCheckLinkFallbackToGETOnForbiddenHead (line 101) | func TestCheckLinkFallbackToGETOnForbiddenHead(t *testing.T) {

FILE: internal/linter/fixer.go
  function RemoveAttribution (line 27) | func RemoveAttribution(desc string) string {
  function FormatEntry (line 34) | func FormatEntry(e parser.Entry) string {
  function FixFile (line 57) | func FixFile(path string) (int, error) {

FILE: internal/linter/fixer_test.go
  function TestRemoveAttribution (line 11) | func TestRemoveAttribution(t *testing.T) {
  function TestFormatEntry (line 54) | func TestFormatEntry(t *testing.T) {
  function TestFormatEntryWithMarkers (line 67) | func TestFormatEntryWithMarkers(t *testing.T) {
  function TestFixFile (line 81) | func TestFixFile(t *testing.T) {
  function TestFixFileSortsAcrossBlankLinesAndIsIdempotent (line 142) | func TestFixFileSortsAcrossBlankLinesAndIsIdempotent(t *testing.T) {

FILE: internal/linter/linter.go
  type Result (line 8) | type Result struct
  function Lint (line 15) | func Lint(doc parser.Document) Result {
  function lintSections (line 30) | func lintSections(sections []parser.Section, result *Result) {
  function collectEntries (line 44) | func collectEntries(sections []parser.Section) []parser.Entry {
  function addIssue (line 53) | func addIssue(result *Result, issue Issue) {

FILE: internal/linter/linter_test.go
  function TestRuleDescriptionCapital (line 9) | func TestRuleDescriptionCapital(t *testing.T) {
  function TestRuleDescriptionPeriod (line 23) | func TestRuleDescriptionPeriod(t *testing.T) {
  function TestRuleSorted (line 37) | func TestRuleSorted(t *testing.T) {
  function TestRuleSortedOK (line 48) | func TestRuleSortedOK(t *testing.T) {
  function TestRuleDuplicateURL (line 59) | func TestRuleDuplicateURL(t *testing.T) {
  function TestValidEntry (line 70) | func TestValidEntry(t *testing.T) {
  function TestFixDescriptionCapital (line 78) | func TestFixDescriptionCapital(t *testing.T) {
  function TestFixDescriptionPeriod (line 86) | func TestFixDescriptionPeriod(t *testing.T) {
  function TestLintDocument (line 94) | func TestLintDocument(t *testing.T) {

FILE: internal/linter/rules.go
  type Rule (line 13) | type Rule
  constant RuleDescriptionCapital (line 16) | RuleDescriptionCapital Rule = "description-capital"
  constant RuleDescriptionPeriod (line 17) | RuleDescriptionPeriod  Rule = "description-period"
  constant RuleSorted (line 18) | RuleSorted             Rule = "sorted"
  constant RuleDuplicateURL (line 19) | RuleDuplicateURL       Rule = "duplicate-url"
  type Severity (line 23) | type Severity
  constant SeverityError (line 26) | SeverityError Severity = iota
  constant SeverityWarning (line 27) | SeverityWarning
  type Issue (line 31) | type Issue struct
    method String (line 38) | func (i Issue) String() string {
  function CheckEntry (line 47) | func CheckEntry(e parser.Entry) []Issue {
  function CheckSorted (line 72) | func CheckSorted(entries []parser.Entry) []Issue {
  function CheckDuplicates (line 90) | func CheckDuplicates(entries []parser.Entry) []Issue {
  function firstLetter (line 110) | func firstLetter(s string) (rune, bool) {
  function FixEntry (line 120) | func FixEntry(e parser.Entry) parser.Entry {
  function SortEntries (line 142) | func SortEntries(entries []parser.Entry) []parser.Entry {

FILE: internal/parser/parser.go
  function ParseEntry (line 32) | func ParseEntry(line string, lineNum int) (Entry, error) {
  function Parse (line 63) | func Parse(r io.Reader) (Document, error) {
  function buildTree (line 114) | func buildTree(flat []struct {

FILE: internal/parser/parser_test.go
  function TestParseEntry (line 9) | func TestParseEntry(t *testing.T) {
  function TestParseEntryWithMarkers (line 29) | func TestParseEntryWithMarkers(t *testing.T) {
  function TestParseEntryMultipleMarkers (line 46) | func TestParseEntryMultipleMarkers(t *testing.T) {
  function TestParseEntryMarkersCanonicalOrder (line 57) | func TestParseEntryMarkersCanonicalOrder(t *testing.T) {
  function TestParseDocument (line 71) | func TestParseDocument(t *testing.T) {
  function TestParseNotAnEntry (line 124) | func TestParseNotAnEntry(t *testing.T) {
  function TestParseRealREADME (line 131) | func TestParseRealREADME(t *testing.T) {
  function countEntries (line 154) | func countEntries(sections []Section) int {

FILE: internal/parser/types.go
  type Marker (line 4) | type Marker
  constant MarkerAbandoned (line 7) | MarkerAbandoned Marker = iota
  constant MarkerPaid (line 8) | MarkerPaid
  constant MarkerWIP (line 9) | MarkerWIP
  constant MarkerStale (line 10) | MarkerStale
  type Entry (line 14) | type Entry struct
  type Section (line 24) | type Section struct
  type Document (line 33) | type Document struct

FILE: internal/scorer/scorer.go
  type Status (line 14) | type Status
  constant StatusHealthy (line 17) | StatusHealthy  Status = "healthy"
  constant StatusInactive (line 18) | StatusInactive Status = "inactive"
  constant StatusStale (line 19) | StatusStale    Status = "stale"
  constant StatusArchived (line 20) | StatusArchived Status = "archived"
  constant StatusDead (line 21) | StatusDead     Status = "dead"
  type ScoredEntry (line 25) | type ScoredEntry struct
  type ReportSummary (line 38) | type ReportSummary struct
  type ReportData (line 47) | type ReportData struct
  function Score (line 56) | func Score(info checker.RepoInfo) Status {
  function ScoreAll (line 77) | func ScoreAll(infos []checker.RepoInfo) []ScoredEntry {
  function ToCacheEntries (line 94) | func ToCacheEntries(scored []ScoredEntry) []cache.HealthEntry {
  function GenerateReport (line 115) | func GenerateReport(scored []ScoredEntry) string {
  function BuildReportData (line 153) | func BuildReportData(scored []ScoredEntry) ReportData {
  function GenerateJSONReport (line 175) | func GenerateJSONReport(scored []ScoredEntry) ([]byte, error) {

FILE: internal/scorer/scorer_test.go
  function TestScoreHealthy (line 13) | func TestScoreHealthy(t *testing.T) {
  function TestScoreInactive (line 26) | func TestScoreInactive(t *testing.T) {
  function TestScoreStale (line 37) | func TestScoreStale(t *testing.T) {
  function TestScoreArchived (line 48) | func TestScoreArchived(t *testing.T) {
  function TestScoreDisabled (line 59) | func TestScoreDisabled(t *testing.T) {
  function TestGenerateReport (line 69) | func TestGenerateReport(t *testing.T) {
  function TestGenerateReportShowsAllEntries (line 87) | func TestGenerateReportShowsAllEntries(t *testing.T) {
  function TestGenerateJSONReport (line 108) | func TestGenerateJSONReport(t *testing.T) {
  function TestScoreAll (line 149) | func TestScoreAll(t *testing.T) {

FILE: internal/tui/model.go
  type panel (line 15) | type panel
  constant panelTree (line 18) | panelTree panel = iota
  constant panelList (line 19) | panelList
  constant entryHeight (line 22) | entryHeight = 5
  constant scrollOff (line 23) | scrollOff = 4
  type Model (line 26) | type Model struct
    method Init (line 61) | func (m Model) Init() tea.Cmd {
    method Update (line 66) | func (m Model) Update(msg tea.Msg) (tea.Model, tea.Cmd) {
    method handleFilterKey (line 104) | func (m Model) handleFilterKey(msg tea.KeyPressMsg) (tea.Model, tea.Cm...
    method applyFilter (line 128) | func (m *Model) applyFilter() {
    method handleTreeKey (line 151) | func (m Model) handleTreeKey(msg tea.KeyPressMsg) (tea.Model, tea.Cmd) {
    method adjustTreeScroll (line 234) | func (m *Model) adjustTreeScroll() {
    method treePanelHeight (line 251) | func (m Model) treePanelHeight() int {
    method handleListKey (line 259) | func (m Model) handleListKey(msg tea.KeyPressMsg) (tea.Model, tea.Cmd) {
    method updateCurrentEntries (line 307) | func (m *Model) updateCurrentEntries() {
    method visibleListEntries (line 321) | func (m Model) visibleListEntries() int {
    method adjustListScroll (line 329) | func (m *Model) adjustListScroll() {
    method listPanelHeight (line 346) | func (m Model) listPanelHeight() int {
    method View (line 356) | func (m Model) View() tea.View {
    method renderTree (line 401) | func (m Model) renderTree(width, height int) string {
    method renderList (line 451) | func (m Model) renderList(width, height int) string {
    method renderFooter (line 563) | func (m Model) renderFooter() string {
  function New (line 44) | func New(entries []cache.HealthEntry) Model {
  type openURLMsg (line 572) | type openURLMsg struct
  function openURL (line 574) | func openURL(url string) tea.Cmd {
  function truncateToWidth (line 590) | func truncateToWidth(s string, maxWidth int) string {

FILE: internal/tui/styles.go
  function statusStyle (line 44) | func statusStyle(status string) lipgloss.Style {

FILE: internal/tui/tree.go
  type TreeNode (line 11) | type TreeNode struct
    method HasChildren (line 26) | func (n *TreeNode) HasChildren() bool {
    method TotalEntries (line 31) | func (n *TreeNode) TotalEntries() int {
    method AllEntries (line 40) | func (n *TreeNode) AllEntries() []cache.HealthEntry {
  type FlatNode (line 20) | type FlatNode struct
  function BuildTree (line 50) | func BuildTree(entries []cache.HealthEntry) []*TreeNode {
  function ensureNode (line 69) | func ensureNode(root *TreeNode, nodeMap map[string]*TreeNode, path strin...
  function sortTree (line 93) | func sortTree(node *TreeNode) {
  function FlattenVisible (line 103) | func FlattenVisible(roots []*TreeNode) []FlatNode {
  function flattenNode (line 111) | func flattenNode(node *TreeNode, depth int, result *[]FlatNode) {

FILE: internal/tui/tree_test.go
  function TestBuildTree (line 9) | func TestBuildTree(t *testing.T) {
  function TestBuildTreeEmpty (line 49) | func TestBuildTreeEmpty(t *testing.T) {
  function TestTotalEntries (line 56) | func TestTotalEntries(t *testing.T) {
  function TestFlattenVisible (line 72) | func TestFlattenVisible(t *testing.T) {
  function TestAllEntries (line 99) | func TestAllEntries(t *testing.T) {

FILE: internal/tui/tui.go
  function Run (line 9) | func Run(entries []cache.HealthEntry) error {
Condensed preview — 48 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (409K chars).
[
  {
    "path": ".claude/settings.local.json",
    "chars": 366,
    "preview": "{\n  \"permissions\": {\n    \"allow\": [\n      \"mcp__plugin_context-mode_context-mode__ctx_batch_execute\",\n      \"mcp__plugin"
  },
  {
    "path": ".gitattributes",
    "chars": 55,
    "preview": "*.css linguist-vendored\n*.* linguist-language=Markdown\n"
  },
  {
    "path": ".github/CODEOWNERS",
    "chars": 89,
    "preview": "* @veggiemonk @agebhar1 @dmitrytokarev @gesellix @mashb1t @moshloop @vegasbrianc @noteed\n"
  },
  {
    "path": ".github/CODE_OF_CONDUCT.md",
    "chars": 3229,
    "preview": "# Contributor Covenant Code of Conduct\n\n## Our Pledge\n\nIn the interest of fostering an open and welcoming environment, w"
  },
  {
    "path": ".github/CONTRIBUTING.md",
    "chars": 1731,
    "preview": "# Contributing to awesome-docker\n\nThanks for taking the time to contribute.\n\nThis repository is a curated list of Docker"
  },
  {
    "path": ".github/ISSUE_TEMPLATE/add-a-project.md",
    "chars": 373,
    "preview": "---\nname: Add a project\nabout: Add a new project to the list\ntitle: \"add: [PROJECT_NAME] in [SECTION_NAME]\"\nlabels: pend"
  },
  {
    "path": ".github/MAINTENANCE.md",
    "chars": 1948,
    "preview": "# Maintenance Guide\n\nThis guide describes how maintainers keep the list and automation healthy.\n\n## Automated Workflows\n"
  },
  {
    "path": ".github/PULL_REQUEST_TEMPLATE.md",
    "chars": 686,
    "preview": "# Summary\n\nDescribe what changed and why.\n\n## Scope\n\n- [ ] README entries/content\n- [ ] Go CLI/tooling\n- [ ] GitHub work"
  },
  {
    "path": ".github/dependabot.yml",
    "chars": 296,
    "preview": "version: 2\nupdates:\n  # Enable version updates for Go modules\n  - package-ecosystem: \"gomod\"\n    directory: \"/\"\n    sche"
  },
  {
    "path": ".github/workflows/broken_links.yml",
    "chars": 2936,
    "preview": "name: Broken Links Report\n\non:\n  schedule:\n    - cron: \"0 2 * * 6\"\n  workflow_dispatch:\n\nconcurrency:\n  group: broken-li"
  },
  {
    "path": ".github/workflows/deploy-pages.yml",
    "chars": 1215,
    "preview": "name: Deploy to GitHub Pages\n\non:\n  push:\n    branches:\n      - master\n  workflow_dispatch:\n\npermissions:\n  contents: re"
  },
  {
    "path": ".github/workflows/health_report.yml",
    "chars": 2173,
    "preview": "name: Weekly Health Report\n\non:\n  schedule:\n    - cron: \"0 9 * * 1\"\n  workflow_dispatch:\n\nconcurrency:\n  group: health-r"
  },
  {
    "path": ".github/workflows/pull_request.yml",
    "chars": 699,
    "preview": "name: Pull Requests / Weekly QA\n\non:\n  pull_request:\n    branches:\n      - master\n  schedule:\n    - cron: \"0 0 * * 6\"\n\nj"
  },
  {
    "path": ".gitignore",
    "chars": 148,
    "preview": "logs\n*.log\nnpm-debug.log*\nbuild\nnode_modules\n.cache\ndist\nwebsite/index.html\nwebsite/table.html\n\n.idea\n**/.DS_Store\n.work"
  },
  {
    "path": "AGENTS.md",
    "chars": 4196,
    "preview": "# Agent Guidelines for awesome-docker\n\n## Commands\n- Build CLI: `make build` (or `go build -o awesome-docker ./cmd/aweso"
  },
  {
    "path": "LICENSE",
    "chars": 11356,
    "preview": "                                 Apache License\n                           Version 2.0, January 2004\n                   "
  },
  {
    "path": "Makefile",
    "chars": 4635,
    "preview": "SHELL := /bin/bash\n\nBINARY ?= awesome-docker\nGO ?= go\nCMD_PACKAGE := ./cmd/awesome-docker\nINTERNAL_PACKAGES := ./interna"
  },
  {
    "path": "README.md",
    "chars": 92969,
    "preview": "# Awesome Docker [![Awesome](https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/"
  },
  {
    "path": "cmd/awesome-docker/main.go",
    "chars": 18625,
    "preview": "package main\n\nimport (\n\t\"context\"\n\t\"fmt\"\n\t\"os\"\n\t\"strconv\"\n\t\"strings\"\n\n\t\"github.com/spf13/cobra\"\n\t\"github.com/veggiemonk/"
  },
  {
    "path": "config/exclude.yaml",
    "chars": 761,
    "preview": "# URLs or URL prefixes to skip during link checking.\n# These are known false positives or rate-limited domains.\ndomains:"
  },
  {
    "path": "config/health_cache.yaml",
    "chars": 133059,
    "preview": "entries:\n    - url: https://github.com/byrnedo/capitan\n      name: byrnedo/capitan\n      status: stale\n      stars: 31\n "
  },
  {
    "path": "config/website.tmpl.html",
    "chars": 19813,
    "preview": "<!DOCTYPE html>\n<html class=\"no-js\" lang=\"en\">\n  <head>\n    <meta http-equiv=\"Content-Type\" content=\"text/html; charset="
  },
  {
    "path": "go.mod",
    "chars": 1323,
    "preview": "module github.com/veggiemonk/awesome-docker\n\ngo 1.26.0\n\nrequire (\n\tcharm.land/bubbletea/v2 v2.0.2\n\tcharm.land/lipgloss/v"
  },
  {
    "path": "go.sum",
    "chars": 7285,
    "preview": "charm.land/bubbletea/v2 v2.0.1 h1:B8e9zzK7x9JJ+XvHGF4xnYu9Xa0E0y0MyggY6dbaCfQ=\ncharm.land/bubbletea/v2 v2.0.1/go.mod h1:"
  },
  {
    "path": "index.html",
    "chars": 378,
    "preview": "<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n  <meta charset=\"UTF-8\">\n  <meta name=\"viewport\" content=\"width=device-width, in"
  },
  {
    "path": "internal/builder/builder.go",
    "chars": 1761,
    "preview": "package builder\n\nimport (\n\t\"bytes\"\n\t\"fmt\"\n\t\"os\"\n\t\"strings\"\n\n\t\"github.com/yuin/goldmark\"\n\t\"github.com/yuin/goldmark/exten"
  },
  {
    "path": "internal/builder/builder_test.go",
    "chars": 4073,
    "preview": "package builder\n\nimport (\n\t\"os\"\n\t\"path/filepath\"\n\t\"strings\"\n\t\"testing\"\n)\n\nfunc TestBuild(t *testing.T) {\n\tdir := t.TempD"
  },
  {
    "path": "internal/cache/cache.go",
    "chars": 2474,
    "preview": "package cache\n\nimport (\n\t\"os\"\n\t\"strings\"\n\t\"time\"\n\n\t\"gopkg.in/yaml.v3\"\n)\n\n// ExcludeList holds URL prefixes to skip durin"
  },
  {
    "path": "internal/cache/cache_test.go",
    "chars": 3251,
    "preview": "package cache\n\nimport (\n\t\"os\"\n\t\"path/filepath\"\n\t\"testing\"\n\t\"time\"\n)\n\nfunc TestLoadExcludeList(t *testing.T) {\n\tdir := t."
  },
  {
    "path": "internal/checker/github.go",
    "chars": 4045,
    "preview": "package checker\n\nimport (\n\t\"context\"\n\t\"fmt\"\n\t\"net/url\"\n\t\"strings\"\n\t\"time\"\n\n\t\"github.com/shurcooL/githubv4\"\n\t\"golang.org/"
  },
  {
    "path": "internal/checker/github_test.go",
    "chars": 2218,
    "preview": "package checker\n\nimport (\n\t\"errors\"\n\t\"testing\"\n)\n\nfunc TestExtractGitHubRepo(t *testing.T) {\n\ttests := []struct {\n\t\turl "
  },
  {
    "path": "internal/checker/http.go",
    "chars": 2779,
    "preview": "package checker\n\nimport (\n\t\"context\"\n\t\"net/http\"\n\t\"sync\"\n\t\"time\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/cache\""
  },
  {
    "path": "internal/checker/http_test.go",
    "chars": 3251,
    "preview": "package checker\n\nimport (\n\t\"net/http\"\n\t\"net/http/httptest\"\n\t\"testing\"\n)\n\nfunc TestCheckLinkOK(t *testing.T) {\n\tserver :="
  },
  {
    "path": "internal/linter/fixer.go",
    "chars": 3645,
    "preview": "package linter\n\nimport (\n\t\"bufio\"\n\t\"fmt\"\n\t\"os\"\n\t\"regexp\"\n\t\"strings\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/par"
  },
  {
    "path": "internal/linter/fixer_test.go",
    "chars": 4275,
    "preview": "package linter\n\nimport (\n\t\"os\"\n\t\"strings\"\n\t\"testing\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/parser\"\n)\n\nfunc Te"
  },
  {
    "path": "internal/linter/linter.go",
    "chars": 1287,
    "preview": "package linter\n\nimport (\n\t\"github.com/veggiemonk/awesome-docker/internal/parser\"\n)\n\n// Result holds all lint issues foun"
  },
  {
    "path": "internal/linter/linter_test.go",
    "chars": 3101,
    "preview": "package linter\n\nimport (\n\t\"testing\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/parser\"\n)\n\nfunc TestRuleDescription"
  },
  {
    "path": "internal/linter/rules.go",
    "chars": 3771,
    "preview": "package linter\n\nimport (\n\t\"fmt\"\n\t\"sort\"\n\t\"strings\"\n\t\"unicode\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/parser\"\n)"
  },
  {
    "path": "internal/parser/parser.go",
    "chars": 3368,
    "preview": "package parser\n\nimport (\n\t\"bufio\"\n\t\"fmt\"\n\t\"io\"\n\t\"regexp\"\n\t\"strings\"\n)\n\n// entryRe matches: - [Name](URL) - Description\n/"
  },
  {
    "path": "internal/parser/parser_test.go",
    "chars": 4260,
    "preview": "package parser\n\nimport (\n\t\"os\"\n\t\"strings\"\n\t\"testing\"\n)\n\nfunc TestParseEntry(t *testing.T) {\n\tline := `- [Docker Desktop]"
  },
  {
    "path": "internal/parser/types.go",
    "chars": 887,
    "preview": "package parser\n\n// Marker represents a status emoji on an entry.\ntype Marker int\n\nconst (\n\tMarkerAbandoned Marker = iota"
  },
  {
    "path": "internal/scorer/scorer.go",
    "chars": 4917,
    "preview": "package scorer\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"strings\"\n\t\"time\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/cac"
  },
  {
    "path": "internal/scorer/scorer_test.go",
    "chars": 4219,
    "preview": "package scorer\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"strings\"\n\t\"testing\"\n\t\"time\"\n\n\t\"github.com/veggiemonk/awesome-docker/i"
  },
  {
    "path": "internal/tui/model.go",
    "chars": 13189,
    "preview": "package tui\n\nimport (\n\t\"fmt\"\n\t\"os/exec\"\n\t\"runtime\"\n\t\"strings\"\n\t\"unicode/utf8\"\n\n\ttea \"charm.land/bubbletea/v2\"\n\t\"charm.la"
  },
  {
    "path": "internal/tui/styles.go",
    "chars": 2024,
    "preview": "package tui\n\nimport \"charm.land/lipgloss/v2\"\n\nvar (\n\t// Panel borders\n\tactiveBorderStyle = lipgloss.NewStyle().\n\t\t\t\tBord"
  },
  {
    "path": "internal/tui/tree.go",
    "chars": 2816,
    "preview": "package tui\n\nimport (\n\t\"sort\"\n\t\"strings\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/cache\"\n)\n\n// TreeNode represen"
  },
  {
    "path": "internal/tui/tree_test.go",
    "chars": 3295,
    "preview": "package tui\n\nimport (\n\t\"testing\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/cache\"\n)\n\nfunc TestBuildTree(t *testin"
  },
  {
    "path": "internal/tui/tui.go",
    "chars": 298,
    "preview": "package tui\n\nimport (\n\ttea \"charm.land/bubbletea/v2\"\n\t\"github.com/veggiemonk/awesome-docker/internal/cache\"\n)\n\n// Run la"
  }
]

About this extraction

This page contains the full source code of the veggiemonk/awesome-docker GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 48 files (380.4 KB), approximately 109.9k tokens, and a symbol index with 200 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!