Showing preview only (397K chars total). Download the full file or copy to clipboard to get everything.
Repository: veggiemonk/awesome-docker
Branch: master
Commit: bba85d05492b
Files: 48
Total size: 380.4 KB
Directory structure:
gitextract_uu2bikk7/
├── .claude/
│ └── settings.local.json
├── .gitattributes
├── .github/
│ ├── CODEOWNERS
│ ├── CODE_OF_CONDUCT.md
│ ├── CONTRIBUTING.md
│ ├── ISSUE_TEMPLATE/
│ │ └── add-a-project.md
│ ├── MAINTENANCE.md
│ ├── PULL_REQUEST_TEMPLATE.md
│ ├── dependabot.yml
│ └── workflows/
│ ├── broken_links.yml
│ ├── deploy-pages.yml
│ ├── health_report.yml
│ └── pull_request.yml
├── .gitignore
├── AGENTS.md
├── LICENSE
├── Makefile
├── README.md
├── cmd/
│ └── awesome-docker/
│ └── main.go
├── config/
│ ├── exclude.yaml
│ ├── health_cache.yaml
│ └── website.tmpl.html
├── go.mod
├── go.sum
├── index.html
└── internal/
├── builder/
│ ├── builder.go
│ └── builder_test.go
├── cache/
│ ├── cache.go
│ └── cache_test.go
├── checker/
│ ├── github.go
│ ├── github_test.go
│ ├── http.go
│ └── http_test.go
├── linter/
│ ├── fixer.go
│ ├── fixer_test.go
│ ├── linter.go
│ ├── linter_test.go
│ └── rules.go
├── parser/
│ ├── parser.go
│ ├── parser_test.go
│ └── types.go
├── scorer/
│ ├── scorer.go
│ └── scorer_test.go
└── tui/
├── model.go
├── styles.go
├── tree.go
├── tree_test.go
└── tui.go
================================================
FILE CONTENTS
================================================
================================================
FILE: .claude/settings.local.json
================================================
{
"permissions": {
"allow": [
"mcp__plugin_context-mode_context-mode__ctx_batch_execute",
"mcp__plugin_context7_context7__resolve-library-id",
"mcp__plugin_context7_context7__query-docs",
"Bash(go:*)",
"Bash(./awesome-docker:*)",
"Bash(tmux send-keys:*)",
"Bash(tmux capture-pane:*)",
"Bash(tmux:*)"
]
}
}
================================================
FILE: .gitattributes
================================================
*.css linguist-vendored
*.* linguist-language=Markdown
================================================
FILE: .github/CODEOWNERS
================================================
* @veggiemonk @agebhar1 @dmitrytokarev @gesellix @mashb1t @moshloop @vegasbrianc @noteed
================================================
FILE: .github/CODE_OF_CONDUCT.md
================================================
# Contributor Covenant Code of Conduct
## Our Pledge
In the interest of fostering an open and welcoming environment, we as contributors and maintainers pledge to making participation in our project and our community a harassment-free experience for everyone, regardless of age, body size, disability, ethnicity, gender identity and expression, level of experience, nationality, personal appearance, race, religion, or sexual identity and orientation.
## Our Standards
Examples of behavior that contributes to creating a positive environment include:
* Using welcoming and inclusive language
* Being respectful of differing viewpoints and experiences
* Gracefully accepting constructive criticism
* Focusing on what is best for the community
* Showing empathy towards other community members
Examples of unacceptable behavior by participants include:
* The use of sexualized language or imagery and unwelcome sexual attention or advances
* Trolling, insulting/derogatory comments, and personal or political attacks
* Public or private harassment
* Publishing others' private information, such as a physical or electronic address, without explicit permission
* Other conduct which could reasonably be considered inappropriate in a professional setting
## Our Responsibilities
Project maintainers are responsible for clarifying the standards of acceptable behavior and are expected to take appropriate and fair corrective action in response to any instances of unacceptable behavior.
Project maintainers have the right and responsibility to remove, edit, or reject comments, commits, code, wiki edits, issues, and other contributions that are not aligned to this Code of Conduct, or to ban temporarily or permanently any contributor for other behaviors that they deem inappropriate, threatening, offensive, or harmful.
## Scope
This Code of Conduct applies both within project spaces and in public spaces when an individual is representing the project or its community. Examples of representing a project or community include using an official project e-mail address, posting via an official social media account, or acting as an appointed representative at an online or offline event. Representation of a project may be further defined and clarified by project maintainers.
## Enforcement
Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at julien.bisconti (at) hotmail.com. The project team will review and investigate all complaints, and will respond in a way that it deems appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.
Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership.
## Attribution
This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4, available at [http://contributor-covenant.org/version/1/4][version]
[homepage]: http://contributor-covenant.org
[version]: http://contributor-covenant.org/version/1/4/
================================================
FILE: .github/CONTRIBUTING.md
================================================
# Contributing to awesome-docker
Thanks for taking the time to contribute.
This repository is a curated list of Docker/container resources plus a Go-based maintenance CLI used by CI. Contributions are welcome for both content and tooling.
Please read and follow the [Code of Conduct](./CODE_OF_CONDUCT.md).
## What We Accept
- New high-quality Docker/container-related projects
- Fixes to descriptions, ordering, or categorization
- Removal of broken, archived, deprecated, or duplicate entries
- Improvements to the Go CLI and GitHub workflows
## README Entry Rules
- Use one link per entry.
- Prefer GitHub project/repository URLs over marketing pages.
- Keep entries alphabetically sorted within their section.
- Keep descriptions concise and concrete.
- Use `:yen:` for paid/commercial services.
- Use `:ice_cube:` for stale projects (2+ years inactive).
- Do not use `:skull:`; archived/deprecated projects should be removed.
- Avoid duplicate links and redirect variants.
## Local Validation
```bash
# Build CLI
make build
# Validate README formatting and content
make lint
# Run code tests (when touching Go code)
make test
# Optional: full external checks (requires GITHUB_TOKEN)
./awesome-docker check
./awesome-docker validate
```
## Pull Request Expectations
- Keep the PR focused to one logical change.
- Explain what changed and why.
- If adding entries, include the target category.
- If removing entries, explain why (archived, broken, duplicate, etc.).
- Fill in the PR template checklist.
## Maintainer Notes
- Changes should be reviewed before merge.
- Prefer helping contributors improve a PR over silently rejecting it.
- Keep `.github` documentation and workflows aligned with current tooling.
================================================
FILE: .github/ISSUE_TEMPLATE/add-a-project.md
================================================
---
name: Add a project
about: Add a new project to the list
title: "add: [PROJECT_NAME] in [SECTION_NAME]"
labels: pending-evaluation
assignees: ''
---
Category:
Repository link:
Description (one sentence):
Author:
Why this should be in the list:
Notes (`:yen:` if relevant):
Or directly write it:
```markdown
[REPO](https://github.com/AUTHOR/REPO) - DESCRIPTION.
```
================================================
FILE: .github/MAINTENANCE.md
================================================
# Maintenance Guide
This guide describes how maintainers keep the list and automation healthy.
## Automated Workflows
### Pull Requests / Weekly QA (`pull_request.yml`)
- Runs on pull requests and weekly on Saturday.
- Builds the Go CLI and runs `./awesome-docker validate`.
### Broken Links Report (`broken_links.yml`)
- Runs weekly on Saturday and on manual trigger.
- Executes `./awesome-docker check`.
- Opens/updates a `broken-links` issue when problems are found.
### Weekly Health Report (`health_report.yml`)
- Runs weekly on Monday and on manual trigger.
- Executes `./awesome-docker health` then `./awesome-docker report`.
- Opens/updates a `health-report` issue.
### Deploy to GitHub Pages (`deploy-pages.yml`)
- Runs on pushes to `master` and manual trigger.
- Builds website with `./awesome-docker build` and publishes `website/`.
## Day-to-Day Commands
```bash
# Build CLI
make build
# README lint/validation
make lint
# Auto-fix formatting issues
./awesome-docker lint --fix
# Link checks and health checks (requires GITHUB_TOKEN)
make check
make health
make report
```
## Content Maintenance Policy
- Remove archived/deprecated projects instead of tagging them.
- Remove broken links that cannot be fixed.
- Keep sections alphabetically sorted.
- Keep descriptions short and actionable.
## Suggested Review Cadence
### Weekly
- Triage open `broken-links` and `health-report` issues.
- Merge straightforward quality PRs.
### Monthly
- Review sections for stale/duplicate entries.
- Re-run `check` and `health` manually if needed.
### Quarterly
- Review `.github` docs and templates for drift.
- Confirm workflows still match repository tooling and policies.
## Contributor Support
When requesting PR changes, be explicit and actionable:
- point to section/order problems,
- explain why a link should be removed,
- suggest exact wording when description quality is the issue.
---
Last updated: 2026-02-27
================================================
FILE: .github/PULL_REQUEST_TEMPLATE.md
================================================
# Summary
Describe what changed and why.
## Scope
- [ ] README entries/content
- [ ] Go CLI/tooling
- [ ] GitHub workflows or `.github` docs
## If This PR Adds/Edits README Entries
- Category/section touched:
- New or updated project links:
## Validation
- [ ] `make lint`
- [ ] `make test` (if Go code changed)
- [ ] `./awesome-docker check` (if `GITHUB_TOKEN` available)
## Contributor Checklist
- [ ] Entries are alphabetically ordered in their section
- [ ] Links point to project repositories (no duplicates or redirects)
- [ ] Descriptions are concise and specific
- [ ] Archived/deprecated projects were removed instead of tagged
- [ ] Used `:yen:` only when applicable
================================================
FILE: .github/dependabot.yml
================================================
version: 2
updates:
# Enable version updates for Go modules
- package-ecosystem: "gomod"
directory: "/"
schedule:
interval: "weekly"
# Enable version updates for GitHub Actions
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "weekly"
================================================
FILE: .github/workflows/broken_links.yml
================================================
name: Broken Links Report
on:
schedule:
- cron: "0 2 * * 6"
workflow_dispatch:
concurrency:
group: broken-links-${{ github.ref }}
cancel-in-progress: false
jobs:
check-links:
runs-on: ubuntu-latest
timeout-minutes: 30
permissions:
contents: read
issues: write
steps:
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # ratchet:actions/checkout@v6
- uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # ratchet:actions/setup-go@v6
with:
go-version-file: go.mod
- name: Build
run: go build -o awesome-docker ./cmd/awesome-docker
- name: Run Link Check
id: link_check
run: ./awesome-docker ci broken-links --issue-file broken_links_issue.md --github-output "$GITHUB_OUTPUT"
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- name: Create/Update Issue for Broken Links
if: steps.link_check.outputs.has_errors == 'true'
uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # ratchet:actions/github-script@v8
with:
script: |
const fs = require('fs');
const issueBody = fs.readFileSync('broken_links_issue.md', 'utf8');
const issues = await github.rest.issues.listForRepo({
owner: context.repo.owner,
repo: context.repo.repo,
state: 'open',
labels: 'broken-links',
per_page: 1
});
if (issues.data.length > 0) {
await github.rest.issues.update({
owner: context.repo.owner,
repo: context.repo.repo,
issue_number: issues.data[0].number,
body: issueBody
});
} else {
await github.rest.issues.create({
owner: context.repo.owner,
repo: context.repo.repo,
title: 'Broken Links Detected',
body: issueBody,
labels: ['broken-links', 'bug']
});
}
- name: Close Issue if No Errors
if: steps.link_check.outputs.has_errors == 'false'
uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # ratchet:actions/github-script@v8
with:
script: |
const issues = await github.rest.issues.listForRepo({
owner: context.repo.owner,
repo: context.repo.repo,
state: 'open',
labels: 'broken-links',
per_page: 1
});
if (issues.data.length > 0) {
await github.rest.issues.update({
owner: context.repo.owner,
repo: context.repo.repo,
issue_number: issues.data[0].number,
state: 'closed',
state_reason: 'completed'
});
}
================================================
FILE: .github/workflows/deploy-pages.yml
================================================
name: Deploy to GitHub Pages
on:
push:
branches:
- master
workflow_dispatch:
permissions:
contents: read
pages: write
id-token: write
concurrency:
group: "pages"
cancel-in-progress: false
jobs:
build:
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # ratchet:actions/checkout@v6
- uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # ratchet:actions/setup-go@v6
with:
go-version-file: go.mod
- name: Build CLI
run: go build -o awesome-docker ./cmd/awesome-docker
- name: Build website
run: make website
- name: Upload artifact
uses: actions/upload-pages-artifact@7b1f4a764d45c48632c6b24a0339c27f5614fb0b # ratchet:actions/upload-pages-artifact@v4
with:
path: ./website
deploy:
environment:
name: github-pages
url: ${{ steps.deployment.outputs.page_url }}
runs-on: ubuntu-latest
needs: build
steps:
- name: Deploy to GitHub Pages
id: deployment
uses: actions/deploy-pages@d6db90164ac5ed86f2b6aed7e0febac5b3c0c03e # ratchet:actions/deploy-pages@v4
================================================
FILE: .github/workflows/health_report.yml
================================================
name: Weekly Health Report
on:
schedule:
- cron: "0 9 * * 1"
workflow_dispatch:
concurrency:
group: health-report-${{ github.ref }}
cancel-in-progress: false
jobs:
health-check:
runs-on: ubuntu-latest
timeout-minutes: 30
permissions:
contents: read
issues: write
steps:
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # ratchet:actions/checkout@v6
- uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # ratchet:actions/setup-go@v6
with:
go-version-file: go.mod
- name: Build
run: go build -o awesome-docker ./cmd/awesome-docker
- name: Run Health + Report
id: report
run: ./awesome-docker ci health-report --issue-file health_report.txt --github-output "$GITHUB_OUTPUT"
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- name: Create/Update Issue with Health Report
if: steps.report.outputs.has_report == 'true'
uses: actions/github-script@ed597411d8f924073f98dfc5c65a23a2325f34cd # ratchet:actions/github-script@v8
with:
script: |
const fs = require('fs');
const report = fs.readFileSync('health_report.txt', 'utf8');
const issueBody = report;
const issues = await github.rest.issues.listForRepo({
owner: context.repo.owner,
repo: context.repo.repo,
state: 'open',
labels: 'health-report',
per_page: 1
});
if (issues.data.length > 0) {
await github.rest.issues.update({
owner: context.repo.owner,
repo: context.repo.repo,
issue_number: issues.data[0].number,
body: issueBody
});
} else {
await github.rest.issues.create({
owner: context.repo.owner,
repo: context.repo.repo,
title: 'Weekly Health Report - Repository Maintenance Needed',
body: issueBody,
labels: ['health-report', 'maintenance']
});
}
================================================
FILE: .github/workflows/pull_request.yml
================================================
name: Pull Requests / Weekly QA
on:
pull_request:
branches:
- master
schedule:
- cron: "0 0 * * 6"
jobs:
test:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # ratchet:actions/checkout@v6
- uses: actions/setup-go@4b73464bb391d4059bd26b0524d20df3927bd417 # ratchet:actions/setup-go@v6
with:
go-version-file: go.mod
- name: Build
run: go build -o awesome-docker ./cmd/awesome-docker
- name: Build website
run: ./awesome-docker build
- name: Validate
run: ./awesome-docker validate
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
================================================
FILE: .gitignore
================================================
logs
*.log
npm-debug.log*
build
node_modules
.cache
dist
website/index.html
website/table.html
.idea
**/.DS_Store
.worktrees
# Go
/awesome-docker
================================================
FILE: AGENTS.md
================================================
# Agent Guidelines for awesome-docker
## Commands
- Build CLI: `make build` (or `go build -o awesome-docker ./cmd/awesome-docker`)
- Rebuild from scratch: `make rebuild`
- Show local workflows: `make help`
- Format Go code: `make fmt`
- Run tests: `make test` (runs `go test ./internal/... -v`)
- Race tests: `make test-race`
- Lint README rules: `make lint` (runs `./awesome-docker lint`)
- Auto-fix lint issues: `make lint-fix`
- Check links: `make check` (runs `./awesome-docker check`; `GITHUB_TOKEN` enables GitHub repo checks)
- PR-safe link checks: `make check-pr`
- PR validation: `make validate` (lint + external link checks in PR mode)
- Build website: `make website` (generates `website/index.html` from `README.md`)
- Health scoring: `make health` (requires `GITHUB_TOKEN`, refreshes `config/health_cache.yaml`)
- Print health report (Markdown): `make report`
- Print health report (JSON): `make report-json` or `./awesome-docker report --json`
- Generate report files: `make report-file` (`HEALTH_REPORT.md`) and `make report-json-file` (`HEALTH_REPORT.json`)
- Maintenance shortcut: `make workflow-maint` (health + JSON report file)
## Architecture
- **Main content**: `README.md` (curated Docker/container resources)
- **CLI entrypoint**: `cmd/awesome-docker/main.go` (Cobra commands)
- **Core packages**:
- `internal/parser` - parse README sections and entries
- `internal/linter` - alphabetical/order/format validation + autofix
- `internal/checker` - HTTP and GitHub link checks
- `internal/scorer` - repository health scoring and report generation
- `internal/cache` - exclude list and health cache read/write
- `internal/builder` - render README to website HTML from template
- **Config**:
- `config/exclude.yaml` - known link-check exclusions
- `config/website.tmpl.html` - HTML template for site generation
- `config/health_cache.yaml` - persisted health scoring cache
- **Generated outputs**:
- `awesome-docker` - compiled CLI binary
- `website/index.html` - generated website
- `HEALTH_REPORT.md` - generated markdown report
- `HEALTH_REPORT.json` - generated JSON report
## Code Style
- **Language**: Go
- **Formatting**: Keep code `gofmt`-clean
- **Testing**: Add/adjust table-driven tests in `internal/*_test.go` for behavior changes
- **Error handling**: Return wrapped errors (`fmt.Errorf("context: %w", err)`) from command handlers
- **CLI conventions**: Keep command behavior consistent with existing Cobra commands (`lint`, `check`, `health`, `build`, `report`, `validate`)
## CI/Automation
- **PR + weekly validation**: `.github/workflows/pull_request.yml`
- Triggers on pull requests to `master` and weekly schedule
- Builds Go CLI and runs `./awesome-docker validate`
- **Weekly broken links issue**: `.github/workflows/broken_links.yml`
- Runs `./awesome-docker check`
- Opens/updates `broken-links` issue when failures are found
- **Weekly health report issue**: `.github/workflows/health_report.yml`
- Runs `./awesome-docker health` then `./awesome-docker report`
- Opens/updates `health-report` issue
- **GitHub Pages deploy**: `.github/workflows/deploy-pages.yml`
- On push to `master`, builds CLI, runs `./awesome-docker build`, deploys `website/`
## Makefile Workflow
- The `Makefile` models file dependencies for generated artifacts (`awesome-docker`, `website/index.html`, `config/health_cache.yaml`, `HEALTH_REPORT.md`, `HEALTH_REPORT.json`).
- Prefer `make` targets over ad-hoc command sequences so dependency and regeneration behavior stays consistent.
- Use:
- `make workflow-dev` for local iteration
- `make workflow-pr` before opening/updating a PR
- `make workflow-maint` for health/report maintenance
- `make workflow-ci` for CI-equivalent local checks
## Content Guidelines (from CONTRIBUTING.md)
- Use one link per entry
- Prefer project/repository URLs over marketing pages
- Keep entries alphabetically ordered within each section
- Keep descriptions concise and concrete
- Use `:yen:` only for paid/commercial services
- Use `:ice_cube:` for stale projects (2+ years inactive)
- Remove archived/deprecated projects instead of tagging them
- Avoid duplicate links and redirect variants
================================================
FILE: LICENSE
================================================
Apache License
Version 2.0, January 2004
http://www.apache.org/licenses/
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
1. Definitions.
"License" shall mean the terms and conditions for use, reproduction,
and distribution as defined by Sections 1 through 9 of this document.
"Licensor" shall mean the copyright owner or entity authorized by
the copyright owner that is granting the License.
"Legal Entity" shall mean the union of the acting entity and all
other entities that control, are controlled by, or are under common
control with that entity. For the purposes of this definition,
"control" means (i) the power, direct or indirect, to cause the
direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the
outstanding shares, or (iii) beneficial ownership of such entity.
"You" (or "Your") shall mean an individual or Legal Entity
exercising permissions granted by this License.
"Source" form shall mean the preferred form for making modifications,
including but not limited to software source code, documentation
source, and configuration files.
"Object" form shall mean any form resulting from mechanical
transformation or translation of a Source form, including but
not limited to compiled object code, generated documentation,
and conversions to other media types.
"Work" shall mean the work of authorship, whether in Source or
Object form, made available under the License, as indicated by a
copyright notice that is included in or attached to the work
(an example is provided in the Appendix below).
"Derivative Works" shall mean any work, whether in Source or Object
form, that is based on (or derived from) the Work and for which the
editorial revisions, annotations, elaborations, or other modifications
represent, as a whole, an original work of authorship. For the purposes
of this License, Derivative Works shall not include works that remain
separable from, or merely link (or bind by name) to the interfaces of,
the Work and Derivative Works thereof.
"Contribution" shall mean any work of authorship, including
the original version of the Work and any modifications or additions
to that Work or Derivative Works thereof, that is intentionally
submitted to Licensor for inclusion in the Work by the copyright owner
or by an individual or Legal Entity authorized to submit on behalf of
the copyright owner. For the purposes of this definition, "submitted"
means any form of electronic, verbal, or written communication sent
to the Licensor or its representatives, including but not limited to
communication on electronic mailing lists, source code control systems,
and issue tracking systems that are managed by, or on behalf of, the
Licensor for the purpose of discussing and improving the Work, but
excluding communication that is conspicuously marked or otherwise
designated in writing by the copyright owner as "Not a Contribution."
"Contributor" shall mean Licensor and any individual or Legal Entity
on behalf of whom a Contribution has been received by Licensor and
subsequently incorporated within the Work.
2. Grant of Copyright License. Subject to the terms and conditions of
this License, each Contributor hereby grants to You a perpetual,
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
copyright license to reproduce, prepare Derivative Works of,
publicly display, publicly perform, sublicense, and distribute the
Work and such Derivative Works in Source or Object form.
3. Grant of Patent License. Subject to the terms and conditions of
this License, each Contributor hereby grants to You a perpetual,
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
(except as stated in this section) patent license to make, have made,
use, offer to sell, sell, import, and otherwise transfer the Work,
where such license applies only to those patent claims licensable
by such Contributor that are necessarily infringed by their
Contribution(s) alone or by combination of their Contribution(s)
with the Work to which such Contribution(s) was submitted. If You
institute patent litigation against any entity (including a
cross-claim or counterclaim in a lawsuit) alleging that the Work
or a Contribution incorporated within the Work constitutes direct
or contributory patent infringement, then any patent licenses
granted to You under this License for that Work shall terminate
as of the date such litigation is filed.
4. Redistribution. You may reproduce and distribute copies of the
Work or Derivative Works thereof in any medium, with or without
modifications, and in Source or Object form, provided that You
meet the following conditions:
(a) You must give any other recipients of the Work or
Derivative Works a copy of this License; and
(b) You must cause any modified files to carry prominent notices
stating that You changed the files; and
(c) You must retain, in the Source form of any Derivative Works
that You distribute, all copyright, patent, trademark, and
attribution notices from the Source form of the Work,
excluding those notices that do not pertain to any part of
the Derivative Works; and
(d) If the Work includes a "NOTICE" text file as part of its
distribution, then any Derivative Works that You distribute must
include a readable copy of the attribution notices contained
within such NOTICE file, excluding those notices that do not
pertain to any part of the Derivative Works, in at least one
of the following places: within a NOTICE text file distributed
as part of the Derivative Works; within the Source form or
documentation, if provided along with the Derivative Works; or,
within a display generated by the Derivative Works, if and
wherever such third-party notices normally appear. The contents
of the NOTICE file are for informational purposes only and
do not modify the License. You may add Your own attribution
notices within Derivative Works that You distribute, alongside
or as an addendum to the NOTICE text from the Work, provided
that such additional attribution notices cannot be construed
as modifying the License.
You may add Your own copyright statement to Your modifications and
may provide additional or different license terms and conditions
for use, reproduction, or distribution of Your modifications, or
for any such Derivative Works as a whole, provided Your use,
reproduction, and distribution of the Work otherwise complies with
the conditions stated in this License.
5. Submission of Contributions. Unless You explicitly state otherwise,
any Contribution intentionally submitted for inclusion in the Work
by You to the Licensor shall be under the terms and conditions of
this License, without any additional terms or conditions.
Notwithstanding the above, nothing herein shall supersede or modify
the terms of any separate license agreement you may have executed
with Licensor regarding such Contributions.
6. Trademarks. This License does not grant permission to use the trade
names, trademarks, service marks, or product names of the Licensor,
except as required for reasonable and customary use in describing the
origin of the Work and reproducing the content of the NOTICE file.
7. Disclaimer of Warranty. Unless required by applicable law or
agreed to in writing, Licensor provides the Work (and each
Contributor provides its Contributions) on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
implied, including, without limitation, any warranties or conditions
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
PARTICULAR PURPOSE. You are solely responsible for determining the
appropriateness of using or redistributing the Work and assume any
risks associated with Your exercise of permissions under this License.
8. Limitation of Liability. In no event and under no legal theory,
whether in tort (including negligence), contract, or otherwise,
unless required by applicable law (such as deliberate and grossly
negligent acts) or agreed to in writing, shall any Contributor be
liable to You for damages, including any direct, indirect, special,
incidental, or consequential damages of any character arising as a
result of this License or out of the use or inability to use the
Work (including but not limited to damages for loss of goodwill,
work stoppage, computer failure or malfunction, or any and all
other commercial damages or losses), even if such Contributor
has been advised of the possibility of such damages.
9. Accepting Warranty or Additional Liability. While redistributing
the Work or Derivative Works thereof, You may choose to offer,
and charge a fee for, acceptance of support, warranty, indemnity,
or other liability obligations and/or rights consistent with this
License. However, in accepting such obligations, You may act only
on Your own behalf and on Your sole responsibility, not on behalf
of any other Contributor, and only if You agree to indemnify,
defend, and hold each Contributor harmless for any liability
incurred by, or claims asserted against, such Contributor by reason
of your accepting any such warranty or additional liability.
END OF TERMS AND CONDITIONS
APPENDIX: How to apply the Apache License to your work.
To apply the Apache License to your work, attach the following
boilerplate notice, with the fields enclosed by brackets "[]"
replaced with your own identifying information. (Don't include
the brackets!) The text should be enclosed in the appropriate
comment syntax for the file format. We also recommend that a
file or class name and description of purpose be included on the
same "printed page" as the copyright notice for easier
identification within third-party archives.
Copyright [yyyy] [name of copyright owner]
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
================================================
FILE: Makefile
================================================
SHELL := /bin/bash
BINARY ?= awesome-docker
GO ?= go
CMD_PACKAGE := ./cmd/awesome-docker
INTERNAL_PACKAGES := ./internal/...
WEBSITE_OUTPUT := website/index.html
HEALTH_CACHE := config/health_cache.yaml
HEALTH_REPORT_MD := HEALTH_REPORT.md
HEALTH_REPORT_JSON := HEALTH_REPORT.json
GO_SOURCES := $(shell find cmd internal -type f -name '*.go')
BUILD_INPUTS := $(GO_SOURCES) go.mod go.sum
WEBSITE_INPUTS := README.md config/website.tmpl.html
HEALTH_INPUTS := README.md config/exclude.yaml
.DEFAULT_GOAL := help
.PHONY: help \
build rebuild clean \
fmt test test-race \
lint lint-fix check check-pr validate website \
guard-github-token health health-cache \
report report-json report-file report-json-file health-report \
workflow-dev workflow-pr workflow-maint workflow-ci
help: ## Show the full local workflow and available targets
@echo "awesome-docker Makefile"
@echo
@echo "Workflows:"
@echo " make workflow-dev # local iteration (fmt + test + lint + check-pr + website)"
@echo " make workflow-pr # recommended before opening/updating a PR"
@echo " make workflow-maint # repository maintenance (health + JSON report)"
@echo " make workflow-ci # CI-equivalent checks"
@echo
@echo "Core targets:"
@echo " make build # build CLI binary"
@echo " make test # run internal Go tests"
@echo " make lint # validate README formatting/content rules"
@echo " make check # check links (uses GITHUB_TOKEN when set)"
@echo " make validate # run PR validation (lint + check --pr)"
@echo " make website # generate website/index.html"
@echo " make report-file # generate HEALTH_REPORT.md"
@echo " make report-json-file# generate HEALTH_REPORT.json"
@echo " make health # refresh health cache (requires GITHUB_TOKEN)"
@echo " make report # print markdown health report"
@echo " make report-json # print full JSON health report"
@echo
@echo "Generated artifacts:"
@echo " $(BINARY)"
@echo " $(WEBSITE_OUTPUT)"
@echo " $(HEALTH_CACHE)"
@echo " $(HEALTH_REPORT_MD)"
@echo " $(HEALTH_REPORT_JSON)"
$(BINARY): $(BUILD_INPUTS)
$(GO) build -o $(BINARY) $(CMD_PACKAGE)
build: $(BINARY) ## Build CLI binary
rebuild: clean build ## Rebuild from scratch
clean: ## Remove generated binary
rm -f $(BINARY) $(HEALTH_REPORT_MD) $(HEALTH_REPORT_JSON)
fmt: ## Format Go code
$(GO) fmt ./...
test: ## Run internal unit tests
$(GO) test $(INTERNAL_PACKAGES) -v
test-race: ## Run internal tests with race detector
$(GO) test $(INTERNAL_PACKAGES) -race
lint: build ## Validate README formatting/content rules
./$(BINARY) lint
lint-fix: build ## Auto-fix lint issues when possible
./$(BINARY) lint --fix
check: build ## Check links (GitHub checks enabled when GITHUB_TOKEN is set)
./$(BINARY) check
check-pr: build ## Check links in PR mode (external links only)
./$(BINARY) check --pr
validate: build ## Run PR validation (lint + check --pr)
./$(BINARY) validate
$(WEBSITE_OUTPUT): $(BINARY) $(WEBSITE_INPUTS)
./$(BINARY) build
website: $(WEBSITE_OUTPUT) ## Generate website from README
guard-github-token:
@if [ -z "$$GITHUB_TOKEN" ]; then \
echo "GITHUB_TOKEN is required for this target."; \
echo "Set it with: export GITHUB_TOKEN=<token>"; \
exit 1; \
fi
$(HEALTH_CACHE): guard-github-token $(BINARY) $(HEALTH_INPUTS)
./$(BINARY) health
health-cache: $(HEALTH_CACHE) ## Update config/health_cache.yaml
health: ## Refresh health cache from GitHub metadata
@$(MAKE) --no-print-directory -B health-cache
report: build ## Print markdown health report from cache
./$(BINARY) report
report-json: build ## Print full health report as JSON
./$(BINARY) report --json
$(HEALTH_REPORT_MD): $(BINARY) $(HEALTH_CACHE)
./$(BINARY) report > $(HEALTH_REPORT_MD)
report-file: $(HEALTH_REPORT_MD) ## Generate HEALTH_REPORT.md from cache
$(HEALTH_REPORT_JSON): $(BINARY) $(HEALTH_CACHE)
./$(BINARY) report --json > $(HEALTH_REPORT_JSON)
report-json-file: $(HEALTH_REPORT_JSON) ## Generate HEALTH_REPORT.json from cache
health-report: health report-file ## Refresh health cache then generate HEALTH_REPORT.md
browse: build ## Launch interactive TUI browser
./$(BINARY) browse
workflow-dev: fmt test lint check-pr website ## Full local development workflow
workflow-pr: fmt test validate ## Recommended workflow before opening a PR
workflow-maint: health report-json-file ## Weekly maintenance workflow
workflow-ci: test validate ## CI-equivalent validation workflow
update-ga:
ratchet upgrade .github/workflows/*
update-go:
go get -u go@latest
go get -u ./...
go mod tidy
================================================
FILE: README.md
================================================
# Awesome Docker [][sindresorhus] [](https://www.trackawesomelist.com/veggiemonk/awesome-docker/)[](https://github.com/veggiemonk/awesome-docker/commits/main)<!-- omit in toc -->
> A curated list of Docker resources and projects
If you would like to contribute, please read [CONTRIBUTING.md][contributing] first.
It contains a lot of tips and guidelines to help keep things organized.
Just click [README.md][editreadme] to submit a [pull request][editreadme].
If this list is not complete, you can [contribute][editreadme] to make it so. Here is a great video tutorial to learn how to [contribute on Github](https://egghead.io/lessons/javascript-identifying-how-to-contribute-to-an-open-source-project-on-github).
> **Please**, help organize these resources so that they are _easy to find_ and _understand_ for newcomers. See how to **[Contribute][contributing]** for tips!
**_If you see a link here that is not (any longer) a good fit, you can fix it by submitting a [pull request][editreadme] to improve this file. Thank you!_**
The creators and maintainers of this list do not receive any form of payment to accept a change made by any contributor. This page is not an official Docker product in any way. It is a list of links to projects and is maintained by volunteers. Everybody is welcome to contribute. The goal of this repo is to index open-source projects, not to advertise for profit.
# Contents <!-- omit in toc -->
<!-- TOC -->
- [Legend](#legend)
- [What is Docker](#what-is-docker)
- [Where to start](#where-to-start)
- [Where to start (Windows)](#where-to-start-windows)
- [Projects](#projects)
- [Container Operations](#container-operations)
- [Container Composition](#container-composition)
- [Deployment and Infrastructure](#deployment-and-infrastructure)
- [Monitoring](#monitoring)
- [Networking](#networking)
- [Orchestration](#orchestration)
- [PaaS](#paas)
- [Reverse Proxy](#reverse-proxy)
- [Runtime](#runtime)
- [Security](#security)
- [Service Discovery](#service-discovery)
- [Volume Management / Data](#volume-management--data)
- [User Interface](#user-interface)
- [IDE integrations](#ide-integrations)
- [Desktop](#desktop)
- [Terminal](#terminal)
- [Terminal UI](#terminal-ui)
- [CLI tools](#cli-tools)
- [Other](#other)
- [Web](#web)
- [Docker Images](#docker-images)
- [Base Tools](#base-tools)
- [Builder](#builder)
- [Dockerfile](#dockerfile)
- [Linter](#linter)
- [Metadata](#metadata)
- [Registry](#registry)
- [Development with Docker](#development-with-docker)
- [API Client](#api-client)
- [CI/CD](#cicd)
- [Development Environment](#development-environment)
- [Garbage Collection](#garbage-collection)
- [Serverless](#serverless)
- [Testing](#testing)
- [Wrappers](#wrappers)
- [Services based on Docker (mostly :yen:)](#services-based-on-docker-mostly-yen)
- [CI Services](#ci-services)
- [CaaS](#caas)
- [Monitoring Services](#monitoring-services)
- [Useful Resources](#useful-resources)
- [Awesome Lists](#awesome-lists)
- [Demos and Examples](#demos-and-examples)
- [Good Tips](#good-tips)
- [Raspberry Pi \& ARM](#raspberry-pi--arm)
- [Security](#security-1)
- [Videos](#videos)
- [Communities and Meetups](#communities-and-meetups)
- [Brazilian](#brazilian)
- [English](#english)
- [Russian](#russian)
- [Spanish](#spanish)
- [Stargazers over time](#stargazers-over-time)
<!-- /TOC -->
# Legend
- Monetized :yen:
- Stale (2+ years inactive) :ice_cube:
# What is Docker
> Docker is an open platform for developers and sysadmins to build, ship, and run distributed applications. Consisting of Docker Engine, a portable, lightweight runtime and packaging tool, and Docker Hub, a cloud service for sharing applications and automating workflows, Docker enables apps to be quickly assembled from components and eliminates the friction between development, QA, and production environments. As a result, IT can ship faster and run the same app, unchanged, on laptops, data center VMs, and any cloud.
_Source:_ [What is Docker](https://www.docker.com/why-docker/)
# Where to start
- [Benefits of using Docker](https://semaphore.io/blog/docker-benefits) for development and delivery, with a practical roadmap for adoption.
- [Bootstrapping Microservices](https://www.manning.com/books/bootstrapping-microservices-with-docker-kubernetes-and-terraform) - A practical and project-based guide to building applications with microservices, starts by building a Docker image for a single microservice and publishing it to a private container registry, finishes by deploying a complete microservices application to a production Kubernetes cluster.
- [Docker Curriculum](https://github.com/prakhar1989/docker-curriculum): A comprehensive tutorial for getting started with Docker. Teaches how to use Docker and deploy dockerized apps on AWS with Elastic Beanstalk and Elastic Container Service.
- [Docker Documentation](https://docs.docker.com/): the official documentation.
- [Docker for beginners](https://github.com/groda/big_data/blob/master/docker_for_beginners.md): A tutorial for beginners who need to learn the basics of Docker—from "Hello world!" to basic interactions with containers, with simple explanations of the underlying concepts.
- [Docker for novices](https://www.youtube.com/watch?v=xsjSadjKXns) An introduction to Docker for developers and testers who have never used it. (Video 1h40, recorded linux.conf.au 2019 — Christchurch, New Zealand) by Alex Clews.
- [Docker katas](https://github.com/eficode-academy/docker-katas) A series of labs that will take you from "Hello Docker" to deploying a containerized web application to a server.
- [Docker simplified in 55 seconds](https://www.youtube.com/watch?v=vP_4DlOH1G4): An animated high-level introduction to Docker. Think of it as a visual tl;dr that makes it easier to dive into more complex learning materials.
- [Docker Training](https://training.mirantis.com) :yen:
- [Dockerlings](https://github.com/furkan/dockerlings): Learn docker from inside your terminal, with a modern TUI and bite sized exercises (by [furkan](https://github.com/furkan))
- [Introduction à Docker](https://blog.stephane-robert.info/docs/conteneurs/moteurs-conteneurs/docker/) A dedicated section to master Docker on a French site about DevSecOps: From the basics to best practices, including optimizing, securing your containers...
- [Learn Docker](https://github.com/dwyl/learn-docker): step-by-step tutorial and more resources (video, articles, cheat sheets) by [dwyl](https://github.com/dwyl)
- [Learn Docker (Visually)](https://pagertree.com/learn/docker/overview) - A beginner-focused high-level overview of all the major components of Docker and how they fit together. Lots of high-quality images, examples, and resources.
- [Play With Docker](https://training.play-with-docker.com/): PWD is a great way to get started with Docker from beginner to advanced users. Docker runs directly in your browser.
- [Practical Guide about Docker Commands in Spanish](https://github.com/brunocascio/docker-espanol) This Spanish guide contains the use of basic docker commands with real life examples.
- [Setting Python Development Environment with VScode and Docker](https://github.com/RamiKrispin/vscode-python): A step-by-step tutorial for setting up a dockerized Python development environment with VScode, Docker, and the Dev Container extension.
- [The Docker Handbook](https://docker-handbook.farhan.dev/) An open-source book that teaches you the fundamentals, best practices and some intermediate Docker functionalities. The book is hosted on [fhsinchy/the-docker-handbook](https://github.com/fhsinchy/the-docker-handbook) and the projects are hosted on [fhsinchy/docker-handbook-projects](https://github.com/fhsinchy/docker-handbook-projects) repository.
**Cheatsheets** by
- [eon01](https://github.com/eon01/DockerCheatSheet)
- [dimonomid](https://github.com/dimonomid/docker-quick-ref) (PDF)
- [JensPiegsa](https://github.com/JensPiegsa/docker-cheat-sheet)
- [wsargent](https://github.com/wsargent/docker-cheat-sheet) (Most popular)
# Where to start (Windows)
- [Docker on Windows behind a firewall](https://toedter.com/2015/05/11/docker-on-windows-behind-a-firewall/) by [kaitoedter](https://twitter.com/kaitoedter)
- [Docker Reference Architecture: Modernizing Traditional .NET Framework Applications](https://docs.mirantis.com/containers/v3.0/dockeree-ref-arch/app-dev/modernize-dotnet-apps.html) - You will learn to identify the types of .NET Framework applications that are good candidates for containerization, the "lift-and-shift" approach to containerization.
- [Docker with Microsoft SQL 2016 + ASP.NET](https://blog.alexellis.io/docker-does-sql2016-aspnet/) Demonstration running ASP.NET and SQL Server workloads in Docker
- [Exploring ASP.NET Core with Docker in both Linux and Windows Containers](https://www.hanselman.com/blog/exploring-aspnet-core-with-docker-in-both-linux-and-windows-containers) Running ASP.NET Core apps in Linux and Windows containers, using [Docker for Windows][docker-for-windows]
- [Running a Legacy ASP.NET App in a Windows Container](https://blog.sixeyed.com/dockerizing-nerd-dinner-part-1-running-a-legacy-asp-net-app-in-a-windows-container/) Steps for Dockerizing a legacy ASP.NET app and running as a Windows container
- [Windows Containers and Docker: The 101](https://www.youtube.com/watch?v=N7SG2wEyQtM) - A 20-minute overview, using Docker to run PowerShell, ASP.NET Core and ASP.NET apps.
- [Windows Containers Quick Start](https://learn.microsoft.com/en-us/virtualization/windowscontainers/about/) Overview of Windows containers, drilling down to Quick Starts for Windows 10 and Windows Server 2016
---
# Projects
- Moby = open source development
- Docker CE = free product release based on Moby
- Docker EE = commercial product release based on Docker CE.
> Docker EE is on the same code base as Docker CE, so also built from Moby, with commercial components added, such as "docker data center / universal control plane"
- [Moby](https://github.com/moby/moby)
- [Docker Images](https://hub.docker.com)
- [Docker Compose](https://github.com/docker/compose/) (Define and run multi-container applications with Docker)
- [Docker Registry][distribution] (The Docker toolset to pack, ship, store, and deliver content)
## Container Operations
### Container Composition
- [Capitan](https://github.com/byrnedo/capitan) :ice_cube: - Composable docker orchestration with added scripting support by [byrnedo].
- [Composerize](https://github.com/magicmark/composerize) - Convert docker run commands into docker-compose files.
- [crowdr](https://github.com/polonskiy/crowdr) :ice_cube: - Tool for managing multiple Docker containers (`docker-compose` alternative).
- [ctk](https://github.com/ctk-hq/ctk) - Visual composer for container based workloads. By [corpulent](https://github.com/corpulent).
- [docker-config-update](https://github.com/sudo-bmitch/docker-config-update) :ice_cube: - Utility to update docker configs and secrets for deploying in a compose file.
- [elsy](https://github.com/cisco/elsy) :ice_cube: - An opinionated, multi-language, build tool based on Docker and Docker Compose.
- [habitus](https://github.com/cloud66-oss/habitus) :ice_cube: - A Build Flow Tool for Docker.
- [kompose](https://github.com/kubernetes/kompose) - Go from Docker Compose to Kubernetes.
- [LLM Harbor](https://github.com/av/harbor) - A CLI and companion app to effortlessly run LLM backends, APIs, frontends, and services with one command. By [av](https://github.com/av).
- [plash](https://github.com/ihucos/plash) - A container run and build engine - runs inside docker.
- [podman-compose](https://github.com/containers/podman-compose) - A script to run docker-compose.yml using podman.
- [Smalte](https://github.com/roquie/smalte) – Dynamically configure applications that require static configuration in docker container. By [roquie](https://github.com/roquie)
- [Stitchocker](https://github.com/alexaandrov/stitchocker) - A lightweight and fast command line utility for conveniently grouping your docker-compose multiple container services. By [alexaandrov](https://github.com/alexaandrov).
### Deployment and Infrastructure
- [awesome-stacks](https://github.com/ethibox/awesome-stacks) - Deploy 150+ open-source web apps with one Docker command.
- [blackfish](https://gitlab.com/blackfish/blackfish) - A CoreOS VM to build swarm clusters for Dev & Production.
- [BosnD](https://gitlab.com/n0r1sk/bosnd) - BosnD, the boatswain daemon - A dynamic configuration file writer & service reloader for dynamically changing container environments.
- [Clocker](https://github.com/brooklyncentral/clocker) :ice_cube: - Clocker creates and manages a Docker cloud infrastructure. Clocker supports single-click deployments and runtime management of multi-node applications that run as containers distributed across multiple hosts, on both Docker and Marathon. It leverages [Calico][calico] and [Weave][weave] for networking and [Brooklyn](https://brooklyn.apache.org/) for application blueprints. By [brooklyncentral](https://github.com/brooklyncentral).
- [Conduit](https://github.com/ehazlett/conduit) :ice_cube: - Experimental deployment system for Docker.
- [depcon](https://github.com/ContainX/depcon) :ice_cube: - Depcon is written in Go and allows you to easily deploy Docker containers to Apache Mesos/Marathon, Amazon ECS and Kubernetes. By [ContainX][containx].
- [docker-to-iac](https://github.com/deploystackio/docker-to-iac) - Translate docker run and commit into Infrastructure as Code templates for AWS, Render.com and DigitalOcean.
- [gitkube](https://github.com/hasura/gitkube) :ice_cube: - Gitkube is a tool for building and deploying docker images on Kubernetes using `git push`. By [Hasura](https://github.com/hasura/).
- [Grafeas](https://github.com/grafeas/grafeas) - A common API for metadata about containers, from image and build details to security vulnerabilities. By [grafeas](https://github.com/grafeas).
- [swarm-ansible](https://github.com/LombardiDaniel/swarm-ansible?tab=readme-ov-file) - Swarm-Ansible bootstraps a production-ready swarm cluster using ansible. Comes with tools to automate CI, help monitoring and traefik pre-configured for SSL certificates and simple-auth. Comes with a private registry and more!.
- [SwarmManagement](https://github.com/hansehe/SwarmManagement) - Swarm Management is a python application, installed with pip. The application makes it easy to manage a Docker Swarm by configuring a single yaml file describing which stacks to deploy, and which networks, configs or secrets to create.
- [werf](https://github.com/werf/werf) - Werf is a CI/CD tool for building Docker images efficiently and deploying them to Kubernetes using GitOps.
### Monitoring
- [ADRG](https://github.com/jaldertech/adrg) - Dynamic Docker resource governor using cgroups v2 to manage system load.
- [Autoheal](https://github.com/willfarrell/docker-autoheal) - Monitor and restart unhealthy docker containers automatically.
- [cAdvisor](https://github.com/google/cadvisor) - Analyzes resource usage and performance characteristics of running containers.
- [Checkmate](https://github.com/bluewave-labs/checkmate) - Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations.
- [DLIA](https://github.com/zorak1103/dlia) - DLIA is an AI-powered Docker log monitoring agent that uses Large Language Models (LLMs) to intelligently analyze container logs, detect anomalies, and provide contextual insights over time. By [zorak1103](https://github.com/zorak1103).
- [Docker-Alertd](https://github.com/deltaskelta/docker-alertd) :ice_cube: - Monitor and send alerts based on docker container resource usage/statistics.
- [Docker-Flow-Monitor](https://github.com/docker-flow/docker-flow-monitor) :ice_cube: - Reconfigures Prometheus when a new service is updated or deployed automatically.
- [DockProbe](https://github.com/deep-on/dockprobe) - Lightweight Docker monitoring dashboard in a single container. Real-time metrics, 6 anomaly detection rules, Telegram alerts, and 16 automated security scans. Zero config, ~50MB RAM. By [DeepOn](https://github.com/deep-on).
- [DockProc](https://gitlab.com/n0r1sk/dockproc) - I/O monitoring for containers on processlevel.
- [dockprom](https://github.com/stefanprodan/dockprom) - Docker hosts and containers monitoring with Prometheus, Grafana, cAdvisor, NodeExporter and AlertManager.
- [Doku](https://github.com/amerkurev/doku) - Doku is a simple web-based application that allows you to monitor Docker disk usage. [amerkurev](https://github.com/amerkurev).
- [Dozzle](dozzle) - Monitor container logs in real-time with a browser or mobile device. [amir20](https://github.com/amir20).
- [Drydock](https://github.com/CodesWhat/drydock) - Container update monitoring with web dashboard, 23 registry providers, 20 notification triggers, and distributed agent architecture. By [CodesWhat](https://github.com/CodesWhat).
- [Dynatrace](https://docs.dynatrace.com/docs/observe/infrastructure-observability/container-platform-monitoring) - :yen: Monitor containerized applications without installing agents or modifying your Run commands.
- [Glances](https://github.com/nicolargo/glances) - A cross-platform curses-based system monitoring tool written in Python.
- [Grafana Docker Dashboard Template](https://grafana.com/grafana/dashboards/179-docker-prometheus-monitoring/) - A template for your Docker, Grafana and Prometheus stack [vegasbrianc][vegasbrianc].
- [HertzBeat](https://github.com/dromara/hertzbeat) - An open-source real-time monitoring system with custom-monitor and agentless.
- [InfluxDB, cAdvisor, Grafana](https://github.com/vegasbrianc/docker-monitoring) :ice_cube: - InfluxDB Time series DB in combination with Grafana and cAdvisor.
- [Logspout](https://github.com/gliderlabs/logspout) :ice_cube: - Log routing for Docker container logs.
- [Maintenant](https://github.com/kolapsis/maintenant) - Self-discovering infrastructure monitoring for Docker and Kubernetes. Auto-detects containers via labels, with endpoint monitoring, heartbeats, TLS certificates, resource metrics, update intelligence, and a built-in status page. Single binary with embedded SPA. By [kolapsis](https://github.com/kolapsis).
- [monit-docker](https://github.com/decryptus/monit-docker) :ice_cube: - Monitor docker containers resources usage or status and execute docker commands or inside containers. [decryptus][decryptus].
- [NexClipper](https://github.com/NexClipper/NexClipper) :ice_cube: - NexClipper is the container monitoring and performance management solution specialized in Docker, Apache Mesos, Marathon, DC/OS, Mesosphere, Kubernetes.
- [Out-of-the-box Host/Container Monitoring/Logging/Alerting Stack](https://github.com/uschtwill/docker_monitoring_logging_alerting) :ice_cube: - Docker host and container monitoring, logging and alerting out of the box using cAdvisor, Prometheus, Grafana for monitoring, Elasticsearch, Kibana and Logstash for logging and elastalert and Alertmanager for alerting. Set up in 5 Minutes. Secure mode for production use with built-in [Automated Nginx Reverse Proxy (jwilder's)][nginxproxy].
- [Sidekick](https://github.com/runsidekick/sidekick) :ice_cube: - Open source live application debugger like Chrome DevTools for your backend. Collect traces and generate logs on-demand without stopping & redeploying your applications.
- [SwarmAlert](https://github.com/gpulido/SwarmAlert) :ice_cube: - Monitors a Docker Swarm and sends Pushover alerts when it finds a container with no healthy service task running.
- [Zabbix Docker](https://github.com/gomex/docker-zabbix) :ice_cube: - Monitor containers automatically using zabbix LLD feature.
- [Zabbix Docker module](https://github.com/monitoringartist/Zabbix-Docker-Monitoring) :ice_cube: - Zabbix module that provides discovery of running containers, CPU/memory/blk IO/net container metrics. Systemd Docker and LXC execution driver is also supported. It's a dynamically linked shared object library, so its performance is (~10x) better, than any script solution.
### Networking
- [Calico][calico] - Calico is a pure layer 3 virtual network that allows containers over multiple docker-hosts to talk to each other.
- [Flannel](https://github.com/coreos/flannel/) - Flannel is a virtual network that gives a subnet to each host for use with container runtimes. By [coreos][coreos].
- [Freeflow](https://github.com/Microsoft/Freeflow) :ice_cube: - High performance container overlay networks on Linux. Enabling RDMA (on both InfiniBand and RoCE) and accelerating TCP to bare metal performance. By [Microsoft](https://github.com/Microsoft).
- [MyIP](https://github.com/jason5ng32/MyIP) - All in one IP Toolbox. Easy to check all your IPs, IP geolocation, check for DNS leaks, examine WebRTC connections, speed test, ping test, MTR test, check website availability, whois search and more. By [jason5ng32](https://github.com/jason5ng32).
- [netshoot](https://github.com/nicolaka/netshoot) - The netshoot container has a powerful set of networking tools to help troubleshoot Docker networking issues.
- [Pipework](https://github.com/jpetazzo/pipework) - Software-Defined Networking for Linux Containers, Pipework works with "plain" LXC containers, and with the awesome Docker. By [jpetazzo][jpetazzo].
### Orchestration
- [Ansible Linux Docker](https://github.com/Peco602/ansible-linux-docker) :ice_cube: - Run Ansible from a Linux container. By [Peco602][peco602].
- [athena](https://github.com/athena-oss/athena) :ice_cube: - An automation platform with a plugin architecture that allows you to easily create and share services.
- [CloudSlang](https://github.com/CloudSlang/cloud-slang) - CloudSlang is a workflow engine to create Docker process automation.
- [clusterdock](https://github.com/clusterdock/clusterdock) :ice_cube: - Docker container orchestration to enable the testing of long-running cluster deployments.
- [Crane](https://github.com/Dataman-Cloud/crane) :ice_cube: - Control plane based on docker built-in swarm [Dataman-Cloud](https://github.com/Dataman-Cloud).
- [Docker Flow Swarm Listener](https://github.com/docker-flow/docker-flow-swarm-listener) :ice_cube: - Docker Flow Swarm Listener project is to listen to Docker Swarm events and send requests when a change occurs. By [docker-flow][docker-flow].
- [docker rollout](https://github.com/Wowu/docker-rollout) - Zero downtime deployment for Docker Compose services.
- [Haven](https://github.com/codeabovelab/haven-platform) :ice_cube: - Haven is a simplified container management platform that integrates container, application, cluster, image, and registry managements. By [codeabovelab](https://github.com/codeabovelab).
- [Kubernetes](https://github.com/kubernetes/kubernetes) - Open source orchestration system for Docker containers by Google.
- [ManageIQ](https://github.com/ManageIQ/manageiq) - Discover, optimize and control your hybrid IT. By [ManageIQ](https://github.com/ManageIQ).
- [Mesos](https://github.com/apache/mesos) - Resource/Job scheduler for containers, VM's and physical hosts [apache](https://mesos.apache.org/).
- [Nebula](https://github.com/nebula-orchestrator) - A Docker orchestration tool designed to manage massive scale distributed clusters.
- [Nomad](https://github.com/hashicorp/nomad) - Easily deploy applications at any scale. A Distributed, Highly Available, Datacenter-Aware Scheduler.
- [Rancher](https://github.com/rancher/rancher) - An open source project that provides a complete platform for operating Docker in production.
- [RedHerd Framework](https://github.com/redherd-project/redherd-framework) :ice_cube: - RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets capable of simulating complex offensive cyberspace operations. By [RedHerdProject](https://github.com/redherd-project).
- [Swarm-cronjob](https://github.com/crazy-max/swarm-cronjob) - Create jobs on a time-based schedule on Swarm by [crazy-max].
### PaaS
- [caprover](https://github.com/caprover/caprover) - [Previously known as CaptainDuckDuck] Automated Scalable Webserver Package (automated Docker+nginx) - Heroku on Steroids.
- [Convox Rack](https://github.com/convox/rack) - Convox Rack is open source PaaS built on top of expert infrastructure automation and devops best practices.
- [Dcw](https://github.com/pbertera/dcw) :ice_cube: - Docker-compose SSH wrapper: a very poor man PaaS, exposing the docker-compose and custom-container commands defined in container labels.
- [Dokku](https://github.com/dokku/dokku) - Docker powered mini-Heroku that helps you build and manage the lifecycle of applications (originally by [progrium][progrium]).
- [Empire](https://github.com/remind101/empire) :ice_cube: - A PaaS built on top of Amazon EC2 Container Service (ECS).
- [Exoframe](https://github.com/exoframejs/exoframe) - A self-hosted tool that allows simple one-command deployments using Docker.
- [Hephy Workflow](https://github.com/teamhephy/workflow) :ice_cube: - Open source PaaS for Kubernetes that adds a developer-friendly layer to any Kubernetes cluster, making it easy to deploy and manage applications. Fork of [Deis Workflow](https://github.com/deis/workflow).
- [Krane](https://github.com/krane/krane) :ice_cube: - Toolset for managing container workloads on remote servers.
- [Nanobox](https://github.com/nanobox-io/nanobox) :ice_cube: - :yen: An application development platform that creates local environments that can then be deployed and scaled in the cloud.
- [OpenShift][openshift] - An open source PaaS built on [Kubernetes][kubernetes] and optimized for Dockerized app development and deployment by [Red Hat](https://www.redhat.com/en)
- [Tsuru](https://github.com/tsuru/tsuru) - Tsuru is an extensible and open source Platform as a Service software.
### Reverse Proxy
- [BunkerWeb](https://github.com/bunkerity/bunkerweb) - Open-source and next-gen Web Application Firewall (WAF). By [Bunkerity](https://www.bunkerity.com).
- [caddy-docker-proxy](https://github.com/lucaslorentz/caddy-docker-proxy) - Caddy-based reverse proxy, configured with service or container labels. By [lucaslorentz](https://github.com/lucaslorentz).
- [caddy-docker-upstreams](https://github.com/invzhi/caddy-docker-upstreams) - Docker upstreams module for Caddy, configured with container labels. By [invzhi](https://github.com/invzhi).
- [Docker Dnsmasq Updater](https://github.com/moonbuggy/docker-dnsmasq-updater) - Update a remote dnsmasq server with Docker container hostnames.
- [docker-flow-proxy](https://github.com/docker-flow/docker-flow-proxy) - Reconfigures proxy every time a new service is deployed, or when a service is scaled. By [docker-flow][docker-flow].
- [fabio](https://github.com/fabiolb/fabio) - A fast, modern, zero-conf load balancing HTTP(S) router for deploying microservices managed by consul. By [magiconair](https://github.com/magiconair) (Frank Schroeder).
- [idle-less](https://github.com/tvup/idle-less) - Reverse proxy with automatic Wake-on-LAN — wakes sleeping backend servers when traffic arrives, shows a waiting screen, and redirects when ready. By [tvup](https://github.com/tvup).
- [Let's Encrypt Nginx-proxy Companion](https://github.com/nginx-proxy/docker-letsencrypt-nginx-proxy-companion) - A lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically. By [JrCs](https://github.com/JrCs).
- [mesh-router](https://github.com/Yundera/mesh-router) - Free domain(nsl.sh) provider for Docker containers with automatic HTTPS routing. Uses Wireguard VPN to securely route subdomain requests across networks. Ideal for self-hosted NAS and cloud deployments. By [Yundera](https://github.com/Yundera).
- [Nginx Proxy Manager](https://github.com/jc21/nginx-proxy-manager) - A beautiful web interface for proxying web based services with SSL. By [jc21](https://github.com/jc21).
- [nginx-proxy][nginxproxy] - Automated nginx proxy for Docker containers using docker-gen by [jwilder][jwilder]
- [OpenResty Manager](https://github.com/Safe3/openresty-manager) - The easiest using, powerful and beautiful OpenResty Manager(Nginx Enhanced Version), open source alternative to OpenResty Edge. By [Safe3](https://github.com/Safe3/).
- [Swarm Router](https://github.com/flavioaiello/swarm-router) - A «zero config» service name based router for docker swarm mode with a fresh and more secure approach. By [flavioaiello](https://github.com/flavioaiello).
- [Træfɪk](https://github.com/containous/traefik) - Automated reverse proxy and load-balancer for Docker, Mesos, Consul, Etcd... By [EmileVauge](https://github.com/emilevauge).
### Runtime
- [cri-o](https://github.com/cri-o/cri-o) - Open Container Initiative-based implementation of Kubernetes Container Runtime Interface by [cri-o](https://github.com/cri-o).
- [lxc](https://github.com/lxc/lxc) - LXC - Linux Containers.
- [podman](https://github.com/containers/libpod) - Libpod is a library used to create container pods. Home of Podman.
- [rlxc](https://github.com/brauner/rlxc) :ice_cube: - LXC binary written in Rust.
- [runtime-tools](https://github.com/opencontainers/runtime-tools) - Oci-runtime-tool is a collection of tools for working with the OCI runtime specification.
### Security
- [Anchor](https://github.com/SongStitch/anchor/) - A tool to ensure reproducible builds by pinning dependencies inside your Dockerfiles [SongStitch](https://github.com/songStitch/).
- [Anchor Enterprise](https://anchore.com/) - :yen: Analyze images for CVE vulnerabilities and against custom security policies.
- [Aqua Security](https://www.aquasec.com) - :yen: Securing container-based applications from Dev to Production on any platform.
- [bane](https://github.com/genuinetools/bane) :ice_cube: - AppArmor profile generator for Docker containers.
- [buildcage](https://github.com/dash14/buildcage) - Restricts outbound network access during Docker builds to prevent supply chain attacks, working as a drop-in BuildKit remote driver for Docker Buildx, with ready-to-use GitHub Actions.
- [CetusGuard](https://github.com/hectorm/cetusguard) - CetusGuard is a tool that protects the Docker daemon socket by filtering calls to its API endpoints.
- [Checkov](https://github.com/bridgecrewio/checkov) - Static analysis for infrastructure as code manifests (Terraform, Kubernetes, Cloudformation, Helm, Dockerfile, Kustomize) find security misconfiguration and fix them. By [bridgecrew](https://github.com/bridgecrewio).
- [CIS Docker Benchmark](https://github.com/dev-sec/cis-docker-benchmark) :ice_cube: - This [InSpec][inspec] compliance profile implement the CIS Docker 1.12.0 Benchmark in an automated way to provide security best-practice tests around Docker daemon and containers in a production environment. By [dev-sec](https://github.com/dev-sec).
- [Clair](https://github.com/quay/clair) - Clair is an open source project for the static analysis of vulnerabilities in appc and docker containers. By [coreos][coreos].
- [crowdsec-blocklist-import](https://github.com/wolffcatskyy/crowdsec-blocklist-import) - Aggregates 36 free threat intelligence feeds into 120k+ malicious IPs for CrowdSec bouncers, providing 10-20x more blocks than default lists. By [wolffcatskyy](https://github.com/wolffcatskyy).
- [Dagda](https://github.com/eliasgranderubio/dagda) :ice_cube: - Dagda is a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities. By [eliasgranderubio](https://github.com/eliasgranderubio).
- [Deepfence Enterprise](https://deepfence.io) - :yen: Full life cycle Cloud Native Workload Protection platform for kubernetes, virtual machines and serverless. By [deepfence][deepfence].
- [Deepfence Threat Mapper](https://github.com/deepfence/ThreatMapper) - Powerful runtime vulnerability scanner for kubernetes, virtual machines and serverless. By [deepfence][deepfence].
- [docker-bench-security](https://github.com/docker/docker-bench-security) - Script that checks for dozens of common best-practices around deploying Docker containers in production. By [docker][docker].
- [docker-explorer](https://github.com/google/docker-explorer) - A tool to help forensicate offline docker acquisitions.
- [dvwassl](https://github.com/Peco602/dvwassl) :ice_cube: - SSL-enabled Damn Vulnerable Web App to test Web Application Firewalls. By [Peco602][peco602].
- [KICS](https://github.com/checkmarx/kics) - An infrastructure-as-code scanning tool, find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle. Can be extended for additional policies. By [Checkmarx](https://github.com/Checkmarx).
- [oscap-docker](https://github.com/OpenSCAP/openscap) - OpenSCAP provides oscap-docker tool which is used to scan Docker containers and images. By [OpenSCAP](https://github.com/OpenSCAP).
- [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud) - :yen: (Previously Twistlock Security Suite) detects vulnerabilities, hardens container images, and enforces security policies across the lifecycle of applications.
- [segspec](https://github.com/dormstern/segspec) - Extracts network dependencies from Docker Compose, Kubernetes manifests, Helm charts, and other config files to generate Kubernetes NetworkPolicies with evidence tracing. By [dormstern](https://github.com/dormstern).
- [Syft](https://github.com/anchore/syft) - CLI tool and library for generating a Software Bill of Materials (SBOM) from container images and filesystems.
- [Sysdig Falco](https://github.com/falcosecurity/falco) - Sysdig Falco is an open source container security monitor. It can monitor application, container, host, and network activity and alert on unauthorized activity.
- [Sysdig Secure](https://www.sysdig.com/solutions/cloud-detection-and-response-cdr) - :yen: Sysdig Secure addresses run-time security through behavioral monitoring and defense, and provides deep forensics based on open source Sysdig for incident response.
- [Trend Micro DeepSecurity](https://www.trendmicro.com/en_us/business/products/hybrid-cloud/deep-security.html) - :yen: Trend Micro DeepSecurity offers runtime protection for container workloads and hosts as well as preruntime scanning of images to identify vulnerabilities, malware and content such as hardcoded secrets.
- [Trivy](https://github.com/aquasecurity/trivy) - Aqua Security's open source simple and comprehensive vulnerability scanner for containers (suitable for CI).
### Service Discovery
- [docker-consul](https://github.com/gliderlabs/docker-consul) by [progrium][progrium]
- [docker-dns](https://github.com/bytesharky/docker-dns) - Lightweight DNS forwarder for Docker containers, resolves container names with custom suffixes (e.g. `.docker`) on the host to simplify service discovery.
- [etcd](https://github.com/etcd-io/etcd) - Distributed reliable key-value store for the most critical data of a distributed system by [etcd-io](https://github.com/etcd-io) (former part of CoreOS).
- [istio](https://github.com/istio/istio) - An open platform to connect, manage, and secure microservices.
- [registrator](https://github.com/gliderlabs/registrator) - Service registry bridge for Docker by [gliderlabs][gliderlabs] and [progrium][progrium].
### Volume Management / Data
- [Blockbridge](https://github.com/blockbridge/blockbridge-docker-volume) :yen:- The Blockbridge plugin is a volume plugin that provides access to an extensible set of container-based persistent storage options. It supports single and multi-host Docker environments with features that include tenant isolation, automated provisioning, encryption, secure deletion, snapshots and QoS. By [blockbridge](https://github.com/blockbridge)
- - [Label Backup](https://github.com/resulgg/label-backup) - A lightweight, Docker-aware backup agent that automatically discovers and backs up containerized databases (PostgreSQL, MySQL, MongoDB, Redis) based on Docker labels. Supports local storage and S3-compatible destinations with flexible scheduling via cron expressions.
- [Docker Volume Backup](https://github.com/offen/docker-volume-backup) Backup Docker volumes locally or to any S3 compatible storage. By [offen](https://github.com/offen)
- [duplicacy-cli-cron](https://github.com/GeiserX/duplicacy-cli-cron) - Docker-based encrypted dual-storage backup automation using Duplicacy CLI with cross-site redundancy and Telegram notifications. By [GeiserX](https://github.com/GeiserX).
- [Netshare](https://github.com/ContainX/docker-volume-netshare) Docker NFS, AWS EFS, Ceph & Samba/CIFS Volume Plugin. By [ContainX][containx]
- [portworx](https://portworx.com) - :yen: Decentralized storage solution for persistent, shared and replicated volumes.
- [quobyte](https://www.quobyte.com/) - :yen: Fully fault-tolerant distributed file system with a docker volume driver.
- [REX-Ray](https://github.com/rexray/rexray) provides a vendor agnostic storage orchestration engine. The primary design goal is to provide persistent storage for Docker, Kubernetes, and Mesos. By[thecodeteam](https://github.com/thecodeteam) (DELL Technologies)
- [Storidge](https://github.com/Storidge/quick-start) :ice_cube: - :yen: Software-defined Persistent Storage for Kubernetes and Docker Swarm.
### User Interface
#### IDE integrations
- JetBrains IDEs (IntelliJ IDEA, GoLand, WebStorm, CLion etc.) has [built-in Docker plugin](https://www.jetbrains.com/help/idea/docker.html#managing-images)
- Eclipse [Docker Tooling plugin](https://www.eclipse.org/community/eclipse_newsletter/2016/july/article2.php)
- [docker.el](https://github.com/Silex/docker.el) Manage docker from Emacs by [Silex](https://github.com/Silex)
#### Desktop
Native desktop applications for managing and monitoring docker hosts and clusters
- [Docker DB Manager](https://github.com/AbianS/docker-db-manager) - Desktop app for managing Docker database containers with visual interface and one-click operations.
- [Docker Desktop](https://www.docker.com/products/docker-desktop/) - Official native app. Only for Windows and MacOS.
- [Simple Docker UI](https://github.com/felixgborrego/simple-docker-ui) - Built on Electron. By [felixgborrego](https://github.com/felixgborrego/).
- [Stevedore](https://github.com/slonopotamus/stevedore) - Good Docker Desktop replacement for Windows. Both Linux and Windows Containers are supported. [slonopotamus](https://github.com/slonopotamus).
#### Terminal
##### Terminal UI
- [d4s](https://github.com/jr-k/d4s) - A fast, keyboard-driven terminal UI to manage Docker containers, Compose stacks, and Swarm services with the ergonomics of K9s.
- [dive](https://github.com/wagoodman/dive) - A tool for exploring each layer in a docker image. By [wagoodman](https://github.com/wagoodman).
- [dockdash](https://github.com/byrnedo/dockdash) detailed stats. By [byrnedo]
- [dockly](https://github.com/lirantal/dockly) - An interactive shell UI for managing Docker containers.
- [DockMate](https://github.com/shubh-io/dockmate) - Lightweight terminal-based Docker and Podman manager with a text-based user interface,.
- [DockSTARTer](https://github.com/GhostWriters/DockSTARTer) - DockSTARTer helps you get started with home server apps running in Docker by [GhostWriters](https://github.com/GhostWriters).
- [dprs](https://github.com/durableprogramming/dprs) - A developer-focused TUI for managing Docker containers with real-time log streaming and container management. Built with Rust. By [durableprogramming](https://github.com/durableprogramming).
- [dry](https://github.com/moncho/dry) - An interactive CLI for Docker containers.
- [goManageDocker](https://github.com/ajayd-san/gomanagedocker) - TUI tool to view and manage your docker objects blazingly fast with sensible keybindings, also supports VIM navigation out of the box.
- [lazydocker](https://github.com/jesseduffield/lazydocker) - The lazier way to manage everything docker. A simple terminal UI for both docker and docker-compose, written in Go with the gocui library. By [jesseduffield](https://github.com/jesseduffield).
- [lazyjournal](https://github.com/Lifailon/lazyjournal) - A interface for reading and filtering the logs output of Docker and Podman containers like [Dozzle](dozzle) but for the terminal with support for fuzzy find, regex and output coloring.
- [oxker](https://github.com/mrjackwills/oxker) - A simple tui to view & control docker containers. Written in [Rust](https://rust-lang.org/), making heavy use of [ratatui](https://github.com/tui-rs-revival/ratatui) & [Bollard](https://github.com/fussybeaver/bollard),.
##### CLI tools
- [captain](https://github.com/jenssegers/captain) :ice_cube: - Easily start and stop docker compose projects from any directory. By [jenssegers](https://github.com/jenssegers).
- [dcinja](https://github.com/Falldog/dcinja) - The powerful and smallest binary size of template engine for docker command line environment. By [Falldog](https://github.com/Falldog).
- [dcp](https://github.com/exdx/dcp) :ice_cube: - A simple tool for copying files from container filesystems. By [exdx](https://github.com/exdx).
- [dctl](https://github.com/FabienD/docker-stack) - Dctl is a Cli tool that helps developers by allowing them to execute all docker compose commands anywhere in the terminal, and more. By [FabienD](https://github.com/FabienD).
- [decompose](https://github.com/s0rg/decompose) - Reverse-engineering tool for docker environments. By [s0rg](https://github.com/s0rg).
- [docker pushrm](https://github.com/christian-korneck/docker-pushrm) - A Docker CLI plugin that lets you push the README.md file from the current directory to Docker Hub. Also supports Quay and Harbor. By [christian-korneck](https://github.com/christian-korneck).
- [docker-captain](https://github.com/lucabello/docker-captain) - A friendly CLI to manage multiple Docker Compose deployments with style — powered by Typer, Rich, questionary, and sh.
- [DVM](https://github.com/howtowhale/dvm) :ice_cube: - Docker version manager.
- [goinside](https://github.com/iamsoorena/goinside) :ice_cube: - Get inside a running docker container easily.
- [Pdocker](https://github.com/g31s/Pdocker) :ice_cube: - A simple tool to manage and maintain Docker for personal projects.
- [proco](https://github.com/shiwaforce/poco) - Proco will help you to organise and manage Docker, Docker-Compose, Kubernetes projects of any complexity using simple YAML config files to shorten the route from finding your project to initialising it in your local environment.
- [scuba](https://github.com/JonathonReinhart/scuba) - Transparently use Docker containers to encapsulate software build environments,.
- [skopeo](https://github.com/containers/skopeo) - Work with remote images registries - retrieving information, images, signing content.
- [supdock](https://github.com/segersniels/supdock) - Allows for slightly more visual usage of Docker with an interactive prompt. By [segersniels](https://github.com/segersniels).
- [tsaotun](https://github.com/qazbnm456/tsaotun) :ice_cube: - Python based Assistance for Docker.
##### Other
- [dext-docker-registry-plugin](https://github.com/vutran/dext-docker-registry-plugin) :ice_cube: - Search the Docker Registry with the Dext smart launcher. By [vutran](https://github.com/vutran).
- [docker-ssh](https://github.com/jeroenpeeters/docker-ssh) :ice_cube: - SSH Server for Docker containers ~ Because every container should be accessible. By [jeroenpeeters](https://github.com/jeroenpeeters).
- [dockerfile-mode](https://github.com/spotify/dockerfile-mode) An emacs mode for handling Dockerfiles by [spotify][spotify]
- [MultiDocker](https://github.com/marty90/multidocker) :ice_cube: - Create a secure multi-user Docker machine, where each user is segregated into an indepentent container.
- [Powerline-Docker](https://github.com/adrianmo/powerline-docker) :ice_cube: - A Powerline segment for showing the status of Docker containers.
#### Web
- [Arcane](https://github.com/getarcaneapp/arcane) - An easy and modern Docker management platform, built with everybody in mind. By [getarcaneapp](https://github.com/getarcaneapp).
- [CASA](https://github.com/knrdl/casa) - Outsource the administration of a handful of containers to your co-workers,.
- [Container Web TTY](https://github.com/wrfly/container-web-tty) - Connect your containers via a web-tty [wrfly](https://github.com/wrfly).
- [dockemon](https://github.com/ProductiveOps/dokemon) :ice_cube: - Docker Container Management GUI.
- [Docker Registry Browser](https://github.com/klausmeyer/docker-registry-browser) - Web Interface for the Docker Registry HTTP API v2.
- [docker-registry-web](https://github.com/mkuchin/docker-registry-web) :ice_cube: - Web UI, authentication service and event recorder for private docker registry v2.
- [docker-swarm-visualizer](https://github.com/dockersamples/docker-swarm-visualizer) - Visualizes Docker services on a Docker Swarm (for running demos).
- [dockge](https://github.com/louislam/dockge) - Easy-to-use and reactive self-hosted docker compose.yaml stack-oriented manager.
- [Komodo](https://github.com/mbecker20/komodo) - A tool to build and deploy software on many servers.
- [Kubevious](https://github.com/kubevious/kubevious) :ice_cube: - A highly visual web UI for Kubernetes which renders configuration and state in an application centric way.
- [Mafl](https://github.com/hywax/mafl) - Minimalistic flexible homepage.
- [netdata](https://github.com/netdata/netdata) - Real-time performance monitoring.
- [OctoLinker](https://github.com/OctoLinker/OctoLinker) :ice_cube: - A browser extension for GitHub that makes the image name in a `Dockerfile` clickable and redirect you to the related Docker Hub page.
- [Portainer](https://github.com/portainer/portainer) - A lightweight management UI for managing your Docker hosts or Docker Swarm clusters.
- [Rapid Dashboard](https://github.com/ozlerhakan/rapid) :ice_cube: - A simple query dashboard to use Docker Remote API.
- [Seagull](https://github.com/tobegit3hub/seagull) :ice_cube: - Friendly Web UI to monitor docker daemon.
- [Swarmpit](https://github.com/swarmpit/swarmpit) - Swarmpit provides simple and easy to use interface for your Docker Swarm cluster. You can manage your stacks, services, secrets, volumes, networks etc.
- [Swirl](https://github.com/cuigh/swirl) :ice_cube: - Swirl is a web management tool for Docker, focused on swarm cluster By [cuigh](https://github.com/cuigh/).
- [Theia](https://github.com/eclipse-theia/theia) - Extensible platform to develop full-fledged multi-language Cloud & Desktop IDE-like products with state-of-the-art web technologies.
- [usulnet](https://github.com/fr4nsys/usulnet) - A complete and modern Docker management platform designed for sysadmin, devops with enterprise grade tools, cve scanner, ssh, rdp on web and much more. By [fr4nsys](https://github.com/fr4nsys).
## Docker Images
### Base Tools
Tools and applications that are either installed inside containers or designed to be run as a [sidecar](https://learn.microsoft.com/en-us/azure/architecture/patterns/sidecar)
- [amicontained](https://github.com/genuinetools/amicontained) :ice_cube: - Container introspection tool. Find out what container runtime is being used as well as features available.
- [Chaperone](https://github.com/garywiz/chaperone) :ice_cube: - A single PID1 process designed for docker containers. Does user management, log management, startup, zombie reaping, all in one small package.
- [ckron](https://github.com/nicomt/ckron) - A cron-style job scheduler for docker,.
- [CoreOS][coreos] - Linux for Massive Server Deployments
- [distroless](https://github.com/GoogleContainerTools/distroless) - Language focused docker images, minus the operating system,.
- [docker-alpine](https://github.com/gliderlabs/docker-alpine) :ice_cube: - A super small Docker base image _(5MB)_ using Alpine Linux.
- [docker-gen](https://github.com/jwilder/docker-gen) - Generate files from docker container meta-data.
- [dockerize](https://github.com/powerman/dockerize) - Utility to simplify running applications in docker containers by [jwilder][jwilder], [powerman][powerman].
- [GoSu](https://github.com/tianon/gosu) - Run this specific application as this specific user and get out of the pipeline (entrypoint script tool).
- [is-docker](https://github.com/sindresorhus/is-docker) - Check if the process is running inside a Docker container.
- [lstags](https://github.com/ivanilves/lstags) :ice_cube: - Sync Docker images across registries.
- [microcheck](https://github.com/tarampampam/microcheck) - Lightweight health check utilities for Docker containers (75 KB instead of 9.3 MB for httpcheck versus cURL) in pure C - http(s), port checks, and parallel execution are included.
- [Ofelia](https://github.com/mcuadros/ofelia/) - Ofelia is a modern and low footprint job scheduler for docker environments, built on Go. Ofelia aims to be a replacement for the old fashioned cron. Supports configuration from container labels and/or configuration files.
- [SparkView](https://github.com/beyondssl/sparkview-container) - Access VMs, desktops, servers or applications anytime and from anywhere, without complex and costly client roll-outs or user management.
- [su-exec](https://github.com/ncopa/su-exec) - This is a simple tool that will simply execute a program with different privileges. The program will be executed directly and not run as a child, like su and sudo does, which avoids TTY and signal issues. Why reinvent gosu? This does more or less exactly the same thing as gosu but it is only 10kb instead of 1.8MB. By [ncopa](https://github.com/ncopa).
- [sue](https://github.com/theAkito/sue) :ice_cube: - Executes a program as a user different from the user running sue. This is a maintainable alternative to ncopa/su-exec, which is the better tianon/gosu. This one is far better (higher performance, smaller size), than the original gosu, however it is far easier to maintain, than su-exec, which is written in plain C. Made by [Akito][akito].
- [supercronic](https://github.com/aptible/supercronic) - Crontab-compatible job runner, designed specifically to run in containers.
- [TrivialRC](https://github.com/vorakl/TrivialRC) :ice_cube: - A minimalistic Runtime Configuration system and process manager for containers [vorakl](https://github.com/vorakl).
### Builder
Applications designed to help or simplify building **new** images
- [ansible-bender](https://github.com/ansible-community/ansible-bender) - A tool utilising `ansible` and `buildah`.
- [buildah](https://github.com/containers/buildah) - A tool that facilitates building OCI images.
- [BuildKit](https://github.com/moby/buildkit) - Concurrent, cache-efficient, and Dockerfile-agnostic builder toolkit.
- [cekit](https://github.com/cekit/cekit) - A tool used by openshift to build base images using different build engines.
- [container-factory](https://github.com/mutable/container-factory) :ice_cube: - Produces Docker images from tarballs of application source code.
- [copy-docker-image](https://github.com/mdlavin/copy-docker-image) :ice_cube: - Copy a Docker image between registries without a full Docker installation.
- [Derrick](https://github.com/alibaba/derrick) :ice_cube: - A tool help you to automate the generation of Dockerfile and dockerize application by scanning the code. By [alibaba](https://github.com/alibaba).
- [dlayer](https://github.com/orisano/dlayer) - Docker layer analyzer.
- [docker-companion](https://github.com/mudler/docker-companion) - A command line tool written in Golang to squash and unpack docker images.
- [docker-make](https://github.com/CtripCloud/docker-make) :ice_cube: - Build, tag,and push a bunch of related docker images via a single command.
- [docker-repack](https://github.com/orf/docker-repack) - Repacks a Docker image into a smaller, more efficient version that makes it significantly faster to pull. By [orf](https://github.com/orf).
- [docker-replay](https://github.com/bcicen/docker-replay) :ice_cube: - Generate `docker run`command and options from running containers. By [bcicen](https://github.com/bcicen).
- [DockerSlim](https://github.com/docker-slim/docker-slim) shrinks fat Docker images creating the smallest possible images.
- [Dockly](https://github.com/swipely/dockly) :ice_cube: - Dockly is a gem made to ease the pain of packaging an application in Docker.
- [essex](https://github.com/utensils/essex) - Boilerplate for Docker Based Projects: Essex is a CLI utility written in bash to quickly setup clean and consistent Docker projects with Makefile driven workflows. [jamesbrink](https://github.com/jamesbrink).
- [HPC Container Maker](https://github.com/NVIDIA/hpc-container-maker) - Generates Dockerfiles from a high level Python recipe, including building blocks for High-Performance Computing components.
- [img](https://github.com/genuinetools/img) - Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder.
- [packer](https://developer.hashicorp.com/packer/integrations/hashicorp/docker/latest/components/builder/docker) - Hashicorp tool to build machine images including docker image integrated with configuration management tools like chef, puppet, ansible.
- [portainer](https://github.com/duedil-ltd/portainer) :ice_cube: - Apache Mesos framework for building Docker images.
- [Production-Ready Python Containers :yen:](https://pythonspeed.com/products/pythoncontainer/) - A template for creating production-ready Docker images for Python applications.
- [RAUDI](https://github.com/cybersecsi/RAUDI) - A tool to automatically update (and optionally push to Docker Hub) Docker Images for 3rd party software whenever theres is a new release/update/commit. By [SecSI](https://github.com/cybersecsi).
- [runlike](https://github.com/lavie/runlike) - Generate `docker run`command and options from running containers.
- [userdef](https://github.com/theAkito/userdef) :ice_cube: - An advanced `adduser` for your Alpine based Docker images. Made by [Akito][akito].
- [Whaler](https://github.com/P3GLEG/Whaler) - Program to reverse Docker images into Dockerfiles.
- [Whales](https://github.com/Gueils/whales) :ice_cube: - A tool to automatically dockerize your applications.
### Dockerfile
- [chaperone-docker](https://github.com/garywiz/chaperone-docker) :ice_cube: - A set of images using the Chaperone process manager, including a lean Alpine image, LAMP, LEMP, and bare-bones base kits.
- [Dockerfile Generator](https://github.com/ozankasikci/dockerfile-generator) `dfg` is both a Go library and an executable that produces valid Dockerfiles using various input channels.
- [Dockerfile Project](https://dockerfile.github.io/) - Trusted Automated Docker Builds. Dockerfile Project maintains a central repository of Dockerfile for various popular open source software services runnable on a Docker container.
- [dockerfilegraph](https://github.com/patrickhoefler/dockerfilegraph) - Visualize your multi-stage Dockerfiles. By [PatrickHoefler](https://github.com/patrickhoefler).
- [Dockershelf](https://github.com/Dockershelf/dockershelf) - A repository that serves as a collector for docker recipes that are universal, efficient and slim. Images are updated, tested and published daily via a Travis cron job.
- [Vektorcloud](https://github.com/vektorcloud) - A collection of minimal, Alpine-based Docker images.
Examples by:
- [0xy](https://gitlab.com/0xy/dockerfiles)
- [arun-gupta](https://github.com/arun-gupta/docker-images)
- [awesome-startup](https://github.com/awesome-startup/docker-compose)
- [crosbymichael](https://github.com/crosbymichael/Dockerfiles)
- [jessfraz](https://github.com/jessfraz/dockerfiles)
- [komljen](https://github.com/komljen/dockerfile-examples)
- [kstaken](https://github.com/kstaken/dockerfile-examples)
- [ondrejmo](https://github.com/ondrejmo/Dockerfiles)
- [vimagick](https://github.com/vimagick/dockerfiles)
### Linter
- [Dockadvisor](https://github.com/deckrun/dockadvisor) - Lightweight Dockerfile linter with 60+ rules, quality scoring, and security checks.
- [docker-image-size-limit](https://github.com/wemake-services/docker-image-size-limit) - A tool to keep an eye on your docker images size.
- [Dockerfile Linter action](https://github.com/buddy-works/dockerfile-linter) :ice_cube: - The linter lets you verify Dockerfile syntax to make sure it follows the best practices for building efficient Docker images.
- [FROM:latest](https://github.com/replicatedhq/dockerfilelint) :ice_cube: - An opinionated Dockerfile linter.
- [Hadolint](https://github.com/hadolint/hadolint) - A Dockerfile linter that checks for best practices, common mistakes, and is also able to lint any bash written in `RUN` instructions;.
### Metadata
- [opencontainer](https://github.com/opencontainers/image-spec/blob/main/annotations.md) - A convention and shared namespace for Docker labels defined by OCI Image Spec.
### Registry
Services to securely store your Docker images.
- [Amazon Elastic Container Registry :yen:](https://aws.amazon.com/ecr/) - Amazon Elastic Container Registry (ECR) is a fully-managed Docker container registry that makes it easy for developers to store, manage, and deploy Docker container images.
- [Azure Container Registry :yen:](https://azure.microsoft.com/en-us/products/container-registry/#overview) - Manage a Docker private registry as a first-class Azure resource.
- [CargoOS](https://github.com/RedCoolBeans/cargos-buildroot) :ice_cube: - A bare essential OS for running the Docker Engine on bare metal or Cloud. By [RedCoolBeans](https://github.com/RedCoolBeans).
- [cleanreg](https://github.com/hcguersoy/cleanreg) :ice_cube: - A small tool to delete image manifests from a Docker Registry implementing the API v2, dereferencing them for the GC.
- [Cloudsmith :yen:](https://cloudsmith.com/product/formats/docker-registry) - A fully managed package management SaaS, with first-class support for public and private Docker registries (and many others, incl. Helm charts for the Kubernetes ecosystem). Has a generous free-tier and is also completely free for open-source.
- [Container Registry Service :yen:](https://container-registry.com/) - Harbor based Container Management Solution as a Service for teams and organizations. Free tier offers 1 GB storage for private repositories.
- [Cycle.io :yen:](https://cycle.io/) - Bare-metal container hosting.
- [DigitalOcean :yen:](https://www.digitalocean.com/products/container-registry) - DigitalOcean Container Registry.
- [Docker Hub](https://hub.docker.com/) provided by Docker Inc.
- [Docker Registry v2][distribution] - The Docker toolset to pack, ship, store, and deliver content
- [Docket](https://github.com/netvarun/docket) :ice_cube: - Custom docker registry that allows for lightning fast deploys through bittorrent.
- [Dragonfly](https://github.com/dragonflyoss/Dragonfly2) - Provide efficient, stable and secure file distribution and image acceleration based on p2p technology.
- [GCP Artifact Registry :yen:](https://cloud.google.com/artifact-registry/docs) Fast, private Docker image storage on Google Cloud Platform.
- [Gitea Container Registry](https://docs.gitea.com/usage/packages/container) - Integrated Docker registry in Gitea, ideal for private, small-scale image hosting.
- [GitHub Container Registry](https://docs.github.com/en/packages/working-with-a-github-packages-registry/working-with-the-container-registry) - GitHub's solution for storing and managing Docker images, with tight integration into GitHub Actions.
- [GitLab Container Registry](https://docs.gitlab.com/user/packages/container_registry/) - Registry focused on using its images in GitLab CI.
- [Harbor](https://github.com/goharbor/harbor) An open source trusted cloud native registry project that stores, signs, and scans content. Supports replication, user management, access control and activity auditing. By [CNCF](https://www.cncf.io) formerly [VMWare][vmware]
- [JFrog Artifactory :yen:](https://jfrog.com/artifactory/) - Artifact Repository Manager, can be used as private Docker Registry as well.
- [Kraken](https://github.com/uber/kraken) - Uber's Highly scalable P2P docker registry, capable of distributing TBs of data in seconds.
- [nscr](https://github.com/jhstatewide/nscr) - A light-weight, self-contained container registry that's easy to run and maintain.
- [Quay.io :yen:](https://quay.io/) - Secure hosting for private Docker repositories.
- [Registryo](https://github.com/inmagik/registryo) - UI and token based authentication server for onpremise docker registry.
- [RepoFlow](https://www.repoflow.io) - A simple and easy-to-use package management platform with Docker support alongside other formats like PyPI, Maven, npm, and Helm. Includes smart search, built-in Docker image scanning, and a great free option for both self-hosted and cloud use.
- [Rescoyl](https://github.com/noteed/rescoyl) :ice_cube: - Private Docker registry (free and open source).
- [Sonatype Nexus Repository](https://www.sonatype.com/products/sonatype-nexus-repository) - Manage binaries and build artifacts across your software supply chain.
## Development with Docker
### API Client
- [ahab](https://github.com/instacart/ahab) :ice_cube: - Docker event handling with Python.
- [contajners](https://github.com/lispyclouds/contajners) - An idiomatic, data-driven, REPL friendly Clojure client for OCI container engines. By [lispyclouds][lispyclouds].
- [Docker Client for JVM](https://github.com/gesellix/docker-client) - A Docker remote api client library for the JVM, written in Groovy.
- [Docker Client TypeScript](https://gitlab.com/masaeedu/docker-client) - Docker API client for JavaScript, automatically generated from Swagger API definition from moby repository. By [masaeedu](https://github.com/masaeedu).
- [docker-controller-bot](https://github.com/dgongut/docker-controller-bot) - Telegram bot to control docker containers. By [dgongut](https://github.com/dgongut/).
- [docker-it-scala](https://github.com/whisklabs/docker-it-scala) :ice_cube: - Docker integration testing kit with Scala.
- [docker-java-api](https://github.com/amihaiemil/docker-java-api) :ice_cube: - Lightweight, truly object-oriented, Java client for Docker's API. By [amihaiemil](https://github.com/amihaiemil).
- [docker-maven-plugin](https://github.com/fabric8io/docker-maven-plugin) - A Maven plugin for running and creating Docker images.
- [Docker.DotNet](https://github.com/Microsoft/Docker.DotNet) - C#/.NET HTTP client for the Docker remote API.
- [Docker.Registry.DotNet](https://github.com/ChangemakerStudios/Docker.Registry.DotNet) - .NET (C#) Client Library for interacting with a Docker Registry API (v2) [rquackenbush](https://github.com/rquackenbush).
- [dockerode](https://github.com/apocas/dockerode) - Docker Remote API node.js module.
- [DoMonit](https://github.com/eon01/DoMonit) :ice_cube: - A simple Docker Monitoring wrapper For Docker API.
- [go-dockerclient](https://github.com/fsouza/go-dockerclient/) - Go HTTP client for the Docker remote API.
- [Gradle Docker plugin](https://github.com/gesellix/gradle-docker-plugin) - A Docker remote api plugin for Gradle.
- [Portainer stack utils](https://github.com/greenled/portainer-stack-utils) - Bash script to deploy/update/undeploy Docker stacks in a Portainer instance from a docker-compose yaml file. By [greenled](https://github.com/greenled).
- [sbt-docker](https://github.com/marcuslonnberg/sbt-docker) - Create Docker images directly from sbt.
### CI/CD
- [Buddy :yen:](https://buddy.works) - The best of Git, build & deployment tools combined into one powerful tool that supercharged our development.
- [Captain](https://github.com/harbur/captain) - Convert your Git workflow to Docker containers ready for Continuous Delivery.
- [Cyclone](https://github.com/caicloud/cyclone) :ice_cube: - Powerful workflow engine and end-to-end pipeline solutions implemented with native Kubernetes resources.
- [Defang](https://github.com/DefangLabs/defang) - Deploy Docker Compose to your favorite cloud in minutes.
- [Depot :yen:](https://depot.dev) - Build Docker images fast, in the cloud. Blazing fast compute, automatic intelligent caching, and zero configuration. [Done in seconds](https://depot.dev/#benchmarks).
- [Diun](https://github.com/crazy-max/diun) - Receive notifications when an image or repository is updated on a Docker registry by [crazy-max].
- [dockcheck](https://github.com/mag37/dockcheck) - A script checking updates for docker images without pulling then auto-update selected/all containers. With notifications, pruning and more.
- [Docker plugin for Jenkins](https://github.com/jenkinsci/docker-plugin/) - The aim of the docker plugin is to be able to use a docker host to dynamically provision a slave, run a single build, then tear-down that slave.
- [Drone](https://github.com/drone/drone) - Continuous integration server built on Docker and configured using YAML files.
- [Gantry](https://github.com/shizunge/gantry) - Automatically update selected Docker swarm services.
- [GitLab Runner](https://gitlab.com/gitlab-org/gitlab-runner) - GitLab has integrated CI to test, build and deploy your code with the use of GitLab runners.
- [Jaypore CI](https://github.com/theSage21/jaypore_ci) - Simple, very flexible, powerful CI / CD / automation system configured in Python. Offline and local first.
- [Kraken CI](https://github.com/Kraken-CI/kraken) - Modern CI/CD, open-source, on-premise system that is highly scalable and focused on testing. One of its executors is Docker. Developed.
- [Microservices Continuous Deployment](https://github.com/francescou/docker-continuous-deployment) :ice_cube: - Continuous deployment of a microservices application.
- [mu](https://github.com/stelligent/mu) :ice_cube: - Tool to configure CI/CD of your container applications via AWS CodePipeline, CodeBuild and ECS [Stelligent](https://github.com/stelligent).
- [Popper](https://github.com/systemslab/popper) :ice_cube: - Github actions workflow (HCL syntax) execution engine.
- [Screwdriver :yen:](https://screwdriver.cd/) - Yahoo's OpenSource buildplatform designed for Continous Delivery.
- [Skipper](https://github.com/Stratoscale/skipper) - Easily dockerize your Git repository.
- [SwarmCI](https://github.com/ghostsquad/swarmci) :ice_cube: - Create a distributed, isolated task pipeline in your Docker Swarm.
- [Tekton CD](https://tekton.dev/) - A cloud-native pipeline resource.
### Development Environment
- [Binci](https://github.com/binci/binci) :ice_cube: - Containerize your development workflow. (formerly DevLab by [TechnologyAdvice](https://github.com/TechnologyAdvice)).
- [coder](https://github.com/coder/coder) - Remote development machines powered by Terraform or Docker.
- [construi](https://github.com/lstephen/construi) :ice_cube: - Run your builds inside a Docker defined environment.
- [dde](https://github.com/whatwedo/dde) - Local development environment toolset based on Docker. By [whatwedo](https://github.com/whatwedo).
- [DIP](https://github.com/bibendi/dip) - CLI utility for straightforward provisioning and interacting with an application configured by docker-compose. By [bibendi](https://github.com/bibendi).
- [dobi](https://github.com/dnephin/dobi) :ice_cube: - A build automation tool for Docker applications. By [dnephin](https://github.com/dnephin).
- [Docker Missing Tools](https://github.com/nandoquintana/docker-missing-tools) :ice_cube: - A set of bash commands to shortcut typical docker dev-ops. An alternative to creating typical helper scripts like "build.sh" and "deploy.sh" inside code repositories. By [NandoQuintana](https://github.com/nandoquintana).
- [Docker-Arch](https://github.com/Ph3nol/Docker-Arch) :ice_cube: - Generate Web/CLI projects Dockerized development environments, from 1 simple YAML file. By [Ph3nol](https://github.com/ph3nol).
- [Docker-sync](https://github.com/EugenMayer/docker-sync) - Drastically improves performance ([50-70x](https://github.com/EugenMayer/docker-sync/wiki/4.-Performance)) when using Docker for development on Mac OS X/Windows and Linux while sharing code to the container. By [EugenMayer](https://github.com/EugenMayer).
- [docker-vm](https://github.com/shyiko/docker-vm) :ice_cube: - Simple and transparent alternative to boot2docker (backed by Vagrant).
- [DockerDL](https://github.com/matifali/dockerdl) - Deep Learning Docker Images. Don't waste time setting up a deep learning env when you can get a deep learning environment with everything pre-installed.
- [Eclipse Che](https://github.com/eclipse/che) - Developer workspace server with Docker runtimes, cloud IDE, next-generation Eclipse IDE.
- [EnvCLI](https://github.com/EnvCLI/EnvCLI) - Replace your local installation of Node, Go, ... with project-specific docker containers. By [EnvCLI](https://github.com/EnvCLI).
- [ESP32 Linux - Docker builder](https://github.com/hpsaturn/esp32s3-linux) - Container solution to compile Linux and develop it for ESP32 microcontrollers - By [Hpsaturn](https://github.com/hpsaturn).
- [Gebug](https://github.com/moshebe/gebug) - A tool that makes debugging of Dockerized Go applications super easy by enabling Debugger and Hot-Reload features, seamlessly.
- [Kitt](https://github.com/senges/kitt) :ice_cube: - A portable and disposable Shell environment, based on Docker and Nix. By [senges](https://github.com/senges).
- [Lando](https://github.com/lando/lando) - Lando is for developers who want to quickly specify and painlessly spin up the services and tools needed to develop their projects. By [Tandem](https://www.thinktandem.io/).
- [Rust Universal Compiler](https://github.com/Peco602/rust-universal-compiler) :ice_cube: - Container solution to compile Rust projects for Linux, macOS and Windows. By [Peco602][peco602].
- [uniget](https://github.com/uniget-org/cli) - Uni(versal)get, the installer and updater for container tools and beyond (formerly docker-setup). By [nicholasdille](https://github.com/nicholasdille).
- [Vagga](https://github.com/tailhook/vagga) :ice_cube: - Vagga is a containerisation tool without daemons. It is a fully-userspace container engine inspired by Vagrant and Docker, specialized for development environments.
- [Zsh-in-Docker](https://github.com/deluan/zsh-in-docker) - Install Zsh, Oh-My-Zsh and plugins inside a Docker container with one line! By [Deluan](https://www.deluan.com).
### Garbage Collection
- [caduc](https://github.com/tjamet/caduc) :ice_cube: - A docker garbage collector cleaning stuff you did not use recently.
- [Docker Clean](https://github.com/ZZROTDesign/docker-clean) :ice_cube: - A script that cleans Docker containers, images and volumes.
- [docker-custodian](https://github.com/Yelp/docker-custodian) - Keep docker hosts tidy. By [Yelp](https://github.com/Yelp).
- [docker_gc](https://github.com/pdacity/docker_gc) :ice_cube: - Image for automatic removing unused Docker Swarm objects. Also works just as Docker Service.
- [Docuum](https://github.com/stepchowfun/docuum) - Least recently used (LRU) eviction of Docker images.
### Serverless
- [Apache OpenWhisk](https://github.com/apache/openwhisk) - A serverless, open source cloud platform that executes functions in response to events at any scale. By [apache](https://github.com/apache).
- [Funker](https://github.com/bfirsh/funker-example-voting-app) :ice_cube: - Functions as Docker containers example voting app. By [bfirsh](https://github.com/bfirsh).
- [IronFunctions](https://github.com/iron-io/functions) :ice_cube: - The serverless microservices platform FaaS (Functions as a Service) which uses Docker containers to run Any language or AWS Lambda functions.
- [Koyeb](https://www.koyeb.com/) - :yen: Koyeb is a developer-friendly serverless platform to deploy apps globally. Seamlessly run Docker containers, web apps, and APIs with git-based deployment, native autoscaling, a global edge network, and built-in service mesh and discovery.
- [OpenFaaS](https://github.com/openfaas/faas) - A complete serverless functions framework for Docker and Kubernetes. By [OpenFaaS](https://github.com/openfaas).
- [SCAR](https://github.com/grycap/scar) :ice_cube: - Serverless Container-aware Architectures (SCAR) is a serverless framework that allows easy deployment and execution of containers (e.g. Docker) in Serverless environments (e.g. Lambda).
### Testing
- [Container Structure Test](https://github.com/GoogleContainerTools/container-structure-test) - A framework to validate the structure of an image by checking the outputs of commands or the contents of the filesystem. By [GoogleContainerTools][googlecontainertools].
- [dgoss](https://github.com/goss-org/goss/tree/master/extras/dgoss) - A fast YAML based tool for validating docker containers.
- [DockerSpec](https://github.com/zuazo/dockerspec) :ice_cube: - A small Ruby Gem to run RSpec and Serverspec, Infrataster and Capybara tests against Dockerfiles or Docker images easily. By [zuazo](https://github.com/zuazo).
- [EZDC](https://github.com/lynchborg/ezdc) :ice_cube: - Golang test harness for easily setting up tests that rely on services in a docker-compose.yml. By [byrnedo].
- [InSpec][inspec] - InSpec is an open-source testing framework for infrastructure with a human- and machine-readable language for specifying compliance, security and policy requirements. By [chef](https://github.com/chef)
- [Kurtosis](https://github.com/kurtosis-tech/kurtosis) - A composable build system for multi-container test environments that provides developers with: a powerful Python-like SDK for environment configuration, a compile-time validator to verify environment behavior & setup, and a runtime for environment execution, monitoring, & debugging capabilities. By [Kurtosis](https://www.kurtosis.com/).
- [Pull Dog](https://github.com/apps/pull-dog) - A GitHub app that automatically creates Docker-based test environments for your pull requests, from your docker-compose files. Not open source.
- [Pumba](https://github.com/alexei-led/pumba) - Chaos testing tool for Docker. Can be deployed on kubernetes and CoreOS cluster. By [alexei-led](https://github.com/alexei-led).
### Wrappers
- [Ansible](https://docs.ansible.com/projects/ansible/latest/collections/community/general/docker_container_module.html) - Manage the life cycle of Docker containers. By RedHat.
- [dexec](https://github.com/docker-exec/dexec) :ice_cube: - Command line interface written in Go for running code with Docker Exec images.
- [dockerized](https://github.com/benzaita/dockerized-cli) :ice_cube: - Seamlessly execute commands in a container.
- [Dray](https://github.com/CenturyLinkLabs/dray) :ice_cube: - An engine for managing the execution of container-based workflows.
- [Hokusai](https://github.com/artsy/hokusai) - A Docker + Kubernetes CLI for application developers; used to containerize an application and to manage its lifecycle throughout development, testing, and release cycles. From [artsy](https://github.com/artsy).
- [Preevy](https://github.com/livecycle/preevy) - Preview environments for Docker and Docker Compose projects. Test your changes and get feedback from devs and non-devs (Product/Design) by deploying pull requests to the your cloud provider as part of your CI pipeline.
- [Shutit](https://github.com/ianmiell/shutit) :ice_cube: - Tool for building and maintaining complex Docker deployments.
- [subuser](https://github.com/subuser-security/subuser) - Makes it easy to securely and portably run graphical desktop applications in Docker.
- [Terraform cloud-init config](https://github.com/christippett/terraform-cloudinit-container-server) :ice_cube: - Terraform module for deploying a single Docker image or `docker-compose.yaml` file to any Cloud™ VM.
- [Turbo](https://github.com/ramitsurana/turbo) :ice_cube: - Simple and Powerful utility for docker. By [ramitsurana][ramitsurana].
- [udocker](https://github.com/indigo-dc/udocker) - A tool to execute simple docker containers in batch or interactive systems without root privileges.
- [Vagrant - Docker provider](https://developer.hashicorp.com/vagrant/docs/providers/docker/basics) - Good starting point is [vagrant-docker-example](https://github.com/bubenkoff/vagrant-docker-example).
## Services based on Docker (mostly :yen:)
### CI Services
- [CircleCI](https://circleci.com/) - :yen: Push or pull Docker images from your build environment, or build and run containers right on CircleCI.
- [CodeFresh](https://codefresh.io) - :yen: Everything you need to build, test, and share your Docker applications. Provides automated end to end testing.
- [CodeShip](https://www.cloudbees.com/blog/how-to-run-codeship-parallel-test-pipelines-efficiently-for-optimal-ci-parallelization) - :yen: Work with your established Docker workflows while automating your testing and deployment tasks with our hosted platform dedicated to speed and security.
- [ConcourseCI](https://concourse-ci.org) - :yen: A CI SaaS platform for developers and DevOps teams pipeline oriented.
- [Semaphore CI](https://semaphore.io/) :yen: — A high-performance cloud solution that makes it easy to build, test and ship your containers to production.
- [TravisCI](https://www.travis-ci.com/) - :yen: A Free github projects continuous integration Saas platform for developers and Devops.
### CaaS
- [Amazon ECS](https://aws.amazon.com/ecs/) - :yen: A management service on EC2 that supports Docker containers.
- [Appfleet](https://appfleet.com/) - :yen: Edge platform to deploy and manage containerized services globally. The system will route the traffic to the closest location for lower latency.
- [Azure AKS](https://azure.microsoft.com/en-us/products/kubernetes-service/) - :yen: Simplify Kubernetes management, deployment, and operations. Use a fully managed Kubernetes container orchestration service.
- [Cloud 66](https://www.cloud66.com) - :yen: Full-stack hosted container management as a service.
- [Giant Swarm](https://www.giantswarm.io/) - :yen: Simple microservice infrastructure. Deploy your containers in seconds.
- [Google Container Engine](https://docs.cloud.google.com/kubernetes-engine/docs) - :yen: Docker containers on Google Cloud Computing powered by [Kubernetes][kubernetes].
- [Mesosphere DC/OS Platform](https://d2iq.com/products/dcos) - :yen: Integrated platform for data and containers built on Apache Mesos.
- [Red Hat OpenShift Dedicated](https://www.redhat.com/en/technologies/cloud-computing/openshift/dedicated) - :yen: Fully-managed Red Hat® OpenShift® service on Amazon Web Services and Google Cloud.
- [Triton](https://www.joyent.com/) - :yen: Elastic container-native infrastructure by Joyent.
### Monitoring Services
- [AppDynamics](https://github.com/Appdynamics/docker-monitoring-extension) - Docker Monitoring extension gathers metrics from the Docker Remote API, either using Unix Socket or TCP.
- [Better Stack](https://betterstack.com/community/guides/scaling-docker/) - :yen: A Docker-compatible observability stack that delivers robust log aggregation and uptime monitoring capabilities for various software application.
- [Broadcom Docker Monitoring](https://www.broadcom.com/info/aiops/docker-monitoring) - :yen: Agile Operations solutions from Broadcom deliver the modern Docker monitoring businesses need to accelerate and optimize the performance of microservices and the dynamic Docker environments running them. Monitor both the Docker environment and apps that run inside them. (former CA Technologies).
- [Collecting docker logs and stats with Splunk](https://www.splunk.com/en_us/blog/tips-and-tricks/collecting-docker-logs-and-stats-with-splunk.html)
- [Datadog](https://www.datadoghq.com/) - :yen: Datadog is a full-stack monitoring service for large-scale cloud environments that aggregates metrics/events from servers, databases, and applications. It includes support for Docker, Kubernetes, and Mesos.
- [Prometheus](https://prometheus.io/) - :yen: Open-source service monitoring system and time series database.
- [Site24x7](https://www.site24x7.com/docker-monitoring.html) - :yen: Docker Monitoring for DevOps and IT is a SaaS Pay per Host model.
- [SPM for Docker](https://github.com/sematext/sematext-agent-docker) :ice_cube: - :yen: Monitoring of host and container metrics, Docker events and logs. Automatic log parser. Anomaly Detection and alerting for metrics and logs. [sematext](https://github.com/sematext).
- [Sysdig Monitor](https://www.sysdig.com/products/monitor) - :yen: Sysdig Monitor can be used as either software or a SaaS service to monitor, alert, and troubleshoot containers using system calls. It has container-specific features for Docker and Kubernetes.
# Useful Resources
- **[Valuable Docker Links](http://nane.kratzke.pages.mylab.th-luebeck.de/about/blog/2014/08/24/valuable-docker-links/)** High quality articles about docker! **MUST SEE**
- [Cloud Native Landscape](https://github.com/cncf/landscape)
- [Docker Blog](https://www.docker.com/blog/) - Regular updates about Docker, the community and tools.
- [Docker Certification](https://intellipaat.com/docker-training-course/?US) :yen: will help you to will Learn Docker containerization, running Docker containers, Image creation, Dockerfile, Docker orchestration, security best practices, and more through hands-on projects and case studies and helps to clear Docker Certified Associate.
- [Docker dev bookmarks](https://www.codever.dev/search?q=docker) - Use the tag [docker](https://www.codever.dev/bookmarks/t/docker).
- [Docker in Action, Second Edition](https://www.manning.com/books/docker-in-action-second-edition)
- [Docker in Practice, Second Edition](https://www.manning.com/books/docker-in-practice-second-edition)
- [Docker packaging guide for Python](https://pythonspeed.com/docker/) - A series of detailed articles on the specifics of Docker packaging for Python.
- [Learn Docker in a Month of Lunches](https://www.manning.com/books/learn-docker-in-a-month-of-lunches)
- [Learn Docker](https://coursesity.com/blog/best-docker-tutorials/) - Learn Docker - curated list of the top online docker tutorials and courses.
- [Programming Community Curated Resources for learning Docker](https://hackr.io/tutorials/learn-docker)
## Awesome Lists
- [Awesome CI/CD](https://github.com/cicdops/awesome-ciandcd) :ice_cube: - Not specific to docker but relevant.
- [Awesome Compose](https://github.com/docker/awesome-compose) - Docker Compose samples.
- [Awesome Kubernetes](https://github.com/ramitsurana/awesome-kubernetes) by [ramitsurana][ramitsurana]
- [Awesome Linux Container](https://github.com/Friz-zy/awesome-linux-containers) more general about container than this repo, by [Friz-zy](https://github.com/Friz-zy).
- [Awesome Selfhosted](https://github.com/awesome-selfhosted/awesome-selfhosted) list of Free Software network services and web applications which can be hosted locally by running in a classical way (setup local web server and run applications from there) or in a Docker container. By [Kickball](https://github.com/Kickball)
- [Awesome Sysadmin](https://github.com/n1trux/awesome-sysadmin) by [n1trux](https://github.com/n1trux)
- [ToolsOfTheTrade](https://github.com/cjbarber/ToolsOfTheTrade) a list of SaaS and On premise applications by [cjbarber](https://github.com/cjbarber)
## Demos and Examples
- [An Annotated Docker Config for Frontend Web Development](https://nystudio107.com/blog/an-annotated-docker-config-for-frontend-web-development) A local development environment with Docker allows you to shrink-wrap the devops your project needs as config, making onboarding frictionless.
- [Local Docker DB](https://github.com/alexmacarthur/local-docker-db) a list of docker-compose samples for a lot of databases by [alexmacarthur](https://github.com/alexmacarthur)
- [Webstack-micro](https://github.com/ferbs/webstack-micro) Demo web app showing how Docker Compose might be used to set up an API Gateway, centralized authentication, background workers, and WebSockets as containerized services.
## Good Tips
- [Docker Caveats](http://docker-saigon.github.io/post/Docker-Caveats/) What You Should Know About Running Docker In Production (written 11 APRIL 2016) **MUST SEE**
- [Docker Containers on the Desktop](https://blog.jessfraz.com/post/docker-containers-on-the-desktop/) - The **funniest way** to learn about docker by [jessfraz][jessfraz] who also gave a [presentation](https://www.youtube.com/watch?v=1qlLUf7KtAw) about it @ DockerCon 2015.
- [Docker vs. VMs? Combining Both for Cloud Portability Nirvana](https://www.flexera.com/blog/finops/)
- [Dockerfile best practices](https://github.com/hexops/dockerfile) :ice_cube: - This repository has best-practices for writing Dockerfiles.
- [Don't Repeat Yourself with Anchors, Aliases and Extensions in Docker Compose Files](https://medium.com/@kinghuang/docker-compose-anchors-aliases-extensions-a1e4105d70bd) by [King Chung Huang](https://github.com/kinghuang)
- [GUI Apps with Docker](http://fabiorehm.com/blog/2014/09/11/running-gui-apps-with-docker/) by [fgrehm][fgrehm]
## Raspberry Pi & ARM
- [Docker Pirates ARMed with explosive stuff](https://blog.hypriot.com/) Huge resource on clustering, swarm, docker, pre-installed image for SD card on Raspberry Pi
- [Get Docker up and running on the RaspberryPi in three steps](https://github.com/umiddelb/armhf/wiki/Get-Docker-up-and-running-on-the-RaspberryPi-%28ARMv6%29-in-three-steps)
- [git push docker containers to linux devices](https://www.balena.io) Modern DevOps for IoT, leveraging git and Docker.
- [Installing, running, using Docker on armhf (ARMv7) devices](https://github.com/umiddelb/armhf/wiki/Installing,-running,-using-docker-on-armhf-%28ARMv7%29-devices)
## Security
- [Bringing new security features to Docker](https://opensource.com/business/14/9/security-for-docker)
- [CVE Scanning Alpine images with Multi-stage builds in Docker 17.05](https://github.com/tomwillfixit/alpine-cvecheck) by [tomwillfixit](https://twitter.com/tomwillfixit)
- [Docker Secure Deployment Guidelines](https://github.com/AonCyberLabs/Docker-Secure-Deployment-Guidelines)
- [Docker Security - Quick Reference](https://binarymist.io/publication/docker-security/)
- [Docker Security: Are Your Containers Tightly Secured to the Ship? SlideShare](https://www.slideshare.net/slideshow/docker-security-are-your-containers-tightly-secured-to-the-ship/43834790)
- [How CVE's are handled on Offical Docker Images](https://github.com/docker-library/official-images/issues/1448)
- [Lynis is an open source security auditing tool including Docker auditing](https://cisofy.com/lynis/)
- [Security Best Practices for Building Docker Images](https://linux-audit.com/tags/docker/)
- [Software Engineering Radio interview of Docker Security Team Lead (Diogo Mónica)](https://www.se-radio.net/2017/05/se-radio-episode-290-diogo-monica-on-docker-security/)
- [Ten Docker Image Security Best Practices Cheat Sheet](https://snyk.io/blog/10-docker-image-security-best-practices/)
- [Top ten most popular docker images each contain at least 30 vulnerabilities](https://snyk.io/blog/top-ten-most-popular-docker-images-each-contain-at-least-30-vulnerabilities/)
- [Tuning Docker with the newest security enhancements](https://opensource.com/business/15/3/docker-security-tuning)
- [10 best practices to containerize Node.js web applications with Docker](https://snyk.io/blog/10-best-practices-to-containerize-nodejs-web-applications-with-docker/)
## Videos
- [Contributing to Docker by Andrew "Tianon" Page (InfoSiftr)](https://www.youtube.com/watch?v=1jwo8-1HYYg) (34:31)
- [Deploying and scaling applications with Docker, Swarm, and a tiny bit of Python magic](https://www.youtube.com/watch?v=GpHMTR7P2Ms) (3:11:06) by [jpetazzo][jpetazzo]
- [Docker and SELinux by Daniel Walsh from Red Hat](https://www.youtube.com/watch?v=zWGFqMuEHdw) (40:23)
- [Docker Course](https://www.youtube.com/watch?v=UZpyvK6UGFo) (Spanish) by [pablokbs](https://github.com/pablokbs)
- [Docker for Developers](https://www.youtube.com/watch?v=FdkNAjjO5yQ) (54:26) by [jpetazzo][jpetazzo] <== Good introduction, context, demo
- [Docker from scratch](https://www.youtube.com/playlist?list=PLLhEJK7fQIxD-btrjrqdEfQHbkZnQrmqE) (1:22:01) on YouTube by Paris Nakita Kejser
- [Docker: How to Use Your Own Private Registry](https://www.youtube.com/watch?v=CAewZCBT4PI) (15:01)
- [Docker in Production](https://www.youtube.com/watch?v=Glk5d5WP6MI) by [jpetazzo][jpetazzo] (36:05)
- [Docker Primer to Docker Compose](https://www.youtube.com/watch?v=G-s2GXGAjTk) (1:56:45) on YouTube by LoginRadius
- [Docker Registry from scratch](https://www.youtube.com/playlist?list=PLLhEJK7fQIxAz3d4Fj3edq7UcxEhdTCBm) (44:40) on YouTube by Paris Nakita Kejser
- [Docker Swarm from scratch](https://www.youtube.com/playlist?list=PLLhEJK7fQIxAY4gZd1Wl-GsLvg-e9Ap1e) (1:41:28) on YouTube by Paris Nakita Kejser
- [Extending Docker with Plugins](https://vimeo.com/110835013) (15:21)
- [From Local Docker Development to Production Deployments](https://www.youtube.com/watch?v=7CZFpHUPqXw) by [jpetazzo][jpetazzo] @ AWS re:Invent 2015
- [Immutable Infrastructure with Docker and EC2 by Michael Bryzek (Gilt)](https://www.youtube.com/watch?v=GaHzdqFithc) (42:04)
- [Introduction to Docker and containers](https://www.youtube.com/watch?v=ZVaRK10HBjo) (3:09:00) by [jpetazzo][jpetazzo]
- [Logging on Docker: What You Need to Know](https://vimeo.com/123341629) (51:27)
- [Performance Analysis of Docker - Jeremy Eder](https://www.youtube.com/watch?v=6f2E6PKYb0w) (1:36:58)
- [Scalable Microservices with Kubernetes](https://www.udacity.com/course/scalable-microservices-with-kubernetes--ud615) Free Udacity course
- [State of containers: a debate with CoreOS, VMware and Google](https://www.youtube.com/watch?v=IiITP3yIRd8) (27:38)
# Communities and Meetups
## Brazilian
- [Docker BR on Telegram](https://telegram.me/dockerbr)
## English
- [Docker Community](https://www.docker.com/community/)
- [Docker Events](https://www.docker.com/events/)
- [Docker Online Meetup](https://www.meetup.com/en-AU/Docker-Online-Meetup/)
- [Docker Reddit Community](https://www.reddit.com/r/docker/)
## Russian
- [Docker Russian-speaking Community](https://t.me/docker_ru)
## Spanish
- [Docker Tips](https://dockertips.com/)
## Stargazers over time
[](https://starchart.cc/veggiemonk/awesome-docker)
[contributing]: https://github.com/veggiemonk/awesome-docker/blob/master/.github/CONTRIBUTING.md
[calico]: https://github.com/projectcalico/calico
[containx]: https://github.com/ContainX
[coreos]: https://github.com/coreos
[deepfence]: https://github.com/deepfence
[distribution]: https://github.com/docker/distribution
[docker-flow]: https://github.com/docker-flow
[docker-for-windows]: https://docs.docker.com/desktop/setup/install/windows-install/
[docker]: https://github.com/docker
[dozzle]: https://github.com/amir20/dozzle
[editreadme]: https://github.com/veggiemonk/awesome-docker/edit/master/README.md
[fgrehm]: https://github.com/fgrehm
[gliderlabs]: https://github.com/gliderlabs
[googlecontainertools]: https://github.com/GoogleContainerTools
[inspec]: https://github.com/inspec/inspec
[jessfraz]: https://github.com/jessfraz
[jpetazzo]: https://github.com/jpetazzo
[jwilder]: https://github.com/jwilder
[kubernetes]: https://kubernetes.io
[lispyclouds]: https://github.com/lispyclouds
[nginxproxy]: https://github.com/nginx-proxy/nginx-proxy
[openshift]: https://okd.io/
[powerman]: https://github.com/powerman
[progrium]: https://github.com/progrium
[ramitsurana]: https://github.com/ramitsurana
[sindresorhus]: https://github.com/sindresorhus/awesome
[spotify]: https://github.com/spotify
[vegasbrianc]: https://github.com/vegasbrianc
[vmware]: https://github.com/vmware
[byrnedo]: https://github.com/byrnedo
[crazy-max]: https://github.com/crazy-max
[skanehira]: https://github.com/skanehira
[akito]: https://github.com/theAkito
[peco602]: https://github.com/Peco602
[weave]: https://github.com/weaveworks/weave
================================================
FILE: cmd/awesome-docker/main.go
================================================
package main
import (
"context"
"fmt"
"os"
"strconv"
"strings"
"github.com/spf13/cobra"
"github.com/veggiemonk/awesome-docker/internal/builder"
"github.com/veggiemonk/awesome-docker/internal/cache"
"github.com/veggiemonk/awesome-docker/internal/checker"
"github.com/veggiemonk/awesome-docker/internal/linter"
"github.com/veggiemonk/awesome-docker/internal/parser"
"github.com/veggiemonk/awesome-docker/internal/scorer"
"github.com/veggiemonk/awesome-docker/internal/tui"
)
const (
readmePath = "README.md"
excludePath = "config/exclude.yaml"
templatePath = "config/website.tmpl.html"
healthCachePath = "config/health_cache.yaml"
websiteOutput = "website/index.html"
version = "0.1.0"
)
type checkSummary struct {
ExternalTotal int
GitHubTotal int
Broken []checker.LinkResult
Redirected []checker.LinkResult
GitHubErrors []error
GitHubSkipped bool
}
func main() {
root := &cobra.Command{
Use: "awesome-docker",
Short: "Quality tooling for the awesome-docker curated list",
}
root.AddCommand(
versionCmd(),
lintCmd(),
checkCmd(),
healthCmd(),
buildCmd(),
reportCmd(),
validateCmd(),
ciCmd(),
browseCmd(),
)
if err := root.Execute(); err != nil {
os.Exit(1)
}
}
func versionCmd() *cobra.Command {
return &cobra.Command{
Use: "version",
Short: "Print version",
Run: func(cmd *cobra.Command, args []string) { fmt.Printf("awesome-docker v%s\n", version) },
}
}
func parseReadme() (parser.Document, error) {
f, err := os.Open(readmePath)
if err != nil {
return parser.Document{}, err
}
defer f.Close()
return parser.Parse(f)
}
func collectURLs(sections []parser.Section, urls *[]string) {
for _, s := range sections {
for _, e := range s.Entries {
*urls = append(*urls, e.URL)
}
collectURLs(s.Children, urls)
}
}
type entryMeta struct {
Category string
Description string
}
func collectEntriesWithCategory(sections []parser.Section, parentPath string, out map[string]entryMeta) {
for _, s := range sections {
path := s.Title
if parentPath != "" {
path = parentPath + " > " + s.Title
}
for _, e := range s.Entries {
out[e.URL] = entryMeta{Category: path, Description: e.Description}
}
collectEntriesWithCategory(s.Children, path, out)
}
}
func runLinkChecks(prMode bool) (checkSummary, error) {
doc, err := parseReadme()
if err != nil {
return checkSummary{}, fmt.Errorf("parse: %w", err)
}
var urls []string
collectURLs(doc.Sections, &urls)
exclude, err := cache.LoadExcludeList(excludePath)
if err != nil {
return checkSummary{}, fmt.Errorf("load exclude list: %w", err)
}
ghURLs, extURLs := checker.PartitionLinks(urls)
summary := checkSummary{
ExternalTotal: len(extURLs),
GitHubTotal: len(ghURLs),
}
results := checker.CheckLinks(extURLs, 10, exclude)
for _, r := range results {
if !r.OK {
summary.Broken = append(summary.Broken, r)
}
if r.Redirected {
summary.Redirected = append(summary.Redirected, r)
}
}
if prMode {
summary.GitHubSkipped = true
return summary, nil
}
token := os.Getenv("GITHUB_TOKEN")
if token == "" {
summary.GitHubSkipped = true
return summary, nil
}
gc := checker.NewGitHubChecker(token)
_, errs := gc.CheckRepos(context.Background(), ghURLs, 50)
summary.GitHubErrors = errs
return summary, nil
}
func runHealth(ctx context.Context) error {
token := os.Getenv("GITHUB_TOKEN")
if token == "" {
return fmt.Errorf("GITHUB_TOKEN environment variable is required")
}
doc, err := parseReadme()
if err != nil {
return fmt.Errorf("parse: %w", err)
}
var urls []string
collectURLs(doc.Sections, &urls)
ghURLs, _ := checker.PartitionLinks(urls)
fmt.Printf("Scoring %d GitHub repositories...\n", len(ghURLs))
gc := checker.NewGitHubChecker(token)
infos, errs := gc.CheckRepos(ctx, ghURLs, 50)
for _, e := range errs {
fmt.Printf(" error: %v\n", e)
}
if len(infos) == 0 {
if len(errs) > 0 {
return fmt.Errorf("failed to fetch GitHub metadata for all repositories (%d errors); check network/DNS and GITHUB_TOKEN", len(errs))
}
return fmt.Errorf("no GitHub repositories found in README")
}
scored := scorer.ScoreAll(infos)
meta := make(map[string]entryMeta)
collectEntriesWithCategory(doc.Sections, "", meta)
for i := range scored {
if m, ok := meta[scored[i].URL]; ok {
scored[i].Category = m.Category
scored[i].Description = m.Description
}
}
cacheEntries := scorer.ToCacheEntries(scored)
hc, err := cache.LoadHealthCache(healthCachePath)
if err != nil {
return fmt.Errorf("load cache: %w", err)
}
hc.Merge(cacheEntries)
if err := cache.SaveHealthCache(healthCachePath, hc); err != nil {
return fmt.Errorf("save cache: %w", err)
}
fmt.Printf("Cache updated: %d entries in %s\n", len(hc.Entries), healthCachePath)
return nil
}
func scoredFromCache() ([]scorer.ScoredEntry, error) {
hc, err := cache.LoadHealthCache(healthCachePath)
if err != nil {
return nil, fmt.Errorf("load cache: %w", err)
}
if len(hc.Entries) == 0 {
return nil, fmt.Errorf("no cache data, run 'health' first")
}
scored := make([]scorer.ScoredEntry, 0, len(hc.Entries))
for _, e := range hc.Entries {
scored = append(scored, scorer.ScoredEntry{
URL: e.URL,
Name: e.Name,
Status: scorer.Status(e.Status),
Stars: e.Stars,
Forks: e.Forks,
HasLicense: e.HasLicense,
LastPush: e.LastPush,
Category: e.Category,
Description: e.Description,
})
}
return scored, nil
}
func markdownReportFromCache() (string, error) {
scored, err := scoredFromCache()
if err != nil {
return "", err
}
return scorer.GenerateReport(scored), nil
}
func writeGitHubOutput(path, key, value string) error {
if path == "" {
return nil
}
f, err := os.OpenFile(path, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0o644)
if err != nil {
return fmt.Errorf("open github output file: %w", err)
}
defer f.Close()
if _, err := fmt.Fprintf(f, "%s=%s\n", key, value); err != nil {
return fmt.Errorf("write github output: %w", err)
}
return nil
}
func sanitizeOutputValue(v string) string {
v = strings.ReplaceAll(v, "\n", " ")
v = strings.ReplaceAll(v, "\r", " ")
return strings.TrimSpace(v)
}
func buildBrokenLinksIssueBody(summary checkSummary, runErr error) string {
var b strings.Builder
b.WriteString("# Broken Links Detected\n\n")
if runErr != nil {
b.WriteString("The link checker failed to execute cleanly.\n\n")
b.WriteString("## Failure\n\n")
fmt.Fprintf(&b, "- %s\n\n", runErr)
} else {
fmt.Fprintf(&b, "- Broken links: %d\n", len(summary.Broken))
fmt.Fprintf(&b, "- Redirected links: %d\n", len(summary.Redirected))
fmt.Fprintf(&b, "- GitHub API errors: %d\n\n", len(summary.GitHubErrors))
if len(summary.Broken) > 0 {
b.WriteString("## Broken Links\n\n")
for _, r := range summary.Broken {
fmt.Fprintf(&b, "- `%s` -> `%d %s`\n", r.URL, r.StatusCode, strings.TrimSpace(r.Error))
}
b.WriteString("\n")
}
if len(summary.GitHubErrors) > 0 {
b.WriteString("## GitHub API Errors\n\n")
for _, e := range summary.GitHubErrors {
fmt.Fprintf(&b, "- `%s`\n", e)
}
b.WriteString("\n")
}
}
b.WriteString("## Action Required\n\n")
b.WriteString("- Update the URL if the resource moved\n")
b.WriteString("- Remove the entry if permanently unavailable\n")
b.WriteString("- Add to `config/exclude.yaml` if a known false positive\n")
b.WriteString("- Investigate GitHub API/auth failures when present\n\n")
b.WriteString("---\n")
b.WriteString("*Auto-generated by awesome-docker ci broken-links*\n")
return b.String()
}
func buildHealthReportIssueBody(report string, healthErr error) string {
var b strings.Builder
if healthErr != nil {
b.WriteString("WARNING: health refresh failed in this run; showing latest cached report.\n\n")
fmt.Fprintf(&b, "Error: `%s`\n\n", healthErr)
}
b.WriteString(report)
if !strings.HasSuffix(report, "\n") {
b.WriteString("\n")
}
b.WriteString("\n---\n")
b.WriteString("*Auto-generated weekly by awesome-docker ci health-report*\n")
return b.String()
}
func lintCmd() *cobra.Command {
var fix bool
cmd := &cobra.Command{
Use: "lint",
Short: "Validate README formatting",
RunE: func(cmd *cobra.Command, args []string) error {
doc, err := parseReadme()
if err != nil {
return fmt.Errorf("parse: %w", err)
}
result := linter.Lint(doc)
for _, issue := range result.Issues {
fmt.Println(issue)
}
if result.Errors > 0 {
fmt.Printf("\n%d errors, %d warnings\n", result.Errors, result.Warnings)
if !fix {
return fmt.Errorf("lint failed with %d errors", result.Errors)
}
count, err := linter.FixFile(readmePath)
if err != nil {
return fmt.Errorf("fix: %w", err)
}
fmt.Printf("Fixed %d lines in %s\n", count, readmePath)
} else {
fmt.Printf("OK: %d warnings\n", result.Warnings)
}
return nil
},
}
cmd.Flags().BoolVar(&fix, "fix", false, "Auto-fix formatting issues")
return cmd
}
func checkCmd() *cobra.Command {
var prMode bool
cmd := &cobra.Command{
Use: "check",
Short: "Check links for reachability",
RunE: func(cmd *cobra.Command, args []string) error {
summary, err := runLinkChecks(prMode)
if err != nil {
return err
}
fmt.Printf("Checking %d external links...\n", summary.ExternalTotal)
if !prMode {
if summary.GitHubSkipped {
fmt.Println("GITHUB_TOKEN not set, skipping GitHub repo checks")
} else {
fmt.Printf("Checking %d GitHub repositories...\n", summary.GitHubTotal)
}
}
for _, e := range summary.GitHubErrors {
fmt.Printf(" GitHub error: %v\n", e)
}
if len(summary.Redirected) > 0 {
fmt.Printf("\n%d redirected links (consider updating):\n", len(summary.Redirected))
for _, r := range summary.Redirected {
fmt.Printf(" %s -> %s\n", r.URL, r.RedirectURL)
}
}
if len(summary.Broken) > 0 {
fmt.Printf("\n%d broken links:\n", len(summary.Broken))
for _, r := range summary.Broken {
fmt.Printf(" %s -> %d %s\n", r.URL, r.StatusCode, r.Error)
}
}
if len(summary.Broken) > 0 && len(summary.GitHubErrors) > 0 {
return fmt.Errorf("found %d broken links and %d GitHub API errors", len(summary.Broken), len(summary.GitHubErrors))
}
if len(summary.Broken) > 0 {
return fmt.Errorf("found %d broken links", len(summary.Broken))
}
if len(summary.GitHubErrors) > 0 {
return fmt.Errorf("github checks failed with %d errors", len(summary.GitHubErrors))
}
fmt.Println("All links OK")
return nil
},
}
cmd.Flags().BoolVar(&prMode, "pr", false, "PR mode: skip GitHub API checks")
return cmd
}
func healthCmd() *cobra.Command {
return &cobra.Command{
Use: "health",
Short: "Score repository health and update cache",
RunE: func(cmd *cobra.Command, args []string) error {
return runHealth(context.Background())
},
}
}
func buildCmd() *cobra.Command {
return &cobra.Command{
Use: "build",
Short: "Generate website from README",
RunE: func(cmd *cobra.Command, args []string) error {
if err := builder.Build(readmePath, templatePath, websiteOutput); err != nil {
return err
}
fmt.Printf("Website built: %s\n", websiteOutput)
return nil
},
}
}
func reportCmd() *cobra.Command {
var jsonOutput bool
cmd := &cobra.Command{
Use: "report",
Short: "Generate health report from cache",
RunE: func(cmd *cobra.Command, args []string) error {
scored, err := scoredFromCache()
if err != nil {
return err
}
if jsonOutput {
payload, err := scorer.GenerateJSONReport(scored)
if err != nil {
return fmt.Errorf("json report: %w", err)
}
fmt.Println(string(payload))
return nil
}
report := scorer.GenerateReport(scored)
fmt.Print(report)
return nil
},
}
cmd.Flags().BoolVar(&jsonOutput, "json", false, "Output full health report as JSON")
return cmd
}
func validateCmd() *cobra.Command {
return &cobra.Command{
Use: "validate",
Short: "PR validation: lint + check --pr",
RunE: func(cmd *cobra.Command, args []string) error {
fmt.Println("=== Linting ===")
doc, err := parseReadme()
if err != nil {
return fmt.Errorf("parse: %w", err)
}
result := linter.Lint(doc)
for _, issue := range result.Issues {
fmt.Println(issue)
}
if result.Errors > 0 {
fmt.Printf("\n%d errors, %d warnings\n", result.Errors, result.Warnings)
return fmt.Errorf("lint failed with %d errors", result.Errors)
}
fmt.Printf("Lint OK: %d warnings\n", result.Warnings)
fmt.Println("\n=== Checking links (PR mode) ===")
summary, err := runLinkChecks(true)
if err != nil {
return err
}
fmt.Printf("Checking %d external links...\n", summary.ExternalTotal)
if len(summary.Broken) > 0 {
fmt.Printf("\n%d broken links:\n", len(summary.Broken))
for _, r := range summary.Broken {
fmt.Printf(" %s -> %d %s\n", r.URL, r.StatusCode, r.Error)
}
return fmt.Errorf("found %d broken links", len(summary.Broken))
}
fmt.Println("\nValidation passed")
return nil
},
}
}
func ciCmd() *cobra.Command {
cmd := &cobra.Command{
Use: "ci",
Short: "CI-oriented helper commands",
}
cmd.AddCommand(
ciBrokenLinksCmd(),
ciHealthReportCmd(),
)
return cmd
}
func ciBrokenLinksCmd() *cobra.Command {
var issueFile string
var githubOutput string
var strict bool
cmd := &cobra.Command{
Use: "broken-links",
Short: "Run link checks and emit CI outputs/artifacts",
RunE: func(cmd *cobra.Command, args []string) error {
summary, runErr := runLinkChecks(false)
hasErrors := runErr != nil || len(summary.Broken) > 0 || len(summary.GitHubErrors) > 0
exitCode := 0
if hasErrors {
exitCode = 1
}
if runErr != nil {
exitCode = 2
}
if issueFile != "" && hasErrors {
body := buildBrokenLinksIssueBody(summary, runErr)
if err := os.WriteFile(issueFile, []byte(body), 0o644); err != nil {
return fmt.Errorf("write issue file: %w", err)
}
}
if err := writeGitHubOutput(githubOutput, "has_errors", strconv.FormatBool(hasErrors)); err != nil {
return err
}
if err := writeGitHubOutput(githubOutput, "check_exit_code", strconv.Itoa(exitCode)); err != nil {
return err
}
if err := writeGitHubOutput(githubOutput, "broken_count", strconv.Itoa(len(summary.Broken))); err != nil {
return err
}
if err := writeGitHubOutput(githubOutput, "github_error_count", strconv.Itoa(len(summary.GitHubErrors))); err != nil {
return err
}
if runErr != nil {
if err := writeGitHubOutput(githubOutput, "run_error", sanitizeOutputValue(runErr.Error())); err != nil {
return err
}
}
if runErr != nil {
fmt.Printf("CI broken-links run error: %v\n", runErr)
}
if hasErrors {
fmt.Printf("CI broken-links found %d broken links and %d GitHub errors\n", len(summary.Broken), len(summary.GitHubErrors))
} else {
fmt.Println("CI broken-links found no errors")
}
if strict {
if runErr != nil {
return runErr
}
if hasErrors {
return fmt.Errorf("found %d broken links and %d GitHub API errors", len(summary.Broken), len(summary.GitHubErrors))
}
}
return nil
},
}
cmd.Flags().StringVar(&issueFile, "issue-file", "broken_links_issue.md", "Path to write issue markdown body")
cmd.Flags().StringVar(&githubOutput, "github-output", "", "Path to GitHub output file (typically $GITHUB_OUTPUT)")
cmd.Flags().BoolVar(&strict, "strict", false, "Return non-zero when errors are found")
return cmd
}
func ciHealthReportCmd() *cobra.Command {
var issueFile string
var githubOutput string
var strict bool
cmd := &cobra.Command{
Use: "health-report",
Short: "Refresh health cache, render report, and emit CI outputs/artifacts",
RunE: func(cmd *cobra.Command, args []string) error {
healthErr := runHealth(context.Background())
report, reportErr := markdownReportFromCache()
healthOK := healthErr == nil
reportOK := reportErr == nil
hasReport := reportOK && strings.TrimSpace(report) != ""
hasErrors := !healthOK || !reportOK
if hasReport && issueFile != "" {
body := buildHealthReportIssueBody(report, healthErr)
if err := os.WriteFile(issueFile, []byte(body), 0o644); err != nil {
return fmt.Errorf("write issue file: %w", err)
}
}
if err := writeGitHubOutput(githubOutput, "has_report", strconv.FormatBool(hasReport)); err != nil {
return err
}
if err := writeGitHubOutput(githubOutput, "health_ok", strconv.FormatBool(healthOK)); err != nil {
return err
}
if err := writeGitHubOutput(githubOutput, "report_ok", strconv.FormatBool(reportOK)); err != nil {
return err
}
if err := writeGitHubOutput(githubOutput, "has_errors", strconv.FormatBool(hasErrors)); err != nil {
return err
}
if healthErr != nil {
if err := writeGitHubOutput(githubOutput, "health_error", sanitizeOutputValue(healthErr.Error())); err != nil {
return err
}
}
if reportErr != nil {
if err := writeGitHubOutput(githubOutput, "report_error", sanitizeOutputValue(reportErr.Error())); err != nil {
return err
}
}
if healthErr != nil {
fmt.Printf("CI health-report health error: %v\n", healthErr)
}
if reportErr != nil {
fmt.Printf("CI health-report report error: %v\n", reportErr)
}
if hasReport {
fmt.Println("CI health-report generated report artifact")
} else {
fmt.Println("CI health-report has no report artifact")
}
if strict {
if healthErr != nil {
return healthErr
}
if reportErr != nil {
return reportErr
}
}
return nil
},
}
cmd.Flags().StringVar(&issueFile, "issue-file", "health_report.txt", "Path to write health issue markdown body")
cmd.Flags().StringVar(&githubOutput, "github-output", "", "Path to GitHub output file (typically $GITHUB_OUTPUT)")
cmd.Flags().BoolVar(&strict, "strict", false, "Return non-zero when health/report fails")
return cmd
}
func browseCmd() *cobra.Command {
var cachePath string
cmd := &cobra.Command{
Use: "browse",
Short: "Interactive TUI browser for awesome-docker resources",
RunE: func(cmd *cobra.Command, args []string) error {
hc, err := cache.LoadHealthCache(cachePath)
if err != nil {
return fmt.Errorf("load cache: %w", err)
}
if len(hc.Entries) == 0 {
return fmt.Errorf("no cache data; run 'awesome-docker health' first")
}
return tui.Run(hc.Entries)
},
}
cmd.Flags().StringVar(&cachePath, "cache", healthCachePath, "Path to health cache YAML")
return cmd
}
================================================
FILE: config/exclude.yaml
================================================
# URLs or URL prefixes to skip during link checking.
# These are known false positives or rate-limited domains.
domains:
- https://vimeo.com
- https://travis-ci.org/veggiemonk/awesome-docker.svg
- https://github.com/apps/
- https://twitter.com
- https://www.meetup.com/
- https://cycle.io/
- https://www.manning.com/
- https://deepfence.io
- https://cdn.rawgit.com/sindresorhus/awesome/d7305f38d29fed78fa85652e3a63e154dd8e8829/media/badge.svg
- https://www.se-radio.net/2017/05/se-radio-episode-290-diogo-monica-on-docker-security
- https://www.reddit.com/r/docker/
- https://www.udacity.com/course/scalable-microservices-with-kubernetes--ud615
- https://www.youtube.com/playlist
- https://www.aquasec.com
- https://cloudsmith.com
================================================
FILE: config/health_cache.yaml
================================================
entries:
- url: https://github.com/byrnedo/capitan
name: byrnedo/capitan
status: stale
stars: 31
last_push: 2017-06-07T09:46:56Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: Composable docker orchestration with added scripting support by [byrnedo].
- url: https://github.com/magicmark/composerize
name: magicmark/composerize
status: healthy
stars: 3703
forks: 247
last_push: 2026-01-17T12:14:28Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: Convert docker run commands into docker-compose files.
- url: https://github.com/polonskiy/crowdr
name: polonskiy/crowdr
status: stale
stars: 98
forks: 9
last_push: 2020-10-09T07:57:52Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: Tool for managing multiple Docker containers (`docker-compose` alternative).
- url: https://github.com/ctk-hq/ctk
name: ctk-hq/ctk
status: healthy
stars: 298
forks: 27
last_push: 2026-02-15T22:53:00Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: Visual composer for container based workloads. By [corpulent](https://github.com/corpulent).
- url: https://github.com/sudo-bmitch/docker-config-update
name: sudo-bmitch/docker-config-update
status: stale
stars: 51
forks: 8
last_push: 2023-03-30T13:03:12Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: Utility to update docker configs and secrets for deploying in a compose file.
- url: https://github.com/cisco/elsy
name: cisco/elsy
status: stale
stars: 80
forks: 22
last_push: 2022-01-18T13:38:49Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: An opinionated, multi-language, build tool based on Docker and Docker Compose.
- url: https://github.com/cloud66-oss/habitus
name: cloud66-oss/habitus
status: stale
stars: 1392
forks: 81
last_push: 2020-02-05T17:10:30Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: A Build Flow Tool for Docker.
- url: https://github.com/kubernetes/kompose
name: kubernetes/kompose
status: healthy
stars: 10464
forks: 794
last_push: 2026-02-27T14:23:27Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: Go from Docker Compose to Kubernetes.
- url: https://github.com/av/harbor
name: av/harbor
status: healthy
stars: 2485
forks: 166
last_push: 2026-03-08T14:30:46Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: A CLI and companion app to effortlessly run LLM backends, APIs, frontends, and services with one command. By [av](https://github.com/av).
- url: https://github.com/ihucos/plash
name: ihucos/plash
status: healthy
stars: 387
forks: 15
last_push: 2025-03-20T15:47:21Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: A container run and build engine - runs inside docker.
- url: https://github.com/containers/podman-compose
name: containers/podman-compose
status: healthy
stars: 5990
forks: 577
last_push: 2026-03-05T16:25:54Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: A script to run docker-compose.yml using podman.
- url: https://github.com/alexaandrov/stitchocker
name: alexaandrov/stitchocker
status: inactive
stars: 30
forks: 2
last_push: 2024-03-14T13:50:30Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Container Composition
description: A lightweight and fast command line utility for conveniently grouping your docker-compose multiple container services. By [alexaandrov](https://github.com/alexaandrov).
- url: https://github.com/ethibox/awesome-stacks
name: ethibox/awesome-stacks
status: healthy
stars: 1250
forks: 162
last_push: 2026-03-08T14:40:12Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: Deploy 150+ open-source web apps with one Docker command.
- url: https://github.com/newrelic/centurion
name: newrelic/centurion
status: archived
stars: 1757
forks: 112
last_push: 2025-09-11T20:47:50Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: Centurion is a mass deployment tool for Docker fleets. It takes containers from a Docker registry and runs them on a fleet of hosts with the correct environment variables, host volume mappings, and port mappings. By [newrelic](https://github.com/newrelic).
- url: https://github.com/brooklyncentral/clocker
name: brooklyncentral/clocker
status: stale
stars: 429
forks: 64
last_push: 2018-10-24T15:29:12Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: Clocker creates and manages a Docker cloud infrastructure. Clocker supports single-click deployments and runtime management of multi-node applications that run as containers distributed across multiple hosts, on both Docker and Marathon. It leverages [Calico][calico] and [Weave][weave] for networking and [Brooklyn](https://brooklyn.apache.org/) for application blueprints. By [brooklyncentral](https://github.com/brooklyncentral).
- url: https://github.com/ehazlett/conduit
name: ehazlett/conduit
status: stale
stars: 108
forks: 11
last_push: 2016-11-07T18:20:56Z
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: Experimental deployment system for Docker.
- url: https://github.com/ContainX/depcon
name: ContainX/depcon
status: stale
stars: 93
forks: 15
last_push: 2018-06-05T04:40:23Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: Depcon is written in Go and allows you to easily deploy Docker containers to Apache Mesos/Marathon, Amazon ECS and Kubernetes. By [ContainX][containx].
- url: https://github.com/deploystackio/docker-to-iac
name: deploystackio/docker-to-iac
status: healthy
stars: 23
last_push: 2026-03-02T06:11:33Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: Translate docker run and commit into Infrastructure as Code templates for AWS, Render.com and DigitalOcean.
- url: https://github.com/hasura/gitkube
name: hasura/gitkube
status: stale
stars: 3850
forks: 203
last_push: 2023-08-31T07:48:24Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: Gitkube is a tool for building and deploying docker images on Kubernetes using `git push`. By [Hasura](https://github.com/hasura/).
- url: https://github.com/grafeas/grafeas
name: grafeas/grafeas
status: healthy
stars: 1564
forks: 307
last_push: 2026-02-13T21:53:15Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: A common API for metadata about containers, from image and build details to security vulnerabilities. By [grafeas](https://github.com/grafeas).
- url: https://github.com/LombardiDaniel/swarm-ansible
name: LombardiDaniel/swarm-ansible
status: healthy
stars: 59
forks: 4
last_push: 2026-01-24T22:01:08Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
- url: https://github.com/hansehe/SwarmManagement
name: hansehe/SwarmManagement
status: healthy
stars: 21
forks: 1
last_push: 2025-05-13T15:24:25Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: Swarm Management is a python application, installed with pip. The application makes it easy to manage a Docker Swarm by configuring a single yaml file describing which stacks to deploy, and which networks, configs or secrets to create.
- url: https://github.com/werf/werf
name: werf/werf
status: healthy
stars: 4661
forks: 230
last_push: 2026-03-06T15:47:09Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Deployment and Infrastructure
description: Werf is a CI/CD tool for building Docker images efficiently and deploying them to Kubernetes using GitOps.
- url: https://github.com/willfarrell/docker-autoheal
name: willfarrell/docker-autoheal
status: healthy
stars: 1801
forks: 254
last_push: 2025-09-09T16:33:25Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Monitor and restart unhealthy docker containers automatically.
- url: https://github.com/google/cadvisor
name: google/cadvisor
status: healthy
stars: 18952
forks: 2461
last_push: 2026-03-02T18:35:32Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Analyzes resource usage and performance characteristics of running containers.
- url: https://github.com/bluewave-labs/checkmate
name: bluewave-labs/checkmate
status: healthy
stars: 9372
forks: 680
last_push: 2026-03-07T01:22:01Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Checkmate is an open-source, self-hosted tool designed to track and monitor server hardware, uptime, response times, and incidents in real-time with beautiful visualizations.
- url: https://github.com/zorak1103/dlia
name: zorak1103/dlia
status: healthy
stars: 3
last_push: 2026-03-07T04:03:52Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: DLIA is an AI-powered Docker log monitoring agent that uses Large Language Models (LLMs) to intelligently analyze container logs, detect anomalies, and provide contextual insights over time. By [zorak1103](https://github.com/zorak1103).
- url: https://github.com/deltaskelta/docker-alertd
name: deltaskelta/docker-alertd
status: stale
stars: 108
forks: 12
last_push: 2017-11-15T04:40:06Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Monitor and send alerts based on docker container resource usage/statistics.
- url: https://github.com/docker-flow/docker-flow-monitor
name: docker-flow/docker-flow-monitor
status: stale
stars: 88
forks: 38
last_push: 2021-03-17T14:33:01Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Reconfigures Prometheus when a new service is updated or deployed automatically.
- url: https://github.com/stefanprodan/dockprom
name: stefanprodan/dockprom
status: healthy
stars: 6488
forks: 1768
last_push: 2026-03-06T05:28:07Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Docker hosts and containers monitoring with Prometheus, Grafana, cAdvisor, NodeExporter and AlertManager.
- url: https://github.com/amerkurev/doku
name: amerkurev/doku
status: healthy
stars: 410
forks: 18
last_push: 2025-12-26T09:13:21Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Doku is a simple web-based application that allows you to monitor Docker disk usage. [amerkurev](https://github.com/amerkurev).
- url: https://github.com/nicolargo/glances
name: nicolargo/glances
status: healthy
stars: 31995
forks: 1695
last_push: 2026-03-07T15:24:35Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: A cross-platform curses-based system monitoring tool written in Python.
- url: https://github.com/dromara/hertzbeat
name: dromara/hertzbeat
status: healthy
stars: 7114
forks: 1255
last_push: 2026-03-08T12:09:09Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: An open-source real-time monitoring system with custom-monitor and agentless.
- url: https://github.com/vegasbrianc/docker-monitoring
name: vegasbrianc/docker-monitoring
status: stale
stars: 473
forks: 129
last_push: 2018-06-10T20:53:49Z
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: InfluxDB Time series DB in combination with Grafana and cAdvisor.
- url: https://github.com/gliderlabs/logspout
name: gliderlabs/logspout
status: stale
stars: 4701
forks: 668
last_push: 2023-07-11T20:36:12Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Log routing for Docker container logs.
- url: https://github.com/decryptus/monit-docker
name: decryptus/monit-docker
status: stale
stars: 34
forks: 5
last_push: 2023-01-16T11:31:14Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Monitor docker containers resources usage or status and execute docker commands or inside containers. [decryptus][decryptus].
- url: https://github.com/NexClipper/NexClipper
name: NexClipper/NexClipper
status: stale
stars: 565
forks: 72
last_push: 2023-05-05T02:21:24Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: NexClipper is the container monitoring and performance management solution specialized in Docker, Apache Mesos, Marathon, DC/OS, Mesosphere, Kubernetes.
- url: https://github.com/uschtwill/docker_monitoring_logging_alerting
name: uschtwill/docker_monitoring_logging_alerting
status: stale
stars: 539
forks: 119
last_push: 2018-09-13T07:36:45Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Docker host and container monitoring, logging and alerting out of the box using cAdvisor, Prometheus, Grafana for monitoring, Elasticsearch, Kibana and Logstash for logging and elastalert and Alertmanager for alerting. Set up in 5 Minutes. Secure mode for production use with built-in [Automated Nginx Reverse Proxy (jwilder's)][nginxproxy].
- url: https://github.com/runsidekick/sidekick
name: runsidekick/sidekick
status: stale
stars: 1611
forks: 67
last_push: 2023-06-29T12:18:38Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Open source live application debugger like Chrome DevTools for your backend. Collect traces and generate logs on-demand without stopping & redeploying your applications.
- url: https://github.com/gpulido/SwarmAlert
name: gpulido/SwarmAlert
status: stale
stars: 22
forks: 2
last_push: 2019-11-27T12:17:14Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Monitors a Docker Swarm and sends Pushover alerts when it finds a container with no healthy service task running.
- url: https://github.com/gomex/docker-zabbix
name: gomex/docker-zabbix
status: stale
stars: 53
forks: 12
last_push: 2017-07-28T14:29:08Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Monitor containers automatically using zabbix LLD feature.
- url: https://github.com/monitoringartist/Zabbix-Docker-Monitoring
name: monitoringartist/Zabbix-Docker-Monitoring
status: stale
stars: 1197
forks: 265
last_push: 2022-02-22T17:01:39Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Monitoring
description: Zabbix module that provides discovery of running containers, CPU/memory/blk IO/net container metrics. Systemd Docker and LXC execution driver is also supported. It's a dynamically linked shared object library, so its performance is (~10x) better, than any script solution.
- url: https://github.com/coreos/flannel
name: coreos/flannel
status: healthy
stars: 9410
forks: 2902
last_push: 2026-03-06T12:10:23Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
- url: https://github.com/Microsoft/Freeflow
name: Microsoft/Freeflow
status: stale
stars: 632
forks: 96
last_push: 2023-06-12T19:30:22Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Networking
description: High performance container overlay networks on Linux. Enabling RDMA (on both InfiniBand and RoCE) and accelerating TCP to bare metal performance. By [Microsoft](https://github.com/Microsoft).
- url: https://github.com/jason5ng32/MyIP
name: jason5ng32/MyIP
status: healthy
stars: 9895
forks: 1072
last_push: 2026-02-10T07:38:47Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Networking
description: All in one IP Toolbox. Easy to check all your IPs, IP geolocation, check for DNS leaks, examine WebRTC connections, speed test, ping test, MTR test, check website availability, whois search and more. By [jason5ng32](https://github.com/jason5ng32).
- url: https://github.com/nicolaka/netshoot
name: nicolaka/netshoot
status: healthy
stars: 10445
forks: 1085
last_push: 2026-03-05T17:23:33Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Networking
description: The netshoot container has a powerful set of networking tools to help troubleshoot Docker networking issues.
- url: https://github.com/jpetazzo/pipework
name: jpetazzo/pipework
status: inactive
stars: 4252
forks: 727
last_push: 2024-11-04T17:31:57Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Networking
description: Software-Defined Networking for Linux Containers, Pipework works with "plain" LXC containers, and with the awesome Docker. By [jpetazzo][jpetazzo].
- url: https://github.com/Peco602/ansible-linux-docker
name: Peco602/ansible-linux-docker
status: stale
stars: 37
forks: 4
last_push: 2023-06-21T09:34:02Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Run Ansible from a Linux container. By [Peco602][peco602].
- url: https://github.com/athena-oss/athena
name: athena-oss/athena
status: stale
stars: 96
forks: 25
last_push: 2017-07-06T08:26:12Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: An automation platform with a plugin architecture that allows you to easily create and share services.
- url: https://github.com/CloudSlang/cloud-slang
name: CloudSlang/cloud-slang
status: healthy
stars: 240
forks: 83
last_push: 2026-03-04T10:56:48Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: CloudSlang is a workflow engine to create Docker process automation.
- url: https://github.com/clusterdock/clusterdock
name: clusterdock/clusterdock
status: stale
stars: 29
forks: 8
last_push: 2023-05-16T18:05:45Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Docker container orchestration to enable the testing of long-running cluster deployments.
- url: https://github.com/Dataman-Cloud/crane
name: Dataman-Cloud/crane
status: stale
stars: 748
forks: 164
last_push: 2023-08-31T09:46:38Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Control plane based on docker built-in swarm [Dataman-Cloud](https://github.com/Dataman-Cloud).
- url: https://github.com/docker-flow/docker-flow-swarm-listener
name: docker-flow/docker-flow-swarm-listener
status: stale
stars: 69
forks: 50
last_push: 2019-05-20T19:40:37Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Docker Flow Swarm Listener project is to listen to Docker Swarm events and send requests when a change occurs. By [docker-flow][docker-flow].
- url: https://github.com/Wowu/docker-rollout
name: Wowu/docker-rollout
status: healthy
stars: 3111
forks: 93
last_push: 2025-07-25T17:57:48Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Zero downtime deployment for Docker Compose services.
- url: https://github.com/codeabovelab/haven-platform
name: codeabovelab/haven-platform
status: stale
stars: 297
forks: 41
last_push: 2018-07-06T11:21:20Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Haven is a simplified container management platform that integrates container, application, cluster, image, and registry managements. By [codeabovelab](https://github.com/codeabovelab).
- url: https://github.com/kubernetes/kubernetes
name: kubernetes/kubernetes
status: healthy
stars: 120996
forks: 42620
last_push: 2026-03-07T08:41:59Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Open source orchestration system for Docker containers by Google.
- url: https://github.com/ManageIQ/manageiq
name: ManageIQ/manageiq
status: healthy
stars: 1392
forks: 922
last_push: 2026-03-05T20:13:05Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Discover, optimize and control your hybrid IT. By [ManageIQ](https://github.com/ManageIQ).
- url: https://github.com/apache/mesos
name: apache/mesos
status: inactive
stars: 5364
forks: 1669
last_push: 2024-08-23T18:59:16Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Resource/Job scheduler for containers, VM's and physical hosts [apache](https://mesos.apache.org/).
- url: https://github.com/hashicorp/nomad
name: hashicorp/nomad
status: healthy
stars: 16262
forks: 2059
last_push: 2026-03-08T09:06:18Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Easily deploy applications at any scale. A Distributed, Highly Available, Datacenter-Aware Scheduler.
- url: https://github.com/rancher/rancher
name: rancher/rancher
status: healthy
stars: 25400
forks: 3173
last_push: 2026-03-06T22:49:23Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: An open source project that provides a complete platform for operating Docker in production.
- url: https://github.com/redherd-project/redherd-framework
name: redherd-project/redherd-framework
status: stale
stars: 74
forks: 17
last_push: 2023-04-25T18:54:33Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets capable of simulating complex offensive cyberspace operations. By [RedHerdProject](https://github.com/redherd-project).
- url: https://github.com/crazy-max/swarm-cronjob
name: crazy-max/swarm-cronjob
status: healthy
stars: 861
forks: 74
last_push: 2026-03-06T07:02:33Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Orchestration
description: Create jobs on a time-based schedule on Swarm by [crazy-max].
- url: https://github.com/caprover/caprover
name: caprover/caprover
status: healthy
stars: 14892
forks: 966
last_push: 2026-01-31T15:42:45Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: '[Previously known as CaptainDuckDuck] Automated Scalable Webserver Package (automated Docker+nginx) - Heroku on Steroids.'
- url: https://github.com/convox/rack
name: convox/rack
status: healthy
stars: 1892
forks: 177
last_push: 2026-02-12T19:55:53Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: Convox Rack is open source PaaS built on top of expert infrastructure automation and devops best practices.
- url: https://github.com/pbertera/dcw
name: pbertera/dcw
status: stale
stars: 17
forks: 3
last_push: 2017-03-29T07:55:37Z
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: 'Docker-compose SSH wrapper: a very poor man PaaS, exposing the docker-compose and custom-container commands defined in container labels.'
- url: https://github.com/dokku/dokku
name: dokku/dokku
status: healthy
stars: 31896
forks: 2022
last_push: 2026-03-07T18:31:36Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: Docker powered mini-Heroku that helps you build and manage the lifecycle of applications (originally by [progrium][progrium]).
- url: https://github.com/remind101/empire
name: remind101/empire
status: stale
stars: 2681
forks: 156
last_push: 2023-11-25T17:16:08Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: A PaaS built on top of Amazon EC2 Container Service (ECS).
- url: https://github.com/exoframejs/exoframe
name: exoframejs/exoframe
status: healthy
stars: 1146
forks: 59
last_push: 2026-02-22T16:24:52Z
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: A self-hosted tool that allows simple one-command deployments using Docker.
- url: https://github.com/teamhephy/workflow
name: teamhephy/workflow
status: stale
stars: 419
forks: 36
last_push: 2023-09-27T17:30:49Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: Open source PaaS for Kubernetes that adds a developer-friendly layer to any Kubernetes cluster, making it easy to deploy and manage applications. Fork of [Deis Workflow](https://github.com/deis/workflow).
- url: https://github.com/krane/krane
name: krane/krane
status: stale
stars: 80
forks: 8
last_push: 2023-05-11T20:39:00Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: Toolset for managing container workloads on remote servers.
- url: https://github.com/nanobox-io/nanobox
name: nanobox-io/nanobox
status: stale
stars: 1625
forks: 90
last_push: 2019-10-21T20:03:10Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: An application development platform that creates local environments that can then be deployed and scaled in the cloud.
- url: https://github.com/tsuru/tsuru
name: tsuru/tsuru
status: healthy
stars: 5259
forks: 550
last_push: 2026-03-05T03:11:24Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > PaaS
description: Tsuru is an extensible and open source Platform as a Service software.
- url: https://github.com/bunkerity/bunkerweb
name: bunkerity/bunkerweb
status: healthy
stars: 10112
forks: 568
last_push: 2026-03-06T17:15:47Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: Open-source and next-gen Web Application Firewall (WAF). By [Bunkerity](https://www.bunkerity.com).
- url: https://github.com/lucaslorentz/caddy-docker-proxy
name: lucaslorentz/caddy-docker-proxy
status: healthy
stars: 4315
forks: 211
last_push: 2026-03-08T07:04:18Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: Caddy-based reverse proxy, configured with service or container labels. By [lucaslorentz](https://github.com/lucaslorentz).
- url: https://github.com/invzhi/caddy-docker-upstreams
name: invzhi/caddy-docker-upstreams
status: healthy
stars: 36
forks: 8
last_push: 2025-09-08T05:17:01Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: Docker upstreams module for Caddy, configured with container labels. By [invzhi](https://github.com/invzhi).
- url: https://github.com/moonbuggy/docker-dnsmasq-updater
name: moonbuggy/docker-dnsmasq-updater
status: inactive
stars: 35
forks: 2
last_push: 2025-02-09T00:21:52Z
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: Update a remote dnsmasq server with Docker container hostnames.
- url: https://github.com/docker-flow/docker-flow-proxy
name: docker-flow/docker-flow-proxy
status: healthy
stars: 320
forks: 189
last_push: 2025-12-05T02:29:16Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: Reconfigures proxy every time a new service is deployed, or when a service is scaled. By [docker-flow][docker-flow].
- url: https://github.com/fabiolb/fabio
name: fabiolb/fabio
status: healthy
stars: 7333
forks: 624
last_push: 2026-02-23T02:48:11Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: A fast, modern, zero-conf load balancing HTTP(S) router for deploying microservices managed by consul. By [magiconair](https://github.com/magiconair) (Frank Schroeder).
- url: https://github.com/nginx-proxy/docker-letsencrypt-nginx-proxy-companion
name: nginx-proxy/docker-letsencrypt-nginx-proxy-companion
status: healthy
stars: 7698
forks: 834
last_push: 2026-03-02T17:04:31Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: A lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically. By [JrCs](https://github.com/JrCs).
- url: https://github.com/Yundera/mesh-router
name: Yundera/mesh-router
status: healthy
stars: 8
last_push: 2026-03-02T15:37:53Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: Free domain(nsl.sh) provider for Docker containers with automatic HTTPS routing. Uses Wireguard VPN to securely route subdomain requests across networks. Ideal for self-hosted NAS and cloud deployments. By [Yundera](https://github.com/Yundera).
- url: https://github.com/jc21/nginx-proxy-manager
name: jc21/nginx-proxy-manager
status: healthy
stars: 32001
forks: 3639
last_push: 2026-03-06T14:15:08Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: A beautiful web interface for proxying web based services with SSL. By [jc21](https://github.com/jc21).
- url: https://github.com/Safe3/openresty-manager
name: Safe3/openresty-manager
status: healthy
stars: 1322
forks: 98
last_push: 2026-01-25T10:38:42Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: The easiest using, powerful and beautiful OpenResty Manager(Nginx Enhanced Version), open source alternative to OpenResty Edge. By [Safe3](https://github.com/Safe3/).
- url: https://github.com/flavioaiello/swarm-router
name: flavioaiello/swarm-router
status: healthy
stars: 73
forks: 12
last_push: 2025-09-15T06:12:30Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: A «zero config» service name based router for docker swarm mode with a fresh and more secure approach. By [flavioaiello](https://github.com/flavioaiello).
- url: https://github.com/containous/traefik
name: containous/traefik
status: healthy
stars: 62086
forks: 5865
last_push: 2026-03-06T16:16:05Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Reverse Proxy
description: Automated reverse proxy and load-balancer for Docker, Mesos, Consul, Etcd... By [EmileVauge](https://github.com/emilevauge).
- url: https://github.com/cri-o/cri-o
name: cri-o/cri-o
status: healthy
stars: 5588
forks: 1151
last_push: 2026-03-08T00:16:02Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Runtime
description: Open Container Initiative-based implementation of Kubernetes Container Runtime Interface by [cri-o](https://github.com/cri-o).
- url: https://github.com/lxc/lxc
name: lxc/lxc
status: healthy
stars: 5126
forks: 1162
last_push: 2026-03-02T14:26:30Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Runtime
description: LXC - Linux Containers.
- url: https://github.com/containers/libpod
name: containers/libpod
status: healthy
stars: 30937
forks: 3006
last_push: 2026-03-06T15:57:05Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Runtime
description: Libpod is a library used to create container pods. Home of Podman.
- url: https://github.com/brauner/rlxc
name: brauner/rlxc
status: stale
stars: 18
forks: 3
last_push: 2021-06-30T13:12:28Z
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Runtime
description: LXC binary written in Rust.
- url: https://github.com/opencontainers/runtime-tools
name: opencontainers/runtime-tools
status: healthy
stars: 473
forks: 159
last_push: 2025-12-05T00:49:12Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Runtime
description: Oci-runtime-tool is a collection of tools for working with the OCI runtime specification.
- url: https://github.com/SongStitch/anchor
name: SongStitch/anchor
status: inactive
stars: 24
last_push: 2025-01-15T23:09:06Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
- url: https://github.com/genuinetools/bane
name: genuinetools/bane
status: stale
stars: 1224
forks: 91
last_push: 2020-09-17T20:10:45Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: AppArmor profile generator for Docker containers.
- url: https://github.com/dash14/buildcage
name: dash14/buildcage
status: healthy
stars: 4
last_push: 2026-03-08T16:59:17Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Restricts outbound network access during Docker builds to prevent supply chain attacks, working as a drop-in BuildKit remote driver for Docker Buildx, with ready-to-use GitHub Actions.
- url: https://github.com/hectorm/cetusguard
name: hectorm/cetusguard
status: healthy
stars: 82
forks: 2
last_push: 2026-03-01T11:42:56Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: CetusGuard is a tool that protects the Docker daemon socket by filtering calls to its API endpoints.
- url: https://github.com/bridgecrewio/checkov
name: bridgecrewio/checkov
status: healthy
stars: 8510
forks: 1307
last_push: 2026-03-08T07:40:01Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Static analysis for infrastructure as code manifests (Terraform, Kubernetes, Cloudformation, Helm, Dockerfile, Kustomize) find security misconfiguration and fix them. By [bridgecrew](https://github.com/bridgecrewio).
- url: https://github.com/dev-sec/cis-docker-benchmark
name: dev-sec/cis-docker-benchmark
status: stale
stars: 524
forks: 118
last_push: 2023-05-02T12:59:10Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: This [InSpec][inspec] compliance profile implement the CIS Docker 1.12.0 Benchmark in an automated way to provide security best-practice tests around Docker daemon and containers in a production environment. By [dev-sec](https://github.com/dev-sec).
- url: https://github.com/quay/clair
name: quay/clair
status: healthy
stars: 10940
forks: 1195
last_push: 2026-03-06T23:17:06Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Clair is an open source project for the static analysis of vulnerabilities in appc and docker containers. By [coreos][coreos].
- url: https://github.com/wolffcatskyy/crowdsec-blocklist-import
name: wolffcatskyy/crowdsec-blocklist-import
status: healthy
stars: 179
forks: 4
last_push: 2026-03-07T18:44:39Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Aggregates 36 free threat intelligence feeds into 120k+ malicious IPs for CrowdSec bouncers, providing 10-20x more blocks than default lists. By [wolffcatskyy](https://github.com/wolffcatskyy).
- url: https://github.com/eliasgranderubio/dagda
name: eliasgranderubio/dagda
status: stale
stars: 1220
forks: 169
last_push: 2023-05-23T02:03:43Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Dagda is a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities. By [eliasgranderubio](https://github.com/eliasgranderubio).
- url: https://github.com/deepfence/ThreatMapper
name: deepfence/ThreatMapper
status: healthy
stars: 5235
forks: 640
last_push: 2026-03-08T03:35:58Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Powerful runtime vulnerability scanner for kubernetes, virtual machines and serverless. By [deepfence][deepfence].
- url: https://github.com/docker/docker-bench-security
name: docker/docker-bench-security
status: inactive
stars: 9600
forks: 1038
last_push: 2024-10-21T07:26:06Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Script that checks for dozens of common best-practices around deploying Docker containers in production. By [docker][docker].
- url: https://github.com/google/docker-explorer
name: google/docker-explorer
status: inactive
stars: 553
forks: 45
last_push: 2024-10-04T07:44:31Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: A tool to help forensicate offline docker acquisitions.
- url: https://github.com/Peco602/dvwassl
name: Peco602/dvwassl
status: stale
stars: 6
forks: 4
last_push: 2023-04-30T17:03:01Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: SSL-enabled Damn Vulnerable Web App to test Web Application Firewalls. By [Peco602][peco602].
- url: https://github.com/checkmarx/kics
name: checkmarx/kics
status: healthy
stars: 2581
forks: 361
last_push: 2026-03-06T15:34:55Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: An infrastructure-as-code scanning tool, find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle. Can be extended for additional policies. By [Checkmarx](https://github.com/Checkmarx).
- url: https://github.com/theupdateframework/notary
name: theupdateframework/notary
status: archived
stars: 3287
forks: 520
last_push: 2024-08-07T19:02:32Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: A server and a client for running and interacting with trusted collections. By [TUF](https://github.com/theupdateframework).
- url: https://github.com/OpenSCAP/openscap
name: OpenSCAP/openscap
status: healthy
stars: 1676
forks: 424
last_push: 2026-02-27T12:44:50Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: OpenSCAP provides oscap-docker tool which is used to scan Docker containers and images. By [OpenSCAP](https://github.com/OpenSCAP).
- url: https://github.com/dormstern/segspec
name: dormstern/segspec
status: healthy
stars: 15
last_push: 2026-02-23T11:39:00Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Extracts network dependencies from Docker Compose, Kubernetes manifests, Helm charts, and other config files to generate Kubernetes NetworkPolicies with evidence tracing. By [dormstern](https://github.com/dormstern).
- url: https://github.com/anchore/syft
name: anchore/syft
status: healthy
stars: 8454
forks: 779
last_push: 2026-03-08T08:12:44Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: CLI tool and library for generating a Software Bill of Materials (SBOM) from container images and filesystems.
- url: https://github.com/falcosecurity/falco
name: falcosecurity/falco
status: healthy
stars: 8712
forks: 990
last_push: 2026-03-02T17:54:20Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Sysdig Falco is an open source container security monitor. It can monitor application, container, host, and network activity and alert on unauthorized activity.
- url: https://github.com/aquasecurity/trivy
name: aquasecurity/trivy
status: healthy
stars: 33020
forks: 76
last_push: 2026-03-06T06:42:06Z
has_license: true
checked_at: 2026-03-08T18:26:00.233336Z
category: Projects > Container Operations > Security
description: Aqua Security's open source simple and comprehensive vulnerability scanner for containers (suitable for CI).
-
gitextract_uu2bikk7/
├── .claude/
│ └── settings.local.json
├── .gitattributes
├── .github/
│ ├── CODEOWNERS
│ ├── CODE_OF_CONDUCT.md
│ ├── CONTRIBUTING.md
│ ├── ISSUE_TEMPLATE/
│ │ └── add-a-project.md
│ ├── MAINTENANCE.md
│ ├── PULL_REQUEST_TEMPLATE.md
│ ├── dependabot.yml
│ └── workflows/
│ ├── broken_links.yml
│ ├── deploy-pages.yml
│ ├── health_report.yml
│ └── pull_request.yml
├── .gitignore
├── AGENTS.md
├── LICENSE
├── Makefile
├── README.md
├── cmd/
│ └── awesome-docker/
│ └── main.go
├── config/
│ ├── exclude.yaml
│ ├── health_cache.yaml
│ └── website.tmpl.html
├── go.mod
├── go.sum
├── index.html
└── internal/
├── builder/
│ ├── builder.go
│ └── builder_test.go
├── cache/
│ ├── cache.go
│ └── cache_test.go
├── checker/
│ ├── github.go
│ ├── github_test.go
│ ├── http.go
│ └── http_test.go
├── linter/
│ ├── fixer.go
│ ├── fixer_test.go
│ ├── linter.go
│ ├── linter_test.go
│ └── rules.go
├── parser/
│ ├── parser.go
│ ├── parser_test.go
│ └── types.go
├── scorer/
│ ├── scorer.go
│ └── scorer_test.go
└── tui/
├── model.go
├── styles.go
├── tree.go
├── tree_test.go
└── tui.go
SYMBOL INDEX (200 symbols across 24 files)
FILE: cmd/awesome-docker/main.go
constant readmePath (line 21) | readmePath = "README.md"
constant excludePath (line 22) | excludePath = "config/exclude.yaml"
constant templatePath (line 23) | templatePath = "config/website.tmpl.html"
constant healthCachePath (line 24) | healthCachePath = "config/health_cache.yaml"
constant websiteOutput (line 25) | websiteOutput = "website/index.html"
constant version (line 26) | version = "0.1.0"
type checkSummary (line 29) | type checkSummary struct
function main (line 38) | func main() {
function versionCmd (line 61) | func versionCmd() *cobra.Command {
function parseReadme (line 69) | func parseReadme() (parser.Document, error) {
function collectURLs (line 78) | func collectURLs(sections []parser.Section, urls *[]string) {
type entryMeta (line 87) | type entryMeta struct
function collectEntriesWithCategory (line 92) | func collectEntriesWithCategory(sections []parser.Section, parentPath st...
function runLinkChecks (line 105) | func runLinkChecks(prMode bool) (checkSummary, error) {
function runHealth (line 153) | func runHealth(ctx context.Context) error {
function scoredFromCache (line 207) | func scoredFromCache() ([]scorer.ScoredEntry, error) {
function markdownReportFromCache (line 233) | func markdownReportFromCache() (string, error) {
function writeGitHubOutput (line 241) | func writeGitHubOutput(path, key, value string) error {
function sanitizeOutputValue (line 256) | func sanitizeOutputValue(v string) string {
function buildBrokenLinksIssueBody (line 262) | func buildBrokenLinksIssueBody(summary checkSummary, runErr error) string {
function buildHealthReportIssueBody (line 302) | func buildHealthReportIssueBody(report string, healthErr error) string {
function lintCmd (line 317) | func lintCmd() *cobra.Command {
function checkCmd (line 354) | func checkCmd() *cobra.Command {
function healthCmd (line 409) | func healthCmd() *cobra.Command {
function buildCmd (line 419) | func buildCmd() *cobra.Command {
function reportCmd (line 433) | func reportCmd() *cobra.Command {
function validateCmd (line 463) | func validateCmd() *cobra.Command {
function ciCmd (line 504) | func ciCmd() *cobra.Command {
function ciBrokenLinksCmd (line 516) | func ciBrokenLinksCmd() *cobra.Command {
function ciHealthReportCmd (line 588) | func ciHealthReportCmd() *cobra.Command {
function browseCmd (line 665) | func browseCmd() *cobra.Command {
FILE: internal/builder/builder.go
function Build (line 17) | func Build(markdownPath, templatePath, outputPath string) error {
FILE: internal/builder/builder_test.go
function TestBuild (line 10) | func TestBuild(t *testing.T) {
function TestBuildWithSectionPlaceholder (line 49) | func TestBuildWithSectionPlaceholder(t *testing.T) {
function TestBuildRealREADME (line 88) | func TestBuildRealREADME(t *testing.T) {
function TestBuildFailsWithoutPlaceholder (line 115) | func TestBuildFailsWithoutPlaceholder(t *testing.T) {
function TestBuildAddsHeadingIDs (line 135) | func TestBuildAddsHeadingIDs(t *testing.T) {
FILE: internal/cache/cache.go
type ExcludeList (line 12) | type ExcludeList struct
method IsExcluded (line 17) | func (e *ExcludeList) IsExcluded(url string) bool {
function LoadExcludeList (line 27) | func LoadExcludeList(path string) (*ExcludeList, error) {
type HealthEntry (line 40) | type HealthEntry struct
type HealthCache (line 55) | type HealthCache struct
method Merge (line 85) | func (hc *HealthCache) Merge(entries []HealthEntry) {
function LoadHealthCache (line 60) | func LoadHealthCache(path string) (*HealthCache, error) {
function SaveHealthCache (line 76) | func SaveHealthCache(path string, hc *HealthCache) error {
FILE: internal/cache/cache_test.go
function TestLoadExcludeList (line 10) | func TestLoadExcludeList(t *testing.T) {
function TestHealthCacheRoundTrip (line 36) | func TestHealthCacheRoundTrip(t *testing.T) {
function TestLoadHealthCacheMissing (line 71) | func TestLoadHealthCacheMissing(t *testing.T) {
function TestLoadHealthCacheInvalidYAML (line 81) | func TestLoadHealthCacheInvalidYAML(t *testing.T) {
function TestMerge (line 97) | func TestMerge(t *testing.T) {
function TestMergeDeduplicatesIncomingBatch (line 123) | func TestMergeDeduplicatesIncomingBatch(t *testing.T) {
FILE: internal/checker/github.go
type RepoInfo (line 15) | type RepoInfo struct
function ExtractGitHubRepo (line 30) | func ExtractGitHubRepo(rawURL string) (owner, name string, ok bool) {
function isHTTPURL (line 61) | func isHTTPURL(raw string) bool {
function isGitHubAuthError (line 69) | func isGitHubAuthError(err error) bool {
function PartitionLinks (line 80) | func PartitionLinks(urls []string) (github, external []string) {
type GitHubChecker (line 92) | type GitHubChecker struct
method CheckRepo (line 104) | func (gc *GitHubChecker) CheckRepo(ctx context.Context, owner, name st...
method CheckRepos (line 144) | func (gc *GitHubChecker) CheckRepos(ctx context.Context, urls []string...
function NewGitHubChecker (line 97) | func NewGitHubChecker(token string) *GitHubChecker {
FILE: internal/checker/github_test.go
function TestExtractGitHubRepo (line 8) | func TestExtractGitHubRepo(t *testing.T) {
function TestPartitionLinks (line 43) | func TestPartitionLinks(t *testing.T) {
function TestIsGitHubAuthError (line 61) | func TestIsGitHubAuthError(t *testing.T) {
FILE: internal/checker/http.go
constant defaultTimeout (line 13) | defaultTimeout = 30 * time.Second
constant defaultConcurrency (line 14) | defaultConcurrency = 10
constant userAgent (line 15) | userAgent = "awesome-docker-checker/1.0"
type LinkResult (line 19) | type LinkResult struct
function shouldFallbackToGET (line 28) | func shouldFallbackToGET(statusCode int) bool {
function CheckLink (line 38) | func CheckLink(url string, client *http.Client) LinkResult {
function CheckLinks (line 94) | func CheckLinks(urls []string, concurrency int, exclude *cache.ExcludeLi...
FILE: internal/checker/http_test.go
function TestCheckLinkOK (line 9) | func TestCheckLinkOK(t *testing.T) {
function TestCheckLink404 (line 21) | func TestCheckLink404(t *testing.T) {
function TestCheckLinkRedirect (line 36) | func TestCheckLinkRedirect(t *testing.T) {
function TestCheckLinks (line 56) | func TestCheckLinks(t *testing.T) {
function TestCheckLinkFallbackToGETOnMethodNotAllowed (line 82) | func TestCheckLinkFallbackToGETOnMethodNotAllowed(t *testing.T) {
function TestCheckLinkFallbackToGETOnForbiddenHead (line 101) | func TestCheckLinkFallbackToGETOnForbiddenHead(t *testing.T) {
FILE: internal/linter/fixer.go
function RemoveAttribution (line 27) | func RemoveAttribution(desc string) string {
function FormatEntry (line 34) | func FormatEntry(e parser.Entry) string {
function FixFile (line 57) | func FixFile(path string) (int, error) {
FILE: internal/linter/fixer_test.go
function TestRemoveAttribution (line 11) | func TestRemoveAttribution(t *testing.T) {
function TestFormatEntry (line 54) | func TestFormatEntry(t *testing.T) {
function TestFormatEntryWithMarkers (line 67) | func TestFormatEntryWithMarkers(t *testing.T) {
function TestFixFile (line 81) | func TestFixFile(t *testing.T) {
function TestFixFileSortsAcrossBlankLinesAndIsIdempotent (line 142) | func TestFixFileSortsAcrossBlankLinesAndIsIdempotent(t *testing.T) {
FILE: internal/linter/linter.go
type Result (line 8) | type Result struct
function Lint (line 15) | func Lint(doc parser.Document) Result {
function lintSections (line 30) | func lintSections(sections []parser.Section, result *Result) {
function collectEntries (line 44) | func collectEntries(sections []parser.Section) []parser.Entry {
function addIssue (line 53) | func addIssue(result *Result, issue Issue) {
FILE: internal/linter/linter_test.go
function TestRuleDescriptionCapital (line 9) | func TestRuleDescriptionCapital(t *testing.T) {
function TestRuleDescriptionPeriod (line 23) | func TestRuleDescriptionPeriod(t *testing.T) {
function TestRuleSorted (line 37) | func TestRuleSorted(t *testing.T) {
function TestRuleSortedOK (line 48) | func TestRuleSortedOK(t *testing.T) {
function TestRuleDuplicateURL (line 59) | func TestRuleDuplicateURL(t *testing.T) {
function TestValidEntry (line 70) | func TestValidEntry(t *testing.T) {
function TestFixDescriptionCapital (line 78) | func TestFixDescriptionCapital(t *testing.T) {
function TestFixDescriptionPeriod (line 86) | func TestFixDescriptionPeriod(t *testing.T) {
function TestLintDocument (line 94) | func TestLintDocument(t *testing.T) {
FILE: internal/linter/rules.go
type Rule (line 13) | type Rule
constant RuleDescriptionCapital (line 16) | RuleDescriptionCapital Rule = "description-capital"
constant RuleDescriptionPeriod (line 17) | RuleDescriptionPeriod Rule = "description-period"
constant RuleSorted (line 18) | RuleSorted Rule = "sorted"
constant RuleDuplicateURL (line 19) | RuleDuplicateURL Rule = "duplicate-url"
type Severity (line 23) | type Severity
constant SeverityError (line 26) | SeverityError Severity = iota
constant SeverityWarning (line 27) | SeverityWarning
type Issue (line 31) | type Issue struct
method String (line 38) | func (i Issue) String() string {
function CheckEntry (line 47) | func CheckEntry(e parser.Entry) []Issue {
function CheckSorted (line 72) | func CheckSorted(entries []parser.Entry) []Issue {
function CheckDuplicates (line 90) | func CheckDuplicates(entries []parser.Entry) []Issue {
function firstLetter (line 110) | func firstLetter(s string) (rune, bool) {
function FixEntry (line 120) | func FixEntry(e parser.Entry) parser.Entry {
function SortEntries (line 142) | func SortEntries(entries []parser.Entry) []parser.Entry {
FILE: internal/parser/parser.go
function ParseEntry (line 32) | func ParseEntry(line string, lineNum int) (Entry, error) {
function Parse (line 63) | func Parse(r io.Reader) (Document, error) {
function buildTree (line 114) | func buildTree(flat []struct {
FILE: internal/parser/parser_test.go
function TestParseEntry (line 9) | func TestParseEntry(t *testing.T) {
function TestParseEntryWithMarkers (line 29) | func TestParseEntryWithMarkers(t *testing.T) {
function TestParseEntryMultipleMarkers (line 46) | func TestParseEntryMultipleMarkers(t *testing.T) {
function TestParseEntryMarkersCanonicalOrder (line 57) | func TestParseEntryMarkersCanonicalOrder(t *testing.T) {
function TestParseDocument (line 71) | func TestParseDocument(t *testing.T) {
function TestParseNotAnEntry (line 124) | func TestParseNotAnEntry(t *testing.T) {
function TestParseRealREADME (line 131) | func TestParseRealREADME(t *testing.T) {
function countEntries (line 154) | func countEntries(sections []Section) int {
FILE: internal/parser/types.go
type Marker (line 4) | type Marker
constant MarkerAbandoned (line 7) | MarkerAbandoned Marker = iota
constant MarkerPaid (line 8) | MarkerPaid
constant MarkerWIP (line 9) | MarkerWIP
constant MarkerStale (line 10) | MarkerStale
type Entry (line 14) | type Entry struct
type Section (line 24) | type Section struct
type Document (line 33) | type Document struct
FILE: internal/scorer/scorer.go
type Status (line 14) | type Status
constant StatusHealthy (line 17) | StatusHealthy Status = "healthy"
constant StatusInactive (line 18) | StatusInactive Status = "inactive"
constant StatusStale (line 19) | StatusStale Status = "stale"
constant StatusArchived (line 20) | StatusArchived Status = "archived"
constant StatusDead (line 21) | StatusDead Status = "dead"
type ScoredEntry (line 25) | type ScoredEntry struct
type ReportSummary (line 38) | type ReportSummary struct
type ReportData (line 47) | type ReportData struct
function Score (line 56) | func Score(info checker.RepoInfo) Status {
function ScoreAll (line 77) | func ScoreAll(infos []checker.RepoInfo) []ScoredEntry {
function ToCacheEntries (line 94) | func ToCacheEntries(scored []ScoredEntry) []cache.HealthEntry {
function GenerateReport (line 115) | func GenerateReport(scored []ScoredEntry) string {
function BuildReportData (line 153) | func BuildReportData(scored []ScoredEntry) ReportData {
function GenerateJSONReport (line 175) | func GenerateJSONReport(scored []ScoredEntry) ([]byte, error) {
FILE: internal/scorer/scorer_test.go
function TestScoreHealthy (line 13) | func TestScoreHealthy(t *testing.T) {
function TestScoreInactive (line 26) | func TestScoreInactive(t *testing.T) {
function TestScoreStale (line 37) | func TestScoreStale(t *testing.T) {
function TestScoreArchived (line 48) | func TestScoreArchived(t *testing.T) {
function TestScoreDisabled (line 59) | func TestScoreDisabled(t *testing.T) {
function TestGenerateReport (line 69) | func TestGenerateReport(t *testing.T) {
function TestGenerateReportShowsAllEntries (line 87) | func TestGenerateReportShowsAllEntries(t *testing.T) {
function TestGenerateJSONReport (line 108) | func TestGenerateJSONReport(t *testing.T) {
function TestScoreAll (line 149) | func TestScoreAll(t *testing.T) {
FILE: internal/tui/model.go
type panel (line 15) | type panel
constant panelTree (line 18) | panelTree panel = iota
constant panelList (line 19) | panelList
constant entryHeight (line 22) | entryHeight = 5
constant scrollOff (line 23) | scrollOff = 4
type Model (line 26) | type Model struct
method Init (line 61) | func (m Model) Init() tea.Cmd {
method Update (line 66) | func (m Model) Update(msg tea.Msg) (tea.Model, tea.Cmd) {
method handleFilterKey (line 104) | func (m Model) handleFilterKey(msg tea.KeyPressMsg) (tea.Model, tea.Cm...
method applyFilter (line 128) | func (m *Model) applyFilter() {
method handleTreeKey (line 151) | func (m Model) handleTreeKey(msg tea.KeyPressMsg) (tea.Model, tea.Cmd) {
method adjustTreeScroll (line 234) | func (m *Model) adjustTreeScroll() {
method treePanelHeight (line 251) | func (m Model) treePanelHeight() int {
method handleListKey (line 259) | func (m Model) handleListKey(msg tea.KeyPressMsg) (tea.Model, tea.Cmd) {
method updateCurrentEntries (line 307) | func (m *Model) updateCurrentEntries() {
method visibleListEntries (line 321) | func (m Model) visibleListEntries() int {
method adjustListScroll (line 329) | func (m *Model) adjustListScroll() {
method listPanelHeight (line 346) | func (m Model) listPanelHeight() int {
method View (line 356) | func (m Model) View() tea.View {
method renderTree (line 401) | func (m Model) renderTree(width, height int) string {
method renderList (line 451) | func (m Model) renderList(width, height int) string {
method renderFooter (line 563) | func (m Model) renderFooter() string {
function New (line 44) | func New(entries []cache.HealthEntry) Model {
type openURLMsg (line 572) | type openURLMsg struct
function openURL (line 574) | func openURL(url string) tea.Cmd {
function truncateToWidth (line 590) | func truncateToWidth(s string, maxWidth int) string {
FILE: internal/tui/styles.go
function statusStyle (line 44) | func statusStyle(status string) lipgloss.Style {
FILE: internal/tui/tree.go
type TreeNode (line 11) | type TreeNode struct
method HasChildren (line 26) | func (n *TreeNode) HasChildren() bool {
method TotalEntries (line 31) | func (n *TreeNode) TotalEntries() int {
method AllEntries (line 40) | func (n *TreeNode) AllEntries() []cache.HealthEntry {
type FlatNode (line 20) | type FlatNode struct
function BuildTree (line 50) | func BuildTree(entries []cache.HealthEntry) []*TreeNode {
function ensureNode (line 69) | func ensureNode(root *TreeNode, nodeMap map[string]*TreeNode, path strin...
function sortTree (line 93) | func sortTree(node *TreeNode) {
function FlattenVisible (line 103) | func FlattenVisible(roots []*TreeNode) []FlatNode {
function flattenNode (line 111) | func flattenNode(node *TreeNode, depth int, result *[]FlatNode) {
FILE: internal/tui/tree_test.go
function TestBuildTree (line 9) | func TestBuildTree(t *testing.T) {
function TestBuildTreeEmpty (line 49) | func TestBuildTreeEmpty(t *testing.T) {
function TestTotalEntries (line 56) | func TestTotalEntries(t *testing.T) {
function TestFlattenVisible (line 72) | func TestFlattenVisible(t *testing.T) {
function TestAllEntries (line 99) | func TestAllEntries(t *testing.T) {
FILE: internal/tui/tui.go
function Run (line 9) | func Run(entries []cache.HealthEntry) error {
Condensed preview — 48 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (409K chars).
[
{
"path": ".claude/settings.local.json",
"chars": 366,
"preview": "{\n \"permissions\": {\n \"allow\": [\n \"mcp__plugin_context-mode_context-mode__ctx_batch_execute\",\n \"mcp__plugin"
},
{
"path": ".gitattributes",
"chars": 55,
"preview": "*.css linguist-vendored\n*.* linguist-language=Markdown\n"
},
{
"path": ".github/CODEOWNERS",
"chars": 89,
"preview": "* @veggiemonk @agebhar1 @dmitrytokarev @gesellix @mashb1t @moshloop @vegasbrianc @noteed\n"
},
{
"path": ".github/CODE_OF_CONDUCT.md",
"chars": 3229,
"preview": "# Contributor Covenant Code of Conduct\n\n## Our Pledge\n\nIn the interest of fostering an open and welcoming environment, w"
},
{
"path": ".github/CONTRIBUTING.md",
"chars": 1731,
"preview": "# Contributing to awesome-docker\n\nThanks for taking the time to contribute.\n\nThis repository is a curated list of Docker"
},
{
"path": ".github/ISSUE_TEMPLATE/add-a-project.md",
"chars": 373,
"preview": "---\nname: Add a project\nabout: Add a new project to the list\ntitle: \"add: [PROJECT_NAME] in [SECTION_NAME]\"\nlabels: pend"
},
{
"path": ".github/MAINTENANCE.md",
"chars": 1948,
"preview": "# Maintenance Guide\n\nThis guide describes how maintainers keep the list and automation healthy.\n\n## Automated Workflows\n"
},
{
"path": ".github/PULL_REQUEST_TEMPLATE.md",
"chars": 686,
"preview": "# Summary\n\nDescribe what changed and why.\n\n## Scope\n\n- [ ] README entries/content\n- [ ] Go CLI/tooling\n- [ ] GitHub work"
},
{
"path": ".github/dependabot.yml",
"chars": 296,
"preview": "version: 2\nupdates:\n # Enable version updates for Go modules\n - package-ecosystem: \"gomod\"\n directory: \"/\"\n sche"
},
{
"path": ".github/workflows/broken_links.yml",
"chars": 2936,
"preview": "name: Broken Links Report\n\non:\n schedule:\n - cron: \"0 2 * * 6\"\n workflow_dispatch:\n\nconcurrency:\n group: broken-li"
},
{
"path": ".github/workflows/deploy-pages.yml",
"chars": 1215,
"preview": "name: Deploy to GitHub Pages\n\non:\n push:\n branches:\n - master\n workflow_dispatch:\n\npermissions:\n contents: re"
},
{
"path": ".github/workflows/health_report.yml",
"chars": 2173,
"preview": "name: Weekly Health Report\n\non:\n schedule:\n - cron: \"0 9 * * 1\"\n workflow_dispatch:\n\nconcurrency:\n group: health-r"
},
{
"path": ".github/workflows/pull_request.yml",
"chars": 699,
"preview": "name: Pull Requests / Weekly QA\n\non:\n pull_request:\n branches:\n - master\n schedule:\n - cron: \"0 0 * * 6\"\n\nj"
},
{
"path": ".gitignore",
"chars": 148,
"preview": "logs\n*.log\nnpm-debug.log*\nbuild\nnode_modules\n.cache\ndist\nwebsite/index.html\nwebsite/table.html\n\n.idea\n**/.DS_Store\n.work"
},
{
"path": "AGENTS.md",
"chars": 4196,
"preview": "# Agent Guidelines for awesome-docker\n\n## Commands\n- Build CLI: `make build` (or `go build -o awesome-docker ./cmd/aweso"
},
{
"path": "LICENSE",
"chars": 11356,
"preview": " Apache License\n Version 2.0, January 2004\n "
},
{
"path": "Makefile",
"chars": 4635,
"preview": "SHELL := /bin/bash\n\nBINARY ?= awesome-docker\nGO ?= go\nCMD_PACKAGE := ./cmd/awesome-docker\nINTERNAL_PACKAGES := ./interna"
},
{
"path": "README.md",
"chars": 92969,
"preview": "# Awesome Docker [\n\nfunc TestBuild(t *testing.T) {\n\tdir := t.TempD"
},
{
"path": "internal/cache/cache.go",
"chars": 2474,
"preview": "package cache\n\nimport (\n\t\"os\"\n\t\"strings\"\n\t\"time\"\n\n\t\"gopkg.in/yaml.v3\"\n)\n\n// ExcludeList holds URL prefixes to skip durin"
},
{
"path": "internal/cache/cache_test.go",
"chars": 3251,
"preview": "package cache\n\nimport (\n\t\"os\"\n\t\"path/filepath\"\n\t\"testing\"\n\t\"time\"\n)\n\nfunc TestLoadExcludeList(t *testing.T) {\n\tdir := t."
},
{
"path": "internal/checker/github.go",
"chars": 4045,
"preview": "package checker\n\nimport (\n\t\"context\"\n\t\"fmt\"\n\t\"net/url\"\n\t\"strings\"\n\t\"time\"\n\n\t\"github.com/shurcooL/githubv4\"\n\t\"golang.org/"
},
{
"path": "internal/checker/github_test.go",
"chars": 2218,
"preview": "package checker\n\nimport (\n\t\"errors\"\n\t\"testing\"\n)\n\nfunc TestExtractGitHubRepo(t *testing.T) {\n\ttests := []struct {\n\t\turl "
},
{
"path": "internal/checker/http.go",
"chars": 2779,
"preview": "package checker\n\nimport (\n\t\"context\"\n\t\"net/http\"\n\t\"sync\"\n\t\"time\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/cache\""
},
{
"path": "internal/checker/http_test.go",
"chars": 3251,
"preview": "package checker\n\nimport (\n\t\"net/http\"\n\t\"net/http/httptest\"\n\t\"testing\"\n)\n\nfunc TestCheckLinkOK(t *testing.T) {\n\tserver :="
},
{
"path": "internal/linter/fixer.go",
"chars": 3645,
"preview": "package linter\n\nimport (\n\t\"bufio\"\n\t\"fmt\"\n\t\"os\"\n\t\"regexp\"\n\t\"strings\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/par"
},
{
"path": "internal/linter/fixer_test.go",
"chars": 4275,
"preview": "package linter\n\nimport (\n\t\"os\"\n\t\"strings\"\n\t\"testing\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/parser\"\n)\n\nfunc Te"
},
{
"path": "internal/linter/linter.go",
"chars": 1287,
"preview": "package linter\n\nimport (\n\t\"github.com/veggiemonk/awesome-docker/internal/parser\"\n)\n\n// Result holds all lint issues foun"
},
{
"path": "internal/linter/linter_test.go",
"chars": 3101,
"preview": "package linter\n\nimport (\n\t\"testing\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/parser\"\n)\n\nfunc TestRuleDescription"
},
{
"path": "internal/linter/rules.go",
"chars": 3771,
"preview": "package linter\n\nimport (\n\t\"fmt\"\n\t\"sort\"\n\t\"strings\"\n\t\"unicode\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/parser\"\n)"
},
{
"path": "internal/parser/parser.go",
"chars": 3368,
"preview": "package parser\n\nimport (\n\t\"bufio\"\n\t\"fmt\"\n\t\"io\"\n\t\"regexp\"\n\t\"strings\"\n)\n\n// entryRe matches: - [Name](URL) - Description\n/"
},
{
"path": "internal/parser/parser_test.go",
"chars": 4260,
"preview": "package parser\n\nimport (\n\t\"os\"\n\t\"strings\"\n\t\"testing\"\n)\n\nfunc TestParseEntry(t *testing.T) {\n\tline := `- [Docker Desktop]"
},
{
"path": "internal/parser/types.go",
"chars": 887,
"preview": "package parser\n\n// Marker represents a status emoji on an entry.\ntype Marker int\n\nconst (\n\tMarkerAbandoned Marker = iota"
},
{
"path": "internal/scorer/scorer.go",
"chars": 4917,
"preview": "package scorer\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"strings\"\n\t\"time\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/cac"
},
{
"path": "internal/scorer/scorer_test.go",
"chars": 4219,
"preview": "package scorer\n\nimport (\n\t\"encoding/json\"\n\t\"fmt\"\n\t\"strings\"\n\t\"testing\"\n\t\"time\"\n\n\t\"github.com/veggiemonk/awesome-docker/i"
},
{
"path": "internal/tui/model.go",
"chars": 13189,
"preview": "package tui\n\nimport (\n\t\"fmt\"\n\t\"os/exec\"\n\t\"runtime\"\n\t\"strings\"\n\t\"unicode/utf8\"\n\n\ttea \"charm.land/bubbletea/v2\"\n\t\"charm.la"
},
{
"path": "internal/tui/styles.go",
"chars": 2024,
"preview": "package tui\n\nimport \"charm.land/lipgloss/v2\"\n\nvar (\n\t// Panel borders\n\tactiveBorderStyle = lipgloss.NewStyle().\n\t\t\t\tBord"
},
{
"path": "internal/tui/tree.go",
"chars": 2816,
"preview": "package tui\n\nimport (\n\t\"sort\"\n\t\"strings\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/cache\"\n)\n\n// TreeNode represen"
},
{
"path": "internal/tui/tree_test.go",
"chars": 3295,
"preview": "package tui\n\nimport (\n\t\"testing\"\n\n\t\"github.com/veggiemonk/awesome-docker/internal/cache\"\n)\n\nfunc TestBuildTree(t *testin"
},
{
"path": "internal/tui/tui.go",
"chars": 298,
"preview": "package tui\n\nimport (\n\ttea \"charm.land/bubbletea/v2\"\n\t\"github.com/veggiemonk/awesome-docker/internal/cache\"\n)\n\n// Run la"
}
]
About this extraction
This page contains the full source code of the veggiemonk/awesome-docker GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 48 files (380.4 KB), approximately 109.9k tokens, and a symbol index with 200 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.