kitematic - Visual Docker Container Management on Mac & Windows

  •        27

Kitematic is a simple application for managing Docker containers on Mac, Linux and Windows. Download the latest version of Kitematic via the github release page.

https://kitematic.com/
https://github.com/docker/kitematic

Dependencies:

JSONStream : ^1.0.7
alt : ^0.16.2
ansi-to-html : 0.3.0
any-promise : ^0.1.0
async : ^1.4.2
bluebird : ^2.9.24
bugsnag-js : ^2.4.7
cached-request : ^1.1.0
classnames : ^2.1.5
coveralls : ^2.11.2
deep-extend : ^0.4.0
dockerode : ^2.2.10
install : ^0.1.8
jquery : ^3.0.1
mixpanel : kitematic/mixpanel-node
mkdirp : ^0.5.0
node-uuid : ^1.4.3
numeral : ^1.5.3
object-assign : ^4.0.1
osx-release : ^1.1.0
parseUri : ^1.2.3-2
react : ^0.13.1
react-bootstrap : ^0.20.3
react-retina-image : ^1.1.2
react-router : ^0.13.4
request : ^2.55.0
request-progress : ^0.3.1
rimraf : ^2.3.2
underscore : ^1.8.3
validator : ^4.1.0
which : ^1.2.4

Tags
Implementation
License
Platform

   




Related Projects

toolbox - The Docker Toolbox

  •    Inno

The Docker Toolbox installs everything you need to get started with Docker on Mac OS X and Windows. It includes the Docker client, Compose, Machine, Kitematic, and VirtualBox. Documentation for Mac is available here.

athenapdf - Drop-in replacement for wkhtmltopdf built on Go, Electron and Docker

  •    Go

Simple, Docker-powered PDF conversions.Athena is comprised of an Electron command line interface (CLI) tool, and a Go microservice for converting HTML to PDF documents.

kitematic - Simple Docker management for Mac

  •    CSS

Simple Docker management for Mac

electron-windows-store - :package: Turn Electron Apps into Windows AppX Packages

  •    Javascript

Electron-Windows-Store: A CLI that takes the packaged output of your Electron app, then converts it into an AppX package. This allows you to submit your Electron app to the Windows Store 📦. You can also distribute your app as an .appx without using the Windows Store, allowing users to just double-click your .appx to automatically install it. This tool supports two methods to create AppX packages: Either using manual file copy operations, or using Windows Containers. The first option requires only the Windows 10 SDK, while the second option also requires the Desktop App Converter.


electron-pdf - 📄 A command line tool to generate PDF from URL, HTML or Markdown files.

  •    Javascript

A command line tool to generate PDF from URL, HTML or Markdown files with electron. There is also an example docker machine here.

docker-slim - DockerSlim (docker-slim): Optimize and secure your Docker containers (free and open source)

  •    Go

Creating small containers requires a lot of voodoo magic and it can be pretty painful. You shouldn't have to throw away your tools and your workflow to have skinny containers. Using Docker should be easy.docker-slim is a magic diet pill for your containers :) It will use static and dynamic analysis to create a skinny container for your app.

electron-packager - Customize and package your Electron app with OS-specific bundles (

  •    Javascript

Package your Electron app into OS-specific bundles (.app, .exe, etc.) via JavaScript or the command line. Electron Packager is a command line tool and Node.js library that bundles Electron-based application source code with a renamed Electron executable and supporting files into folders ready for distribution.

electron-api-demos - Explore the Electron APIs

  •    HTML

This is a desktop app that interactively and with sample code demonstrates core features of the Electron API. It's built with Electron, too, of course. This app works on Windows, macOS and Linux operating systems. Use this app to see what you can do with Electron and use the source code to learn how to create a basic Electron app.

Docker-Secure-Deployment-Guidelines - Deployment checklist for securely deploying Docker

  •    

Within today’s growing cloud-based IT market, there is a strong demand for virtualisation technologies. Unfortunately most virtualisation solutions are not flexible enough to meet developer requirements and the overhead implied by the use of full virtualisation solutions becomes a burden on the scalability of the infrastructure. Docker reduces that overhead by allowing developers and system administrators to seamlessly deploy containers for applications and services required for business operations. However, because Docker leverages the same kernel as the host system to reduce the need for resources, containers can be exposed to significant security risks if not adequately configured. The following itemised list suggests hardening actions that can be undertaken to improve the security posture of the containers within their respective environment. It should be noted that proposed solutions only apply to deployment of Linux Docker containers on Linux-based hosts, using the most recent release of Docker at the time of this writing (1.4.0, commit 4595d4f, dating 11/12/14). Part of the content below is based on publications from Jérôme Petazzoni [1] and Daniel J Walsh [2]. This document aims at adding on to their recommendations and how they can specifically be implemented within Docker. Note: Most of suggested command line options can be stored and used in a similar manner inside a Dockerfile for automated image building. Docker 1.3 now supports cryptographic signatures [3] to ascertain the origin and integrity of official repository images. This feature is however still a work in progress as Docker will issue a warning but not prevent the image from actually running. Furthermore, it does not apply to non-official images. In general, ensure that images are only retrieved from trusted repositories and that the --insecure-registry=[] command line option is never used.

udocker - A basic user tool to execute simple docker containers in batch or interactive systems without root privileges

  •    Python

A basic user tool to execute simple docker containers in user space without requiring root privileges. Enables download and execution of docker containers by non-privileged users in Linux systems where docker is not available. It can be used to pull and execute docker containers in Linux batch systems and interactive clusters that are managed by other entities such as grid infrastructures or externally managed batch or interactive systems. The INDIGO udocker does not require any type of privileges nor the deployment of services by system administrators. It can be downloaded and executed entirely by the end user.

electron-prebuilt - 🎂 Retired project. See README

  •    Javascript

This project has been merged into the electron/electron repository, and the electron module is now published to npm as part of the Electron release process. If you're having trouble installing or using Electron, please file an issue on the electron/electron repo.

electron-builder - A complete solution to package and build a ready for distribution Electron app with “auto update” support out of the box

  •    TypeScript

A complete solution to package and build a ready for distribution Electron, Proton Native or Muon app for macOS, Windows and Linux with “auto update” support out of the box. See documentation on electron.build.

docker-gc - Docker garbage collection of containers and images

  •    Shell

A simple Docker container and image garbage collection script.Although docker normally prevents removal of images that are in use by containers, we take extra care to not remove any image tags (e.g., ubuntu:14.04, busybox, etc) that are in use by containers. A naive docker rmi $(docker images -q) will leave images stripped of all tags, forcing docker to re-pull the repositories when starting new containers even though the images themselves are still on disk.

dagda - a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities

  •    Python

Dagda is a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities. In order to fulfill its mission, first the known vulnerabilities as CVEs (Common Vulnerabilities and Exposures), BIDs (Bugtraq IDs), RHSAs (Red Hat Security Advisories) and RHBAs (Red Hat Bug Advisories), and the known exploits from Offensive Security database are imported into a MongoDB to facilitate the search of these vulnerabilities and exploits when your analysis are in progress.

docker-bench-security - The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production

  •    Shell

The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production. The tests are all automated, and are inspired by the CIS Docker Community Edition Benchmark v1.1.0. We are releasing this as a follow-up to our Understanding Docker Security and Best Practices blog post. We are making this available as an open-source utility so the Docker community can have an easy way to self-assess their hosts and docker containers against this benchmark.

electron-osx-sign - Codesign Electron macOS apps

  •    Javascript

electron-osx-sign minimizes the extra work needed to eventually prepare your apps for shipping, providing the most basic tools and assets. Note that the bare necessities here are sufficient for enabling app sandbox, yet other configurations for network access etc. require additional work. Check out electron-osx-sign guide for suggestions on setting up your environment and workflow for distribution or development.

docker-cleanup - Automatic Docker image, container and volume cleanup

  •    Shell

This image will periodically clean up exited containers and remove images and volumes that aren't in use by a running container. Based on tutumcloud/image-cleanup and chadoe/docker-cleanup-volumes with some small fixes. WARNING: This script will remove all exited containers, data-only containers and unused images unless you carefully exclude them. Take care if you mount /var/lib/docker into the container since that will clean up all unused data volumes. If it's not compatible with your system or Docker version it may delete all your volumes, even from under running containers.