dockerfiles-windows - Various Dockerfiles for Windows Containers

  •        7

Various Dockerfiles for Windows. Most of these can be run as Windows Containers on Windows 10, Windows Server 2016, Windows Server 1709 and Windows Server 1803. Most of these Dockerfiles are automatically built on AppVeyor and pushed to Docker Hub. See the badges in each sub folder's README files.

https://github.com/StefanScherer/dockerfiles-windows

Tags
Implementation
License
Platform

   




Related Projects

dockerfiles - Dockerfiles: Check_Mk, Couchpotato, Deluge, Gollum, Headphones, Lazy Librarian, OpenVPN PIA client, Plex, Sabnzbd, Samba, SSH Socks Proxy server, Sickrage, Syncthing, Stringer and Transmission

  •    Dockerfile

An assorted collection of Dockerfiles, mostly designed for home server/lab use. Build/run instructions are in each subdirectory. Bold items are ones that I currently use. Others could potentially be out of date. I prefer when possible to build my own Docker images rather than pull images build by someone else. The only exceptions are official images that are vetted by Docker and the Plex image.

dockerfiles - Compilation of Dockerfiles with automated builds enabled on the Docker Registry

  •    Dockerfile

Compilation of Dockerfiles with automated builds enabled on the Docker Hub. Not suitable for production environments. These images are under continuous development, so breaking changes may be introduced. Nearly all images are based on Ubuntu Core 14.04 LTS, built with minimising size/layers and best practices in mind. Dependencies are indicated left to right e.g. cuda-vnc is VNC built on top of CUDA. Explicit dependencies are excluded.

docker-scripts - Dockerfiles and scripts for Spark and Shark Docker images

  •    Shell

Dockerfiles to build Spark and Shark images for testing and development. Tested on Ubuntu 12.04 (Docker version 0.6.4), Ubuntu 13.10 (Docker 0.7.0 and 0.9.0) with the virtual switch lxcbr0 enabled. For running Docker on Mac and Windows see the docs. Also tested inside the VirtualBox Tiny Core Linux VirtualBox VM for Docker on Mac.

Docker-Secure-Deployment-Guidelines - Deployment checklist for securely deploying Docker

  •    

Within today’s growing cloud-based IT market, there is a strong demand for virtualisation technologies. Unfortunately most virtualisation solutions are not flexible enough to meet developer requirements and the overhead implied by the use of full virtualisation solutions becomes a burden on the scalability of the infrastructure. Docker reduces that overhead by allowing developers and system administrators to seamlessly deploy containers for applications and services required for business operations. However, because Docker leverages the same kernel as the host system to reduce the need for resources, containers can be exposed to significant security risks if not adequately configured. The following itemised list suggests hardening actions that can be undertaken to improve the security posture of the containers within their respective environment. It should be noted that proposed solutions only apply to deployment of Linux Docker containers on Linux-based hosts, using the most recent release of Docker at the time of this writing (1.4.0, commit 4595d4f, dating 11/12/14). Part of the content below is based on publications from Jérôme Petazzoni [1] and Daniel J Walsh [2]. This document aims at adding on to their recommendations and how they can specifically be implemented within Docker. Note: Most of suggested command line options can be stored and used in a similar manner inside a Dockerfile for automated image building. Docker 1.3 now supports cryptographic signatures [3] to ascertain the origin and integrity of official repository images. This feature is however still a work in progress as Docker will issue a warning but not prevent the image from actually running. Furthermore, it does not apply to non-official images. In general, ensure that images are only retrieved from trusted repositories and that the --insecure-registry=[] command line option is never used.


rocker - R configurations for Docker

  •    Shell

This repository contains Dockerfiles for different Docker containers of interest to R users. To get started right away, ensure you have Docker installed and start a container with docker run --rm -ti rocker/r-base (see here for the docker run command options). In this case we are starting the r-base container (the base package to build from) in an interactive mode, see below for details of the other containers currently available. To get started on the rstudio container or its derivative containers (eg. hadleyverse and ropensci) you need to open a port, see the instructions in the wiki. The wiki also contains further instructions and information on the project, including how to extend these images and contribute to development.

habitus - A Build Flow Tool for Docker

  •    Go

Habitus adds workflows to Docker build. This means you can create a chain of builds to generate your final Docker image based on a workflow. This is particularly useful if your code is in compiled languages like Java or Go or if you need to use secrets like SSH keys during the build.Habitus is a standalone build flow tool for Docker. It’s a command line tool that builds Docker images based on their Dockerfile and a build.yml.

habitus - A Build Flow Tool for Docker

  •    Go

Habitus adds workflows to Docker build. This means you can create a chain of builds to generate your final Docker image based on a workflow. This is particularly useful if your code is in compiled languages like Java or Go or if you need to use secrets like SSH keys during the build. Habitus is a standalone build flow tool for Docker. It’s a command line tool that builds Docker images based on their Dockerfile and a build.yml.

Portainer - Simple management UI for Docker

  •    Javascript

Portainer is a lightweight management UI which allows you to easily manage your different Docker environments (Docker hosts or Swarm clusters). Portainer is meant to be as simple to deploy as it is to use. It consists of a single container that can run on any Docker engine (can be deployed as Linux container or a Windows native container). It allows you to manage your Docker containers, images, volumes, networks and more ! It is compatible with the standalone Docker engine and with Docker Swarm mode.

docklands - Minimalistic Java EE Related Dockerfiles

  •    Shell

Simplest viable dockerfiles for Java EE projects (aka microservices) aiming for build speed and productivity. Each folder represents a Dockerfile which can be build by executing the build.js command. Recent builds already exist in https://hub.docker.com/u/airhacks/. To run the image use the "airhacks" name e.g. docker run -d -p 8080:8080 --name payara-ping airhacks/payara-ping.

docker-nginx - Official NGINX Dockerfiles

  •    Dockerfile

This is the Git repo of the official Docker image for nginx. See the Hub page for the full readme on how to use the Docker image and for information regarding contributing and issues. The full readme is generated over in docker-library/docs, specificially in docker-library/docs/nginx.

docker-images - Official source for Docker configurations, images, and examples of Dockerfiles for Oracle products and projects

  •    Shell

This repository contains Dockerfiles and samples to build Docker images for Oracle products and open source projects. For support and certification information, please consult the documentation for each product.

docker-splunk - Docker Splunk Enterprise image

  •    Shell

This is the official repository for the Splunk Enterprise and Splunk universal forwarder Docker effort. It contains Dockerfiles that you can use to build Splunk Docker images. To learn more about the Splunk Enterprise Docker image, see the Splunk Enterprise Docker image README.

docker-splunk-legacy - Docker Splunk Enterprise image

  •    Shell

This is the official repository for the Splunk Enterprise and Splunk universal forwarder Docker effort. It contains Dockerfiles that you can use to build Splunk Docker images. To learn more about the Splunk Enterprise Docker image, see the Splunk Enterprise Docker image README.

dockerfiles - Various Dockerfiles I use on the desktop and on servers.

  •    Shell

This is a repo to hold various Dockerfiles for images I create.You may also want to checkout my dotfiles, specifically the aliases for all these files which are here: github.com/jessfraz/dotfiles/blob/master/.dockerfunc.

zerotodocker - Dockerfiles to be used to create Dockerhub trusted builds of NetflixOSS

  •    Python

Zero To Docker is a project to help accelerate the evaluation of [NetflixOSS] (http://netflix.github.io). The Docker images created are [not intended to be used in production as is] (https://github.com/Netflix-Skunkworks/zerotodocker/wiki/Not-Production). The Docker images created are to allow for easier evaluation of the various NetflixOSS technologies, similar to many other published open source Docker images. Netflix continues to run our cloud deployments on virtual machines leveraging the deep IaaS support of Amazon EC2.

Harbor - An enterprise-class container registry server based on Docker Distribution

  •    Go

Project Harbor is an enterprise-class registry server that stores and distributes Docker images. It extends the open source Docker Distribution by adding the functionalities usually required by an enterprise, such as security, identity and management. As an enterprise private registry, Harbor offers better performance and security.

docker-gc - Docker garbage collection of containers and images

  •    Shell

A simple Docker container and image garbage collection script.Although docker normally prevents removal of images that are in use by containers, we take extra care to not remove any image tags (e.g., ubuntu:14.04, busybox, etc) that are in use by containers. A naive docker rmi $(docker images -q) will leave images stripped of all tags, forcing docker to re-pull the repositories when starting new containers even though the images themselves are still on disk.

watchtower - Automatically update running Docker containers

  •    Go

A process for watching your Docker containers and automatically restarting them whenever their base image is refreshed. Watchtower is an application that will monitor your running Docker containers and watch for changes to the images that those containers were originally started from. If watchtower detects that an image has changed, it will automatically restart the container using the new image.