Dataset Preview
Duplicate
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
The dataset generation failed because of a cast error
Error code:   DatasetGenerationCastError
Exception:    DatasetGenerationCastError
Message:      An error occurred while generating the dataset

All the data files must have the same columns, but at some point there are 7 new columns ({'path', 'license', 'branch', 'last_updated', 'stars', 'repo_url', 'default_branch'})

This happened while the json dataset builder was generating data using

hf://datasets/LeeSek/dockerfiles-linted/full/dockerfiles_enriched_00_full.jsonl (at revision ce045f373060545cc79fc97ee4f818d60b039312)

Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback:    Traceback (most recent call last):
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1871, in _prepare_split_single
                  writer.write_table(table)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/arrow_writer.py", line 643, in write_table
                  pa_table = table_cast(pa_table, self._schema)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2293, in table_cast
                  return cast_table_to_schema(table, schema)
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/table.py", line 2241, in cast_table_to_schema
                  raise CastError(
              datasets.table.CastError: Couldn't cast
              image: string
              raw_dockerfile_url: string
              dockerfile_content: string
              dockerfile_sha256: string
              lines: int64
              valid: bool
              fetched_at: timestamp[s]
              repo_url: string
              default_branch: string
              license: string
              stars: int64
              last_updated: timestamp[s]
              path: string
              branch: string
              to
              {'image': Value(dtype='string', id=None), 'raw_dockerfile_url': Value(dtype='string', id=None), 'dockerfile_content': Value(dtype='string', id=None), 'dockerfile_sha256': Value(dtype='string', id=None), 'lines': Value(dtype='int64', id=None), 'valid': Value(dtype='bool', id=None), 'fetched_at': Value(dtype='timestamp[s]', id=None)}
              because column names don't match
              
              During handling of the above exception, another exception occurred:
              
              Traceback (most recent call last):
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1431, in compute_config_parquet_and_info_response
                  parquet_operations, partial, estimated_dataset_info = stream_convert_to_parquet(
                File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 992, in stream_convert_to_parquet
                  builder._prepare_split(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1742, in _prepare_split
                  for job_id, done, content in self._prepare_split_single(
                File "/src/services/worker/.venv/lib/python3.9/site-packages/datasets/builder.py", line 1873, in _prepare_split_single
                  raise DatasetGenerationCastError.from_cast_error(
              datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
              
              All the data files must have the same columns, but at some point there are 7 new columns ({'path', 'license', 'branch', 'last_updated', 'stars', 'repo_url', 'default_branch'})
              
              This happened while the json dataset builder was generating data using
              
              hf://datasets/LeeSek/dockerfiles-linted/full/dockerfiles_enriched_00_full.jsonl (at revision ce045f373060545cc79fc97ee4f818d60b039312)
              
              Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)

Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.

image
string
raw_dockerfile_url
string
dockerfile_content
string
dockerfile_sha256
string
lines
int64
valid
bool
fetched_at
timestamp[us]
allegro/hermes-consumers
https://raw.githubusercontent.com/allegro/hermes/master/docker/latest/consumers/Dockerfile
FROM gradle:8.12-jdk21 AS builder COPY --chown=gradle:gradle . /home/gradle/src/ WORKDIR /home/gradle/src/ RUN gradle clean distZip -Pdistribution FROM eclipse-temurin:21-jre RUN apt-get update \ && apt-get -y install unzip wget bash \ && rm -rf /var/lib/apt/lists/* RUN mkdir /app COPY --from=builder /home/gradle/src/hermes-consumers/build/distributions/*.zip /app/hermes-consumers.zip RUN unzip /app/hermes-consumers.zip && mv /hermes-consumers-* /hermes-consumers ADD docker/latest/consumers/consumers.yaml /etc/hermes/consumers.yaml ADD docker/latest/consumers/logback.xml /etc/hermes/logback.xml ENV HERMES_CONSUMERS_OPTS="-Dspring.config.location=file:///etc/hermes/consumers.yaml -Dlogback.configurationFile=/etc/hermes/logback.xml" CMD /hermes-consumers/bin/hermes-consumers
126b3e737acff00adc2dd900a41fc32feb6454bf83e83e57612e8a154d7bc015
23
true
2025-06-07T11:41:55
allegro/hermes-consumers
https://raw.githubusercontent.com/allegro/hermes/master/docker/latest/management/Dockerfile
FROM gradle:8.12-jdk21 AS builder COPY --chown=gradle:gradle . /home/gradle/src/ WORKDIR /home/gradle/src/ RUN gradle clean distZip -Pdistribution FROM eclipse-temurin:21-jre RUN apt-get update \ && apt-get -y install unzip wget bash \ && rm -rf /var/lib/apt/lists/* RUN mkdir /app COPY --from=builder /home/gradle/src/hermes-management/build/distributions/*.zip /app/hermes-management.zip RUN unzip /app/hermes-management.zip && mv /hermes-management-* /hermes-management ADD docker/latest/management/management.yaml /etc/hermes/management.yaml ENV SPRING_CONFIG_LOCATION="file:///etc/hermes/management.yaml" CMD /hermes-management/bin/hermes-management
cf372ceb8dbd2608dbf6c962ada90a88deac63aee448b23bd2d6f6e1301146f6
22
true
2025-06-07T11:41:55
allegro/hermes-frontend
https://raw.githubusercontent.com/allegro/hermes/master/docker/latest/frontend/Dockerfile
FROM gradle:8.12-jdk21 AS builder COPY --chown=gradle:gradle . /home/gradle/src/ WORKDIR /home/gradle/src/ RUN gradle clean distZip -Pdistribution FROM eclipse-temurin:21-jre RUN apt-get update \ && apt-get -y install unzip wget bash \ && rm -rf /var/lib/apt/lists/* RUN mkdir /app COPY --from=builder /home/gradle/src/hermes-frontend/build/distributions/*.zip /app/hermes-frontend.zip RUN unzip /app/hermes-frontend.zip && mv /hermes-frontend-* /hermes-frontend ADD docker/latest/frontend/frontend.yaml /etc/hermes/frontend.yaml ADD docker/latest/frontend/logback.xml /etc/hermes/logback.xml ENV HERMES_FRONTEND_OPTS="-Dspring.config.location=file:///etc/hermes/frontend.yaml -Dlogback.configurationFile=/etc/hermes/logback.xml" CMD /hermes-frontend/bin/hermes-frontend
1e44f929c7febd1f4bbeaf9cb9a6201312750425f4290984fb720b084439d5a4
22
true
2025-06-07T11:41:55
allegro/hermes-frontend
https://raw.githubusercontent.com/allegro/hermes/master/docker/latest/management/Dockerfile
FROM gradle:8.12-jdk21 AS builder COPY --chown=gradle:gradle . /home/gradle/src/ WORKDIR /home/gradle/src/ RUN gradle clean distZip -Pdistribution FROM eclipse-temurin:21-jre RUN apt-get update \ && apt-get -y install unzip wget bash \ && rm -rf /var/lib/apt/lists/* RUN mkdir /app COPY --from=builder /home/gradle/src/hermes-management/build/distributions/*.zip /app/hermes-management.zip RUN unzip /app/hermes-management.zip && mv /hermes-management-* /hermes-management ADD docker/latest/management/management.yaml /etc/hermes/management.yaml ENV SPRING_CONFIG_LOCATION="file:///etc/hermes/management.yaml" CMD /hermes-management/bin/hermes-management
cf372ceb8dbd2608dbf6c962ada90a88deac63aee448b23bd2d6f6e1301146f6
22
true
2025-06-07T11:41:55
allegro/hermes-consumers
https://raw.githubusercontent.com/allegro/hermes/master/docker/latest/frontend/Dockerfile
FROM gradle:8.12-jdk21 AS builder COPY --chown=gradle:gradle . /home/gradle/src/ WORKDIR /home/gradle/src/ RUN gradle clean distZip -Pdistribution FROM eclipse-temurin:21-jre RUN apt-get update \ && apt-get -y install unzip wget bash \ && rm -rf /var/lib/apt/lists/* RUN mkdir /app COPY --from=builder /home/gradle/src/hermes-frontend/build/distributions/*.zip /app/hermes-frontend.zip RUN unzip /app/hermes-frontend.zip && mv /hermes-frontend-* /hermes-frontend ADD docker/latest/frontend/frontend.yaml /etc/hermes/frontend.yaml ADD docker/latest/frontend/logback.xml /etc/hermes/logback.xml ENV HERMES_FRONTEND_OPTS="-Dspring.config.location=file:///etc/hermes/frontend.yaml -Dlogback.configurationFile=/etc/hermes/logback.xml" CMD /hermes-frontend/bin/hermes-frontend
1e44f929c7febd1f4bbeaf9cb9a6201312750425f4290984fb720b084439d5a4
22
true
2025-06-07T11:41:55
allegro/hermes-frontend
https://raw.githubusercontent.com/allegro/hermes/master/docker/latest/consumers/Dockerfile
FROM gradle:8.12-jdk21 AS builder COPY --chown=gradle:gradle . /home/gradle/src/ WORKDIR /home/gradle/src/ RUN gradle clean distZip -Pdistribution FROM eclipse-temurin:21-jre RUN apt-get update \ && apt-get -y install unzip wget bash \ && rm -rf /var/lib/apt/lists/* RUN mkdir /app COPY --from=builder /home/gradle/src/hermes-consumers/build/distributions/*.zip /app/hermes-consumers.zip RUN unzip /app/hermes-consumers.zip && mv /hermes-consumers-* /hermes-consumers ADD docker/latest/consumers/consumers.yaml /etc/hermes/consumers.yaml ADD docker/latest/consumers/logback.xml /etc/hermes/logback.xml ENV HERMES_CONSUMERS_OPTS="-Dspring.config.location=file:///etc/hermes/consumers.yaml -Dlogback.configurationFile=/etc/hermes/logback.xml" CMD /hermes-consumers/bin/hermes-consumers
126b3e737acff00adc2dd900a41fc32feb6454bf83e83e57612e8a154d7bc015
23
true
2025-06-07T11:41:55
allegro/hermes-management
https://raw.githubusercontent.com/allegro/hermes/master/docker/latest/consumers/Dockerfile
FROM gradle:8.12-jdk21 AS builder COPY --chown=gradle:gradle . /home/gradle/src/ WORKDIR /home/gradle/src/ RUN gradle clean distZip -Pdistribution FROM eclipse-temurin:21-jre RUN apt-get update \ && apt-get -y install unzip wget bash \ && rm -rf /var/lib/apt/lists/* RUN mkdir /app COPY --from=builder /home/gradle/src/hermes-consumers/build/distributions/*.zip /app/hermes-consumers.zip RUN unzip /app/hermes-consumers.zip && mv /hermes-consumers-* /hermes-consumers ADD docker/latest/consumers/consumers.yaml /etc/hermes/consumers.yaml ADD docker/latest/consumers/logback.xml /etc/hermes/logback.xml ENV HERMES_CONSUMERS_OPTS="-Dspring.config.location=file:///etc/hermes/consumers.yaml -Dlogback.configurationFile=/etc/hermes/logback.xml" CMD /hermes-consumers/bin/hermes-consumers
126b3e737acff00adc2dd900a41fc32feb6454bf83e83e57612e8a154d7bc015
23
true
2025-06-07T11:41:55
aimstack/aim
https://raw.githubusercontent.com/aimhubio/aim/main/docker/Dockerfile
FROM python:3.9.10-slim ARG AIM_VERSION RUN pip install Cython==3.0.10 RUN pip install aim==$AIM_VERSION WORKDIR /opt/aim RUN aim init ENTRYPOINT ["aim"] CMD ["up"]
44c12d6d992237d7a754e516f92f322c59c5bfe2960fa1ad5c9c9373a851602f
11
true
2025-06-07T11:41:55
allegro/hermes-management
https://raw.githubusercontent.com/allegro/hermes/master/docker/latest/frontend/Dockerfile
FROM gradle:8.12-jdk21 AS builder COPY --chown=gradle:gradle . /home/gradle/src/ WORKDIR /home/gradle/src/ RUN gradle clean distZip -Pdistribution FROM eclipse-temurin:21-jre RUN apt-get update \ && apt-get -y install unzip wget bash \ && rm -rf /var/lib/apt/lists/* RUN mkdir /app COPY --from=builder /home/gradle/src/hermes-frontend/build/distributions/*.zip /app/hermes-frontend.zip RUN unzip /app/hermes-frontend.zip && mv /hermes-frontend-* /hermes-frontend ADD docker/latest/frontend/frontend.yaml /etc/hermes/frontend.yaml ADD docker/latest/frontend/logback.xml /etc/hermes/logback.xml ENV HERMES_FRONTEND_OPTS="-Dspring.config.location=file:///etc/hermes/frontend.yaml -Dlogback.configurationFile=/etc/hermes/logback.xml" CMD /hermes-frontend/bin/hermes-frontend
1e44f929c7febd1f4bbeaf9cb9a6201312750425f4290984fb720b084439d5a4
22
true
2025-06-07T11:41:55
allegro/hermes-management
https://raw.githubusercontent.com/allegro/hermes/master/docker/latest/management/Dockerfile
FROM gradle:8.12-jdk21 AS builder COPY --chown=gradle:gradle . /home/gradle/src/ WORKDIR /home/gradle/src/ RUN gradle clean distZip -Pdistribution FROM eclipse-temurin:21-jre RUN apt-get update \ && apt-get -y install unzip wget bash \ && rm -rf /var/lib/apt/lists/* RUN mkdir /app COPY --from=builder /home/gradle/src/hermes-management/build/distributions/*.zip /app/hermes-management.zip RUN unzip /app/hermes-management.zip && mv /hermes-management-* /hermes-management ADD docker/latest/management/management.yaml /etc/hermes/management.yaml ENV SPRING_CONFIG_LOCATION="file:///etc/hermes/management.yaml" CMD /hermes-management/bin/hermes-management
cf372ceb8dbd2608dbf6c962ada90a88deac63aee448b23bd2d6f6e1301146f6
22
true
2025-06-07T11:41:55
alpine/httpie
https://raw.githubusercontent.com/jakubroztocil/httpie/master/extras/packaging/linux/Dockerfile
# Use the oldest (but still supported) Ubuntu as the base for PyInstaller # packages. This will prevent stuff like glibc from conflicting. FROM ubuntu:18.04 RUN apt-get update RUN apt-get install -y software-properties-common binutils RUN apt-get install -y ruby-dev RUN gem install fpm # Use deadsnakes for the latest Pythons (e.g 3.9) RUN add-apt-repository ppa:deadsnakes/ppa RUN apt-get update && apt-get install -y python3.9 python3.9-dev python3.9-venv # Install rpm as well, since we are going to build fedora dists too RUN apt-get install -y rpm ADD . /app WORKDIR /app/extras/packaging/linux ENV VIRTUAL_ENV=/opt/venv RUN python3.9 -m venv $VIRTUAL_ENV ENV PATH="$VIRTUAL_ENV/bin:$PATH" # Ensure that pip is renewed, otherwise we would be using distro-provided pip # which strips vendored packages and doesn't work with PyInstaller. RUN python -m pip install /app RUN python -m pip install pyinstaller wheel RUN python -m pip install --force-reinstall --upgrade pip RUN echo 'BUILD_CHANNEL="pypi"' > /app/httpie/internal/__build_channel__.py RUN python build.py ENTRYPOINT ["mv", "/app/extras/packaging/linux/dist/", "/artifacts"]
8ea214433e90bb41ed11fe36dd2eaac9e9be4dbc5db5f9868520e78dbfa0056a
34
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/ansible/Dockerfile
FROM alpine:3 RUN apk add --update --no-cache ansible bash openssh sshpass rsync ENTRYPOINT [] CMD ["ansible", "--help"]
a88bac146180f5de34013e2b05ab804670b3fe869a8690f82b63089e58c9f104
7
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/curl/Dockerfile
FROM alpine RUN apk add --update --no-cache curl COPY entrypoint.sh / ENTRYPOINT ["/entrypoint.sh"] CMD ["curl"]
a1c77853d64b3b9a73202b1185bbd187438d332ba00683b78fcc65378668677d
9
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/bruno/Dockerfile
FROM node:18-alpine RUN npm install -g @usebruno/cli ENTRYPOINT [ "bru" ] CMD ["--help"]
a2e1372358d13a475a747cf980b8e92d6e8bd35a577429b9fcfa787de8a9aea6
7
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/flake8/Dockerfile
FROM python:3-alpine RUN pip install flake8 RUN pip install flake8-sarif WORKDIR /apps ENTRYPOINT ["flake8"] CMD ["--help"]
9ef8412b5a2e041a1d7785d49bf269bd88b3c769b818c632b2467e1a830d81b2
10
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/asma/Dockerfile
# Stage 1: Build the Rust application FROM rust:alpine as builder # Install build dependencies RUN apk add --no-cache musl-dev git # Set the working directory inside the container WORKDIR /usr/src # Clone the source code from GitHub using the specified version (tag) ARG VERSION=1.0.0 RUN git clone https://github.com/aws/aws-secretsmanager-agent.git && \ cd aws-secretsmanager-agent && \ git checkout v$VERSION # Set the working directory inside the container WORKDIR /usr/src/aws-secretsmanager-agent # Build the Rust application RUN cargo build --release # Stage 2: Create a smaller image with the built binary FROM alpine:latest # Install necessary runtime dependencies RUN apk --no-cache add ca-certificates bash acl # Set the working directory inside the container WORKDIR /usr/local/bin # Copy the binary from the builder stage COPY --from=builder /usr/src/aws-secretsmanager-agent/target/release/aws_secretsmanager_agent secrets-manager-agent COPY --from=builder /usr/src/aws-secretsmanager-agent/aws_secretsmanager_agent/configuration/awssmaseedtoken . # Create a group and a user RUN addgroup -S awssmatokenreader && adduser -S awssmauser -G awssmatokenreader # Change the ownership of the binary to the created user and group RUN chown awssmauser:awssmatokenreader /usr/local/bin/secrets-manager-agent # Create the entrypoint script COPY entrypoint.sh /usr/local/bin/entrypoint.sh RUN chmod +x /usr/local/bin/entrypoint.sh RUN chgrp -R awssmatokenreader /var/run && chmod -R g+rwx /var/run RUN chgrp -R awssmatokenreader /run && chmod -R g+rwx /run # Switch to the created user USER awssmauser # Set environment variable ENV AWS_TOKEN=file:///var/run/awssmatoken # Run the entrypoint script by default when the container starts ENTRYPOINT ["/usr/local/bin/entrypoint.sh"]
0ea7bffe4afc3e55dcc6a642968c429cf37a8774396a5ab11fc2be96e57c004a
55
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/links/Dockerfile
FROM alpine RUN apk add --update --no-cache links ENTRYPOINT ["/usr/bin/links"] CMD ["-help"]
15f6ea49312502ff534b4805c30fbc9a4142c92a62fb3ce685f0966fcb61c07c
7
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/lynx/Dockerfile
FROM alpine RUN apk add --update --no-cache lynx ENTRYPOINT ["/usr/bin/lynx"] CMD ["-help"]
2c4edcf113098878540a0efd3540ae7aa078922df8322d907adaf6e830af1e9b
7
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/httpie/Dockerfile
FROM python:3-alpine RUN apk add build-base python3-dev && \ python -m pip install --upgrade pip wheel && \ python -m pip install httpie && \ apk del build-base python3-dev ENTRYPOINT [ "http" ] CMD ["--help"]
76d253d8b5a4f108fd50bb8dfc6fd3715b61c75a0025e031f57fec8e4d1b928f
10
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/mkcert/Dockerfile
# Step 1: Build mkcert binary for multiple architectures FROM --platform=$BUILDPLATFORM golang:1.20-alpine AS builder # Install dependencies RUN apk add --no-cache \ git \ bash \ gcc \ musl-dev # Set up working directory WORKDIR /app # Clone mkcert repository and checkout the latest tag RUN git clone https://github.com/FiloSottile/mkcert.git . && \ latest_tag=$(git describe --tags `git rev-list --tags --max-count=1`) && \ git checkout $latest_tag # Build mkcert binary based on target architecture ARG TARGETPLATFORM RUN go env -w GOOS=linux && \ if [ "$TARGETPLATFORM" = "linux/arm64" ]; then \ go env -w GOARCH=arm64; \ elif [ "$TARGETPLATFORM" = "linux/amd64" ]; then \ go env -w GOARCH=amd64; \ fi && \ go build -ldflags "-X main.Version=$latest_tag" -o mkcert # Step 2: Create minimal final image with mkcert binary FROM alpine:latest # Install nss-tools to manage certificates RUN apk add --no-cache \ nss-tools \ ca-certificates # Copy mkcert binary from builder stage COPY --from=builder /app/mkcert /usr/local/bin/mkcert # Set entrypoint to mkcert ENTRYPOINT ["mkcert"] CMD ["--help"]
70fe48f5b6a4abef9c3d5a7a2bc6cf027c4f963d6559a2b30cc1e84d9e85ca76
44
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/mongosh/Dockerfile
FROM node:lts-alpine RUN apk add --update --no-cache mongodb-tools git bash RUN yarn global add mongosh ENTRYPOINT []
17980075b581e82b2535d9aa23ce8500a0036eb1992ce32fac7662df6e1cdc47
7
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/psql/Dockerfile
FROM alpine RUN apk add --update --no-cache postgresql-client ENTRYPOINT ["/usr/bin/psql"] CMD ["--help"]
89dce5a22d01c0616a71146bc17b6d730d7c9437e557e3141a9390018acdbd4f
7
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/mysql/Dockerfile
FROM alpine RUN apk add --update --no-cache mysql-client mariadb-connector-c ENTRYPOINT ["/usr/bin/mariadb"] CMD ["--help"]
a65873f7bf3d96702346c9a16cbc419be74f3abb3385d285bc2f46947a2d58ae
7
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/openssl/Dockerfile
FROM alpine RUN apk add --update --no-cache openssl ENTRYPOINT ["openssl"]
23cf3d1d39e6425f58b48412454660d3ae5c565f151818a22f3b0435752383f3
6
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/semver/Dockerfile
FROM node:lts-alpine # ENV NPM_VERSION=10.3.0 # RUN npm install -g npm@"${NPM_VERSION}" RUN export PATH=/usr/local/bin:$PATH && \ npm install -g semver CMD ["semver", "--help"]
e96393f48cd29637ba4a33444eb74957b7db78753585206db1dd55377bb78a33
10
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/sqlite/Dockerfile
FROM alpine:latest RUN apk --no-cache --update add sqlite ENTRYPOINT ["sqlite3"] CMD ["--version"]
ed674fab08e9ebbad4829ea06fc178e2249331380f1f67cd03dc586f7d571009
7
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/socat/Dockerfile
FROM alpine:latest RUN apk --upgrade --no-cache add socat ENTRYPOINT ["socat"]
21e973016e0612773c52a88cc0790e28f9ff5a42f400deba5afa87d0bcba428b
7
true
2025-06-07T11:41:55
alpine/socat
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/trivy/Dockerfile
FROM alpine RUN apk add --update --no-cache curl # Ref: https://github.com/aquasecurity/trivy/discussions/4746 # RUN curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -x -s -- -b /usr/local/bin COPY ./install.sh /tmp/install.sh RUN cat /tmp/install.sh | sh -x -s -- -b /usr/local/bin ENTRYPOINT ["/usr/local/bin/trivy"] CMD ["--help"]
4be2e6b67c80c863493bb1a29e0b79de4568feb2b3df965e68e1d8bb97dfd8ec
13
true
2025-06-07T11:41:55
alpine/git
https://raw.githubusercontent.com/alpine-docker/git/master/Dockerfile
FROM alpine RUN apk fix && \ apk --no-cache --update add git git-lfs gpg less openssh patch perl && \ git lfs install VOLUME /git WORKDIR /git ENTRYPOINT ["git"] CMD ["--help"]
5bd13982c2f08be0859b77c0518da6c89c8afb7b1fa73de9a85a943ba2923261
12
true
2025-06-07T11:41:55
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/ansible/Dockerfile
FROM alpine:3 RUN apk add --update --no-cache ansible bash openssh sshpass rsync ENTRYPOINT [] CMD ["ansible", "--help"]
a88bac146180f5de34013e2b05ab804670b3fe869a8690f82b63089e58c9f104
7
true
2025-06-07T11:41:55
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/bruno/Dockerfile
FROM node:18-alpine RUN npm install -g @usebruno/cli ENTRYPOINT [ "bru" ] CMD ["--help"]
a2e1372358d13a475a747cf980b8e92d6e8bd35a577429b9fcfa787de8a9aea6
7
true
2025-06-07T11:41:55
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/asma/Dockerfile
# Stage 1: Build the Rust application FROM rust:alpine as builder # Install build dependencies RUN apk add --no-cache musl-dev git # Set the working directory inside the container WORKDIR /usr/src # Clone the source code from GitHub using the specified version (tag) ARG VERSION=1.0.0 RUN git clone https://github.com/aws/aws-secretsmanager-agent.git && \ cd aws-secretsmanager-agent && \ git checkout v$VERSION # Set the working directory inside the container WORKDIR /usr/src/aws-secretsmanager-agent # Build the Rust application RUN cargo build --release # Stage 2: Create a smaller image with the built binary FROM alpine:latest # Install necessary runtime dependencies RUN apk --no-cache add ca-certificates bash acl # Set the working directory inside the container WORKDIR /usr/local/bin # Copy the binary from the builder stage COPY --from=builder /usr/src/aws-secretsmanager-agent/target/release/aws_secretsmanager_agent secrets-manager-agent COPY --from=builder /usr/src/aws-secretsmanager-agent/aws_secretsmanager_agent/configuration/awssmaseedtoken . # Create a group and a user RUN addgroup -S awssmatokenreader && adduser -S awssmauser -G awssmatokenreader # Change the ownership of the binary to the created user and group RUN chown awssmauser:awssmatokenreader /usr/local/bin/secrets-manager-agent # Create the entrypoint script COPY entrypoint.sh /usr/local/bin/entrypoint.sh RUN chmod +x /usr/local/bin/entrypoint.sh RUN chgrp -R awssmatokenreader /var/run && chmod -R g+rwx /var/run RUN chgrp -R awssmatokenreader /run && chmod -R g+rwx /run # Switch to the created user USER awssmauser # Set environment variable ENV AWS_TOKEN=file:///var/run/awssmatoken # Run the entrypoint script by default when the container starts ENTRYPOINT ["/usr/local/bin/entrypoint.sh"]
0ea7bffe4afc3e55dcc6a642968c429cf37a8774396a5ab11fc2be96e57c004a
55
true
2025-06-07T11:41:55
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/curl/Dockerfile
FROM alpine RUN apk add --update --no-cache curl COPY entrypoint.sh / ENTRYPOINT ["/entrypoint.sh"] CMD ["curl"]
a1c77853d64b3b9a73202b1185bbd187438d332ba00683b78fcc65378668677d
9
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/flake8/Dockerfile
FROM python:3-alpine RUN pip install flake8 RUN pip install flake8-sarif WORKDIR /apps ENTRYPOINT ["flake8"] CMD ["--help"]
9ef8412b5a2e041a1d7785d49bf269bd88b3c769b818c632b2467e1a830d81b2
10
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/httpie/Dockerfile
FROM python:3-alpine RUN apk add build-base python3-dev && \ python -m pip install --upgrade pip wheel && \ python -m pip install httpie && \ apk del build-base python3-dev ENTRYPOINT [ "http" ] CMD ["--help"]
76d253d8b5a4f108fd50bb8dfc6fd3715b61c75a0025e031f57fec8e4d1b928f
10
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/links/Dockerfile
FROM alpine RUN apk add --update --no-cache links ENTRYPOINT ["/usr/bin/links"] CMD ["-help"]
15f6ea49312502ff534b4805c30fbc9a4142c92a62fb3ce685f0966fcb61c07c
7
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/lynx/Dockerfile
FROM alpine RUN apk add --update --no-cache lynx ENTRYPOINT ["/usr/bin/lynx"] CMD ["-help"]
2c4edcf113098878540a0efd3540ae7aa078922df8322d907adaf6e830af1e9b
7
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/mkcert/Dockerfile
# Step 1: Build mkcert binary for multiple architectures FROM --platform=$BUILDPLATFORM golang:1.20-alpine AS builder # Install dependencies RUN apk add --no-cache \ git \ bash \ gcc \ musl-dev # Set up working directory WORKDIR /app # Clone mkcert repository and checkout the latest tag RUN git clone https://github.com/FiloSottile/mkcert.git . && \ latest_tag=$(git describe --tags `git rev-list --tags --max-count=1`) && \ git checkout $latest_tag # Build mkcert binary based on target architecture ARG TARGETPLATFORM RUN go env -w GOOS=linux && \ if [ "$TARGETPLATFORM" = "linux/arm64" ]; then \ go env -w GOARCH=arm64; \ elif [ "$TARGETPLATFORM" = "linux/amd64" ]; then \ go env -w GOARCH=amd64; \ fi && \ go build -ldflags "-X main.Version=$latest_tag" -o mkcert # Step 2: Create minimal final image with mkcert binary FROM alpine:latest # Install nss-tools to manage certificates RUN apk add --no-cache \ nss-tools \ ca-certificates # Copy mkcert binary from builder stage COPY --from=builder /app/mkcert /usr/local/bin/mkcert # Set entrypoint to mkcert ENTRYPOINT ["mkcert"] CMD ["--help"]
70fe48f5b6a4abef9c3d5a7a2bc6cf027c4f963d6559a2b30cc1e84d9e85ca76
44
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/mysql/Dockerfile
FROM alpine RUN apk add --update --no-cache mysql-client mariadb-connector-c ENTRYPOINT ["/usr/bin/mariadb"] CMD ["--help"]
a65873f7bf3d96702346c9a16cbc419be74f3abb3385d285bc2f46947a2d58ae
7
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/mongosh/Dockerfile
FROM node:lts-alpine RUN apk add --update --no-cache mongodb-tools git bash RUN yarn global add mongosh ENTRYPOINT []
17980075b581e82b2535d9aa23ce8500a0036eb1992ce32fac7662df6e1cdc47
7
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/openssl/Dockerfile
FROM alpine RUN apk add --update --no-cache openssl ENTRYPOINT ["openssl"]
23cf3d1d39e6425f58b48412454660d3ae5c565f151818a22f3b0435752383f3
6
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/psql/Dockerfile
FROM alpine RUN apk add --update --no-cache postgresql-client ENTRYPOINT ["/usr/bin/psql"] CMD ["--help"]
89dce5a22d01c0616a71146bc17b6d730d7c9437e557e3141a9390018acdbd4f
7
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/semver/Dockerfile
FROM node:lts-alpine # ENV NPM_VERSION=10.3.0 # RUN npm install -g npm@"${NPM_VERSION}" RUN export PATH=/usr/local/bin:$PATH && \ npm install -g semver CMD ["semver", "--help"]
e96393f48cd29637ba4a33444eb74957b7db78753585206db1dd55377bb78a33
10
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/socat/Dockerfile
FROM alpine:latest RUN apk --upgrade --no-cache add socat ENTRYPOINT ["socat"]
21e973016e0612773c52a88cc0790e28f9ff5a42f400deba5afa87d0bcba428b
7
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/sqlite/Dockerfile
FROM alpine:latest RUN apk --no-cache --update add sqlite ENTRYPOINT ["sqlite3"] CMD ["--version"]
ed674fab08e9ebbad4829ea06fc178e2249331380f1f67cd03dc586f7d571009
7
true
2025-06-07T11:41:56
alpine/flake8
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/trivy/Dockerfile
FROM alpine RUN apk add --update --no-cache curl # Ref: https://github.com/aquasecurity/trivy/discussions/4746 # RUN curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -x -s -- -b /usr/local/bin COPY ./install.sh /tmp/install.sh RUN cat /tmp/install.sh | sh -x -s -- -b /usr/local/bin ENTRYPOINT ["/usr/local/bin/trivy"] CMD ["--help"]
4be2e6b67c80c863493bb1a29e0b79de4568feb2b3df965e68e1d8bb97dfd8ec
13
true
2025-06-07T11:41:56
alpine/landscape
https://raw.githubusercontent.com/coinbase/terraform-landscape/master/Dockerfile
FROM alpine:3.8 RUN apk --no-cache add \ ruby-bundler=1.16.2-r1 \ ruby-json=2.5.8-r0 \ diffutils=3.6-r1 # this is required for diffy to work on alpine RUN gem install --no-document --no-ri terraform_landscape ENTRYPOINT ["landscape"]
9d3c6e41ddc44959a1ef458a2d04c6a0f5f3d7b847751fc970a2486cf2de1c5c
10
true
2025-06-07T11:41:56
alpine/bundle
https://raw.githubusercontent.com/alpine-docker/bundler/master/Dockerfile.template
FROM ruby:VERSION RUN gem install bundler WORKDIR /apps CMD ["bundle", "--help"]
e9140171d327115f137b72f40446185b4820da1d2e90ecbfd0384a6d2868eefb
8
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/ansible/Dockerfile
FROM alpine:3 RUN apk add --update --no-cache ansible bash openssh sshpass rsync ENTRYPOINT [] CMD ["ansible", "--help"]
a88bac146180f5de34013e2b05ab804670b3fe869a8690f82b63089e58c9f104
7
true
2025-06-07T11:41:56
alpine/make
https://raw.githubusercontent.com/alpine-docker/make/master/Dockerfile
FROM alpine:edge RUN apk add --update --no-cache make=4.2.1-r2 CMD ["make", "--help"]
d7e15d193658b3ee26f5a22e8da021aed2e2b35a932f7495317f2dcf164ab38e
6
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/asma/Dockerfile
# Stage 1: Build the Rust application FROM rust:alpine as builder # Install build dependencies RUN apk add --no-cache musl-dev git # Set the working directory inside the container WORKDIR /usr/src # Clone the source code from GitHub using the specified version (tag) ARG VERSION=1.0.0 RUN git clone https://github.com/aws/aws-secretsmanager-agent.git && \ cd aws-secretsmanager-agent && \ git checkout v$VERSION # Set the working directory inside the container WORKDIR /usr/src/aws-secretsmanager-agent # Build the Rust application RUN cargo build --release # Stage 2: Create a smaller image with the built binary FROM alpine:latest # Install necessary runtime dependencies RUN apk --no-cache add ca-certificates bash acl # Set the working directory inside the container WORKDIR /usr/local/bin # Copy the binary from the builder stage COPY --from=builder /usr/src/aws-secretsmanager-agent/target/release/aws_secretsmanager_agent secrets-manager-agent COPY --from=builder /usr/src/aws-secretsmanager-agent/aws_secretsmanager_agent/configuration/awssmaseedtoken . # Create a group and a user RUN addgroup -S awssmatokenreader && adduser -S awssmauser -G awssmatokenreader # Change the ownership of the binary to the created user and group RUN chown awssmauser:awssmatokenreader /usr/local/bin/secrets-manager-agent # Create the entrypoint script COPY entrypoint.sh /usr/local/bin/entrypoint.sh RUN chmod +x /usr/local/bin/entrypoint.sh RUN chgrp -R awssmatokenreader /var/run && chmod -R g+rwx /var/run RUN chgrp -R awssmatokenreader /run && chmod -R g+rwx /run # Switch to the created user USER awssmauser # Set environment variable ENV AWS_TOKEN=file:///var/run/awssmatoken # Run the entrypoint script by default when the container starts ENTRYPOINT ["/usr/local/bin/entrypoint.sh"]
0ea7bffe4afc3e55dcc6a642968c429cf37a8774396a5ab11fc2be96e57c004a
55
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/curl/Dockerfile
FROM alpine RUN apk add --update --no-cache curl COPY entrypoint.sh / ENTRYPOINT ["/entrypoint.sh"] CMD ["curl"]
a1c77853d64b3b9a73202b1185bbd187438d332ba00683b78fcc65378668677d
9
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/bruno/Dockerfile
FROM node:18-alpine RUN npm install -g @usebruno/cli ENTRYPOINT [ "bru" ] CMD ["--help"]
a2e1372358d13a475a747cf980b8e92d6e8bd35a577429b9fcfa787de8a9aea6
7
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/httpie/Dockerfile
FROM python:3-alpine RUN apk add build-base python3-dev && \ python -m pip install --upgrade pip wheel && \ python -m pip install httpie && \ apk del build-base python3-dev ENTRYPOINT [ "http" ] CMD ["--help"]
76d253d8b5a4f108fd50bb8dfc6fd3715b61c75a0025e031f57fec8e4d1b928f
10
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/links/Dockerfile
FROM alpine RUN apk add --update --no-cache links ENTRYPOINT ["/usr/bin/links"] CMD ["-help"]
15f6ea49312502ff534b4805c30fbc9a4142c92a62fb3ce685f0966fcb61c07c
7
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/mkcert/Dockerfile
# Step 1: Build mkcert binary for multiple architectures FROM --platform=$BUILDPLATFORM golang:1.20-alpine AS builder # Install dependencies RUN apk add --no-cache \ git \ bash \ gcc \ musl-dev # Set up working directory WORKDIR /app # Clone mkcert repository and checkout the latest tag RUN git clone https://github.com/FiloSottile/mkcert.git . && \ latest_tag=$(git describe --tags `git rev-list --tags --max-count=1`) && \ git checkout $latest_tag # Build mkcert binary based on target architecture ARG TARGETPLATFORM RUN go env -w GOOS=linux && \ if [ "$TARGETPLATFORM" = "linux/arm64" ]; then \ go env -w GOARCH=arm64; \ elif [ "$TARGETPLATFORM" = "linux/amd64" ]; then \ go env -w GOARCH=amd64; \ fi && \ go build -ldflags "-X main.Version=$latest_tag" -o mkcert # Step 2: Create minimal final image with mkcert binary FROM alpine:latest # Install nss-tools to manage certificates RUN apk add --no-cache \ nss-tools \ ca-certificates # Copy mkcert binary from builder stage COPY --from=builder /app/mkcert /usr/local/bin/mkcert # Set entrypoint to mkcert ENTRYPOINT ["mkcert"] CMD ["--help"]
70fe48f5b6a4abef9c3d5a7a2bc6cf027c4f963d6559a2b30cc1e84d9e85ca76
44
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/lynx/Dockerfile
FROM alpine RUN apk add --update --no-cache lynx ENTRYPOINT ["/usr/bin/lynx"] CMD ["-help"]
2c4edcf113098878540a0efd3540ae7aa078922df8322d907adaf6e830af1e9b
7
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/mysql/Dockerfile
FROM alpine RUN apk add --update --no-cache mysql-client mariadb-connector-c ENTRYPOINT ["/usr/bin/mariadb"] CMD ["--help"]
a65873f7bf3d96702346c9a16cbc419be74f3abb3385d285bc2f46947a2d58ae
7
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/openssl/Dockerfile
FROM alpine RUN apk add --update --no-cache openssl ENTRYPOINT ["openssl"]
23cf3d1d39e6425f58b48412454660d3ae5c565f151818a22f3b0435752383f3
6
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/psql/Dockerfile
FROM alpine RUN apk add --update --no-cache postgresql-client ENTRYPOINT ["/usr/bin/psql"] CMD ["--help"]
89dce5a22d01c0616a71146bc17b6d730d7c9437e557e3141a9390018acdbd4f
7
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/semver/Dockerfile
FROM node:lts-alpine # ENV NPM_VERSION=10.3.0 # RUN npm install -g npm@"${NPM_VERSION}" RUN export PATH=/usr/local/bin:$PATH && \ npm install -g semver CMD ["semver", "--help"]
e96393f48cd29637ba4a33444eb74957b7db78753585206db1dd55377bb78a33
10
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/mongosh/Dockerfile
FROM node:lts-alpine RUN apk add --update --no-cache mongodb-tools git bash RUN yarn global add mongosh ENTRYPOINT []
17980075b581e82b2535d9aa23ce8500a0036eb1992ce32fac7662df6e1cdc47
7
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/socat/Dockerfile
FROM alpine:latest RUN apk --upgrade --no-cache add socat ENTRYPOINT ["socat"]
21e973016e0612773c52a88cc0790e28f9ff5a42f400deba5afa87d0bcba428b
7
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/sqlite/Dockerfile
FROM alpine:latest RUN apk --no-cache --update add sqlite ENTRYPOINT ["sqlite3"] CMD ["--version"]
ed674fab08e9ebbad4829ea06fc178e2249331380f1f67cd03dc586f7d571009
7
true
2025-06-07T11:41:56
alpine/terragrunt
https://raw.githubusercontent.com/gruntwork-io/terragrunt/main/docs-starlight/Dockerfile
# FROM oven/bun:1.2.2 # # WORKDIR /app # COPY package.json bun.lock ./ # # RUN bun install # # COPY . . # # EXPOSE 4321 # # CMD ["bun", "run", "dev"] # There's a bug that prevents us from using bun for this: # https://github.com/oven-sh/bun/issues/17022 FROM node:22 WORKDIR /app COPY package.json ./ RUN npm install COPY . . EXPOSE 4321 CMD ["npm", "run", "dev", "--", "--host", "0.0.0.0"]
12d3d377965cbc9527e6ffbc98a2b713ccd9f1c9e86046e3318f17c78f3ef0b0
29
true
2025-06-07T11:41:56
alpine/terragrunt
https://raw.githubusercontent.com/gruntwork-io/terragrunt/main/docs/Dockerfile
FROM ruby:3.3-bookworm LABEL org.opencontainers.image.authors="Gruntwork <[email protected]>" # Copy the Gemfile and Gemfile.lock into the image and run bundle install in a way that will be cached WORKDIR /tmp ADD Gemfile Gemfile ADD Gemfile.lock Gemfile.lock RUN bundle install RUN mkdir -p /src VOLUME ["/src"] WORKDIR /src COPY . /src # Jekyll runs on port 4000 by default EXPOSE 4000 # Run jekyll serve - jekyll will build first to create a plain html file for TOS update CMD ["./jekyll-serve.sh"]
2c0d5fb499d01bd3393e065e1cb1e7d929b5880145a608f68b910c2d46dc7d98
20
true
2025-06-07T11:41:56
alpine/awslogs
https://raw.githubusercontent.com/jorgebastida/awslogs/master/Dockerfile
FROM python:3.12 ENV PYTHONUNBUFFERED 1 ENV PYTHONDONTWRITEBYTECODE 1 RUN apt-get update RUN apt-get install -y build-essential python3-dev RUN mkdir -p /usr/src WORKDIR /usr/src COPY requirements.txt /usr/src/requirements.txt RUN pip install --upgrade pip RUN pip install -r requirements.txt COPY . /usr/src RUN python setup.py develop
d962885fdd84c61c55ce04efd2f915a95d89d083a4884346df66bd129461a99e
13
true
2025-06-07T11:41:56
alpine/semver
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/trivy/Dockerfile
FROM alpine RUN apk add --update --no-cache curl # Ref: https://github.com/aquasecurity/trivy/discussions/4746 # RUN curl -sfL https://raw.githubusercontent.com/aquasecurity/trivy/main/contrib/install.sh | sh -x -s -- -b /usr/local/bin COPY ./install.sh /tmp/install.sh RUN cat /tmp/install.sh | sh -x -s -- -b /usr/local/bin ENTRYPOINT ["/usr/local/bin/trivy"] CMD ["--help"]
4be2e6b67c80c863493bb1a29e0b79de4568feb2b3df965e68e1d8bb97dfd8ec
13
true
2025-06-07T11:41:56
alpine/greengrass
https://raw.githubusercontent.com/alpine-docker/greengrass/master/Dockerfile
FROM amazonlinux:2 # Set ENV_VAR for Greengrass RC to be untarred inside Docker Image ARG VERSION=1.9.2 ARG GREENGRASS_RELEASE_URL=https://d1onfpft10uf5o.cloudfront.net/greengrass-core/downloads/${VERSION}/greengrass-linux-x86-64-${VERSION}.tar.gz # Install Greengrass Core Dependencies RUN yum update -y && \ yum install -y shadow-utils tar.x86_64 gzip xz wget iproute java-1.8.0 make && \ yum install -y gcc openssl-devel libffi-devel && \ ln -s /usr/bin/java /usr/local/bin/java8 && \ wget $GREENGRASS_RELEASE_URL && \ wget https://www.python.org/ftp/python/3.7.3/Python-3.7.3.tgz && \ tar xzf Python-3.7.3.tgz && \ cd Python-3.7.3 && \ ./configure --enable-optimizations && \ make altinstall && \ ln -s /usr/local/bin/python3.7 /usr/bin/python3.7 && \ cd ../ && \ wget https://nodejs.org/dist/v6.10.2/node-v6.10.2-linux-x64.tar.xz && \ tar xf node-v6.10.2-linux-x64.tar.xz && \ cp node-v6.10.2-linux-x64/bin/node /usr/bin/node && \ ln -s /usr/bin/node /usr/bin/nodejs6.10 && \ wget https://nodejs.org/dist/v8.10.0/node-v8.10.0-linux-x64.tar.xz && \ tar xf node-v8.10.0-linux-x64.tar.xz && \ cp node-v8.10.0-linux-x64/bin/node /usr/bin/nodejs8.10 && \ rm -rf node-v6.10.2-linux-x64.tar.xz node-v6.10.2-linux-x64 && \ rm -rf node-v8.10.0-linux-x64.tar.xz node-v8.10.0-linux-x64 && \ rm -rf Python-3.7.3.tgz Python-3.7.3 && \ yum remove -y wget && \ rm -rf /var/cache/yum # Copy Greengrass Licenses AWS IoT Greengrass Docker Image COPY greengrass-license-v1.pdf / # Copy start-up script COPY "greengrass-entrypoint.sh" / # Setup Greengrass inside Docker Image RUN export GREENGRASS_RELEASE=$(basename $GREENGRASS_RELEASE_URL) && \ tar xzf $GREENGRASS_RELEASE -C / && \ rm $GREENGRASS_RELEASE && \ useradd -r ggc_user && \ groupadd -r ggc_group # Expose 8883 to pub/sub MQTT messages EXPOSE 8883
6b1461efb30caf20bbde5272ac8aea60a122e55d855a8a03a8c87d3262b783b6
48
true
2025-06-07T11:41:56
alpine/greengrass
https://raw.githubusercontent.com/alpine-docker/greengrass/master/Dockerfile.alpine-armv7l
#FROM arm32v7/alpine:3.9 FROM balenalib/armv7hf-alpine-python:latest-3.9 # Set ENV_VAR for Greengrass RC to be untarred inside Docker Image ARG VERSION=1.9.2 ARG GREENGRASS_RELEASE_URL=https://d1onfpft10uf5o.cloudfront.net/greengrass-core/downloads/${VERSION}/greengrass-linux-armv7l-${VERSION}.tar.gz # Install Greengrass Core Dependencies RUN apk add --update --no-cache tar gzip wget xz shadow libc6-compat ca-certificates iproute2 python && \ wget $GREENGRASS_RELEASE_URL && \ apk del wget # Copy Greengrass Licenses AWS IoT Greengrass Docker Image COPY greengrass-license-v1.pdf / # Copy start-up script COPY "greengrass-entrypoint.sh" / # Setup Greengrass inside Docker Image RUN export GREENGRASS_RELEASE=$(basename $GREENGRASS_RELEASE_URL) && \ tar xzf $GREENGRASS_RELEASE -C / && \ rm $GREENGRASS_RELEASE && \ useradd -r ggc_user && \ groupadd -r ggc_group # Expose 8883 to pub/sub MQTT messages EXPOSE 8883
62ef304f6641052e18c57ec0822eb255dd364e126c963b1f589983a216856645
27
true
2025-06-07T11:41:56
alpine/greengrass
https://raw.githubusercontent.com/alpine-docker/greengrass/master/Dockerfile.alpine-aarch64
#FROM arm64v8/alpine:3.9 FROM balenalib/aarch64-alpine-python:latest-3.9 # Set ENV_VAR for Greengrass RC to be untarred inside Docker Image ARG VERSION=1.9.2 ARG GREENGRASS_RELEASE_URL=https://d1onfpft10uf5o.cloudfront.net/greengrass-core/downloads/${VERSION}/greengrass-linux-aarch64-${VERSION}.tar.gz # Install Greengrass Core Dependencies RUN apk add --update --no-cache tar gzip wget xz shadow libc6-compat ca-certificates iproute2 python && \ wget $GREENGRASS_RELEASE_URL && \ apk del wget # Copy Greengrass Licenses AWS IoT Greengrass Docker Image COPY greengrass-license-v1.pdf / # Copy start-up script COPY "greengrass-entrypoint.sh" / # Setup Greengrass inside Docker Image RUN export GREENGRASS_RELEASE=$(basename $GREENGRASS_RELEASE_URL) && \ tar xzf $GREENGRASS_RELEASE -C / && \ rm $GREENGRASS_RELEASE && \ useradd -r ggc_user && \ groupadd -r ggc_group # Expose 8883 to pub/sub MQTT messages EXPOSE 8883
d5b9112d8c4fc533a84d777d312ba9d1c5013c99c05d55acdb5590aea68a4f47
27
true
2025-06-07T11:41:56
alpine/greengrass
https://raw.githubusercontent.com/alpine-docker/greengrass/master/Dockerfile.alpine-x86_64
FROM alpine:3.9 # Set ENV_VAR for Greengrass RC to be untarred inside Docker Image ARG VERSION=1.9.2 ARG GREENGRASS_RELEASE_URL=https://d1onfpft10uf5o.cloudfront.net/greengrass-core/downloads/${VERSION}/greengrass-linux-x86-64-${VERSION}.tar.gz # Install Greengrass Core Dependencies RUN apk add --update --no-cache tar gzip wget xz shadow libc6-compat ca-certificates iproute2 python && \ wget $GREENGRASS_RELEASE_URL && \ apk del wget # Copy Greengrass Licenses AWS IoT Greengrass Docker Image COPY greengrass-license-v1.pdf / # Copy start-up script COPY "greengrass-entrypoint.sh" / # Setup Greengrass inside Docker Image RUN export GREENGRASS_RELEASE=$(basename $GREENGRASS_RELEASE_URL) && \ tar xzf $GREENGRASS_RELEASE -C / && \ rm $GREENGRASS_RELEASE && \ useradd -r ggc_user && \ groupadd -r ggc_group # Expose 8883 to pub/sub MQTT messages EXPOSE 8883
5a45271058862e61a01ef352567fbed8a03a0c048cb4d50791f35a1eb23af72f
26
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/4.4/Dockerfile
FROM debian:11-slim RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends curl unzip ca-certificates; \ rm -rf /var/lib/apt/lists/* RUN set -eu; \ groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx ENV EMQX_VERSION=4.4.19 ENV OTP=otp24.3.4.2-1 RUN set -eu; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="bf4192c64c9006733b30f96fe99506a0a3af115c7073995a044cc0e60230675e"; fi; \ if [ ${arch} = "arm64" ]; then sha256="7cd27d5112380fd4d81029b10ba862a050b0bba8af1eb90aac669189fc3053c0"; fi; \ ID="$(sed -n '/^ID=/p' /etc/os-release | sed -r 's/ID=(.*)/\1/g' | sed 's/\"//g')"; \ VERSION_ID="$(sed -n '/^VERSION_ID=/p' /etc/os-release | sed -r 's/VERSION_ID=(.*)/\1/g' | sed 's/\"//g')"; \ pkg="emqx-${EMQX_VERSION}-${OTP}-${ID}${VERSION_ID}-${arch}.zip"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/${EMQX_VERSION}/${pkg}; \ echo "$(sha256sum $pkg)"; \ echo "$sha256 *$pkg" | sha256sum -c; \ unzip -q -d /opt $pkg; \ chgrp -Rf emqx /opt/emqx; \ chmod -Rf g+w /opt/emqx; \ chown -Rf emqx /opt/emqx; \ ln -s /opt/emqx/bin/* /usr/local/bin/; \ rm -rf $pkg WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8081 for mgmt API # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 11883 port for internal MQTT/TCP # - 18083 for dashboard # - 4369 epmd (Erlang-distrbution port mapper daemon) listener (deprecated) # - 4370 default Erlang distrbution port # - 5369 for gen_rpc port mapping # - 6369 6370 for distributed node EXPOSE 1883 8081 8083 8084 8883 11883 18083 4369 4370 5369 6369 6370 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["emqx", "foreground"]
a89ad9e020575393e729d9cf6bce2326949b519a529892a40d5d6e1620d8ea54
57
true
2025-06-07T11:41:56
alpine/k8s
https://raw.githubusercontent.com/alpine-docker/k8s/master/Dockerfile
FROM alpine ARG ARCH # Ignore to update versions here # docker build --no-cache --build-arg KUBECTL_VERSION=${tag} --build-arg HELM_VERSION=${helm} --build-arg KUSTOMIZE_VERSION=${kustomize_version} -t ${image}:${tag} . ARG HELM_VERSION=3.2.1 ARG KUBECTL_VERSION=1.17.5 ARG KUSTOMIZE_VERSION=v3.8.1 ARG KUBESEAL_VERSION=0.18.1 ARG KREW_VERSION=v0.4.4 ARG VALS_VERSION=0.28.1 ARG KUBECONFORM_VERSION=0.6.3 # Install helm (latest release) # ENV BASE_URL="https://storage.googleapis.com/kubernetes-helm" RUN case `uname -m` in \ x86_64) ARCH=amd64; ;; \ armv7l) ARCH=arm; ;; \ aarch64) ARCH=arm64; ;; \ ppc64le) ARCH=ppc64le; ;; \ s390x) ARCH=s390x; ;; \ *) echo "un-supported arch, exit ..."; exit 1; ;; \ esac && \ echo "export ARCH=$ARCH" > /envfile && \ cat /envfile RUN . /envfile && echo $ARCH && \ apk add --update --no-cache curl ca-certificates bash git && \ curl -sL https://get.helm.sh/helm-v${HELM_VERSION}-linux-${ARCH}.tar.gz | tar -xvz && \ mv linux-${ARCH}/helm /usr/bin/helm && \ chmod +x /usr/bin/helm && \ rm -rf linux-${ARCH} # add helm-diff RUN helm plugin install https://github.com/databus23/helm-diff && rm -rf /tmp/helm-* # add helm-unittest RUN helm plugin install https://github.com/helm-unittest/helm-unittest && rm -rf /tmp/helm-* # add helm-push RUN helm plugin install https://github.com/chartmuseum/helm-push && \ rm -rf /tmp/helm-* \ /root/.local/share/helm/plugins/helm-push/testdata \ /root/.cache/helm/plugins/https-github.com-chartmuseum-helm-push/testdata # Install kubectl RUN . /envfile && echo $ARCH && \ curl -sLO "https://dl.k8s.io/release/v${KUBECTL_VERSION}/bin/linux/${ARCH}/kubectl" && \ mv kubectl /usr/bin/kubectl && \ chmod +x /usr/bin/kubectl # Install kustomize (latest release) RUN . /envfile && echo $ARCH && \ curl -sLO https://github.com/kubernetes-sigs/kustomize/releases/download/kustomize%2F${KUSTOMIZE_VERSION}/kustomize_${KUSTOMIZE_VERSION}_linux_${ARCH}.tar.gz && \ tar xvzf kustomize_${KUSTOMIZE_VERSION}_linux_${ARCH}.tar.gz && \ mv kustomize /usr/bin/kustomize && \ chmod +x /usr/bin/kustomize && \ rm kustomize_${KUSTOMIZE_VERSION}_linux_${ARCH}.tar.gz # Install eksctl (latest version) RUN . /envfile && echo $ARCH && \ curl -sL "https://github.com/weaveworks/eksctl/releases/latest/download/eksctl_$(uname -s)_${ARCH}.tar.gz" | tar xz -C /tmp && \ mv /tmp/eksctl /usr/bin && \ chmod +x /usr/bin/eksctl # Install awscli # Temp fix to allow system-wide package installation: # https://stackoverflow.com/a/76540031/3671801 RUN apk add --update --no-cache py3-pip && \ pip3 install --break-system-packages --upgrade pip setuptools && \ pip3 install --break-system-packages awscli && \ pip3 cache purge # Install jq RUN apk add --update --no-cache jq yq # https://docs.aws.amazon.com/eks/latest/userguide/install-aws-iam-authenticator.html # Install aws-iam-authenticator (latest version) RUN . /envfile && echo $ARCH && \ authenticator=$(curl -fs https://api.github.com/repos/kubernetes-sigs/aws-iam-authenticator/releases/latest | jq --raw-output '.name' | sed 's/^v//') && \ curl -fL https://github.com/kubernetes-sigs/aws-iam-authenticator/releases/download/v${authenticator}/aws-iam-authenticator_${authenticator}_linux_${ARCH} -o /usr/bin/aws-iam-authenticator && \ chmod +x /usr/bin/aws-iam-authenticator # Install for envsubst RUN apk add --update --no-cache gettext # Install kubeseal RUN . /envfile && echo $ARCH && \ curl -L https://github.com/bitnami-labs/sealed-secrets/releases/download/v${KUBESEAL_VERSION}/kubeseal-${KUBESEAL_VERSION}-linux-${ARCH}.tar.gz -o - | tar xz -C /usr/bin/ && \ chmod +x /usr/bin/kubeseal # Install vals RUN . /envfile && echo $ARCH && \ curl -L https://github.com/helmfile/vals/releases/download/v${VALS_VERSION}/vals_${VALS_VERSION}_linux_${ARCH}.tar.gz -o -| tar xz -C /usr/bin/ && \ chmod +x /usr/bin/vals # Install krew (latest release) RUN . /envfile && echo $ARCH && \ curl -fsSLO "https://github.com/kubernetes-sigs/krew/releases/download/v${KREW_VERSION}/krew-linux_${ARCH}.tar.gz" && \ tar zxvf krew-linux_${ARCH}.tar.gz && \ ./krew-linux_${ARCH} install krew && \ echo 'export PATH=/root/.krew/bin:$PATH' >> ~/.bashrc && \ rm krew-linux_${ARCH}.tar.gz # Install kubeconform RUN . /envfile && echo $ARCH && \ curl -L https://github.com/yannh/kubeconform/releases/download/v${KUBECONFORM_VERSION}/kubeconform-linux-${ARCH}.tar.gz -o - | tar xz -C /usr/bin/ && \ chmod +x /usr/bin/kubeconform WORKDIR /apps
ac97f06da6a8a45deb32f3254f98d0ee4aa9f7bffaf28b9a09dbac26332008b4
112
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/5.0/Dockerfile
FROM debian:11-slim RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends curl ca-certificates procps; \ rm -rf /var/lib/apt/lists/* RUN groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx; ENV EMQX_VERSION=5.0.26 ENV AMD64_SHA256=00f954065fe7fd2f678f2e561578234240cc2cace49fb5cbb5aa7fb450825ffa ENV ARM64_SHA256=0b013f0b900e687c1ef3ed73bd6fef268b5492d12a3083ffd0d75c8e3935b4ae ENV LC_ALL=C.UTF-8 LANG=C.UTF-8 RUN set -eu; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="$AMD64_SHA256"; fi; \ if [ ${arch} = "arm64" ]; then sha256="$ARM64_SHA256"; fi; \ ID="$(sed -n '/^ID=/p' /etc/os-release | sed -r 's/ID=(.*)/\1/g' | sed 's/\"//g')"; \ VERSION_ID="$(sed -n '/^VERSION_ID=/p' /etc/os-release | sed -r 's/VERSION_ID=(.*)/\1/g' | sed 's/\"//g')"; \ pkg="emqx-${EMQX_VERSION}-${ID}${VERSION_ID}-${arch}.tar.gz"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/v${EMQX_VERSION}/${pkg} && \ echo "$sha256 *$pkg" | sha256sum -c && \ mkdir /opt/emqx && \ tar zxf $pkg -C /opt/emqx && \ find /opt/emqx -name 'swagger*.js.map' -exec rm {} +; \ chgrp -Rf emqx /opt/emqx && \ chmod -Rf g+w /opt/emqx && \ chown -Rf emqx /opt/emqx && \ ln -s /opt/emqx/bin/* /usr/local/bin/ && \ rm -f $pkg WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 11883 port for internal MQTT/TCP # - 18083 for dashboard and API # - 4370 default Erlang distribution port # - 5369 for backplain gen_rpc EXPOSE 1883 8083 8084 8883 11883 18083 4370 5369 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["/opt/emqx/bin/emqx", "foreground"]
12896bda8ae96a8e7178fc4d3e21eb391bdfe0ec303a1f16916e01716d1e36f9
56
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/5.1/Dockerfile
FROM debian:11-slim RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends curl ca-certificates procps; \ rm -rf /var/lib/apt/lists/* RUN groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx; ENV EMQX_VERSION=5.1.6 ENV AMD64_SHA256=5c65f7538141e93d71d1dd7d088589339ef6a091b90f901604a2e0e004f5f4aa ENV ARM64_SHA256=ae832d29d6b4e7fa43f3bf04c8c9fad4c9047f079d1587d3ed2a3564d5ea8147 ENV LC_ALL=C.UTF-8 LANG=C.UTF-8 RUN set -eu; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="$AMD64_SHA256"; fi; \ if [ ${arch} = "arm64" ]; then sha256="$ARM64_SHA256"; fi; \ ID="$(sed -n '/^ID=/p' /etc/os-release | sed -r 's/ID=(.*)/\1/g' | sed 's/\"//g')"; \ VERSION_ID="$(sed -n '/^VERSION_ID=/p' /etc/os-release | sed -r 's/VERSION_ID=(.*)/\1/g' | sed 's/\"//g')"; \ pkg="emqx-${EMQX_VERSION}-${ID}${VERSION_ID}-${arch}.tar.gz"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/v${EMQX_VERSION}/${pkg}; \ echo "$sha256 *$pkg" | sha256sum -c; \ mkdir /opt/emqx; \ tar zxf $pkg -C /opt/emqx; \ find /opt/emqx -name 'swagger*.js.map' -exec rm {} +; \ chgrp -Rf emqx /opt/emqx; \ chmod -Rf g+w /opt/emqx; \ chown -Rf emqx /opt/emqx; \ ln -s /opt/emqx/bin/* /usr/local/bin/; \ rm -f $pkg WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 11883 port for internal MQTT/TCP # - 18083 for dashboard and API # - 4370 default Erlang distribution port # - 5369 for backplain gen_rpc EXPOSE 1883 8083 8084 8883 11883 18083 4370 5369 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["/opt/emqx/bin/emqx", "foreground"]
7950b7301b1657ed02c5c020b3fe202b646cbaad45b1c417caa58884677a3e4d
56
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/5.2/Dockerfile
FROM debian:11-slim RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends ca-certificates procps; \ rm -rf /var/lib/apt/lists/* RUN groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx; ENV EMQX_VERSION=5.2.1 ENV AMD64_SHA256=359a12811e5e6725e4269d9484abd348effdde35c0f2af1f5b63cae790c73020 ENV ARM64_SHA256=2e0a3e0b33669c9b6da488970a2f92d08d7bd0824295822b205b83461ba4728d ENV LC_ALL=C.UTF-8 LANG=C.UTF-8 RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends curl; \ rm -rf /var/lib/apt/lists/*; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="$AMD64_SHA256"; fi; \ if [ ${arch} = "arm64" ]; then sha256="$ARM64_SHA256"; fi; \ ID="$(sed -n '/^ID=/p' /etc/os-release | sed -r 's/ID=(.*)/\1/g' | sed 's/\"//g')"; \ VERSION_ID="$(sed -n '/^VERSION_ID=/p' /etc/os-release | sed -r 's/VERSION_ID=(.*)/\1/g' | sed 's/\"//g')"; \ pkg="emqx-${EMQX_VERSION}-${ID}${VERSION_ID}-${arch}.tar.gz"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/v${EMQX_VERSION}/${pkg}; \ echo "$sha256 *$pkg" | sha256sum -c; \ mkdir /opt/emqx; \ tar zxf $pkg -C /opt/emqx; \ find /opt/emqx -name 'swagger*.js.map' -exec rm {} +; \ chgrp -Rf emqx /opt/emqx; \ chmod -Rf g+w /opt/emqx; \ chown -Rf emqx /opt/emqx; \ ln -s /opt/emqx/bin/* /usr/local/bin/; \ rm -f $pkg; \ apt-get purge -y --auto-remove curl WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 11883 port for internal MQTT/TCP # - 18083 for dashboard and API # - 4370 default Erlang distribution port # - 5369 for backplain gen_rpc EXPOSE 1883 8083 8084 8883 11883 18083 4370 5369 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["/opt/emqx/bin/emqx", "foreground"]
4f6eef9677ae91e30b79805b4dc7df3006e606002971c399156f72e2c33ec01d
60
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/5.3/Dockerfile
FROM debian:11-slim ENV EMQX_VERSION=5.3.2 ENV AMD64_SHA256=d5948d4171f57e77756dd6c9eeb745c39e391e75aad3798fce445f44f5690be0 ENV ARM64_SHA256=82b056bb1c1cd1f16e9d0719150fa8ac19c499d29563738bcd6984b3c395c6ac ENV LC_ALL=C.UTF-8 LANG=C.UTF-8 RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends ca-certificates procps curl; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="$AMD64_SHA256"; fi; \ if [ ${arch} = "arm64" ]; then sha256="$ARM64_SHA256"; fi; \ ID="$(sed -n '/^ID=/p' /etc/os-release | sed -r 's/ID=(.*)/\1/g' | sed 's/\"//g')"; \ VERSION_ID="$(sed -n '/^VERSION_ID=/p' /etc/os-release | sed -r 's/VERSION_ID=(.*)/\1/g' | sed 's/\"//g')"; \ pkg="emqx-${EMQX_VERSION}-${ID}${VERSION_ID}-${arch}.tar.gz"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/v${EMQX_VERSION}/${pkg}; \ echo "$sha256 *$pkg" | sha256sum -c; \ mkdir /opt/emqx; \ tar zxf $pkg -C /opt/emqx; \ find /opt/emqx -name 'swagger*.js.map' -exec rm {} +; \ groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx; \ chgrp -Rf emqx /opt/emqx; \ chmod -Rf g+w /opt/emqx; \ chown -Rf emqx /opt/emqx; \ ln -s /opt/emqx/bin/* /usr/local/bin/; \ rm -f $pkg; \ apt-get purge -y --auto-remove curl; \ rm -rf /var/lib/apt/lists/* WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 11883 port for internal MQTT/TCP # - 18083 for dashboard and API # - 4370 default Erlang distribution port # - 5369 for backplain gen_rpc EXPOSE 1883 8083 8084 8883 11883 18083 4370 5369 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["/opt/emqx/bin/emqx", "foreground"]
e97519a21c211c97aae18972eb8abdca90d01464fe608116a0277f0471adadd8
54
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/5.4/Dockerfile
FROM debian:11-slim ENV EMQX_VERSION=5.4.1 ENV AMD64_SHA256=c2087651d72f17999f52d73ff22cd8f23dc5fa5db8b5a90a8bc4a1410b03affb ENV ARM64_SHA256=6c53a68ae907f7b4a3cdcd4dbee4f839b07853695ac1c039b51fd97d993073bc ENV LC_ALL=C.UTF-8 LANG=C.UTF-8 RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends ca-certificates procps curl; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="$AMD64_SHA256"; fi; \ if [ ${arch} = "arm64" ]; then sha256="$ARM64_SHA256"; fi; \ ID="$(sed -n '/^ID=/p' /etc/os-release | sed -r 's/ID=(.*)/\1/g' | sed 's/\"//g')"; \ VERSION_ID="$(sed -n '/^VERSION_ID=/p' /etc/os-release | sed -r 's/VERSION_ID=(.*)/\1/g' | sed 's/\"//g')"; \ pkg="emqx-${EMQX_VERSION}-${ID}${VERSION_ID}-${arch}.tar.gz"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/v${EMQX_VERSION}/${pkg}; \ echo "$sha256 *$pkg" | sha256sum -c; \ mkdir /opt/emqx; \ tar zxf $pkg -C /opt/emqx; \ find /opt/emqx -name 'swagger*.js.map' -exec rm {} +; \ groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx; \ chgrp -Rf emqx /opt/emqx; \ chmod -Rf g+w /opt/emqx; \ chown -Rf emqx /opt/emqx; \ ln -s /opt/emqx/bin/* /usr/local/bin/; \ rm -f $pkg; \ apt-get purge -y --auto-remove curl; \ rm -rf /var/lib/apt/lists/* WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 18083 for dashboard and API # - 4370 default Erlang distribution port # - 5369 for backplain gen_rpc EXPOSE 1883 8083 8084 8883 18083 4370 5369 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["/opt/emqx/bin/emqx", "foreground"]
b4bd8fcf113a2dbd0b8ad8ca8e653a1dfbc36490edeae6abb789df1dc9124d5c
53
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/5.6/Dockerfile
FROM debian:12-slim ENV EMQX_VERSION=5.6.1 ENV AMD64_SHA256=a5be37660bfe6130bc159b934ed98ffcb9bef5519765491b4ed38d08ba304538 ENV ARM64_SHA256=3f7f9b10d313f760af43e0a54cba2af4eb23ad3864b439196cb8b2903baf5651 ENV LC_ALL=C.UTF-8 LANG=C.UTF-8 RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends ca-certificates procps curl; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="$AMD64_SHA256"; fi; \ if [ ${arch} = "arm64" ]; then sha256="$ARM64_SHA256"; fi; \ . /etc/os-release; \ pkg="emqx-${EMQX_VERSION}-${ID}${VERSION_ID}-${arch}.tar.gz"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/v${EMQX_VERSION}/${pkg}; \ echo "$sha256 *$pkg" | sha256sum -c; \ mkdir /opt/emqx; \ tar zxf $pkg -C /opt/emqx; \ find /opt/emqx -name 'swagger*.js.map' -exec rm {} +; \ ln -s /opt/emqx/bin/* /usr/local/bin/; \ groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx; \ chown -R emqx:emqx /opt/emqx; \ rm -f $pkg; \ rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/* WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 18083 for dashboard and API # - 4370 default Erlang distribution port # - 5369 for backplain gen_rpc EXPOSE 1883 8083 8084 8883 18083 4370 5369 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["/opt/emqx/bin/emqx", "foreground"]
8f020f267e36832a3938bafb02a5bc4ed88be12f628aebe4a32c5d978fa2a370
49
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/5.5/Dockerfile
FROM debian:11-slim ENV EMQX_VERSION=5.5.1 ENV AMD64_SHA256=8bac2886987a632aab1c738aa3de28684b415d3b1e1f9489b458c819254673a6 ENV ARM64_SHA256=8b962ad8beea50fb92dc0b93d2ab8a5064752147b70bbf46fd221bc4cc29c32d ENV LC_ALL=C.UTF-8 LANG=C.UTF-8 RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends ca-certificates procps curl; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="$AMD64_SHA256"; fi; \ if [ ${arch} = "arm64" ]; then sha256="$ARM64_SHA256"; fi; \ ID="$(sed -n '/^ID=/p' /etc/os-release | sed -r 's/ID=(.*)/\1/g' | sed 's/\"//g')"; \ VERSION_ID="$(sed -n '/^VERSION_ID=/p' /etc/os-release | sed -r 's/VERSION_ID=(.*)/\1/g' | sed 's/\"//g')"; \ pkg="emqx-${EMQX_VERSION}-${ID}${VERSION_ID}-${arch}.tar.gz"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/v${EMQX_VERSION}/${pkg}; \ echo "$sha256 *$pkg" | sha256sum -c; \ mkdir /opt/emqx; \ tar zxf $pkg -C /opt/emqx; \ find /opt/emqx -name 'swagger*.js.map' -exec rm {} +; \ ln -s /opt/emqx/bin/* /usr/local/bin/; \ groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx; \ mkdir -p /opt/emqx/log /opt/emqx/data /opt/emqx/plugins; \ chown -R emqx:emqx /opt/emqx/log /opt/emqx/data /opt/emqx/plugins; \ rm -f $pkg; \ apt-get purge -y --auto-remove curl; \ rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/* WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 18083 for dashboard and API # - 4370 default Erlang distribution port # - 5369 for backplain gen_rpc EXPOSE 1883 8083 8084 8883 18083 4370 5369 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["/opt/emqx/bin/emqx", "foreground"]
3bd6840b8e5b82f0abc40e75e1eac0659955b44635c1c0dbcc00391b1e0341c3
52
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/5.7/Dockerfile
FROM debian:12-slim ENV EMQX_VERSION=5.7.2 ENV AMD64_SHA256=1f32fb90ca5e7b3d2a447a82d4e3d22397e25bc97800bdcb1deb6d2a685c1c35 ENV ARM64_SHA256=6bfa8c774a9f7b2957a6519e428c96d58ac4f748ddd0b40dd2b429d270fcf9c0 ENV LC_ALL=C.UTF-8 LANG=C.UTF-8 RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends ca-certificates procps curl; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="$AMD64_SHA256"; fi; \ if [ ${arch} = "arm64" ]; then sha256="$ARM64_SHA256"; fi; \ . /etc/os-release; \ pkg="emqx-${EMQX_VERSION}-${ID}${VERSION_ID}-${arch}.tar.gz"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/v${EMQX_VERSION}/${pkg}; \ echo "$sha256 *$pkg" | sha256sum -c; \ mkdir /opt/emqx; \ tar zxf $pkg -C /opt/emqx; \ find /opt/emqx -name 'swagger*.js.map' -exec rm {} +; \ ln -s /opt/emqx/bin/* /usr/local/bin/; \ groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx; \ chown -R emqx:emqx /opt/emqx; \ rm -f $pkg; \ rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/* WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 18083 for dashboard and API # - 4370 default Erlang distribution port # - 5369 for backplain gen_rpc EXPOSE 1883 8083 8084 8883 18083 4370 5369 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["/opt/emqx/bin/emqx", "foreground"]
49811aaabd0e548167e2bb1d045be88eeb852c6579e51d149b79d5d71e48446f
49
true
2025-06-07T11:41:56
alpine/emqx
https://raw.githubusercontent.com/emqx/emqx-docker/main/5.8/Dockerfile
FROM debian:12-slim ENV EMQX_VERSION=5.8.6 ENV AMD64_SHA256=430f69c24c0d659a9ce2e902d018c6dd20565519925e0cc893980d824b0a952e ENV ARM64_SHA256=dcabedb9d3888e0fb6e8138da6ae3d8ef1afce1f85e4580f26f19d65115ed5c3 ENV LC_ALL=C.UTF-8 LANG=C.UTF-8 RUN set -eu; \ apt-get update; \ apt-get install -y --no-install-recommends ca-certificates procps curl; \ arch=$(dpkg --print-architecture); \ if [ ${arch} = "amd64" ]; then sha256="$AMD64_SHA256"; fi; \ if [ ${arch} = "arm64" ]; then sha256="$ARM64_SHA256"; fi; \ . /etc/os-release; \ pkg="emqx-${EMQX_VERSION}-${ID}${VERSION_ID}-${arch}.tar.gz"; \ curl -f -O -L https://www.emqx.com/en/downloads/broker/v${EMQX_VERSION}/${pkg}; \ echo "$sha256 *$pkg" | sha256sum -c; \ mkdir /opt/emqx; \ tar zxf $pkg -C /opt/emqx; \ find /opt/emqx -name 'swagger*.js.map' -exec rm {} +; \ ln -s /opt/emqx/bin/* /usr/local/bin/; \ groupadd -r -g 1000 emqx; \ useradd -r -m -u 1000 -g emqx emqx; \ chown -R emqx:emqx /opt/emqx; \ rm -f $pkg; \ rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/* WORKDIR /opt/emqx USER emqx VOLUME ["/opt/emqx/log", "/opt/emqx/data"] # emqx will occupy these port: # - 1883 port for MQTT # - 8083 for WebSocket/HTTP # - 8084 for WSS/HTTPS # - 8883 port for MQTT(SSL) # - 18083 for dashboard and API # - 4370 default Erlang distribution port # - 5369 for backplain gen_rpc EXPOSE 1883 8083 8084 8883 18083 4370 5369 COPY docker-entrypoint.sh /usr/bin/ ENTRYPOINT ["/usr/bin/docker-entrypoint.sh"] CMD ["/opt/emqx/bin/emqx", "foreground"]
7b7d33f866a64cd00acf24e9e63b3c7d7904755f30c1050865f8e189cf65016e
49
true
2025-06-07T11:41:56
alpine/nikto
https://raw.githubusercontent.com/sullo/nikto/master/Dockerfile
FROM alpine:3.20.3 LABEL version="2.5.0" \ author="Author Paul Sec (https://github.com/PaulSec), Nikto User https://github.com/drwetter" \ docker_build="docker build -t sullo/nikto:2.5.0 ." \ docker_run_basic="docker run --rm sullo/nikto:2.5.0 -h http://www.example.com" \ docker_run_advanced="docker run --rm -v $(pwd):/tmp sullo/nikto:2.5.0 -h http://www.example.com -o /tmp/out.json" RUN echo 'Installing packages for Nikto.' RUN apk add --update --no-cache --virtual .build-deps \ perl \ perl-net-ssleay RUN echo 'Creating the nikto group.' \ && addgroup nikto \ && echo 'Creating the nikto user.' \ && adduser -G nikto -g "Nikto user" -s /bin/sh -HD nikto ENV PATH=${PATH}:/opt/nikto USER nikto COPY --chown=nikto:nikto ["program/", "/opt/nikto"] ENTRYPOINT ["nikto.pl"]
2a0d48e764cfaeeb4b93c1a42bbbcf9c801c06ea0e7f9de05ed82d80249e789b
24
true
2025-06-07T11:41:56
alpine/cfn-nag
https://raw.githubusercontent.com/stelligent/cfn_nag/master/.devcontainer/Dockerfile
FROM stelligent/vscode-remote-cfn_nag:latest
fa146cf17ec4e9a6d1fc6450ddaf5d7221e8873083ce800d550cf0ecfada4dc6
2
false
2025-06-07T11:41:56
alpine/xml
https://raw.githubusercontent.com/alpine-docker/xml/master/Dockerfile
FROM python:3-alpine RUN apk add --update --no-cache jq libxml2-utils curl RUN pip install --upgrade yq pip
8a8dd0e535883442cd0cd12d970394e88d1888a147a5cfd69d7b398d7f5824c1
5
false
2025-06-07T11:41:56
alpine/cfn-nag
https://raw.githubusercontent.com/stelligent/cfn_nag/master/Dockerfile
FROM ruby:2.7-alpine # an explicitly blank version appears to grab latest # override here for a real build process ARG version='' RUN gem install cfn-nag --version "$version" ENTRYPOINT ["cfn_nag"] CMD ["--help"]
e554ea82b966ed51f6550d68daf628e11c21e1bb5f344fb245ab38eb8965f02b
11
true
2025-06-07T11:41:56
alpine/cfn-nag
https://raw.githubusercontent.com/stelligent/cfn_nag/master/.devcontainer/build/Dockerfile
FROM ruby:2.7 # Avoid warnings by switching to noninteractive ENV DEBIAN_FRONTEND=noninteractive # Update package tool RUN apt-get update # Install apt-utils and suppress package configuration warning RUN apt-get update \ && apt-get -y install --no-install-recommends apt-utils dialog 2>&1 # Install build tools RUN apt-get install -y --no-install-recommends build-essential \ git # Install Docker CE CLI RUN apt-get install -y apt-transport-https \ ca-certificates \ curl \ gnupg-agent \ software-properties-common \ lsb-release \ && curl -fsSL https://download.docker.com/linux/$(lsb_release -is | tr '[:upper:]' '[:lower:]')/gpg | apt-key add - 2>/dev/null \ && add-apt-repository "deb [arch=amd64] https://download.docker.com/linux/$(lsb_release -is | tr '[:upper:]' '[:lower:]') $(lsb_release -cs) stable" \ && apt-get update \ && apt-get install -y docker-ce-cli # Install gems RUN gem install bundler RUN gem install rubocop RUN gem install solargraph # Install cfn-lint via pip RUN apt-get install -y python3-pip RUN pip3 install cfn-lint # Create a non-root user and provide sudo rights ARG USERNAME=cfn_nag_dev ARG USER_UID=1000 ARG USER_GID=$USER_UID RUN groupadd --gid $USER_GID $USERNAME \ && useradd --uid $USER_UID --gid $USER_GID --shell /bin/bash -m $USERNAME \ && apt-get install -y sudo \ && echo $USERNAME ALL=\(root\) NOPASSWD:ALL > /etc/sudoers.d/$USERNAME \ && chmod 0440 /etc/sudoers.d/$USERNAME # Persist bash history between runs RUN SNIPPET="export PROMPT_COMMAND='history -a' && export HISTFILE=/commandhistory/.bash_history" \ && mkdir /commandhistory \ && touch /commandhistory/.bash_history \ && chown -R $USERNAME /commandhistory \ && echo $SNIPPET >> "/home/$USERNAME/.bashrc" # Prompt gpg window inside container for signing commits & setup folder permissions for non-root user RUN echo 'export GPG_TTY="$(tty)"' >> /home/$USERNAME/.bashrc \ && mkdir /home/$USERNAME/.gnupg \ && chown -R $USERNAME /home/$USERNAME/.gnupg # Add non-root user to gems and bundle RUN chown -R $USERNAME /usr/local/lib/ruby/gems/2.7.0 \ && chown -R $USERNAME /usr/local/bundle # Enter container as non-root user USER $USERNAME
f047606471452022203a04680221121fafb0cc9e649acb9bed88fa44beb7063a
66
true
2025-06-07T11:41:56
alpine/cfn-nag
https://raw.githubusercontent.com/stelligent/cfn_nag/master/Dockerfile.local
FROM ruby:2.7-alpine ARG version COPY cfn-nag-${version}.gem / RUN gem install cfn-nag-${version}.gem ENTRYPOINT ["cfn_nag"] CMD ["--help"]
688fc4b7d4dbfbfa9601f0363ffce65e031da8ece1733557000eaad2a85dc99a
11
true
2025-06-07T11:41:56
alpine/cfn-nag
https://raw.githubusercontent.com/stelligent/cfn_nag/master/github-action/Dockerfile
FROM stelligent/cfn_nag:latest COPY entrypoint.sh /entrypoint.sh ENTRYPOINT [ "/entrypoint.sh" ]
058421f8ace8c419423d12b8bccff572b7421ac8824c9f76ac817616f6c50bd7
6
true
2025-06-07T11:41:56
alpine/gcloud
https://raw.githubusercontent.com/alpine-docker/gcloud/master/Dockerfile
FROM python:3-alpine # variable "VERSION" must be passed as docker environment variables during the image build ARG VERSION=290.0.1 ENV GCLOUD_URL="https://dl.google.com/dl/cloudsdk/channels/rapid/downloads/google-cloud-sdk-${VERSION}-linux-x86_64.tar.gz" ENV CLOUD_SQL_PROXY="https://dl.google.com/cloudsql/cloud_sql_proxy.linux.amd64" RUN apk add --update --no-cache curl ca-certificates bash && \ curl -L ${GCLOUD_URL} |tar xvz && \ /google-cloud-sdk/install.sh -q SHELL ["/bin/bash", "-c"] RUN source /google-cloud-sdk/completion.bash.inc && \ source /google-cloud-sdk/path.bash.inc && \ echo "source /google-cloud-sdk/completion.bash.inc" >> ~/.bashrc && \ echo "source /google-cloud-sdk/path.bash.inc" >> ~/.bashrc ENV PATH="/google-cloud-sdk/bin:${PATH}" RUN gcloud components list |grep "Not Installed" |while read line; do echo $line | awk -F "│" '{print $4}' ; done |while read component ; do gcloud components install ${component} -q ; done WORKDIR /apps
acb448f733d41a958996df3ef902ac492846d42ccffe82b4ecb307d562cf81f9
27
true
2025-06-07T11:41:56
alpine/jmeter
https://raw.githubusercontent.com/alpine-docker/jmeter/master/Dockerfile
# inspired by https://github.com/hauptmedia/docker-jmeter and # https://github.com/hhcordero/docker-jmeter-server/blob/master/Dockerfile and # https://github.com/justb4/docker-jmeter FROM alpine ARG JMETER_VERSION="5.3" ENV JMETER_HOME /opt/apache-jmeter-${JMETER_VERSION} ENV JMETER_BIN ${JMETER_HOME}/bin ENV JMETER_DOWNLOAD_URL https://archive.apache.org/dist/jmeter/binaries/apache-jmeter-${JMETER_VERSION}.tgz # Install extra packages # See https://github.com/gliderlabs/docker-alpine/issues/136#issuecomment-272703023 # Change TimeZone TODO: TZ still is not set! ARG TZ="Europe/Amsterdam" RUN apk update \ && apk upgrade \ && apk add ca-certificates \ && update-ca-certificates \ && apk add --update openjdk8-jre tzdata curl unzip bash \ && apk add --no-cache nss \ && rm -rf /var/cache/apk/* \ && mkdir -p /tmp/dependencies \ && curl -L --silent ${JMETER_DOWNLOAD_URL} > /tmp/dependencies/apache-jmeter-${JMETER_VERSION}.tgz \ && mkdir -p /opt \ && tar -xzf /tmp/dependencies/apache-jmeter-${JMETER_VERSION}.tgz -C /opt \ && rm -rf /tmp/dependencies # TODO: plugins (later) # && unzip -oq "/tmp/dependencies/JMeterPlugins-*.zip" -d $JMETER_HOME # Set global PATH such that "jmeter" command is found ENV PATH $PATH:$JMETER_BIN # Entrypoint has same signature as "jmeter" command COPY entrypoint.sh / WORKDIR ${JMETER_HOME} ENTRYPOINT ["/entrypoint.sh"]
fc8de8a72b620207521486a5100933d7b1c4e169e9cc4a552eb1184d3e136670
40
true
2025-06-07T11:41:56
alpine/dfimage
https://raw.githubusercontent.com/P3GLEG/Whaler/master/Dockerfile
FROM golang:1.24.1 AS builder ADD ./ /root/whaler_build WORKDIR /root/whaler_build RUN export CGO_ENABLED=0 && go build . RUN cp whaler /root/whaler FROM alpine:3.21.3 WORKDIR /root/ COPY --from=builder /root/whaler . ENTRYPOINT ["./whaler"]
c53368e1e2a32c0a1205d661b2a2d42d0418e08eeb0ea6c69d14d3963de7bb30
11
true
2025-06-07T11:41:56
alpine/ansible
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/ansible/Dockerfile
FROM alpine:3 RUN apk add --update --no-cache ansible bash openssh sshpass rsync ENTRYPOINT [] CMD ["ansible", "--help"]
a88bac146180f5de34013e2b05ab804670b3fe869a8690f82b63089e58c9f104
7
true
2025-06-07T11:41:56
alpine/cfn
https://raw.githubusercontent.com/aws-cloudformation/cfn-python-lint/main/Dockerfile
FROM public.ecr.aws/docker/library/python:3.13-alpine3.20 RUN pip install cfn-lint[full] RUN pip install pydot ENTRYPOINT ["cfn-lint"] CMD ["--help"]
6fe278f15d96af62328894804405c4a0a60f403155e9498d53f74f2eb67890b7
8
true
2025-06-07T11:41:56
alpine/ansible
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/asma/Dockerfile
# Stage 1: Build the Rust application FROM rust:alpine as builder # Install build dependencies RUN apk add --no-cache musl-dev git # Set the working directory inside the container WORKDIR /usr/src # Clone the source code from GitHub using the specified version (tag) ARG VERSION=1.0.0 RUN git clone https://github.com/aws/aws-secretsmanager-agent.git && \ cd aws-secretsmanager-agent && \ git checkout v$VERSION # Set the working directory inside the container WORKDIR /usr/src/aws-secretsmanager-agent # Build the Rust application RUN cargo build --release # Stage 2: Create a smaller image with the built binary FROM alpine:latest # Install necessary runtime dependencies RUN apk --no-cache add ca-certificates bash acl # Set the working directory inside the container WORKDIR /usr/local/bin # Copy the binary from the builder stage COPY --from=builder /usr/src/aws-secretsmanager-agent/target/release/aws_secretsmanager_agent secrets-manager-agent COPY --from=builder /usr/src/aws-secretsmanager-agent/aws_secretsmanager_agent/configuration/awssmaseedtoken . # Create a group and a user RUN addgroup -S awssmatokenreader && adduser -S awssmauser -G awssmatokenreader # Change the ownership of the binary to the created user and group RUN chown awssmauser:awssmatokenreader /usr/local/bin/secrets-manager-agent # Create the entrypoint script COPY entrypoint.sh /usr/local/bin/entrypoint.sh RUN chmod +x /usr/local/bin/entrypoint.sh RUN chgrp -R awssmatokenreader /var/run && chmod -R g+rwx /var/run RUN chgrp -R awssmatokenreader /run && chmod -R g+rwx /run # Switch to the created user USER awssmauser # Set environment variable ENV AWS_TOKEN=file:///var/run/awssmatoken # Run the entrypoint script by default when the container starts ENTRYPOINT ["/usr/local/bin/entrypoint.sh"]
0ea7bffe4afc3e55dcc6a642968c429cf37a8774396a5ab11fc2be96e57c004a
55
true
2025-06-07T11:41:56
alpine/ansible
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/bruno/Dockerfile
FROM node:18-alpine RUN npm install -g @usebruno/cli ENTRYPOINT [ "bru" ] CMD ["--help"]
a2e1372358d13a475a747cf980b8e92d6e8bd35a577429b9fcfa787de8a9aea6
7
true
2025-06-07T11:41:56
alpine/ansible
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/curl/Dockerfile
FROM alpine RUN apk add --update --no-cache curl COPY entrypoint.sh / ENTRYPOINT ["/entrypoint.sh"] CMD ["curl"]
a1c77853d64b3b9a73202b1185bbd187438d332ba00683b78fcc65378668677d
9
true
2025-06-07T11:41:56
alpine/ansible
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/flake8/Dockerfile
FROM python:3-alpine RUN pip install flake8 RUN pip install flake8-sarif WORKDIR /apps ENTRYPOINT ["flake8"] CMD ["--help"]
9ef8412b5a2e041a1d7785d49bf269bd88b3c769b818c632b2467e1a830d81b2
10
true
2025-06-07T11:41:56
alpine/ansible
https://raw.githubusercontent.com/alpine-docker/multi-arch-libs/master/httpie/Dockerfile
FROM python:3-alpine RUN apk add build-base python3-dev && \ python -m pip install --upgrade pip wheel && \ python -m pip install httpie && \ apk del build-base python3-dev ENTRYPOINT [ "http" ] CMD ["--help"]
76d253d8b5a4f108fd50bb8dfc6fd3715b61c75a0025e031f57fec8e4d1b928f
10
true
2025-06-07T11:41:56
End of preview.

Dockerfiles Linted Dataset

This dataset contains 195,758 Dockerfiles collected from public container images found on Docker Hub. Each Dockerfile is enriched with metadata and statically analyzed using Hadolint.

Dataset Overview

Dockerfiles were collected by:

  1. Enumerating Docker Hub images,
  2. Extracting raw GitHub URLs pointing to Dockerfile locations in those repositories,
  3. Downloading each file and extracting content-level metadata (e.g. line count, validity),
  4. Fetching GitHub-level metadata such as license, stars, and path,
  5. Running Hadolint to detect Dockerfile best-practice violations.

Each data entry includes:

  • Dockerfile content and metadata (hash, lines, valid),
  • GitHub repository context (repo URL, license, stars, branch),
  • Hadolint static analysis results.

Structure

The dataset is split into 4 progressive stages:

resolved/       → Resolved image ↔ raw Dockerfile URL mappings
enriched/       → Dockerfile content + metadata (hash, lines, valid)
full/           → Enriched with GitHub repository metadata
linted/         → Final stage with Hadolint static analysis results
summary/        → Visual summaries and statistics

Each folder contains:

  • 20 partial .jsonl chunks (10k entries each),
  • 1 combined *_all.jsonl file for bulk use,
  • a dataset_info.json describing the data structure.

Bias Warning: CircleCI Dominance

A very large portion of the Dockerfiles originate from the circleci/circleci-dockerfiles repository (170,000+ entries).
To ensure clarity, we include two sets of visualizations:

  • Full dataset statistics
  • Statistics with CircleCI excluded

This allows users to explore data either globally or more evenly across repositories.

Repository Distribution

Top 20 repositories by number of Dockerfiles (entire dataset):

Top 20 Repositories

Top 20 repositories (excluding CircleCI):

Top 20 Repositories (No CircleCI)

Hadolint Rule Violations

Top 20 Hadolint rules triggered (entire dataset):

Top 20 Hadolint Rules

Top 20 Hadolint rules (excluding CircleCI):

Top 20 Hadolint Rules (No CircleCI)

Example Entry

Each row in the .jsonl files contains enriched information about a Dockerfile.
The full field structure for each stage is documented in its respective dataset_info.json.

License

This dataset is provided under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.

Attribution Notice

This dataset contains Dockerfiles originally created by developers across many public GitHub repositories.
We do not claim ownership of any individual Dockerfile.
Instead, we provide this dataset as a collection of metadata, structure, and analysis, compiled and curated for research and educational use.

Please consult individual repository licenses if you plan to reuse specific Dockerfile content in derived works.

Downloads last month
99