{"id":23521249,"url":"https://github.com/leplusorg/docker-yaml","last_synced_at":"2025-04-19T19:42:37.086Z","repository":{"id":39871122,"uuid":"225735314","full_name":"leplusorg/docker-yaml","owner":"leplusorg","description":"Docker container with utilities to process YAML files (yamllint...).","archived":false,"fork":false,"pushed_at":"2024-05-23T03:00:53.000Z","size":214,"stargazers_count":6,"open_issues_count":1,"forks_count":3,"subscribers_count":2,"default_branch":"main","last_synced_at":"2024-05-23T03:33:43.403Z","etag":null,"topics":["docker","docker-container","docker-image","dockerfile","yaml","yaml-parser","yaml-processor","yaml-to-json","yaml-validator","yaml2json","yamllint","yamlpath","yq"],"latest_commit_sha":null,"homepage":"https://hub.docker.com/r/leplusorg/yaml","language":"Dockerfile","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/leplusorg.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2019-12-03T23:13:42.000Z","updated_at":"2024-05-29T04:28:52.376Z","dependencies_parsed_at":"2023-09-29T02:49:16.360Z","dependency_job_id":"8cbe0274-3740-4b47-9424-9899ca7472fb","html_url":"https://github.com/leplusorg/docker-yaml","commit_stats":{"total_commits":80,"total_committers":5,"mean_commits":16.0,"dds":"0.21250000000000002","last_synced_commit":"a80ff0d9e4e70482f85d3c35e2e0dd7b82f54f20"},"previous_names":[],"tags_count":7,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/leplusorg%2Fdocker-yaml","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/leplusorg%2Fdocker-yaml/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/leplusorg%2Fdocker-yaml/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/leplusorg%2Fdocker-yaml/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/leplusorg","download_url":"https://codeload.github.com/leplusorg/docker-yaml/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":231260790,"owners_count":18349461,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["docker","docker-container","docker-image","dockerfile","yaml","yaml-parser","yaml-processor","yaml-to-json","yaml-validator","yaml2json","yamllint","yamlpath","yq"],"created_at":"2024-12-25T17:11:29.325Z","updated_at":"2025-04-19T19:42:37.080Z","avatar_url":"https://github.com/leplusorg.png","language":"Dockerfile","readme":"# YAML\n\nDocker container with utilities to process YAML files (yamllint...).\n\n[![Dockerfile](https://img.shields.io/badge/GitHub-Dockerfile-blue)](yaml/Dockerfile)\n[![Docker Build](https://github.com/leplusorg/docker-yaml/workflows/Docker/badge.svg)](https://github.com/leplusorg/docker-yaml/actions?query=workflow:\"Docker\")\n[![Docker Stars](https://img.shields.io/docker/stars/leplusorg/yaml)](https://hub.docker.com/r/leplusorg/yaml)\n[![Docker Pulls](https://img.shields.io/docker/pulls/leplusorg/yaml)](https://hub.docker.com/r/leplusorg/yaml)\n[![Docker Version](https://img.shields.io/docker/v/leplusorg/yaml?sort=semver)](https://hub.docker.com/r/leplusorg/yaml)\n[![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/10074/badge)](https://bestpractices.coreinfrastructure.org/projects/10074)\n[![OpenSSF Scorecard](https://api.securityscorecards.dev/projects/github.com/leplusorg/docker-yaml/badge)](https://securityscorecards.dev/viewer/?uri=github.com/leplusorg/docker-yaml)\n\n## Example not using the filesystem\n\nLet's say that you have a file `foo.yml` in your current working directory that you want to validate:\n\n**Mac/Linux**\n\n```bash\ncat foo.yml | docker run --rm -i --net=none leplusorg/yaml yamllint -\n```\n\n**Windows**\n\n```batch\ntype foo.yml | docker run --rm -i --net=none leplusorg/yaml yamllint -\n```\n\n## Example using the filesystem\n\nSame thing, assuming that you have a file `foo.yml` in your current working directory that you want to validate:\n\n**Mac/Linux**\n\n```bash\ndocker run --rm -t --user=\"$(id -u):$(id -g)\" --net=none -v \"$(pwd):/tmp\" leplusorg/yaml yamllint /tmp/foo.yml\n```\n\n**Windows**\n\nIn `cmd`:\n\n```batch\ndocker run --rm -t --net=none -v \"%cd%:/tmp\" leplusorg/yaml yamllint /tmp/foo.yml\n```\n\nIn PowerShell:\n\n```pwsh\ndocker run --rm -t --net=none -v \"${PWD}:/tmp\" leplusorg/yaml yamllint /tmp/foo.yml\n```\n\n## Help\n\nTo know more command-line options of `yamllint`:\n\n```bash\ndocker run --rm --net=none leplusorg/yaml yamllint -h\n```\n\n## Software Bill of Materials (SBOM)\n\nTo get the SBOM for the latest image (in SPDX JSON format), use the\nfollowing command:\n\n```bash\ndocker buildx imagetools inspect leplusorg/yaml --format '{{ json (index .SBOM \"linux/amd64\").SPDX }}'\n```\n\nReplace `linux/amd64` by the desired platform (`linux/amd64`, `linux/arm64` etc.).\n\n### Sigstore\n\n[Sigstore](https://docs.sigstore.dev) is trying to improve supply\nchain security by allowing you to verify the origin of an\nartifcat. You can verify that the jar that you use was actually\nproduced by this repository. This means that if you verify the\nsignature of the ristretto jar, you can trust the integrity of the\nwhole supply chain from code source, to CI/CD build, to distribution\non Maven Central or whever you got the jar from.\n\nYou can use the following command to verify the latest image using its\nsigstore signature attestation:\n\n```bash\ncosign verify leplusorg/yaml --certificate-identity-regexp 'https://github\\.com/leplusorg/docker-yaml/\\.github/workflows/.+' --certificate-oidc-issuer 'https://token.actions.githubusercontent.com'\n```\n\nThe output should look something like this:\n\n```text\nVerification for index.docker.io/leplusorg/xml:main --\nThe following checks were performed on each of these signatures:\n  - The cosign claims were validated\n  - Existence of the claims in the transparency log was verified offline\n  - The code-signing certificate was verified using trusted certificate authority certificates\n\n[{\"critical\":...\n```\n\nFor instructions on how to install `cosign`, please read this [documentation](https://docs.sigstore.dev/cosign/system_config/installation/).\n\n## Request new tool\n\nPlease use [this link](https://github.com/leplusorg/docker-yaml/issues/new?assignees=thomasleplus\u0026labels=enhancement\u0026template=feature_request.md\u0026title=%5BFEAT%5D) (GitHub account required) to request that a new tool be added to the image. I am always interested in adding new capabilities to these images.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fleplusorg%2Fdocker-yaml","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fleplusorg%2Fdocker-yaml","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fleplusorg%2Fdocker-yaml/lists"}