{"id":13638022,"url":"https://github.com/remorses/cloud-run-compose","last_synced_at":"2025-10-14T01:07:27.483Z","repository":{"id":62562880,"uuid":"236236788","full_name":"remorses/cloud-run-compose","owner":"remorses","description":"Generate Google Cloud Run terraform plan from a docker-compose file","archived":false,"fork":false,"pushed_at":"2020-02-07T18:35:14.000Z","size":43552,"stargazers_count":10,"open_issues_count":1,"forks_count":2,"subscribers_count":3,"default_branch":"master","last_synced_at":"2025-09-01T16:58:47.213Z","etag":null,"topics":["cloud-run","containers","docker","docker-compose","google-cloud","microservice"],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/remorses.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2020-01-25T22:09:59.000Z","updated_at":"2024-10-30T16:09:39.000Z","dependencies_parsed_at":"2022-11-03T15:45:16.101Z","dependency_job_id":null,"html_url":"https://github.com/remorses/cloud-run-compose","commit_stats":null,"previous_names":[],"tags_count":7,"template":false,"template_full_name":"remorses/python-lib-template","purl":"pkg:github/remorses/cloud-run-compose","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/remorses%2Fcloud-run-compose","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/remorses%2Fcloud-run-compose/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/remorses%2Fcloud-run-compose/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/remorses%2Fcloud-run-compose/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/remorses","download_url":"https://codeload.github.com/remorses/cloud-run-compose/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/remorses%2Fcloud-run-compose/sbom","scorecard":{"id":770416,"data":{"date":"2025-08-11","repo":{"name":"github.com/remorses/cloud-run-compose","commit":"84355f3cd246b28868a7415bb587760a7dd1c9ac"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":2.9,"checks":[{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Code-Review","score":0,"reason":"Found 0/29 approved changesets -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/pythonpackage.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"SAST","score":0,"reason":"no SAST tool detected","details":["Warn: no pull requests merged into dev branch"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"License","score":0,"reason":"license file not detected","details":["Warn: project does not have a license file"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pythonpackage.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/remorses/cloud-run-compose/pythonpackage.yml/master?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/pythonpackage.yml:15: update your workflow using https://app.stepsecurity.io/secureworkflow/remorses/cloud-run-compose/pythonpackage.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/pythonpackage.yml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/remorses/cloud-run-compose/pythonpackage.yml/master?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/pythonpackage.yml:31: update your workflow using https://app.stepsecurity.io/secureworkflow/remorses/cloud-run-compose/pythonpackage.yml/master?enable=pin","Warn: containerImage not pinned by hash: Dockerfile:1: pin your Docker image by updating python:3.7.4-alpine to python:3.7.4-alpine@sha256:6673d8ce9610d166b6d7d6abda21537ddcf30e6bc8c20ca86f17f1085e20ac95","Warn: pipCommand not pinned by hash: .github/workflows/pythonpackage.yml:18","Warn: pipCommand not pinned by hash: .github/workflows/pythonpackage.yml:19","Warn: pipCommand not pinned by hash: .github/workflows/pythonpackage.yml:22","Info:   0 out of   2 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   2 third-party GitHubAction dependencies pinned","Info:   0 out of   1 containerImage dependencies pinned","Info:   0 out of   3 pipCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"Branch-Protection","score":0,"reason":"branch protection not enabled on development/release branches","details":["Warn: branch protection not enabled for branch 'master'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Vulnerabilities","score":8,"reason":"2 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: PYSEC-2021-142 / GHSA-8q59-q68h-6hv4","Warn: Project is vulnerable to: PYSEC-2018-49 / GHSA-rprw-h62v-c2w7"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-23T02:05:46.593Z","repository_id":62562880,"created_at":"2025-08-23T02:05:46.593Z","updated_at":"2025-08-23T02:05:46.593Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279017454,"owners_count":26086081,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-13T02:00:06.723Z","response_time":61,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cloud-run","containers","docker","docker-compose","google-cloud","microservice"],"created_at":"2024-08-02T01:00:38.681Z","updated_at":"2025-10-14T01:07:27.460Z","avatar_url":"https://github.com/remorses.png","language":"Python","readme":"# cloud-run-compose\n\nDeploy a stack of services to Cloud Rus using the docker-compose syntax.\n\nCreates a terraform plan based on the docker-compose configuration.\n\nMissing docker-compose features\n\n-   service discovery\n-   volumes\n-   non https traffic\n\n## Install\n\n```\npip3 install cloud-run-compose\n```\n\n## Requirements\n\n-   `terraform` in PATH\n-   `docker-compose` in PATH\n-   a google cloud dervice account .json file\n\n## Usage\n\nDownload a service account json from the console, with the cloud run persmissions, place it in `./account.json`\n\nUse the following `docker-compose.yml` file\n\n```yml\nversion: '3'\n\nservices:\n    example-cloudrun-compose:\n        image: gcr.io/cloudrun/hello\n        expose:\n            - 8080\n        environment:\n            URL_0: 'http://mongoke/'\n            URL_1: 'http://server'\n    example-cloudrun-compose2:\n        image: gcr.io/cloudrun/hello\n        expose:\n            - 8080\n```\n\nRun the following command to deploy the services\n\n`compose --project {your-project} --credentials ./account.json`\n\nThe command will generate a `main.tf` file in the working directory, to deploy the plan run\n\n`terraform apply`\n\nThe services will be deployed in google cloud run and will be available at url like\n\n`https://{service-name}-zakzcx4zxq-uc.a.run.app`\n\n## Build and push\n\nIf you want to also build and push the services you can use the `--build` flag, it will\n\n-   build the service using the docker-compose cache\n-   push the image\n\n`compose --build --project {your-project} --credentials ./account.json`\n\n# TODO\n\n-   add private option in `labels`\n-   only support remote bucket usage\n-   add constraints of concurrency, memory, cpu, maxScale via labels\n-\n","funding_links":[],"categories":["Tools"],"sub_categories":["Container guides"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fremorses%2Fcloud-run-compose","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fremorses%2Fcloud-run-compose","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fremorses%2Fcloud-run-compose/lists"}