dockwrap
dockwrap copied to clipboard
A very simple Docker wrapper written in bash designed to enforce some kind of lifecycle for your containerized app
Dockwrap
Dockwrap is a small utility written in Bash designed to help you test/run your application in a Docker container.
By default, Docker spawns a new container from an image when you use docker run, and you usually have to repeat a lot of commands and know complex arguments if you want to build, run and stop your app while testing it.
Furthermore, Docker randomly assigns IP addresses in the range provided by the bridged interface specified by the --bridge parameter, or the CIDR range provided by --bip. This means you'll get a new IP each time you start a new container. This tool is able to perform dynamic DNS updates to assign one or multiple sub-domain in a zone to the IP address allocated by Docker. This is very useful for testing purposes. The feature has been tested with the default configuration of Bind9 on Ubuntu. You need the nsupdate tool which is provided by the package dnsutils on Debian/Ubuntu.
Installation
Clone the repo or download the file directly with: wget https://github.com/gferon/dockwrap/blob/master/dockwrap.sh
You can install the script in /usr/local/bin/dockwrap by running ./dockwrap install.
Usage
Usage: dockwrap [--remote] [OPTIONS]
You can chain multiple options, like dockwrap build destroy run
All the commands can be executed on a remote docker daemon, when running with --remote and using
the environment variable DOCKWRAP_REMOTE_DAEMON. The remote docker daemon needs to listen on a TCP socket for this feature to work.
To use dockwrap, you need to run dockwrap init in the directory containing your Dockerfile. This will create a sample dockwrap-env.sh file which contains all the host-specific settings which are detailed later on this page.
Environment variables
TAG- the tag to use when building the imageVERSION- the version to use along with the tag (Docker defaults to 'latest')CONTAINER_NAME- the name to assign when spawning a new container from the image, this is used by Dockwrap to enforce a "lifecycle" on your containerized app, you won't be able to spawn multiple instances of your appDNS_SERVER- the DNS server to use for dynamic updatesZONE- the DNS zone you have the right to update (usually localhost on a dev machine)SUBDOMAIN- all the subdomains you want to add on the DNS serverVOLUME_OPTS- this is where you can define the shared folders between the host and the containerADDITIONAL_OPTS- any kind of additional options you want to pass todocker runBROWSE_BASE_URL- the base URL used when runningdockwrap browseBROWSE_PATH- the path of your app fordockwrap browse
Don't forget to exclude the dockwrap-env.sh file from your git repo is you are multiple users, as all the variables contained in the file are host-specific.
Core functions
build- Build the image using the Dockerfile in the current directory and tag itstart- Spawn a new container in detached mode with a pseudo-tty. If a container namedCONTAINER_NAMEalready exists, start it. If the container permits it (uses CMD and not ENTRYPOINT) you can specify a different command likedockwrap run /bin/bash.stop- Stop the running containerdebug- Same asstartexcept wedocker attachafter starting the containerexec- Use docker exec to spawn a new instance of the specified program (defaults to /bin/bash)commit- Commit the named container and tag it as the latest version of the imagedestroy- Stop then remove the running container, this is a destructive operationinfo- Get the status of the running container, its IP address, and the DNS domain you can use
Helper functions
tidy- Delete stopped containers images and untagged images to regain volume spacebrowse- Open the default browser
Disclaimer
I know I'm somewhat reinventing the wheel here, but I really wanted an integrated solution I could quickly modify without any kind of external dependencies, except a DNS server.