2022
DOI: 10.1109/access.2021.3137671
|View full text |Cite
|
Sign up to set email alerts
|

Developing Docker and Docker-Compose Specifications: A Developers’ Survey

Abstract: Cloud computing and Infrastructure-as-Code (IaC), supported by technologies such as Docker, have shaped how many software systems are built and deployed. Previous research has identified typical issues for some types of IaC specification but not why they come to be, or they have delved into collaboration aspects but not into technical ones. This work aims to characterize the activities around two particular kinds of IaC specification-Dockerfiles and docker-compose.yml files. We seek to know how they can be bet… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0
1

Year Published

2022
2022
2025
2025

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 32 publications
(16 citation statements)
references
References 25 publications
0
14
0
1
Order By: Relevance
“…Typically, if a developer creates a Docker environment [28], the workflow is convoluted and most of the time relies on a trial-and-error process. Editing a specification (e.g., a Docker file), building it into an image, instantiating the image in a container, understanding whether it works as expected or not, identifying the cause(s) of a fault, and returning to the first step to improve the specification are all steps in creating a Docker container.…”
Section: Build Toolsmentioning
confidence: 99%
“…Typically, if a developer creates a Docker environment [28], the workflow is convoluted and most of the time relies on a trial-and-error process. Editing a specification (e.g., a Docker file), building it into an image, instantiating the image in a container, understanding whether it works as expected or not, identifying the cause(s) of a fault, and returning to the first step to improve the specification are all steps in creating a Docker container.…”
Section: Build Toolsmentioning
confidence: 99%
“…We provide photos with vulnerabilities and evaluate how well our method for finding the flaws works. Additionally, we demonstrate how dynamic analysis complements the static studies generally used for security assessments by evaluating the security of Docker containers based on their activity [27].…”
Section: Security Vulnerabilities In Containerizationmentioning
confidence: 99%
“…In this article, we restrict our analysis of related works (cf. Section V) to those addressing simultaneously patterns and software quality aspects in the scope of microservices design, but such a systematic review could also look in more detail into works as those done by Li et al [36], Reis et al [37], Bogner et al [38], [39], Soldani et al [40] and Waseem et al [41], which study practices and quality aspects in the context of microservices. Even if not necessarily leaning on pattern literature and on how patterns are perceived by professionals, we believe that some of the results of these studies could be used to improve existing pattern knowledge.…”
Section: Future Workmentioning
confidence: 99%