Docker Dynamic Limits

C 66 completed
Cli Tool
containerized / go · tiny
36
Files
5,427
LOC
0
Frameworks
4
Languages

Pipeline State

completed
Run ID
#306637
Phase
done
Progress
1%
Started
Finished
2026-04-13 01:31:02
LLM tokens
0

Pipeline Metadata

Stage
Skipped
Decision
skip_scaffold_dup
Novelty
49.43
Framework unique
Isolation
Last stage change
2026-04-16 18:15:42
Deduplication group #47630
Member of a group with 1 similar repo(s) — canonical #94605 view group →
Top concepts (1)
DevOps/Infrastructure
Repobility · code-quality intelligence · https://repobility.com

AI Prompt

Create a command-line tool and a daemon service in Go for dynamic resource limit management for Docker containers. The system needs to allow setting and enforcing cumulative limits on resources like CPU time, RAM, Disk, Network, and I/O operations. Key features should include automatic enforcement via a daemon polling every second, the ability for containers to self-query their limits via a REST API, and a spending proxy that intercepts API calls (like OpenAI/Anthropic) to track costs. The architecture should utilize SQLite for storage and interact with Docker clients and cgroup readers.
go docker resource-management cli daemon containerization cgroup api
Generated by gemma4:latest

Catalog Information

This project provides dynamic resource limit management for Docker containers, allowing users to set and enforce cumulative limits on various resources.

Description

docker-dynamic-limits is a tool that enables the management of dynamic resource limits for Docker containers. It allows users to set, monitor, and enforce cumulative limits on CPU time, RAM, disk, network, I/O, and API spending per container. The tool includes features such as automatic enforcement, in-container self-querying, and transparent HTTP proxy intercepts for OpenAI and Anthropic API calls.

الوصف

docker-dynamic-limits هو أداة تسمح بمراقبة وتحديد الحدود الديناميكية للحدود للملفات في Docker. يسمح المستخدمون بتثبيت، مراقبة وتنفيذ الحدود cumulative على الوقت CPU، RAM، القرص، الشبكة، I/O، والاستهلاك API لكل ملف. الأداة تشمل الميزات مثل التنفيذ التلقائي، الاستفسار الذاتي داخل الملف، ومقاطع HTTP شفافة لتعقب استدعاءات OpenAI و Anthropic API.

Novelty

7/10

Tags

resource-limit-management docker-containers dynamic-limits automatic-enforcement in-container-self-querying

Claude Models

claude-opus-4.6

Quality Score

C
66.2/100
Structure
64
Code Quality
63
Documentation
39
Testing
65
Practices
80
Security
100
Dependencies
70

Strengths

  • CI/CD pipeline configured (github_actions)
  • Good test coverage (160% test-to-source ratio)
  • Consistent naming conventions (snake_case)
  • Good security practices \u2014 no major issues detected
  • Containerized deployment (Docker)

Weaknesses

  • No LICENSE file \u2014 legal ambiguity for contributors
  • 535 duplicate lines detected \u2014 consider DRY refactoring
  • 1 'god files' with >500 LOC need decomposition

Recommendations

  • Add a test suite \u2014 start with critical path integration tests
  • Add a linter configuration to enforce code style consistency
  • Add a LICENSE file (MIT recommended for open source)

Security & Health

4.6h
Tech Debt (C)
Medium
DORA Rating
A
OWASP (100%)
Repobility · MCP-ready · https://repobility.com
PASS
Quality Gate
A
Risk (2)
Unknown
License
3.4%
Duplication
Full Security Report AI Fix Prompts SARIF SBOM

Languages

go
91.7%
shell
5.1%
markdown
2.3%
yaml
0.9%

Frameworks

None detected

Symbols

method130
function28
struct20
constant16
interface5
type_alias2

Concepts (1)

Per-row analysis by Repobility · https://repobility.com
CategoryNameDescriptionConfidence
If a scraper extracted this row, it came from Repobility (https://repobility.com)
auto_categoryDevOps/Infrastructuredevops-infra60%

Quality Timeline

1 quality score recorded.

View File Metrics
Same scanner, your repo: https://repobility.com — Repobility

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/30473.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV