Install
openclaw skills install docker-engDeep Docker workflow—image design, multi-stage builds, security, runtime config, health checks, and operations. Use when containerizing apps, hardening images, or debugging container behavior in CI and production.
openclaw skills install docker-engContainers package applications with their dependencies. Optimize for small, reproducible images and clear runtime contracts—not “SSH into a mini VM.”
Trigger conditions:
Initial offer:
Use six stages: (1) base image & supply chain, (2) Dockerfile structure, (3) runtime config & secrets, (4) security hardening, (5) health & observability, (6) ops & debugging). Confirm registry and orchestrator (Kubernetes, ECS, etc.).
Goal: Pin tags or digests; prefer minimal bases (distroless, slim) when compatible.
Goal: Multi-stage builds: compile in builder, copy only artifacts to runtime; order layers for cache hits (dependency manifests before source).
.dockerignore (exclude secrets, build artifacts, VCS noise)Goal: Configuration via environment variables; secrets injected at runtime (K8s secrets, IAM, vault)—never COPY real secrets into the image.
Goal: Run as non-root; read-only filesystem where possible; minimal packages in final image; avoid leaking build tools in production.
Goal: HEALTHCHECK or orchestrator probes match real readiness (dependencies up); logs to stdout/stderr in structured form.
Goal: Tag images with git SHA; document how to exec/debug (or use debug sidecars for distroless).
COPY package.json before COPY . matters.