DevOps tools
10 browser-based tools for infrastructure and deployment workflows — lint, format, validate, and build config files without uploading anything. No signup, no cloud, nothing leaves your device.
DevOps tools
-
Dockerfileリンター
Dockerfileのよくあるミス・セキュリティ問題・ベストプラクティス違反をチェック。
ツールを開く →
-
NGINX設定フォーマッター
NGINXの設定ファイルを読みやすくフォーマット・インデントします。
ツールを開く →
-
.envフォーマッター
.env環境変数ファイルを検証・ソート・整形します。
ツールを開く →
-
.htaccessビルダー
リダイレクト・HTTPS・認証などApache .htaccessルールを生成します。
ツールを開く →
-
GitHub Actionsリンター
GitHub Actionsワークフローの YAML 構造とよくあるミスを検証します。
ツールを開く →
-
SSH鍵生成ビルダー
RSA・Ed25519・ECDSAキー向けの正しいssh-keygenコマンドを構築します。
ツールを開く →
-
ポートリファレンス
ウェルノウンポート番号をプロトコル・サービス詳細付きで参照・検索できます。
ツールを開く →
-
SSL証明書デコーダー
PEM証明書を貼り付けると、ブラウザ上でサブジェクト・発行者・有効期限を表示。
ツールを開く →
-
DNSレコードビルダー
A・AAAA・CNAME・MX・TXTなどのDNSゾーンファイルレコードを作成・整形します。
ツールを開く →
-
.gitignoreビルダー
言語・フレームワークを選択して .gitignore ファイルを自動生成します。
ツールを開く →
Why browser-only DevOps tools?
Infrastructure configuration files often contain sensitive data: environment variable values, SSL private key paths, server hostnames, and authentication credentials. Uploading these to an online linter or formatter means trusting a third party with production secrets. The tools on this page run entirely in your browser — paste freely, audit thoroughly, and share nothing.
These tools are designed for the moments between commits: quickly checking a Dockerfile before pushing an image, formatting an NGINX config block before a deploy, or building a DNS record string before updating your zone file. Fast, private, and always available.
Choosing the right tool
For container workflows: start with the Dockerfile Linter to catch mistakes before building. For web server work: use the NGINX Formatter or .htaccess Builder. For CI/CD: validate your pipelines with the GitHub Actions Linter. For security: decode SSL certificates or generate SSH keygen commands. For DNS: use the DNS Record Builder. For project setup: generate .gitignore files and format .env files.
よくある質問
- Do my config files get uploaded to a server?
- No. Every DevOps tool on this page runs entirely in your browser using JavaScript. Your Dockerfiles, NGINX configs, SSH keys, and certificates never leave your device — not even temporarily.
- Can I use these tools with sensitive production config?
- Yes. Because all processing happens locally in your browser, it is safe to paste production configuration files, SSH key comments, SSL certificates, and .env files without risking exposure to third parties.
- Does the Dockerfile linter cover all best practices?
- The Dockerfile linter checks for the most impactful best practices: correct instruction order, combined RUN statements, avoiding the latest tag, using COPY over ADD, setting a non-root USER, and more. For a comprehensive audit, pair it with Hadolint in CI.
- Can the SSL cert decoder handle certificates from any CA?
- Yes. The decoder parses the PEM-encoded DER binary directly in your browser. It works with certificates from any Certificate Authority — Let's Encrypt, DigiCert, Comodo, self-signed, or any other CA.
- What DNS record types does the DNS Record Builder support?
- The builder supports A, AAAA, CNAME, MX, TXT, NS, CAA, and SRV records. It outputs the zone file format and the matching dig command for verification.
- Which .gitignore templates are included?
- Templates cover the most common stacks: Node.js, Python, Java, Go, Rust, PHP, Ruby, .NET/C#, Xcode/iOS, Android, React, Docker, Terraform, and a generic OS template for macOS and Windows system files.
- Do these tools work offline?
- Yes. All computation runs locally once the page has loaded. The tools continue to work with no network connection after the initial page load.
- Which SSH key type should I generate?
- Ed25519 is the modern default — it is fast, small, and secure. Use RSA 4096 when connecting to older servers that do not support Ed25519. Avoid RSA 1024 and DSA entirely as both are considered weak.