Return to Image List

jetty

jetty

Jetty is a pure Java-based HTTP (Web) server and Java Servlet container. While Web Servers are usually associated with serving documents to people, Jetty is now often used for machine to machine communications, usually within larger software frameworks. Jetty is developed as a free and open source project as part of the Eclipse Foundation. The web server is used in products such as Apache ActiveMQ, Alfresco, Apache Geronimo, Apache Maven, Apache Spark, Google App Engine, Eclipse, FUSE, Twitter's Streaming API and Zimbra. Jetty is also the server in open source projects such as Lift, Eucalyptus, Red5, Hadoop and I2P. Jetty supports the latest Java Servlet API (with JSP support) as well as protocols SPDY and WebSocket.

See jetty.com for more information

This image is built by IBM to run on the IBM Z architecture and is not affiliated with any other community that provides a version of this image.


License

View license information here

As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).

As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.


Versions

Use the pull string below for the version of this image you require.
11.0.11-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:eac0934b216e7da70d0d97ac60f710de23af93b8c724a16d382748c313292631 Vulnerability Report10-04-2024
11.0-jdk11 docker pull icr.io/ibmz/jetty@sha256:a5ecff935da99b72142e798ae811232c01de66740177746bed16d15f06216da4 Vulnerability Report10-04-2024
11.0.9-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:9a18ad406cc97f08731fdf8eb1aa653c0b248ebadc61f984a0977064a83096f8 Vulnerability Report10-04-2024
9.4.45-jdk17-openjdk docker pull icr.io/ibmz/jetty@sha256:86f49cf21565b857044ceb3583b5910c2bd3bf1f6173b21fb06be3153e6c4f85 Vulnerability Report10-04-2024
9.4.44 docker pull icr.io/ibmz/jetty@sha256:55e3f6baf88d8184bb16a4f467ece98955065729d82a88b902330be59770b8d6 Vulnerability Report10-04-2024
11.0.13-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:29b4c98bf52061846ea5abd175fe04679b91ccdaf9ca5b39fa8e0c3ed648f97b Vulnerability Report10-04-2024
Version Pull String Security (IBM Cloud) Created

Usage Notes

To run the default Jetty server in the background, use the following command with the values for {http_port} and {https_port} replaced with your desired ports.

docker run -d --name jetty -p {http_port}:8080 -p {https_port}:8443 icr.io/ibmz/jetty:[version]

You can test it by visiting container-ip:8080 or container-ip:8443/ in a browser.

Environment:
The default Jetty environment in the image is:

JETTY_HOME    =  /usr/local/jetty
JETTY_BASE    =  /var/lib/jetty
TMPDIR        =  /tmp/jetty

Deployment:
Webapps can be deployed under /var/lib/jetty/webapps in the usual ways (WAR file, exploded WAR directory, or context XML file). To deploy your application to the / context, use the name ROOT.war, the directory name ROOT, or the context file ROOT.xml (case insensitive).