jetty
Jetty is a pure Java-based HTTP (Web) server and Java Servlet container. While Web Servers are usually associated with serving documents to people, Jetty is now often used for machine to machine communications, usually within larger software frameworks. Jetty is developed as a free and open source project as part of the Eclipse Foundation. The web server is used in products such as Apache ActiveMQ, Alfresco, Apache Geronimo, Apache Maven, Apache Spark, Google App Engine, Eclipse, FUSE, Twitter's Streaming API and Zimbra. Jetty is also the server in open source projects such as Lift, Eucalyptus, Red5, Hadoop and I2P. Jetty supports the latest Java Servlet API (with JSP support) as well as protocols SPDY and WebSocket.
See jetty.com for more information
This image is built by IBM to run on the IBM Z architecture and is not affiliated with any other community that provides a version of this image.
License
View license information
here
As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).
As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.
Versions
Use the pull string below for the version of this image you require.
11.0.9-jdk17-eclipse-temurin |
docker pull icr.io/ibmz/jetty@sha256:b7f750451b7fd5a9100e24601e21426e0ebf25d1b41d1aa835a9e02122a7b199 |
Vulnerability Report | 10-29-2024 | 11.0-jdk11 |
docker pull icr.io/ibmz/jetty@sha256:acc53b26ea3e8fcddde41501f25d9433065706ecdd01fb93e80519caace886ea |
Vulnerability Report | 10-29-2024 | 11.0.13-jdk17-eclipse-temurin |
docker pull icr.io/ibmz/jetty@sha256:6cc7375fecc522bf99ce82a879b20f3e1576429b747f19519b0d1b77b7a52113 |
Vulnerability Report | 10-29-2024 | 11.0.11-jdk17-eclipse-temurin |
docker pull icr.io/ibmz/jetty@sha256:61c913b4733e1d89e1f7253aecf6687578a93c0fbfaecfc3ddfd25eb079e632d |
Vulnerability Report | 10-29-2024 | 9.4.45-jdk17-openjdk |
docker pull icr.io/ibmz/jetty@sha256:5b55a0870da2b22d115469f3f0ff964d34c2bc5ad4a16c5b162e067d961f7ba3 |
Vulnerability Report | 10-29-2024 | 9.4.44 |
docker pull icr.io/ibmz/jetty@sha256:199f0b76f00122386025f5f7304d0aadcdc2350be07245cc12da8b46dca70a40 |
Vulnerability Report | 10-29-2024 |
Version |
Pull String |
Security (IBM Cloud) |
Created |
Usage Notes
To run the default Jetty server in the background, use the following command with the values for {http_port}
and {https_port}
replaced with your desired ports.
docker run -d --name jetty -p {http_port}:8080 -p {https_port}:8443 icr.io/ibmz/jetty:[version]
You can test it by visiting container-ip:8080 or container-ip:8443/ in a browser.
Environment:
The default Jetty environment in the image is:
JETTY_HOME = /usr/local/jetty
JETTY_BASE = /var/lib/jetty
TMPDIR = /tmp/jetty
Deployment:
Webapps can be deployed under
/var/lib/jetty/webapps
in the usual ways (WAR file, exploded WAR directory, or context XML file). To deploy your application to the
/
context, use the name
ROOT.war
, the directory name ROOT, or the context file
ROOT.xml
(case insensitive).