Return to Image List

jetty

jetty

Jetty is a pure Java-based HTTP (Web) server and Java Servlet container. While Web Servers are usually associated with serving documents to people, Jetty is now often used for machine to machine communications, usually within larger software frameworks. Jetty is developed as a free and open source project as part of the Eclipse Foundation. The web server is used in products such as Apache ActiveMQ, Alfresco, Apache Geronimo, Apache Maven, Apache Spark, Google App Engine, Eclipse, FUSE, Twitter's Streaming API and Zimbra. Jetty is also the server in open source projects such as Lift, Eucalyptus, Red5, Hadoop and I2P. Jetty supports the latest Java Servlet API (with JSP support) as well as protocols SPDY and WebSocket.

See jetty.com for more information

This image is built by IBM to run on the IBM Z architecture and is not affiliated with any other community that provides a version of this image.


License

View license information here

As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).

As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.


Versions

Use the pull string below for the version of this image you require.
11.0-jdk11 docker pull icr.io/ibmz/jetty@sha256:b483ab718b7ee0426294eb53872ea7486cc585c6e310f0ca24bbcc97770abfe0 Vulnerability Report04-30-2024
11.0.13-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:b0b0f5943d85f55fcacdb472a487c2598a2a539051540369c6aaa903c28672f4 Vulnerability Report04-30-2024
11.0.11-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:6f123fb275fc833c90274377ea1ff9f7943402e5843a8b50ec1934ccabe55525 Vulnerability Report04-30-2024
11.0.9-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:584ce4250b17f341b8a2fe41ea842681095fb83a5bc0c1048d28a15766c1569e Vulnerability Report04-30-2024
9.4.44 docker pull icr.io/ibmz/jetty@sha256:23c472a8b3e082838f6680ea6332780144a562b397fea16596e00745e284e8ef Vulnerability Report04-30-2024
9.4.45-jdk17-openjdk docker pull icr.io/ibmz/jetty@sha256:1dd4daef0e093670a42aa820ed6b32f8d8bb45bac1153051e3ebfe4517deab3c Vulnerability Report04-30-2024
Version Pull String Security (IBM Cloud) Created

Usage Notes

To run the default Jetty server in the background, use the following command with the values for {http_port} and {https_port} replaced with your desired ports.

docker run -d --name jetty -p {http_port}:8080 -p {https_port}:8443 icr.io/ibmz/jetty:[version]

You can test it by visiting container-ip:8080 or container-ip:8443/ in a browser.

Environment:
The default Jetty environment in the image is:

JETTY_HOME    =  /usr/local/jetty
JETTY_BASE    =  /var/lib/jetty
TMPDIR        =  /tmp/jetty

Deployment:
Webapps can be deployed under /var/lib/jetty/webapps in the usual ways (WAR file, exploded WAR directory, or context XML file). To deploy your application to the / context, use the name ROOT.war, the directory name ROOT, or the context file ROOT.xml (case insensitive).