Return to Image List

jetty

jetty

Jetty is a pure Java-based HTTP (Web) server and Java Servlet container. While Web Servers are usually associated with serving documents to people, Jetty is now often used for machine to machine communications, usually within larger software frameworks. Jetty is developed as a free and open source project as part of the Eclipse Foundation. The web server is used in products such as Apache ActiveMQ, Alfresco, Apache Geronimo, Apache Maven, Apache Spark, Google App Engine, Eclipse, FUSE, Twitter's Streaming API and Zimbra. Jetty is also the server in open source projects such as Lift, Eucalyptus, Red5, Hadoop and I2P. Jetty supports the latest Java Servlet API (with JSP support) as well as protocols SPDY and WebSocket.

See jetty.com for more information

This image is built by IBM to run on the IBM Z architecture and is not affiliated with any other community that provides a version of this image.


License

View license information here

As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).

As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.


Versions

Use the pull string below for the version of this image you require.
11.0.9-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:b7f750451b7fd5a9100e24601e21426e0ebf25d1b41d1aa835a9e02122a7b199 Vulnerability Report10-29-2024
11.0-jdk11 docker pull icr.io/ibmz/jetty@sha256:acc53b26ea3e8fcddde41501f25d9433065706ecdd01fb93e80519caace886ea Vulnerability Report10-29-2024
11.0.13-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:6cc7375fecc522bf99ce82a879b20f3e1576429b747f19519b0d1b77b7a52113 Vulnerability Report10-29-2024
11.0.11-jdk17-eclipse-temurin docker pull icr.io/ibmz/jetty@sha256:61c913b4733e1d89e1f7253aecf6687578a93c0fbfaecfc3ddfd25eb079e632d Vulnerability Report10-29-2024
9.4.45-jdk17-openjdk docker pull icr.io/ibmz/jetty@sha256:5b55a0870da2b22d115469f3f0ff964d34c2bc5ad4a16c5b162e067d961f7ba3 Vulnerability Report10-29-2024
9.4.44 docker pull icr.io/ibmz/jetty@sha256:199f0b76f00122386025f5f7304d0aadcdc2350be07245cc12da8b46dca70a40 Vulnerability Report10-29-2024
Version Pull String Security (IBM Cloud) Created

Usage Notes

To run the default Jetty server in the background, use the following command with the values for {http_port} and {https_port} replaced with your desired ports.

docker run -d --name jetty -p {http_port}:8080 -p {https_port}:8443 icr.io/ibmz/jetty:[version]

You can test it by visiting container-ip:8080 or container-ip:8443/ in a browser.

Environment:
The default Jetty environment in the image is:

JETTY_HOME    =  /usr/local/jetty
JETTY_BASE    =  /var/lib/jetty
TMPDIR        =  /tmp/jetty

Deployment:
Webapps can be deployed under /var/lib/jetty/webapps in the usual ways (WAR file, exploded WAR directory, or context XML file). To deploy your application to the / context, use the name ROOT.war, the directory name ROOT, or the context file ROOT.xml (case insensitive).