README.md

    Corretto Docker Build Status

    Master repository where Dockerfiles for Amazon Corretto are hosted. These docker files are used to build images for Amazon Corretto Offical Images and ECR images.

    Usage

    The docker images are available on Amazon Corretto Official Images

    To use Amazon Corretto Official Images from Docker hub run

    docker pull amazoncorretto:11

    The docker images are also available on Amazon ECR.

    To use the docker images from Amazon ECR, you would need to authenticate with the ECR registry (id: 489478819445) with the help of instruction from here. Once authenticated, Amazon Corretto docker images can be pulled using command

    docker pull 489478819445.dkr.ecr.us-west-2.amazonaws.com/amazoncorretto:latest
    docker run -it 489478819445.dkr.ecr.us-west-2.amazonaws.com/amazoncorretto:latest /bin/bash

    You can view the available tags, run

    aws ecr list-images --region us-west-2 --registry-id 489478819445 --repository-name amazoncorretto | jq -r '.imageIds[] | .imageTag'

    Supported Tags

    Building

    To build the docker images, you can use the following command.

    docker build -t amazon-corretto-{major_version} -f ./{major_version}/{jdk|jre|slim}/{al2|alpine|debian}/Dockerfile .

    Security

    If you would like to report a potential security issue in this project, please do not create a GitHub issue. Instead, please follow the instructions here or email AWS security directly.

    Why does security scanner show that a docker image has a CVE?

    If you are using a Corretto Docker image with an AL2 guest, then Amazon’s ECS scanning function can result in a ALAS2-2021-1731 notification. However, there is no reason to update the Corretto application within Docker. You can safely ignore this ALAS. Once the next Corretto quarterly release is posted, currently scheduled for January 19, 2022, the alarm condition will be satisfied. This notice only affects the following Corretto Docker images with AL2 in the Docker ECR:


    If a security scanner reports that an amazoncorretto image includes a CVE, the first recommended action is to pull an updated version of this image.

    If no updated image is available, run the appropriate command to update packages for the platform, ie. run "apk -U upgrade" for Alpine or "yum update -y --security" for AmazonLinux in your Dockerfiles or systems to resolve the issue immediately.

    If no updated package is available, please treat this as a potential security issue and follow these instructions or email AWS security directly at aws-security@amazon.com.

    It is the responsibility of the base docker image supplier to provide timely security updates to images and packages. The amazoncorretto images are automatically rebuilt when a new base image is made available, but we do not make changes to our Dockerfiles to pull in one-off package updates. If a new base image has not yet been made generally available by a base docker image maintainer, please contact that maintainer to request that the issue be addressed.

    Note that there are multiple reasons why a CVE may appear to be present in a docker image, as explained in the docker library FAQs.

    项目简介

    Dockerfiles for Amazon Corretto Official images.

    🚀 Github 镜像仓库 🚀

    源项目地址

    https://github.com/corretto/corretto-docker

    发行版本

    当前项目没有发行版本

    贡献者 18

    全部贡献者

    开发语言

    • Dockerfile 84.2 %
    • Shell 9.8 %
    • Python 6.0 %