2020-11-05 14:02:30 UTC
65.8 MB
/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
[#000] sha256:21c83c5242199776c232920ddb58cfa2a46b17e42ed831ca9001c8dbc532d22d - 4.05% (2.67 MB)
[#001] sha256:5467b10376db56a48db943467fbefae58564ae905ec2b795bd6d3c0d315648e4 - 0.01% (5.25 KB)
[#002] sha256:30b487674d5aca23cf97d72220166e7c9833315321046f81771438e5c18e76dd - 0.0% (1.23 KB)
[#003] sha256:8f868bc9e5e6779b2e17001a13ccd4b98b49193f0d2fef5dae5871d570f344ed - 95.94% (63.1 MB)
[#004] sha256:d84c6f25225d925a6109426a55e85736eedd5c38197f88b52477209665be4ea9 - 0.0% (154 Bytes)
[#005] sha256:4f3e2abbe07562ad7237d3f5aafe0386c831b56a7e3a0ce98631c115813fcb7d - 0.0% (1.77 KB)
/bin/sh -c #(nop) ADD file:66a440394c2442570f1f060e25c86613cb2d88a8af0c71c5a4154b3570e9a805 in /
2020-04-24 01:05:21 UTC/bin/sh -c #(nop) CMD ["/bin/sh"]
2020-11-05 14:02:19 UTC/bin/sh -c #(nop) ARG VAULT_VERSION=1.6.0-rc
2020-11-05 14:02:19 UTC/bin/sh -c #(nop) LABEL name=Vault maintainer=Vault Team <vault@hashicorp.com> vendor=HashiCorp version=1.6.0-rc release=1.6.0-rc summary=Vault is a tool for securely accessing secrets. description=Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
2020-11-05 14:02:19 UTC/bin/sh -c #(nop) COPY file:446e4c7f135bb973b1bf2b5b2c83e3f11127a89bc61d4db4f92f3746e06450d9 in /licenses/mozilla.txt
2020-11-05 14:02:20 UTC|1 VAULT_VERSION=1.6.0-rc /bin/sh -c addgroup vault && adduser -S -G vault vault
2020-11-05 14:02:28 UTC|1 VAULT_VERSION=1.6.0-rc /bin/sh -c set -eux; apk add --no-cache ca-certificates gnupg openssl libcap su-exec dumb-init tzdata && apkArch="$(apk --print-arch)"; case "$apkArch" in armhf) ARCH='arm' ;; aarch64) ARCH='arm64' ;; x86_64) ARCH='amd64' ;; x86) ARCH='386' ;; *) echo >&2 "error: unsupported architecture: $apkArch"; exit 1 ;; esac && VAULT_GPGKEY=91A6E7F85D05C65630BEF18951852D87348FFC4C; found=''; for server in hkp://p80.pool.sks-keyservers.net:80 hkp://keyserver.ubuntu.com:80 hkp://pgp.mit.edu:80 ; do echo "Fetching GPG key $VAULT_GPGKEY from $server"; gpg --batch --keyserver "$server" --recv-keys "$VAULT_GPGKEY" && found=yes && break; done; test -z "$found" && echo >&2 "error: failed to fetch GPG key $VAULT_GPGKEY" && exit 1; mkdir -p /tmp/build && cd /tmp/build && wget https://releases.hashicorp.com/vault/${VAULT_VERSION}/vault_${VAULT_VERSION}_linux_${ARCH}.zip && wget https://releases.hashicorp.com/vault/${VAULT_VERSION}/vault_${VAULT_VERSION}_SHA256SUMS && wget https://releases.hashicorp.com/vault/${VAULT_VERSION}/vault_${VAULT_VERSION}_SHA256SUMS.sig && gpg --batch --verify vault_${VAULT_VERSION}_SHA256SUMS.sig vault_${VAULT_VERSION}_SHA256SUMS && grep vault_${VAULT_VERSION}_linux_${ARCH}.zip vault_${VAULT_VERSION}_SHA256SUMS | sha256sum -c && unzip -d /bin vault_${VAULT_VERSION}_linux_${ARCH}.zip && cd /tmp && rm -rf /tmp/build && gpgconf --kill dirmngr && gpgconf --kill gpg-agent && apk del gnupg openssl && rm -rf /root/.gnupg
2020-11-05 14:02:29 UTC|1 VAULT_VERSION=1.6.0-rc /bin/sh -c mkdir -p /vault/logs && mkdir -p /vault/file && mkdir -p /vault/config && chown -R vault:vault /vault
2020-11-05 14:02:30 UTC/bin/sh -c #(nop) VOLUME [/vault/logs]
2020-11-05 14:02:30 UTC/bin/sh -c #(nop) VOLUME [/vault/file]
2020-11-05 14:02:30 UTC/bin/sh -c #(nop) EXPOSE 8200/tcp
2020-11-05 14:02:30 UTC/bin/sh -c #(nop) COPY file:79c74eb4a8d69484af83798b5c6f20a4a8185fa39fb31792b6c8f3b70e7bfa2d in /usr/local/bin/docker-entrypoint.sh
2020-11-05 14:02:30 UTC/bin/sh -c #(nop) ENTRYPOINT ["docker-entrypoint.sh"]
2020-11-05 14:02:30 UTC/bin/sh -c #(nop) CMD ["server" "-dev"]
Please be careful as this will not just delete the reference but also the actual content!
For example when you have latest and v1.2.3 both pointing to the same image
the deletion of latest will also permanently remove v1.2.3.