Namespace
hashicorp
Image / Tag
vault:1.6.0-rc
Content Digest
sha256:ebaefee8ecf278f099ad15221e6a4016429050ec9cea14d27c3df5a2ba0389a0
Details
Created

2020-11-05 14:02:30 UTC

Size

65.8 MB

Content Digest
Labels
  • description
    Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
  • maintainer
    Vault Team <vault@hashicorp.com>
  • name
    Vault
  • release
    1.6.0-rc
  • summary
    Vault is a tool for securely accessing secrets.
  • vendor
    HashiCorp
  • version
    1.6.0-rc

Environment
PATH

/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin


Layers

[#000] sha256:21c83c5242199776c232920ddb58cfa2a46b17e42ed831ca9001c8dbc532d22d - 4.05% (2.67 MB)

[#001] sha256:5467b10376db56a48db943467fbefae58564ae905ec2b795bd6d3c0d315648e4 - 0.01% (5.25 KB)

[#002] sha256:30b487674d5aca23cf97d72220166e7c9833315321046f81771438e5c18e76dd - 0.0% (1.23 KB)

[#003] sha256:8f868bc9e5e6779b2e17001a13ccd4b98b49193f0d2fef5dae5871d570f344ed - 95.94% (63.1 MB)

[#004] sha256:d84c6f25225d925a6109426a55e85736eedd5c38197f88b52477209665be4ea9 - 0.0% (154 Bytes)

[#005] sha256:4f3e2abbe07562ad7237d3f5aafe0386c831b56a7e3a0ce98631c115813fcb7d - 0.0% (1.77 KB)


History
2020-04-24 01:05:21 UTC

/bin/sh -c #(nop) ADD file:66a440394c2442570f1f060e25c86613cb2d88a8af0c71c5a4154b3570e9a805 in /

2020-04-24 01:05:21 UTC

/bin/sh -c #(nop) CMD ["/bin/sh"]

2020-11-05 14:02:19 UTC

/bin/sh -c #(nop) ARG VAULT_VERSION=1.6.0-rc

2020-11-05 14:02:19 UTC

/bin/sh -c #(nop) LABEL name=Vault maintainer=Vault Team <vault@hashicorp.com> vendor=HashiCorp version=1.6.0-rc release=1.6.0-rc summary=Vault is a tool for securely accessing secrets. description=Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.

2020-11-05 14:02:19 UTC

/bin/sh -c #(nop) COPY file:446e4c7f135bb973b1bf2b5b2c83e3f11127a89bc61d4db4f92f3746e06450d9 in /licenses/mozilla.txt

2020-11-05 14:02:20 UTC

|1 VAULT_VERSION=1.6.0-rc /bin/sh -c addgroup vault && adduser -S -G vault vault

2020-11-05 14:02:28 UTC

|1 VAULT_VERSION=1.6.0-rc /bin/sh -c set -eux; apk add --no-cache ca-certificates gnupg openssl libcap su-exec dumb-init tzdata && apkArch="$(apk --print-arch)"; case "$apkArch" in armhf) ARCH='arm' ;; aarch64) ARCH='arm64' ;; x86_64) ARCH='amd64' ;; x86) ARCH='386' ;; *) echo >&2 "error: unsupported architecture: $apkArch"; exit 1 ;; esac && VAULT_GPGKEY=91A6E7F85D05C65630BEF18951852D87348FFC4C; found=''; for server in hkp://p80.pool.sks-keyservers.net:80 hkp://keyserver.ubuntu.com:80 hkp://pgp.mit.edu:80 ; do echo "Fetching GPG key $VAULT_GPGKEY from $server"; gpg --batch --keyserver "$server" --recv-keys "$VAULT_GPGKEY" && found=yes && break; done; test -z "$found" && echo >&2 "error: failed to fetch GPG key $VAULT_GPGKEY" && exit 1; mkdir -p /tmp/build && cd /tmp/build && wget https://releases.hashicorp.com/vault/${VAULT_VERSION}/vault_${VAULT_VERSION}_linux_${ARCH}.zip && wget https://releases.hashicorp.com/vault/${VAULT_VERSION}/vault_${VAULT_VERSION}_SHA256SUMS && wget https://releases.hashicorp.com/vault/${VAULT_VERSION}/vault_${VAULT_VERSION}_SHA256SUMS.sig && gpg --batch --verify vault_${VAULT_VERSION}_SHA256SUMS.sig vault_${VAULT_VERSION}_SHA256SUMS && grep vault_${VAULT_VERSION}_linux_${ARCH}.zip vault_${VAULT_VERSION}_SHA256SUMS | sha256sum -c && unzip -d /bin vault_${VAULT_VERSION}_linux_${ARCH}.zip && cd /tmp && rm -rf /tmp/build && gpgconf --kill dirmngr && gpgconf --kill gpg-agent && apk del gnupg openssl && rm -rf /root/.gnupg

2020-11-05 14:02:29 UTC

|1 VAULT_VERSION=1.6.0-rc /bin/sh -c mkdir -p /vault/logs && mkdir -p /vault/file && mkdir -p /vault/config && chown -R vault:vault /vault

2020-11-05 14:02:30 UTC

/bin/sh -c #(nop) VOLUME [/vault/logs]

2020-11-05 14:02:30 UTC

/bin/sh -c #(nop) VOLUME [/vault/file]

2020-11-05 14:02:30 UTC

/bin/sh -c #(nop) EXPOSE 8200/tcp

2020-11-05 14:02:30 UTC

/bin/sh -c #(nop) COPY file:79c74eb4a8d69484af83798b5c6f20a4a8185fa39fb31792b6c8f3b70e7bfa2d in /usr/local/bin/docker-entrypoint.sh

2020-11-05 14:02:30 UTC

/bin/sh -c #(nop) ENTRYPOINT ["docker-entrypoint.sh"]

2020-11-05 14:02:30 UTC

/bin/sh -c #(nop) CMD ["server" "-dev"]

Danger Zone
Delete Tag

Please be careful as this will not just delete the reference but also the actual content!

For example when you have latest and v1.2.3 both pointing to the same image
the deletion of latest will also permanently remove v1.2.3.

Delete