/glibc-dynamic

Image for running dynamicly linked glibc binaries

Apache License 2.0Apache-2.0

glibc-dynamic

CI status

Base image with just enough to run arbitrary glibc binaries.

This image is meant to be used as just a base image only. It does not contain any programs that can be run, other than /sbin/ldconfig.

You must bring your own artifacts to use this image, e.g. with a Docker multi-stage build. If you want locale support other than C.UTF-8, you must bring your own locale data as well. This may change in the future based on user feedback.

See also musl-dynamic which is an equivalent image for running dynamically-linked musl binaries.

Get It!

The image is available on cgr.dev:

docker pull cgr.dev/chainguard/glibc-dynamic:latest

Supported tags

Tag Digest Arch
latest sha256:bdacfb9e5f36474e00748963871ee210b7c940f8aa4a3fdc4cf8a8acab580333
View entry in Rekor
amd64

Signing

All Chainguard Images are signed using Sigstore!


To verify the image, download cosign and run:
COSIGN_EXPERIMENTAL=1 cosign verify cgr.dev/chainguard/glibc-dynamic:latest | jq

Output:

Verification for cgr.dev/chainguard/glibc-dynamic:latest --
The following checks were performed on each of these signatures:
  - The cosign claims were validated
  - Existence of the claims in the transparency log was verified offline
  - Any certificates were verified against the Fulcio roots.
[
  {
    "critical": {
      "identity": {
        "docker-reference": "ghcr.io/chainguard-images/glibc-dynamic"
      },
      "image": {
        "docker-manifest-digest": "sha256:bdacfb9e5f36474e00748963871ee210b7c940f8aa4a3fdc4cf8a8acab580333"
      },
      "type": "cosign container image signature"
    },
    "optional": {
      "1.3.6.1.4.1.57264.1.1": "https://token.actions.githubusercontent.com",
      "1.3.6.1.4.1.57264.1.2": "push",
      "1.3.6.1.4.1.57264.1.3": "2d6c160acc7c27f329da51e90cd6ba0e1d04ff51",
      "1.3.6.1.4.1.57264.1.4": "Create Release",
      "1.3.6.1.4.1.57264.1.5": "chainguard-images/glibc-dynamic",
      "1.3.6.1.4.1.57264.1.6": "refs/heads/main",
      "Bundle": {
        "SignedEntryTimestamp": "MEUCICo7yuo85v88MSgEus/zwe/UBbqG8OoSVsAsIBsB7sdjAiEA1Y48JVy5hRq0NIp8vDJP6MN0GxMaV7UY+i8idRW4As0=",
        "Payload": {
          "body": "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",
          "integratedTime": 1665688336,
          "logIndex": 5045608,
          "logID": "c0d23d6ad406973f9559f3ba2d1ca01f84147d8ffc5b8445c224f98b9591801d"
        }
      },
      "Issuer": "https://token.actions.githubusercontent.com",
      "Subject": "https://github.com/chainguard-images/glibc-dynamic/.github/workflows/release.yaml@refs/heads/main",
      "githubWorkflowName": "Create Release",
      "githubWorkflowRef": "refs/heads/main",
      "githubWorkflowRepository": "chainguard-images/glibc-dynamic",
      "githubWorkflowSha": "2d6c160acc7c27f329da51e90cd6ba0e1d04ff51",
      "githubWorkflowTrigger": "push",
      "run_attempt": "1",
      "run_id": "3245024838",
      "sha": "2d6c160acc7c27f329da51e90cd6ba0e1d04ff51"
    }
  }
]

You can verify that the image was built in Github Actions in this repository from the Issuer and Subject fields.

Build

This image is built with apko.