back to home

bitnami / containers

Bitnami container images

4,390 stars
6,724 forks
5 issues
ShellDockerfileGo Template

AI Architecture Analysis

This repository is indexed by RepoMind. By analyzing bitnami/containers in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.

Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.

Source files are only loaded when you start an analysis to optimize performance.

Embed this Badge

Showcase RepoMind's analysis directly in your repository's README.

[![Analyzed by RepoMind](https://img.shields.io/badge/Analyzed%20by-RepoMind-4F46E5?style=for-the-badge)](https://repomind.in/repo/bitnami/containers)
Preview:Analyzed by RepoMind

Repository Overview (README excerpt)

Crawler view

The Bitnami Containers Library Popular applications, provided by Bitnami, containerized and ready to launch. Why use Bitnami Secure Images? Those are hardened, minimal CVE images built and maintained by Bitnami. Bitnami Secure Images are based on the cloud-optimized, security-hardened enterprise OS Photon Linux. Why choose BSI images? • Hardened secure images of popular open source software with Near-Zero Vulnerabilities • Vulnerability Triage & Prioritization with VEX Statements, KEV and EPSS Scores • Compliance focus with FIPS, STIG, and air-gap options, including secure bill of materials (SBOM) • Software supply chain provenance attestation through in-toto • First class support for the internet’s favorite Helm charts Each image comes with valuable security metadata. You can view the metadata in our public catalog here. Note: Some data is only available with commercial subscriptions to BSI. If you are looking for our previous generation of images based on Debian Linux, please see the Bitnami Legacy registry. Get an image The recommended way to get any of the Bitnami Images is to pull the prebuilt image from the Docker Hub Registry. To use a specific version, you can pull a versioned tag. If you wish, you can also build the image yourself by cloning the repository, changing to the directory containing the Dockerfile, and executing the command. > [!TIP] > Remember to replace the , , and placeholders in the example command above with the correct values. Run the application using Docker Compose The main folder of each application contains a functional file. Run the application using it as shown below: > [!TIP] > Remember to replace the placeholder in the example command above with the correct value. Vulnerability scan in Bitnami container images As part of the release process, the Bitnami container images are analyzed for vulnerabilities. At this moment, we are using two different tools: • Trivy • Grype This scanning process is triggered via a GH action for every PR affecting the source code of the containers, regardless of its nature or origin. Retention policy Deprecated assets will be retained in the container registry (Bitnami DockerHub org) without changes for, at least, 6 months after the deprecation. After that period, all the images will be moved to a new _"archived"_ repository. For instance, once deprecated an asset named _foo_ whose container repository was , all the images will be moved to where they will remain indefinitely. Special images, like or , which are extensively used in Helm charts, will have an extended coexistence period of 1 year. Contributing We'd love for you to contribute to those container images. You can request new features by creating an issue, or submit a pull request with your contribution. License Copyright © 2026 Broadcom. The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.