Maintained by:
Adoptium
Where to get help:
Adoptium Slack; Adoptium Support
Dockerfile links(See "What's the difference between 'Shared' and 'Simple' tags?" in the FAQ.)
8u462-b08-jdk-ubi10-minimal, 8-jdk-ubi10-minimal, 8-ubi10-minimal
8u462-b08-jdk-ubi9-minimal, 8-jdk-ubi9-minimal, 8-ubi9-minimal
8u462-b08-jdk-nanoserver-ltsc2025, 8-jdk-nanoserver-ltsc2025, 8-nanoserver-ltsc2025
8u462-b08-jdk-nanoserver-ltsc2022, 8-jdk-nanoserver-ltsc2022, 8-nanoserver-ltsc2022
8u462-b08-jre-alpine-3.22, 8-jre-alpine-3.22, 8u462-b08-jre-alpine, 8-jre-alpine
8u462-b08-jre-windowsservercore-ltsc2025, 8-jre-windowsservercore-ltsc2025
8u462-b08-jre-nanoserver-ltsc2025, 8-jre-nanoserver-ltsc2025
8u462-b08-jre-windowsservercore-ltsc2022, 8-jre-windowsservercore-ltsc2022
8u462-b08-jre-nanoserver-ltsc2022, 8-jre-nanoserver-ltsc2022
11.0.28_6-jdk-alpine-3.20, 11-jdk-alpine-3.20, 11-alpine-3.20
11.0.28_6-jdk-alpine-3.21, 11-jdk-alpine-3.21, 11-alpine-3.21
11.0.28_6-jdk-ubi10-minimal, 11-jdk-ubi10-minimal, 11-ubi10-minimal
11.0.28_6-jdk-ubi9-minimal, 11-jdk-ubi9-minimal, 11-ubi9-minimal
11.0.28_6-jdk-nanoserver-ltsc2025, 11-jdk-nanoserver-ltsc2025, 11-nanoserver-ltsc2025
11.0.28_6-jdk-nanoserver-ltsc2022, 11-jdk-nanoserver-ltsc2022, 11-nanoserver-ltsc2022
11.0.28_6-jre-alpine-3.22, 11-jre-alpine-3.22, 11.0.28_6-jre-alpine, 11-jre-alpine
11.0.28_6-jre-windowsservercore-ltsc2025, 11-jre-windowsservercore-ltsc2025
11.0.28_6-jre-nanoserver-ltsc2025, 11-jre-nanoserver-ltsc2025
11.0.28_6-jre-windowsservercore-ltsc2022, 11-jre-windowsservercore-ltsc2022
11.0.28_6-jre-nanoserver-ltsc2022, 11-jre-nanoserver-ltsc2022
17.0.16_8-jdk-alpine-3.20, 17-jdk-alpine-3.20, 17-alpine-3.20
17.0.16_8-jdk-alpine-3.21, 17-jdk-alpine-3.21, 17-alpine-3.21
17.0.16_8-jdk-ubi10-minimal, 17-jdk-ubi10-minimal, 17-ubi10-minimal
17.0.16_8-jdk-ubi9-minimal, 17-jdk-ubi9-minimal, 17-ubi9-minimal
17.0.16_8-jdk-nanoserver-ltsc2025, 17-jdk-nanoserver-ltsc2025, 17-nanoserver-ltsc2025
17.0.16_8-jdk-nanoserver-ltsc2022, 17-jdk-nanoserver-ltsc2022, 17-nanoserver-ltsc2022
17.0.16_8-jre-alpine-3.22, 17-jre-alpine-3.22, 17.0.16_8-jre-alpine, 17-jre-alpine
17.0.16_8-jre-windowsservercore-ltsc2025, 17-jre-windowsservercore-ltsc2025
17.0.16_8-jre-nanoserver-ltsc2025, 17-jre-nanoserver-ltsc2025
17.0.16_8-jre-windowsservercore-ltsc2022, 17-jre-windowsservercore-ltsc2022
17.0.16_8-jre-nanoserver-ltsc2022, 17-jre-nanoserver-ltsc2022
21.0.8_9-jdk-alpine-3.20, 21-jdk-alpine-3.20, 21-alpine-3.20
21.0.8_9-jdk-alpine-3.21, 21-jdk-alpine-3.21, 21-alpine-3.21
21.0.8_9-jdk-ubi10-minimal, 21-jdk-ubi10-minimal, 21-ubi10-minimal
21.0.8_9-jdk-ubi9-minimal, 21-jdk-ubi9-minimal, 21-ubi9-minimal
21.0.8_9-jdk-nanoserver-ltsc2025, 21-jdk-nanoserver-ltsc2025, 21-nanoserver-ltsc2025
21.0.8_9-jdk-nanoserver-ltsc2022, 21-jdk-nanoserver-ltsc2022, 21-nanoserver-ltsc2022
21.0.8_9-jre-alpine-3.22, 21-jre-alpine-3.22, 21.0.8_9-jre-alpine, 21-jre-alpine
21.0.8_9-jre-windowsservercore-ltsc2025, 21-jre-windowsservercore-ltsc2025
21.0.8_9-jre-nanoserver-ltsc2025, 21-jre-nanoserver-ltsc2025
21.0.8_9-jre-windowsservercore-ltsc2022, 21-jre-windowsservercore-ltsc2022
21.0.8_9-jre-nanoserver-ltsc2022, 21-jre-nanoserver-ltsc2022
25_36-jdk-ubi10-minimal, 25-jdk-ubi10-minimal, 25-ubi10-minimal
25_36-jdk-nanoserver-ltsc2025, 25-jdk-nanoserver-ltsc2025, 25-nanoserver-ltsc2025
25_36-jdk-nanoserver-ltsc2022, 25-jdk-nanoserver-ltsc2022, 25-nanoserver-ltsc2022
25_36-jre-alpine-3.22, 25-jre-alpine-3.22, 25_36-jre-alpine, 25-jre-alpine
25_36-jre-windowsservercore-ltsc2025, 25-jre-windowsservercore-ltsc2025
25_36-jre-windowsservercore-ltsc2022, 25-jre-windowsservercore-ltsc2022
8u462-b08-jdk, 8-jdk, 8:
8u462-b08-jdk-windowsservercore, 8-jdk-windowsservercore, 8-windowsservercore:
8u462-b08-jdk-nanoserver, 8-jdk-nanoserver, 8-nanoserver:
8u462-b08-jre, 8-jre:
8u462-b08-jre-windowsservercore, 8-jre-windowsservercore:
8u462-b08-jre-nanoserver, 8-jre-nanoserver:
11.0.28_6-jdk, 11-jdk, 11:
11.0.28_6-jdk-windowsservercore, 11-jdk-windowsservercore, 11-windowsservercore:
11.0.28_6-jdk-nanoserver, 11-jdk-nanoserver, 11-nanoserver:
11.0.28_6-jre, 11-jre:
11.0.28_6-jre-windowsservercore, 11-jre-windowsservercore:
11.0.28_6-jre-nanoserver, 11-jre-nanoserver:
17.0.16_8-jdk, 17-jdk, 17:
17.0.16_8-jdk-windowsservercore, 17-jdk-windowsservercore, 17-windowsservercore:
17.0.16_8-jdk-nanoserver, 17-jdk-nanoserver, 17-nanoserver:
17.0.16_8-jre, 17-jre:
17.0.16_8-jre-windowsservercore, 17-jre-windowsservercore:
17.0.16_8-jre-nanoserver, 17-jre-nanoserver:
21.0.8_9-jdk, 21-jdk, 21:
21.0.8_9-jdk-windowsservercore, 21-jdk-windowsservercore, 21-windowsservercore:
21.0.8_9-jdk-nanoserver, 21-jdk-nanoserver, 21-nanoserver:
21.0.8_9-jre, 21-jre:
21.0.8_9-jre-windowsservercore, 21-jre-windowsservercore:
21.0.8_9-jre-nanoserver, 21-jre-nanoserver:
25_36-jdk, 25-jdk, 25, latest:
25_36-jdk-windowsservercore, 25-jdk-windowsservercore, 25-windowsservercore:
25_36-jdk-nanoserver, 25-jdk-nanoserver, 25-nanoserver:
25_36-jre, 25-jre:
25_36-jre-windowsservercore, 25-jre-windowsservercore:
25_36-jre-nanoserver, 25-jre-nanoserver:
Where to file issues:
GitHub; The adoptium support page has more information on quality, roadmap and support levels for Eclipse Temurin builds. Vulnerabilities not related to Eclipse Temurin itself should be be raised to their respective projects (e.g Ubuntu vulnerabilities need to be raised directly to the Ubuntu project).
Supported architectures: (more info)
amd64, arm32v7, arm64v8, ppc64le, riscv64, s390x, windows-amd64
Published image artifact details:
repo-info repo's repos/eclipse-temurin/ directory (history)
(image metadata, transfer size, etc)
Image updates:
official-images repo's library/eclipse-temurin label
official-images repo's library/eclipse-temurin file (history)
Source of this description:
docs repo's eclipse-temurin/ directory (history)
The images in this repository contain OpenJDK binaries that are built by Eclipse Temurin.
The Eclipse Temurin project provides code and processes that support the building of runtime binaries and associated technologies that are high performance, enterprise-caliber, cross-platform, open-source licensed, and Java SE TCK-tested for general use across the Java ecosystem.
JRE images are available for all versions of Eclipse Temurin but it is recommended that you produce a custom JRE-like runtime using jlink (see usage below).
Yes, it's possible for all image flavors except for Windows-based images. The format of the certificates depends on what the OS of the base image used expects, but PEM format with a .crt file extension is a good bet.
You need to put your CA certificates into /certificates directory inside the container (e.g. by using a volume) and opt-in into CA certificate processing by setting the environment variable USE_SYSTEM_CA_CERTS on the container to any value (if you are overriding the entrypoint script, please make sure you call /__cacert_entrypoint.sh to enable the processing). Using Docker CLI this might look like this:
$ docker run -v $(pwd)/certs:/certificates/ -e USE_SYSTEM_CA_CERTS=1 eclipse-temurin:21
When run like this, your certificates will get added to both the JVM truststore and to the system CA store (e.g. for use by curl and other CLI tools). However, if you are running your containers in a restricted-by-default environment (such as Red Hat OpenShift), there will be some small differences:
Your containers are run with a non-root UID: Since neither the default JVM truststore nor the system CA store can be written to by a non-root user, the system CA store will not be updated, while a separate truststore will be provided to the JVM. Your certificates will get added to that truststore and the JAVA_TOOL_OPTIONS environment variable will be automatically extended to switch the JVM over to this new truststore. If you are overriding the default entrypoint script of this image, you'll need let the JVM know about the new truststore manually. The path to the new truststore will be exported via JRE_CACERTS_PATH environment variable.
Your containers are run with a read-only filesystem: The same restrictions apply as with running containers with a non-root UID. In addition, a writable volume is required at /tmp to be able to create the new truststore.
While this feature has been tested in multiple scenarios, there is always a chance of an unexpected edge case. Should you encounter one of these, please open an issue.
To run a pre-built jar file with the latest OpenJDK 21, use the following Dockerfile:
FROM eclipse-temurin:21
RUN mkdir /opt/app
COPY japp.jar /opt/app
CMD ["java", "-jar", "/opt/app/japp.jar"]
You can build and run the Docker Image as shown in the following example:
docker build -t japp .
docker run -it --rm japp
If you are using a distribution that we don't provide an image for you can copy the JDK using a similar Dockerfile to the one below:
# Example
FROM <base image>
ENV JAVA_HOME=/opt/java/openjdk
COPY --from=eclipse-temurin:21 $JAVA_HOME $JAVA_HOME
ENV PATH="${JAVA_HOME}/bin:${PATH}"
On OpenJDK 21+, a JRE can be generated using jlink, see the following Dockerfile:
# Example of custom Java runtime using jlink in a multi-stage container build
FROM eclipse-temurin:21 as jre-build
# Create a custom Java runtime
RUN $JAVA_HOME/bin/jlink \
--add-modules java.base \
--strip-debug \
--no-man-pages \
--no-header-files \
--compress=2 \
--output /javaruntime
# Define your base image
FROM debian:buster-slim
ENV JAVA_HOME=/opt/java/openjdk
ENV PATH "${JAVA_HOME}/bin:${PATH}"
COPY --from=jre-build /javaruntime $JAVA_HOME
# Continue with your application deployment
RUN mkdir /opt/app
COPY japp.jar /opt/app
CMD ["java", "-jar", "/opt/app/japp.jar"]
If you want to place the jar file on the host file system instead of inside the container, you can mount the host path onto the container by using the following commands:
FROM eclipse-temurin:21.0.2_13-jdk
CMD ["java", "-jar", "/opt/app/japp.jar"]
docker build -t japp .
docker run -it -v /path/on/host/system/jars:/opt/app japp
The eclipse-temurin images come in many flavors, each designed for a specific use case.
eclipse-temurin:<version>This is the defacto image. If you are unsure about what your needs are, you probably want to use this one. It is designed to be used both as a throw away container (mount your source code and start the container to start your app), as well as the base to build other images off of.
Some of these tags may have names like jammy or noble in them. These are the suite code names for releases of Ubuntu and indicate which release the image is based on. If your image needs to install any additional packages beyond what comes with the image, you'll likely want to specify one of these explicitly to minimize breakage when there are new releases of Ubuntu.
eclipse-temurin:<version>-alpineThis image is based on the popular Alpine Linux project, available in the alpine official image. Alpine Linux is much smaller than most distribution base images (~5MB), and thus leads to much slimmer images in general.
This variant is useful when final image size being as small as possible is your primary concern. The main caveat to note is that it does use musl libc instead of glibc and friends, so software will often run into issues depending on the depth of their libc requirements/assumptions. See this Hacker News comment thread for more discussion of the issues that might arise and some pro/con comparisons of using Alpine-based images.
To minimize image size, it's uncommon for additional related tools (such as git or bash) to be included in Alpine-based images. Using this image as a base, add the things you need in your own Dockerfile (see the alpine image description for examples of how to install packages if you are unfamiliar).
eclipse-temurin:<version>-windowsservercoreThis image is based on Windows Server Core (mcr.microsoft.com/windows/servercore). As such, it only works in places which that image does, such as Windows 10 Professional/Enterprise (Anniversary Edition) or Windows Server 2016.
For information about how to get Docker running on Windows, please see the relevant "Quick Start" guide provided by Microsoft:
The Dockerfiles and associated scripts are licensed under the Apache License, Version 2.0.
Licenses for the products installed within the images:
As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).
Some additional license information which was able to be auto-detected might be found in the repo-info repository's eclipse-temurin/ directory.
As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.