{"architecture":"amd64","config":{"User":"unifiedpolicy","ExposedPorts":{"8027/tcp":{},"8028/tcp":{}},"Env":["PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin","uname=unifiedpolicy","gname=unifiedpolicy","JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/unifiedpolicy","JF_PRODUCT_HOME=/opt/jfrog/unifiedpolicy","TARGETARCH=amd64"],"Entrypoint":["/usr/local/bin/fips-entrypoint.sh","/opt/jfrog/unifiedpolicy/app/unified-policy/bin/unified-policy"],"Volumes":{"/var/opt/jfrog/unifiedpolicy":{}},"WorkingDir":"/opt/jfrog/unifiedpolicy","Labels":{"ai.echo.image.name":"echo-fips","ai.echo.image.tag":"latest","ai.echo.image.upstream.digest":"sha256:e969bc4a6af81e66bf2ee7e79cecb24885929111d5eddb97dd80bed3b90a5e93","ai.echo.image.upstream.tag":"stable","ai.echo.image.upstream.uri":"docker.io/library/debian","com.echohq.image.name":"echo-fips","com.echohq.image.tag":"latest","description":"JFrog Echo Image — base (FIPS-aware, hardened)","maintainer":"unified-policy@jfrog.com","org.opencontainers.image.author":"echohq.com","org.opencontainers.image.title":"jfrog/echo-base","org.opencontainers.image.vendor":"JFrog"},"ArgsEscaped":true},"created":"2026-05-04T12:24:04.522205463Z","history":[{"created":"2026-04-28T11:20:02.637644574Z","created_by":"COPY / / # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T11:20:02.637644574Z","created_by":"CMD [\"bash\"]","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-28T11:27:42.51406666Z","created_by":"ARG CACHEBUST=73299ad08e2c76fceb2c21d69e37dde725ce07a7f5535100d94d40f1f8f4d6df","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-28T11:27:42.51406666Z","created_by":"RUN |1 CACHEBUST=73299ad08e2c76fceb2c21d69e37dde725ce07a7f5535100d94d40f1f8f4d6df /bin/sh -c disable-docker-clean \u0026\u0026     apt-get update \u0026\u0026 apt-get upgrade -y \u0026\u0026     apt-get install -y --no-install-recommends     libc6     openssl-fips-provider     openssl-config-fips \u0026\u0026     enable-docker-clean # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T11:32:15.475413545Z","created_by":"ARG CACHEBUST=73299ad08e2c76fceb2c21d69e37dde725ce07a7f5535100d94d40f1f8f4d6df","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-28T11:32:15.475413545Z","created_by":"RUN |1 CACHEBUST=73299ad08e2c76fceb2c21d69e37dde725ce07a7f5535100d94d40f1f8f4d6df /bin/sh -c disable-docker-clean \u0026\u0026     apt-get update \u0026\u0026 apt-get upgrade -y \u0026\u0026     apt install -y --no-install-recommends     libc6 \u0026\u0026     enable-docker-clean # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T11:32:15.475413545Z","created_by":"CMD [\"bash\"]","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-28T17:43:50.150191594Z","created_by":"LABEL maintainer=JFrog Installers \u003cinstallers@jfrog.com\u003e","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-28T17:43:50.150191594Z","created_by":"LABEL description=JFrog Echo Image — base (FIPS-aware, hardened)","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-28T17:43:50.150191594Z","created_by":"LABEL org.opencontainers.image.vendor=JFrog","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-28T17:43:50.150191594Z","created_by":"LABEL org.opencontainers.image.title=jfrog/echo-base","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-28T17:43:50.150191594Z","created_by":"COPY packages-base.txt /tmp/packages.txt # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:01.181180508Z","created_by":"RUN /bin/sh -c apt-get update -qq \u0026\u0026     xargs -a /tmp/packages.txt apt-get install -y --no-install-recommends \u0026\u0026     rm -f /tmp/packages.txt \u0026\u0026     (update-ca-certificates 2\u003e/dev/null || true) \u0026\u0026     rm -rf /var/lib/apt/lists/* \u0026\u0026     OSSL_VER=$(dpkg-query -W -f='${Version}' openssl 2\u003e/dev/null) \u0026\u0026     echo \"OpenSSL package version: ${OSSL_VER}\" \u0026\u0026     (echo \"${OSSL_VER}\" | grep -q '+e' ||         { echo \"ERROR: Echo-patched OpenSSL replaced by stock build\"; exit 1; }) # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:01.375900474Z","created_by":"RUN /bin/sh -c cp -L /usr/lib/ssl/openssl.cnf /etc/ssl/openssl.cnf.orig # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:01.408244638Z","created_by":"COPY openssl.cnf /etc/ssl/openssl.cnf # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:01.459030306Z","created_by":"COPY fips-entrypoint.sh /usr/local/bin/fips-entrypoint.sh # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:01.627923137Z","created_by":"RUN /bin/sh -c OUT=/usr/lib/ssl/openssl-fips.cnf \u0026\u0026     ORIG=/etc/ssl/openssl.cnf.orig \u0026\u0026     cp \"$ORIG\" \"$OUT\" \u0026\u0026     awk 'BEGIN {         print \"\";         print \"# JFrog TLS hardening\";         print \"[ssl_sect]\";         print \"system_default = system_default_sect\";         print \"\";         print \"[system_default_sect]\";         print \"MinProtocol  = TLSv1.2\";         print \"MaxProtocol  = TLSv1.3\";         print \"CipherString = ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256\";         print \"CipherSuites = TLS_AES_256_GCM_SHA384:TLS_AES_128_GCM_SHA256\";     }' /dev/null \u003e\u003e \"$OUT\" \u0026\u0026     cp \"$OUT\" /etc/ssl/openssl-fips.cnf \u0026\u0026     echo \"Lines in fips.cnf: $(wc -l \u003c \"$OUT\")\" \u0026\u0026     grep -q 'fips = fips_sect' \"$OUT\" \u0026\u0026 echo \"PASS: fips_sect present\" || { echo \"FAIL: fips_sect missing\"; exit 1; } \u0026\u0026     grep -q 'MinProtocol' \"$OUT\" \u0026\u0026 echo \"PASS: MinProtocol present\" || { echo \"FAIL: MinProtocol missing\"; exit 1; } \u0026\u0026     grep -q '\\.include' \"$OUT\" \u0026\u0026 echo \"PASS: .include present\" || { echo \"FAIL: .include missing\"; exit 1; } # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:01.822841037Z","created_by":"RUN /bin/sh -c chmod +x /usr/local/bin/fips-entrypoint.sh \u0026\u0026     sh -n /usr/local/bin/fips-entrypoint.sh \u0026\u0026     chmod 644 /etc/ssl/openssl.cnf \u0026\u0026     chmod 644 /usr/lib/ssl/openssl-fips.cnf /etc/ssl/openssl-fips.cnf \u0026\u0026     (chmod 644 /etc/ssl/certs/ca-certificates.crt 2\u003e/dev/null || true) \u0026\u0026     (find /usr/bin /usr/sbin /bin /sbin          \\( -perm -4000 -o -perm -2000 \\)          ! -name 'su' ! -name 'newgrp'          -exec chmod a-s {} \\; 2\u003e/dev/null || true) # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:01.991094899Z","created_by":"RUN /bin/sh -c echo \"=== OS ===\" \u0026\u0026 cat /etc/os-release | grep -E 'NAME|VERSION' # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:02.132821025Z","created_by":"RUN /bin/sh -c echo \"=== OpenSSL ===\" \u0026\u0026 openssl version -a # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:02.220041664Z","created_by":"RUN /bin/sh -c echo \"=== Non-FIPS config ===\" \u0026\u0026     OPENSSL_CONF=/etc/ssl/openssl.cnf openssl ciphers -v ALL 2\u003e\u00261 | head -3 \u0026\u0026     echo \"openssl.cnf OK\" # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:02.399991247Z","created_by":"RUN /bin/sh -c echo \"=== FIPS config loads FIPS provider? ===\" \u0026\u0026     OPENSSL_CONF=/usr/lib/ssl/openssl-fips.cnf openssl list -providers 2\u003e\u00261 | tee /tmp/fips-providers.txt \u0026\u0026     grep -qi 'fips' /tmp/fips-providers.txt || { echo \"FAIL: FIPS provider not active under openssl-fips.cnf\"; exit 1; } \u0026\u0026     echo \"openssl-fips.cnf OK\" # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:02.585885632Z","created_by":"RUN /bin/sh -c echo \"=== Cipher policy ===\" \u0026\u0026     CSTR=\"ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256\" \u0026\u0026     openssl ciphers -v \"$CSTR\" 2\u003e/dev/null | awk '{print $1}' |         grep -E '^ADH-|^AECDH-|^NULL-|^EXP-'         \u0026\u0026 echo \"FAIL: weak suites\" \u0026\u0026 exit 1         || echo \"PASS: no weak suites\" \u0026\u0026     grep -E 'MinProtocol\\s*=\\s*TLSv1\\.2' /etc/ssl/openssl.cnf \u0026\u0026 echo \"PASS: MinProtocol set\" # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:02.657041994Z","created_by":"RUN /bin/sh -c echo \"=== CA bundle ===\" \u0026\u0026     TOTAL=$(grep -c 'BEGIN CERTIFICATE' /etc/ssl/certs/ca-certificates.crt) \u0026\u0026     echo \"Total CAs: $TOTAL\" \u0026\u0026     grep -i baltimore /etc/ssl/certs/ca-certificates.crt         \u0026\u0026 echo \"WARNING: Baltimore expired root present\"         || echo \"PASS: Baltimore absent\" # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:02.740239354Z","created_by":"RUN /bin/sh -c echo \"=== initContainer utilities ===\" \u0026\u0026     MISSING=\"\" \u0026\u0026     for cmd in bash sh curl cp rm mkdir chmod sed grep ls mv cat                sleep timeout tail kill touch tee basename; do         if command -v \"$cmd\" \u003e/dev/null 2\u003e\u00261; then             printf \"  %-12s %s\\n\" \"$cmd\" \"$(command -v \"$cmd\")\";         else             printf \"  %-12s MISSING\\n\" \"$cmd\"; MISSING=\"${MISSING} ${cmd}\";         fi;     done \u0026\u0026     [ -z \"$MISSING\" ] \u0026\u0026 echo \"PASS: all initContainer utilities present\"         || { echo \"FAIL: missing:${MISSING}\"; exit 1; } # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:02.815265951Z","created_by":"RUN /bin/sh -c echo \"=== All smoke tests passed ===\" # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-04-28T17:44:02.815265951Z","created_by":"ENTRYPOINT [\"/usr/local/bin/fips-entrypoint.sh\"]","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-04-28T17:44:02.815265951Z","created_by":"CMD [\"/bin/sh\"]","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-05-04T12:24:00.415168426Z","created_by":"LABEL maintainer=unified-policy@jfrog.com","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-05-04T12:24:00.415168426Z","created_by":"ARG TARGETARCH=amd64","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-05-04T12:24:00.415168426Z","created_by":"ENV uname=unifiedpolicy gname=unifiedpolicy JF_PRODUCT_DATA_INTERNAL=/var/opt/jfrog/unifiedpolicy JF_PRODUCT_HOME=/opt/jfrog/unifiedpolicy TARGETARCH=amd64","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-05-04T12:24:00.415168426Z","created_by":"USER root","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-05-04T12:24:00.415168426Z","created_by":"RUN |1 TARGETARCH=amd64 /bin/sh -c groupadd -g 1125 unifiedpolicy \u0026\u0026     useradd -u 1125 -g 1125 -s /sbin/nologin unifiedpolicy # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-05-04T12:24:00.415168426Z","created_by":"USER root","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-05-04T12:24:04.255837055Z","created_by":"COPY /opt/jfrog/unifiedpolicy /opt/jfrog/unifiedpolicy # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-05-04T12:24:04.463164233Z","created_by":"RUN |1 TARGETARCH=amd64 /bin/sh -c mkdir -p ${JF_PRODUCT_DATA_INTERNAL}/etc/security \u0026\u0026     chown -R ${uname}:${gname} ${JF_PRODUCT_HOME} ${JF_PRODUCT_DATA_INTERNAL} \u0026\u0026     chmod -R 775 ${JF_PRODUCT_HOME} ${JF_PRODUCT_DATA_INTERNAL} \u0026\u0026     ln -s ${JF_PRODUCT_DATA_INTERNAL} ${JF_PRODUCT_HOME}/var # buildkit","comment":"buildkit.dockerfile.v0"},{"created":"2026-05-04T12:24:04.463164233Z","created_by":"EXPOSE [8027/tcp 8028/tcp]","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-05-04T12:24:04.463164233Z","created_by":"USER unifiedpolicy","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-05-04T12:24:04.463164233Z","created_by":"VOLUME [/var/opt/jfrog/unifiedpolicy]","comment":"buildkit.dockerfile.v0","empty_layer":true},{"created":"2026-05-04T12:24:04.522205463Z","created_by":"WORKDIR /opt/jfrog/unifiedpolicy","comment":"buildkit.dockerfile.v0"},{"created":"2026-05-04T12:24:04.522205463Z","created_by":"ENTRYPOINT [\"/usr/local/bin/fips-entrypoint.sh\" \"/opt/jfrog/unifiedpolicy/app/unified-policy/bin/unified-policy\"]","comment":"buildkit.dockerfile.v0","empty_layer":true}],"os":"linux","rootfs":{"type":"layers","diff_ids":["sha256:7e132bce79873dc3a5c112d9d9517930737adcb1a75d98036af555ab8acb4e44","sha256:b9a5aa677f54509169fbe610208f27c451cbdd56f8ab0ca91c5c8f4422698116","sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef","sha256:fe799fc4b0c335416efa8b6f8f2a284cca38f89fa2396dd938c0341d12685293","sha256:5ee47780d9b22491f9b4e9cdb16a0b2677b9e088f945c0f281a7ca8ee042e880","sha256:074b865fa9139d297c919953594ab4206b2139e9121b8333c7a12366cb4bfdb1","sha256:8cbb483f709e3a8efff9d87adcdbec973f005e2818721a0540a7a50c2f0bc448","sha256:330bf2ec15c2c30cfc0e1d707467aed3e1aca6d8b08c038c5dbadd09e9230fca","sha256:4fe08674423017868ee3aa1ea7b665139d0cafc09ce8b4108ab6b93759d2ecc8","sha256:c1cc5acf26ccc5c359cb3ed9afbdafd141e727a06d68e81700332db950e25828","sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef","sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef","sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef","sha256:2e8ef8a22bf296e2a15c00a9fd8c2e8a8d35c5c674e7e534b7b31a8b70efdc83","sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef","sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef","sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef","sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef","sha256:340549d1733876e7610b95d93ecf1592d59359c98a9db312780921aba5de2583","sha256:f71e46a83306f9c4608593db6da64d348831c4b14c35f9f415d00c78a6f38ade","sha256:70f7507a0b66a3fb729a3a3a0a22722da06fa3a60ca0af222c82282b2c1f5a70","sha256:5f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef"]}}