buildpack-depsEstimated reading time: 4 minutes
A collection of common build dependencies used for installing various modules, e.g., gems.
GitHub repo: https://github.com/docker-library/buildpack-deps
This content is imported from the official Docker Library docs, and is provided by the original uploader. You can view the Docker Hub page for this image at https://hub.docker.com/images/buildpack-deps
Supported tags and respective
Where to file issues:
the Docker Community
buildpack-deps is similar to Heroku’s stack images. It includes a large number of “development header” packages needed by various things like Ruby Gems, PyPI modules, etc. For example,
buildpack-deps would let you do a
bundle install in an arbitrary application directory without knowing beforehand that
ssl.h is required to build a dependent module.
How to use this image
This stack is designed to be the foundation of a language-stack image.
The main tags of this image are the full batteries-included approach. With them, a majority of arbitrary
gem install /
npm install /
pip install should be successful without additional header/development packages.
For some language stacks, that doesn’t make sense, particularly if linking to arbitrary external C libraries is much less common (as in Go and Java, for example), which is where these other smaller variants can come in handy.
This variant includes just the
ca-certificates packages. This is perfect for cases like the Java JRE, where downloading JARs is very common and necessary, but checking out code isn’t.
This variant is based on
curl, but also adds various source control management tools. As of this writing, the current list of included tools is
svn. Intentionally missing is
cvs due to the dwindling relevance it has (sorry CVS). This image is perfect for cases like the Java JDK, where downloading JARs is very common (hence the
curl base still), but checking out code also becomes more common as well (compared to the JRE).
View license information for the software contained in this image.
As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).
Some additional license information which was able to be auto-detected might be found in the
As for any pre-built image usage, it is the image user’s responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.library, sample, buildpack-deps