/
DirectorySecurity AdvisoriesPricing
Sign in
Directory
pypy logo

pypy

Last changed

Request a free trial

Contact our team to test out this image for free. Please also indicate any other images you would like to evaluate.

Tags
Overview
Comparison
Provenance
Specifications
SBOM
Vulnerabilities
Advisories

Chainguard Container for pypy

PyPy is a fast and compliant implementation of the Python language.

Chainguard Containers are regularly-updated, secure-by-default container images.

Download this Container Image

For those with access, this container image is available on cgr.dev:

docker pull cgr.dev/ORGANIZATION/pypy:latest

Be sure to replace the ORGANIZATION placeholder with the name used for your organization's private repository within the Chainguard Registry.

Compatibility Notes

This image is comparable to the pypy/pypy image, with the following differences:

  • Like all other Chainguard Images, pypy features a stripped down, minimal design
  • It has few-to-zero CVEs
  • It does not run as the root user

Getting Started

The PyPy Chainguard Image provides a minimal PyPy runtime suitable for workloads such as web applications, CLI utilities, interfacing with APIs, or other tasks. Currently Pypy only supports pypy-3.11 and pypy-3.10 which are also available as chainguard images.

Variants

We have two image variants available:

  • A pypy:latest-dev variant that contains the pip, pypy, and apk package managers and the bash, ash, and sh shells.
  • A minimal runtime variant that removes shells and package managers for additional security. To pull the minimal runtime variant from cgr.dev, run the following:
docker pull cgr.dev/<ORGANIZATION>/pypy:latest

The minimal runtime can be used to run an application that doesn't need non system wide packages and or a linux shell. An example hash.py function is given below;

import hashlib

def generate_hash(text: str, algorithm: str = "sha256") -> str:
    """
    Generate a hash of the given text using the specified algorithm.

    :param text: The input string to hash.
    :param algorithm: The hashing algorithm (e.g., 'md5', 'sha1', 'sha256', 'sha512').
    :return: The hexadecimal hash string.
    """
    try:
        hasher = hashlib.new(algorithm)
        hasher.update(text.encode("utf-8"))
        return hasher.hexdigest()
    except ValueError:
        return f"Error: Unsupported hashing algorithm '{algorithm}'"

# Example usage
print(generate_hash("Hello, World!", "sha256"))
print(generate_hash("Hello, World!", "md5"))
print(generate_hash("Hello, World!", "sha1"))

To execute the code above in a pypy container, run the following

FROM cgr.dev/<ORGANIZATION>/pypy:latest

WORKDIR /app

COPY app.py app.py

ENTRYPOINT ["pypy3", "-c", "/app/hash.py"]

To pull the dev variant, run this command:

docker pull cgr.dev/<ORGANIZATION>/pypy:latest-dev

To access the shell in the pypy:latest-dev image, you'll need to include an --entrypoint option, as in the following example:

docker run -it --entrypoint /bin/bash cgr.dev/<ORGANIZATION>/pypy:latest-dev

Usage with Dockerfiles

If you require additional packages that can be installed with the pip package manager, we recommend using a multistage build. This process involves installing packages in a virtual environment using the latest-dev variant, then copying this environment over to the minimal runtime image.

The following is a minimal example of a Dockerfile that uses a multistage build to run an app.py script after installing dependencies:

#!/usr/bin/env python

from flask import Flask

app = Flask(__name__)

@app.route("/")
def hello():
    return "Hello, World!"
# syntax=docker/dockerfile:1

FROM cgr.dev/<ORGANISATION>/pypy:latest-dev as dev

WORKDIR /app

COPY requirements.txt requirements.txt
RUN pip install flask

FROM cgr.dev/<ORGANIZATION>/pypy:latest

WORKDIR /app

COPY app.py app.py

ENTRYPOINT ["pypy3", "-m", "flask", "--app", "/app/hello.py", "run", "--host", "0.0.0.0"]

Documentation and Resources

For more information, please refer to the following resources:

What are Chainguard Containers?

Chainguard's free tier of Starter container images are built with Wolfi, our minimal Linux undistro.

All other Chainguard Containers are built with Chainguard OS, Chainguard's minimal Linux operating system designed to produce container images that meet the requirements of a more secure software supply chain.

The main features of Chainguard Containers include:

For cases where you need container images with shells and package managers to build or debug, most Chainguard Containers come paired with a development, or -dev, variant.

In all other cases, including Chainguard Containers tagged as :latest or with a specific version number, the container images include only an open-source application and its runtime dependencies. These minimal container images typically do not contain a shell or package manager.

Although the -dev container image variants have similar security features as their more minimal versions, they include additional software that is typically not necessary in production environments. We recommend using multi-stage builds to copy artifacts from the -dev variant into a more minimal production image.

Need additional packages?

To improve security, Chainguard Containers include only essential dependencies. Need more packages? Chainguard customers can use Custom Assembly to add packages, either through the Console, chainctl, or API.

To use Custom Assembly in the Chainguard Console: navigate to the image you'd like to customize in your Organization's list of images, and click on the Customize image button at the top of the page.

Learn More

Refer to our Chainguard Containers documentation on Chainguard Academy. Chainguard also offers VMs and Librariescontact us for access.

Trademarks

This software listing is packaged by Chainguard. The trademarks set forth in this offering are owned by their respective companies, and use of them does not imply any affiliation, sponsorship, or endorsement by such companies.

Licenses

Chainguard container images contain software packages that are direct or transitive dependencies. The following licenses were found in the "latest" tag of this image:

  • Apache-2.0

  • BSD-2-Clause

  • CC-BY-4.0

  • GCC-exception-3.1

  • GPL-2.0

  • GPL-2.0-only

  • GPL-2.0-or-later

For a complete list of licenses, please refer to this Image's SBOM.

Software license agreement

Category
base

Safe Source for Open Source™
Contact us
© 2025 Chainguard. All Rights Reserved.
Private PolicyTerms of Use

Product

Chainguard ContainersChainguard LibrariesChainguard VMsIntegrationsPricing