This directory contains Docker images for the Burrows-Wheeler Aligner (BWA), a software package for mapping low-divergent sequences against a large reference genome.
latest( Dockerfile | Vulnerability Report )0.7.17( Dockerfile | Vulnerability Report )
These Docker images are built from Ubuntu 24.04 and include:
- BWA v0.7.17: A software package for mapping DNA sequences against a reference genome
- Samtools v1.11: A suite of programs for interacting with high-throughput sequencing data
The images are designed to be minimal and focused on a specific version of BWA with its dependencies.
Note: This image is only built for linux/amd64 architecture. BWA contains x86-specific optimizations that are not compatible with ARM64 platforms.
docker pull getwilds/bwa:latest
# or
docker pull getwilds/bwa:0.7.17
# Alternatively, pull from GitHub Container Registry
docker pull ghcr.io/getwilds/bwa:latestapptainer pull docker://getwilds/bwa:latest
# or
apptainer pull docker://getwilds/bwa:0.7.17
# Alternatively, pull from GitHub Container Registry
apptainer pull docker://ghcr.io/getwilds/bwa:latest# Docker
docker run --rm -v /path/to/data:/data getwilds/bwa:latest bwa mem -t 4 reference.fa reads_1.fq reads_2.fq > aligned_reads.sam
# Apptainer
apptainer run --bind /path/to/data:/data docker://getwilds/bwa:latest bwa mem -t 4 reference.fa reads_1.fq reads_2.fq > aligned_reads.sam
# Apptainer (local SIF file)
apptainer run --bind /path/to/data:/data bwa_latest.sif bwa mem -t 4 reference.fa reads_1.fq reads_2.fq > aligned_reads.samThe BWA Docker images include:
- Dynamic versioning for all dependencies to ensure the latest security patches
- Pinned versions for reproducibility
- Minimal installation with only required dependencies
- Health check to verify the BWA installation
These images are regularly scanned for vulnerabilities using Docker Scout. However, due to the nature of bioinformatics software and their dependencies, some Docker images may contain components with known vulnerabilities (CVEs).
Use at your own risk: While we strive to minimize security issues, these images are primarily designed for research and analytical workflows in controlled environments.
For the latest security information about this image, please check the CVEs_*.md files in this directory, which are automatically updated through our GitHub Actions workflow. If a particular vulnerability is of concern, please file an issue in the GitHub repo citing which CVE you would like to be addressed.
The Dockerfile follows these main steps:
- Uses Ubuntu 24.04 as the base image
- Adds metadata labels for documentation and attribution
- Dynamically determines and pins the latest security-patched versions of dependencies
- Downloads and builds BWA v0.7.17 from source
- Includes Samtools v1.11 built from source
- Sets up a working directory at
/datafor workflow execution - Implements a health check to verify the BWA installation
These Dockerfiles are maintained in the WILDS Docker Library repository.