Skip to content

Commit 370d268

Browse files
aevesdockertanurecraig-osterhoutchaomonicaduffuniverse
authored
publish updates from main (#22480)
Automated pull request for publishing docs updates. --------- Co-authored-by: Albert Tanure <[email protected]> Co-authored-by: Craig Osterhout <[email protected]> Co-authored-by: Monica Chao <[email protected]> Co-authored-by: Andrey Sobolev <[email protected]> Co-authored-by: karman <[email protected]> Co-authored-by: Allie Sadler <[email protected]>
2 parents 41ce832 + 633830a commit 370d268

File tree

6 files changed

+39
-19
lines changed

6 files changed

+39
-19
lines changed

content/manuals/build/building/base-images.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ For most cases, you don't need to create your own base image. Docker Hub
2222
contains a vast library of Docker images that are suitable for use as a base
2323
image in your build. [Docker Official
2424
Images](../../docker-hub/image-library/trusted-content.md#docker-official-images)
25-
have clear documentation, promote best practices, and are regularly updated
25+
have clear documentation, promote best practices, and are regularly updated.
2626
There are also [Docker Verified
2727
Publisher](../../docker-hub/image-library/trusted-content.md#verified-publisher-images)
2828
images, created by trusted publishing partners, verified by Docker.
@@ -77,7 +77,7 @@ To run your new image, use the `docker run` command:
7777
$ docker run --rm hello
7878
```
7979

80-
This example image can only successfully execute as long as the `hello` binary
80+
This example image can only be successfully executed as long as the `hello` binary
8181
doesn't have any runtime dependencies. Computer programs tend to depend on
8282
certain other programs or resources to exist in the runtime environment. For
8383
example:

content/manuals/compose/how-tos/environment-variables/envvars-precedence.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -83,23 +83,23 @@ Result 1: The local environment takes precedence, but the Compose file is not se
8383

8484
Result 2: The `env_file` attribute in the Compose file defines an explicit value for `VALUE` so the container environment is set accordingly.
8585

86-
Result 3: The `environment` attribute in the Compose file defines an explicit value for `VALUE`, so the container environment is set accordingly/
86+
Result 3: The `environment` attribute in the Compose file defines an explicit value for `VALUE`, so the container environment is set accordingly.
8787

8888
Result 4: The image's `ENV` directive declares the variable `VALUE`, and since the Compose file is not set to override this value, this variable is defined by image
8989

9090
Result 5: The `docker compose run` command has the `--env` flag set which an explicit value, and overrides the value set by the image.
9191

9292
Result 6: The `docker compose run` command has the `--env` flag set to replicate the value from the environment. Host OS value takes precedence and is replicated into the container's environment.
9393

94-
Result 7: The `docker compose run` command has the `--env` flag set to replicate the value from the environment. Value from `.env` file is the selected to define the container's environment.
94+
Result 7: The `docker compose run` command has the `--env` flag set to replicate the value from the environment. Value from `.env` file is selected to define the container's environment.
9595

9696
Result 8: The `env_file` attribute in the Compose file is set to replicate `VALUE` from the local environment. Host OS value takes precedence and is replicated into the container's environment.
9797

98-
Result 9: The `env_file` attribute in the Compose file is set to replicate `VALUE` from the local environment. Value from `.env` file is the selected to define the container's environment.
98+
Result 9: The `env_file` attribute in the Compose file is set to replicate `VALUE` from the local environment. Value from `.env` file is selected to define the container's environment.
9999

100100
Result 10: The `environment` attribute in the Compose file is set to replicate `VALUE` from the local environment. Host OS value takes precedence and is replicated into the container's environment.
101101

102-
Result 11: The `environment` attribute in the Compose file is set to replicate `VALUE` from the local environment. Value from `.env` file is the selected to define the container's environment.
102+
Result 11: The `environment` attribute in the Compose file is set to replicate `VALUE` from the local environment. Value from `.env` file is selected to define the container's environment.
103103

104104
Result 12: The `--env` flag has higher precedence than the `environment` and `env_file` attributes and is to set to replicate `VALUE` from the local environment. Host OS value takes precedence and is replicated into the container's environment.
105105

content/manuals/docker-hub/image-library/mirror.md

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,21 @@ Hub can be mirrored.
4545
The Registry can be configured as a pull through cache. In this mode a Registry
4646
responds to all normal docker pull requests but stores all content locally.
4747

48+
### Using Registry Access Management (RAM) with a registry mirror
49+
50+
If Docker Hub access is restricted via your Registry Access Management (RAM) configuration, you will not be able to pull images originating from Docker Hub even if the images are available in your registry mirror.
51+
52+
You will encounter the following error:
53+
```console
54+
Error response from daemon: Access to docker.io has been restricted by your administrators.
55+
```
56+
57+
If you are unable to allow access to Docker Hub, you can manually pull from your registry mirror and optionally, retag the image. For example:
58+
```console
59+
docker pull <your-registry-mirror>[:<port>]/library/busybox
60+
docker tag <your-registry-mirror>[:<port>]/library/busybox:latest busybox:latest
61+
```
62+
4863
## How does it work?
4964

5065
The first time you request an image from your local registry mirror, it pulls

content/manuals/scout/quickstart.md

Lines changed: 15 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -84,26 +84,24 @@ Learn more about the `docker scout cves` command in the
8484

8585
## Step 4: Fix application vulnerabilities
8686

87-
The fix suggested by Docker Scout is to update
88-
the underlying vulnerable express version to 4.17.3 or later.
87+
After the Docker Scout analysis, a high vulnerability CVE-2022-24999 was found, caused by an outdated version of the **express** package.
8988

90-
1. Update the `package.json` file with the new package version.
89+
The version 4.17.3 of the express package fixes the vulnerability. Therefore, update the `package.json` file to the new version:
9190

9291
```diff
9392
"dependencies": {
9493
- "express": "4.17.1"
9594
+ "express": "4.17.3"
9695
}
9796
```
98-
99-
2. Rebuild the image with a new tag and push it to your Docker Hub repository:
97+
98+
Rebuild the image with a new tag and push it to your Docker Hub repository:
10099

101100
```console
102101
$ docker build --push -t <ORG_NAME>/scout-demo:v2 .
103102
```
104103

105-
Now, viewing the latest tag of the image in Docker Desktop, the Docker Scout
106-
Dashboard, or CLI, you can see that you have fixed the vulnerability.
104+
Run the `docker scout` command again and verify that HIGH CVE-2022-24999 is no longer present:
107105

108106
```console
109107
$ docker scout cves --only-package express
@@ -154,7 +152,7 @@ $ docker scout config organization <ORG_NAME>
154152

155153
Now you can run the `quickview` command to get an overview
156154
of the compliance status for the image you just built.
157-
The image is evaluated against the default policy configurations.
155+
The image is evaluated against the default policy configurations. You'll see output similar to the following:
158156

159157
```console
160158
$ docker scout quickview
@@ -209,7 +207,7 @@ The classic image store doesn't support manifest lists,
209207
which is how the provenance attestations are attached to an image.
210208

211209
Open **Settings** in Docker Desktop. Under the **General** section, make sure
212-
that the **Use containerd for pulling and storing images** option is checked.
210+
that the **Use containerd for pulling and storing images** option is checked, then select **Apply & Restart**.
213211
Note that changing image stores temporarily hides images and containers of the
214212
inactive image store until you switch back.
215213

@@ -230,7 +228,9 @@ results through a different lens: the Docker Scout Dashboard.
230228
3. Select **Images** in the left-hand navigation.
231229

232230
The images page lists your Scout-enabled repositories.
233-
Select the image in the list to open the **Image details** sidebar.
231+
232+
Select the row for the image you want to view, anywhere in the row except on a link, to open the **Image details** sidebar.
233+
234234
The sidebar shows a compliance overview for the last pushed tag of a repository.
235235

236236
> [!NOTE]
@@ -239,13 +239,15 @@ The sidebar shows a compliance overview for the last pushed tag of a repository.
239239
> It might take a few minutes before the results appear if this is your
240240
> first time using the Docker Scout Dashboard.
241241
242-
Inspect the **Up-to-Date Base Images** policy.
242+
Go back to the image list and select the image version, available in the **Most recent image** column.
243+
Then, at the top right of the page, select the **Update base image** button to inspect the policy.
244+
243245
This policy checks whether base images you use are up-to-date.
244246
It currently has a non-compliant status,
245247
because the example image uses an old version `alpine` as a base image.
246248

247-
Select the **View fix** button next to the policy name for details about the violation,
248-
and recommendations on how to address it.
249+
Close the **Recommended fixes for base image** modal. In the policy listing, select **View fixes** button, next to the policy name for details about the violation, and recommendations on how to address it.
250+
249251
In this case, the recommended action is to enable
250252
[Docker Scout's GitHub integration](./integrations/source-code-management/github.md),
251253
which helps keep your base images up-to-date automatically.

content/manuals/security/for-admins/enforce-sign-in/methods.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -121,6 +121,8 @@ tampered with by the users.
121121

122122
4. Use a MDM solution to distribute your modified `.mobileconfig` file to your macOS clients.
123123

124+
5. Verify that the profile is added to **Device (Managed)** profiles list (**System Settings** > **General** > **Device Management**) on your macOS clients.
125+
124126
## plist method (Mac only)
125127

126128
> [!NOTE]

content/manuals/security/for-admins/hardened-desktop/registry-access-management.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -89,6 +89,7 @@ earlier Linux kernel series).
8989
This will be resolved in the updated 5.15 series Linux kernel.
9090
- Images pulled by Docker Desktop when Docker Debug or Kubernetes is enabled,
9191
are not restricted by default even if Docker Hub is blocked by RAM.
92+
- If Docker Hub access is restricted by RAM, pulls on images originating from Docker Hub are restricted even if the image has been previously cached by a registry mirror. See [Using Registry Access Management (RAM) with a registry mirror](/manuals/docker-hub/image-library/mirror.md).
9293

9394
Also, Registry Access Management operates on the level of hosts, not IP
9495
addresses. Developers can bypass this restriction within their domain

0 commit comments

Comments
 (0)