Skip to content

Commit 6358697

Browse files
Merge branch 'main' into settings-reference
2 parents bebd681 + 537c9f1 commit 6358697

File tree

26 files changed

+152
-29
lines changed

26 files changed

+152
-29
lines changed

Dockerfile

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
# check=skip=InvalidBaseImagePlatform
33

44
ARG ALPINE_VERSION=3.21
5-
ARG GO_VERSION=1.23.8
5+
ARG GO_VERSION=1.24
66
ARG HTMLTEST_VERSION=0.17.0
77
ARG HUGO_VERSION=0.141.0
88
ARG NODE_VERSION=22

content/manuals/admin/faqs/general-faqs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Additionally, you can't reuse a Docker ID in the future if you deactivate your a
2727

2828
### What if my Docker ID is taken?
2929

30-
All Docker IDs are first-come, first-served except for companies that have a US Trademark on a username. If you have a trademark for your namespace, [Docker Support](https://hub.docker.com/support/contact/) can retrieve the Docker ID for you.
30+
All Docker IDs are first-come, first-served except for companies that have a U.S. Trademark on a username. If you have a trademark for your namespace, [Docker Support](https://hub.docker.com/support/contact/) can retrieve the Docker ID for you.
3131

3232
### What’s an organization?
3333

@@ -66,7 +66,7 @@ The organization owner can also add additional owners to help them manage users,
6666

6767
### Can I configure multiple SSO identity providers (IdPs) to authenticate users to a single org?
6868

69-
Docker SSO allows only one IdP configuration per organization. For more
69+
Yes. Docker SSO supports multiple IdP configurations. For more
7070
information, see [Configure SSO](../../security/for-admins/single-sign-on/configure/_index.md) and [SSO FAQs](../../security/faqs/single-sign-on/faqs.md).
7171

7272
### What is a service account?

content/manuals/build/cache/backends/_index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -179,3 +179,6 @@ $ docker buildx build --push -t <registry>/<image> \
179179
--cache-to type=registry,ref=<registry>/<cache-image>,oci-mediatypes=true,image-manifest=true \
180180
--cache-from type=registry,ref=<registry>/<cache-image> .
181181
```
182+
183+
> [!NOTE]
184+
> Since BuildKit v0.21, `image-manifest` is enabled by default.

content/manuals/build/cache/backends/local.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,13 +25,13 @@ The following table describes the available CSV parameters that you can pass to
2525
`--cache-to` and `--cache-from`.
2626

2727
| Name | Option | Type | Default | Description |
28-
| ------------------- | ------------ | ----------------------- | ------- | ------------------------------------------------------------------------------------------------------------------------------- |
28+
|---------------------|--------------|-------------------------|---------|---------------------------------------------------------------------------------------------------------------------------------|
2929
| `src` | `cache-from` | String | | Path of the local directory where cache gets imported from. |
3030
| `digest` | `cache-from` | String | | Digest of manifest to import, see [cache versioning][4]. |
3131
| `dest` | `cache-to` | String | | Path of the local directory where cache gets exported to. |
3232
| `mode` | `cache-to` | `min`,`max` | `min` | Cache layers to export, see [cache mode][1]. |
3333
| `oci-mediatypes` | `cache-to` | `true`,`false` | `true` | Use OCI media types in exported manifests, see [OCI media types][2]. |
34-
| `image-manifest` | `cache-to` | `true`,`false` | `false` | When using OCI media types, generate an image manifest instead of an image index for the cache image, see [OCI media types][2]. |
34+
| `image-manifest` | `cache-to` | `true`,`false` | `true` | When using OCI media types, generate an image manifest instead of an image index for the cache image, see [OCI media types][2]. |
3535
| `compression` | `cache-to` | `gzip`,`estargz`,`zstd` | `gzip` | Compression type, see [cache compression][3]. |
3636
| `compression-level` | `cache-to` | `0..22` | | Compression level, see [cache compression][3]. |
3737
| `force-compression` | `cache-to` | `true`,`false` | `false` | Forcibly apply compression, see [cache compression][3]. |

content/manuals/build/cache/backends/registry.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,11 +37,11 @@ The following table describes the available CSV parameters that you can pass to
3737
`--cache-to` and `--cache-from`.
3838

3939
| Name | Option | Type | Default | Description |
40-
| ------------------- | ----------------------- | ----------------------- | ------- | ------------------------------------------------------------------------------------------------------------------------------- |
40+
|---------------------|-------------------------|-------------------------|---------|---------------------------------------------------------------------------------------------------------------------------------|
4141
| `ref` | `cache-to`,`cache-from` | String | | Full name of the cache image to import. |
4242
| `mode` | `cache-to` | `min`,`max` | `min` | Cache layers to export, see [cache mode][1]. |
4343
| `oci-mediatypes` | `cache-to` | `true`,`false` | `true` | Use OCI media types in exported manifests, see [OCI media types][2]. |
44-
| `image-manifest` | `cache-to` | `true`,`false` | `false` | When using OCI media types, generate an image manifest instead of an image index for the cache image, see [OCI media types][2]. |
44+
| `image-manifest` | `cache-to` | `true`,`false` | `true` | When using OCI media types, generate an image manifest instead of an image index for the cache image, see [OCI media types][2]. |
4545
| `compression` | `cache-to` | `gzip`,`estargz`,`zstd` | `gzip` | Compression type, see [cache compression][3]. |
4646
| `compression-level` | `cache-to` | `0..22` | | Compression level, see [cache compression][3]. |
4747
| `force-compression` | `cache-to` | `true`,`false` | `false` | Forcibly apply compression, see [cache compression][3]. |

content/manuals/build/metadata/annotations.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ arbitrary information and attach it to your image, which helps consumers and
1111
tools understand the origin, contents, and how to use the image.
1212

1313
Annotations are similar to, and in some sense overlap with, [labels]. Both
14-
serve the same purpose: attach metadata to a resource. As a general principle,
14+
serve the same purpose: to attach metadata to a resource. As a general principle,
1515
you can think of the difference between annotations and labels as follows:
1616

1717
- Annotations describe OCI image components, such as [manifests], [indexes],
@@ -68,7 +68,7 @@ For examples on how to add annotations to images built with GitHub Actions, see
6868
You can also add annotations to an image created using `docker buildx
6969
imagetools create`. This command only supports adding annotations to an index
7070
or manifest descriptors, see
71-
[CLI reference](/reference/cli/docker/buildx/imagetools/create.md#annotations).
71+
[CLI reference](/reference/cli/docker/buildx/imagetools/create.md#annotation).
7272

7373
## Inspect annotations
7474

content/manuals/desktop/setup/install/enterprise-deployment/faq.md

Lines changed: 15 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,4 +83,18 @@ Add-LocalGroupMember -Group $Group -Member $CurrentUser
8383

8484
> [!NOTE]
8585
>
86-
> After adding a new user to the `docker-users` group, the user must sign out and then sign back in for the changes to take effect.
86+
> After adding a new user to the `docker-users` group, the user must sign out and then sign back in for the changes to take effect.
87+
88+
## MDM
89+
90+
Common questions about deploying Docker Desktop using mobile device management
91+
(MDM) tools such as Jamf, Intune, or Workspace ONE.
92+
93+
### Why doesn't my MDM tool apply all Docker Desktop configuration settings at once?
94+
95+
Some MDM tools, such as Workspace ONE, may not support applying multiple
96+
configuration settings in a single XML file. In these cases, you may need to
97+
deploy each setting in a separate XML file.
98+
99+
Refer to your MDM provider's documentation for specific deployment
100+
requirements or limitations.

content/manuals/docker-hub/repos/manage/access.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,3 +132,42 @@ To configure team repository permissions:
132132
Organizations can use OATs. OATs let you assign fine-grained repository access
133133
permissions to tokens. For more details, see [Organization access
134134
tokens](/manuals/security/for-admins/access-tokens.md).
135+
136+
## Gated distribution
137+
138+
{{< summary-bar feature_name="Gated distribution" >}}
139+
140+
Gated distribution allows publishers to securely share private container images with external customers or partners, without giving them full organization access or visibility into your teams, collaborators, or other repositories.
141+
142+
This feature is ideal for commercial software publishers who want to control who can pull specific images while preserving a clean separation between internal users and external consumers.
143+
144+
### Key features
145+
146+
- **Private repository distribution**: Content is stored in private repositories and only accessible to explicitly invited users.
147+
148+
- **External access without organization membership**: External users don't need to be added to your internal organization to pull images.
149+
150+
- **Pull-only permissions**: External users receive pull-only access and cannot push or modify repository content.
151+
152+
- **Invite-only access**: Access is granted through authenticated email invites, managed via API.
153+
154+
### Invite distributor members via API
155+
156+
> [!NOTE]
157+
> When you invite members, you assign them a role. See [Roles and permissions](/manuals/security/for-admins/roles-and-permissions.md) for details about the access permissions for each role.
158+
159+
Distributor members (used for gated distribution) can only be invited using the Docker Hub API. UI-based invitations are not currently supported for this role. To invite distributor members, use the Bulk create invites API endpoint.
160+
161+
To invite distributor members:
162+
163+
1. Use the [Authentication API](https://docs.docker.com/reference/api/hub/latest/#tag/authentication-api/operation/AuthCreateAccessToken) to generate a bearer token for your Docker Hub account.
164+
165+
2. Create a team in the Hub UI or use the [Teams API](https://docs.docker.com/reference/api/hub/latest/#tag/groups/paths/~1v2~1orgs~1%7Borg_name%7D~1groups/post).
166+
167+
3. Grant repository access to the team:
168+
- In the Hub UI: Navigate to your repository settings and add the team with "Read-only" permissions
169+
- Using the [Repository Teams API](https://docs.docker.com/reference/api/hub/latest/#tag/repositories/paths/~1v2~1repositories~1%7Bnamespace%7D~1%7Brepository%7D~1groups/post): Assign the team to your repositories with "read-only" access level
170+
171+
4. Use the [Bulk create invites endpoint](https://docs.docker.com/reference/api/hub/latest/#tag/invites/paths/~1v2~1invites~1bulk/post) to send email invites with the distributor member role. In the request body, set the "role" field to "distributor_member".
172+
173+
5. The invited user will receive an email with a link to accept the invite. After signing in with their Docker ID, they'll be granted pull-only access to the specified private repository as a distributor member.
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
description: Learn about immutable tags and how they help maintain image version consistency on Docker Hub.
3+
keywords: Docker Hub, Hub, repository content, tags, immutable tags, version control
4+
title: Immutable tags on Docker Hub
5+
linkTitle: Immutable tags
6+
weight: 11
7+
---
8+
{{< summary-bar feature_name="Immutable tags" >}}
9+
10+
Immutable tags provide a way to ensure that specific image versions remain unchanged once they are published to Docker Hub. This feature helps maintain consistency and reliability in your container deployments by preventing accidental overwrites of important image versions.
11+
12+
## What are immutable tags?
13+
14+
Immutable tags are image tags that, once pushed to Docker Hub, cannot be overwritten or deleted. This ensures that a specific version of an image remains exactly the same throughout its lifecycle, providing:
15+
16+
- Version consistency
17+
- Reproducible builds
18+
- Protection against accidental overwrites
19+
- Better security and compliance
20+
21+
## Enable immutable tags
22+
23+
To enable immutable tags for your repository:
24+
25+
1. Sign in to [Docker Hub](https://hub.docker.com).
26+
2. Select **My Hub** > **Repositories**.
27+
3. Select the repository where you want to enable immutable tags.
28+
4. Select the **Settings** tab
29+
5. Under **Tag mutability settings**, select **Immutable**.
30+
6. Select **Save**.
31+
32+
Once enabled, all tags are locked to their specific images, ensuring that each tag always points to the same image version and cannot be modified.
33+
34+
> [!NOTE]
35+
>
36+
> All tags in the repository become immutable, including the `latest` tag.
37+
38+
## Working with immutable tags
39+
40+
When immutable tags are enabled:
41+
42+
- You cannot push a new image with the same tag name
43+
- You must use a new tag name for each new image version
44+
45+
To push an image, create a new tag for your updated image and push it to the repository.
46+
47+
48+
49+
50+

content/manuals/engine/install/debian.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,6 +42,7 @@ To get started with Docker Engine on Debian, make sure you
4242
To install Docker Engine, you need the 64-bit version of one of these Debian
4343
versions:
4444

45+
- Debian Trixie 13 (testing)
4546
- Debian Bookworm 12 (stable)
4647
- Debian Bullseye 11 (oldstable)
4748

@@ -144,7 +145,7 @@ Docker from the repository.
144145
```console
145146
$ sudo apt-get install docker-ce docker-ce-cli containerd.io docker-buildx-plugin docker-compose-plugin
146147
```
147-
148+
148149
{{< /tab >}}
149150
{{< tab name="Specific version" >}}
150151

0 commit comments

Comments
 (0)