@@ -195,13 +195,30 @@ A couple of caveats:
195195 from a repository). This is usually not a problem as the tools that need this
196196 feature (e.g., Paketo buildpacks) will do the pre-pull of the parent image.
197197
198- * The ` allowDerivedImages ` setting applies to all images in the ` imageList `
199- specified with an explicit tag (e.g., ` <name>:<tag> ` ). It does not apply to
200- images specified using the tag wildcard (e.g., ` <name>:* ` ) described in the
201- prior section, because Docker Desktop needs to know the tag in order to
202- perform ancestor-descendant image checks. Therefore, if you want Docker socket
203- mounts to be allowed for images derived from a parent image in the
204- ` imageList ` , make sure the parent image is listed with name and tag.
198+ * For Docker Desktop versions 4.34 and 4.35 only: The ` allowDerivedImages ` setting
199+ applies to all images in the ` imageList ` specified with an explicit tag (e.g.,
200+ ` <name>:<tag> ` ). It does not apply to images specified using the tag wildcard
201+ (e.g., ` <name>:* ` ) described in the prior section. In Docker Desktop 4.36 and
202+ later, this caveat no longer applies, meaning that the ` allowDerivedImages `
203+ settings applies to images specified with or without a wildcard tag. This
204+ makes it easier to manage the ECI Docker socket image list.
205+
206+ ### Allowing all containers to mount the Docker socket
207+
208+ In Docker Desktop version 4.36 and later, it's possible to configure the image
209+ list to allow any container to mount the Docker socket. You do this by adding
210+ ` "*" ` to the ` imageList ` :
211+
212+ ``` json
213+ "imageList" : {
214+ "images" : [
215+ " *"
216+ ]
217+ }
218+ ```
219+
220+ It is recommended that you use this only in scenarios where explicitly listing
221+ allowed container images is not flexible enough.
205222
206223### Command list
207224
@@ -302,10 +319,13 @@ Whether to configure the list as an allow or deny list depends on the use case.
302319 this case, remove the local image and pull it again (e.g., ` docker rm <image> `
303320 and ` docker pull <image> ` ).
304321
305- * It's not possible to allow Docker socket bind-mounts on local images (i.e., images that are not on
306- a registry) unless they are [ derived from an allowed image] ( #docker-socket-mount-permissions-for-derived-images ) .
307- That's because Docker Desktop pulls the digests for the allowed images from the
308- registry, and then uses that to compare against the local copy of the image.
322+ * It's not possible to allow Docker socket bind-mounts on containers using
323+ local-only images (i.e., images that are not on a registry) unless they are
324+ [ derived from an allowed image] ( #docker-socket-mount-permissions-for-derived-images )
325+ or you've [ allowed all containers to mount the Docker socket] ( #allowing-all-containers-to-mount-the-docker-socket ) .
326+ That is because Docker Desktop pulls the digests for the allowed images from
327+ the registry, and then uses that to compare against the local copy of the
328+ image.
309329
310330* The ` commandList ` configuration applies to all containers that are allowed to
311331 bind-mount the Docker socket. Therefore it can't be configured differently per
0 commit comments