Skip to content

Commit d0e5d1a

Browse files
authored
eci: document Docker socket mount permission improvements. (#21357)
## NOTE: Do not merge until Docker Desktop v4.36 is released. <!--Delete sections as needed --> ## Description Documents a couple of improvements for DD 4.36 in the [ECI Docker Socket mount permissions](https://docs.docker.com/security/for-admins/hardened-desktop/enhanced-container-isolation/config/#docker-socket-mount-permissions) feature. ## Related issues or tickets https://docker.atlassian.net/browse/POS-2740 ## Reviews <!-- Notes for reviewers here --> <!-- List applicable reviews (optionally @tag reviewers) --> - [ ] Technical review - [X] Editorial review - [ ] Product review Signed-off-by: Cesar Talledo <[email protected]>
1 parent 27d2f6d commit d0e5d1a

File tree

1 file changed

+31
-11
lines changed
  • content/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation

1 file changed

+31
-11
lines changed

content/manuals/security/for-admins/hardened-desktop/enhanced-container-isolation/config.md

Lines changed: 31 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -195,13 +195,30 @@ A couple of caveats:
195195
from a repository). This is usually not a problem as the tools that need this
196196
feature (e.g., Paketo buildpacks) will do the pre-pull of the parent image.
197197

198-
* The `allowDerivedImages` setting applies to all images in the `imageList`
199-
specified with an explicit tag (e.g., `<name>:<tag>`). It does not apply to
200-
images specified using the tag wildcard (e.g., `<name>:*`) described in the
201-
prior section, because Docker Desktop needs to know the tag in order to
202-
perform ancestor-descendant image checks. Therefore, if you want Docker socket
203-
mounts to be allowed for images derived from a parent image in the
204-
`imageList`, make sure the parent image is listed with name and tag.
198+
* For Docker Desktop versions 4.34 and 4.35 only: The `allowDerivedImages` setting
199+
applies to all images in the `imageList` specified with an explicit tag (e.g.,
200+
`<name>:<tag>`). It does not apply to images specified using the tag wildcard
201+
(e.g., `<name>:*`) described in the prior section. In Docker Desktop 4.36 and
202+
later, this caveat no longer applies, meaning that the `allowDerivedImages`
203+
settings applies to images specified with or without a wildcard tag. This
204+
makes it easier to manage the ECI Docker socket image list.
205+
206+
### Allowing all containers to mount the Docker socket
207+
208+
In Docker Desktop version 4.36 and later, it's possible to configure the image
209+
list to allow any container to mount the Docker socket. You do this by adding
210+
`"*"` to the `imageList`:
211+
212+
```json
213+
"imageList": {
214+
"images": [
215+
"*"
216+
]
217+
}
218+
```
219+
220+
It is recommended that you use this only in scenarios where explicitly listing
221+
allowed container images is not flexible enough.
205222

206223
### Command list
207224

@@ -302,10 +319,13 @@ Whether to configure the list as an allow or deny list depends on the use case.
302319
this case, remove the local image and pull it again (e.g., `docker rm <image>`
303320
and `docker pull <image>`).
304321

305-
* It's not possible to allow Docker socket bind-mounts on local images (i.e., images that are not on
306-
a registry) unless they are [derived from an allowed image](#docker-socket-mount-permissions-for-derived-images).
307-
That's because Docker Desktop pulls the digests for the allowed images from the
308-
registry, and then uses that to compare against the local copy of the image.
322+
* It's not possible to allow Docker socket bind-mounts on containers using
323+
local-only images (i.e., images that are not on a registry) unless they are
324+
[derived from an allowed image](#docker-socket-mount-permissions-for-derived-images)
325+
or you've [allowed all containers to mount the Docker socket](#allowing-all-containers-to-mount-the-docker-socket).
326+
That is because Docker Desktop pulls the digests for the allowed images from
327+
the registry, and then uses that to compare against the local copy of the
328+
image.
309329

310330
* The `commandList` configuration applies to all containers that are allowed to
311331
bind-mount the Docker socket. Therefore it can't be configured differently per

0 commit comments

Comments
 (0)