Skip to content

Commit e17e68b

Browse files
authored
Merge pull request #21406 from docker/published-update
publish updates from main
2 parents 18909bb + ff72d25 commit e17e68b

File tree

14 files changed

+68
-60
lines changed

14 files changed

+68
-60
lines changed

_vale/Docker/Acronyms.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,7 @@ exceptions:
6060
- LTS
6161
- MAC
6262
- MDM
63+
- MDN
6364
- NAT
6465
- NET
6566
- NFS
@@ -90,6 +91,7 @@ exceptions:
9091
- SDK
9192
- SLES
9293
- SLSA
94+
- SOCKS
9395
- SPDX
9496
- SQL
9597
- SSD

_vale/config/vocabularies/Docker/accept.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -108,6 +108,7 @@ Zsh
108108
[Mm]oby
109109
[Oo]nboarding
110110
[Pp]aravirtualization
111+
[Pp]roxied
111112
[Pp]roxying
112113
[Rr]eal-time
113114
[Rr]untimes?
@@ -156,5 +157,6 @@ tmpfs
156157
ufw
157158
umask
158159
ungated
160+
untrusted
159161
vSphere
160162
vpnkit

content/manuals/build/building/best-practices.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -319,7 +319,7 @@ backslashes to make your Dockerfile more readable, understandable, and
319319
maintainable.
320320

321321
For example, you can chain commands with the `&&` operator, and use
322-
use escape characters to break long commands into multiple lines.
322+
escape characters to break long commands into multiple lines.
323323

324324
```dockerfile
325325
RUN apt-get update && apt-get install -y \

content/manuals/desktop/troubleshoot-and-support/troubleshoot/known-issues.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ keywords: mac, troubleshooting, known issues, Docker Desktop
44
title: Known issues
55
tags: [ Troubleshooting ]
66
weight: 30
7+
aliases:
8+
- /desktop/troubleshoot/known-issues/
79
---
810

911
{{< tabs >}}

content/manuals/desktop/troubleshoot-and-support/troubleshoot/topics.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@ linkTitle: Common topics
66
toc_max: 4
77
tags: [ Troubleshooting ]
88
weight: 10
9+
aliases:
10+
- /desktop/troubleshoot/topics/
911
---
1012

1113
> [!TIP]

content/manuals/desktop/troubleshoot-and-support/troubleshoot/workarounds.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ keywords: linux, mac, windows, troubleshooting, workarounds, Docker Desktop
44
title: Workarounds for common problems
55
tags: [ Troubleshooting ]
66
weight: 20
7+
aliases:
8+
- /desktop/troubleshoot/workarounds/
79
---
810

911
### Reboot
Lines changed: 28 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -1,59 +1,50 @@
11
---
2-
description: Find a comprehensive overview of Docker Hub, including its features, administrative settings, how to get started quickly, and more
3-
keywords: Docker, docker, docker hub, hub, repositories, docker account
4-
title: Overview of Docker Hub
2+
description: Get an overview on Docker Hub to find and share container images
3+
keywords: docker hub, hub, repositories
4+
title: Docker Hub
55
linkTitle: Docker Hub
66
weight: 100
77
grid:
88
- title: Quickstart
99
description: Step-by-step instructions on getting started on Docker Hub.
1010
icon: explore
1111
link: /docker-hub/quickstart
12-
- title: Create a repository
12+
- title: Repositories
1313
description: Create a repository to share your images with your team, customers,
1414
or the Docker community.
1515
icon: inbox
1616
link: /docker-hub/repos
17-
- title: Manage repository access
18-
description: Manage access to push and pull to your repository and assign permissions.
19-
icon: key
20-
link: /docker-hub/repos/access
21-
- title: Automated builds
22-
description: Learn how you can automatically build images from source code to push to your repositories.
23-
icon: build
24-
link: /docker-hub/builds/how-builds-work
17+
- title: Organizations
18+
description: Learn about organization administration.
19+
icon: store
20+
link: /admin/
21+
- title: Usage
22+
description: Explore usage limits and how to better utilize Docker Hub.
23+
icon: leaderboard
24+
link: /docker-hub/download-rate-limit/
2525
- title: Release notes
2626
description: Find out about new features, improvements, and bug fixes.
2727
icon: note_add
2828
link: /docker-hub/release-notes
2929
---
3030

31-
Docker Hub is a service provided by Docker for finding and sharing container images.
31+
Docker Hub simplifies development with the world's largest container registry
32+
for storing, managing, and sharing Docker images. By integrating seamlessly with
33+
your tools, it enhances productivity and ensures reliable deployment,
34+
distribution, and access to containerized applications. It also provides
35+
developers with pre-built images and assets to speed up development workflows.
3236

33-
It's the world’s largest repository of container images with an array of content sources including container community developers, open source projects, and independent software vendors (ISV) building and distributing their code in containers.
37+
Key features of Docker Hub:
3438

35-
Docker Hub is also where you can go to [carry out administrative tasks for organizations](/admin/). If you have a Docker Team or Business subscription, you can also carry out administrative tasks in the [Docker Admin Console](https://admin.docker.com).
39+
* Unlimited public repositories
40+
* Private repositories
41+
* Webhooks to automate workflows
42+
* GitHub and Bitbucket integrations
43+
* Concurrent and automated builds
44+
* Trusted content featuring high-quality, secure images
3645

37-
{{< tabs >}}
38-
{{< tab name="What key features are included in Docker Hub?" >}}
39-
* [Repositories](../docker-hub/repos/_index.md): Push and pull container images.
40-
* [Builds](builds/_index.md): Automatically build container images from
41-
GitHub and Bitbucket and push them to Docker Hub.
42-
* [Webhooks](webhooks.md): Trigger actions after a successful push
43-
to a repository to integrate Docker Hub with other services.
44-
* [Docker Hub CLI](https://github.com/docker/hub-tool#readme) tool (currently experimental) and an API that allows you to interact with Docker Hub.
45-
* Browse through the [Docker Hub API](/reference/api/hub/latest/) documentation to explore the supported endpoints.
46-
{{< /tab >}}
47-
{{< tab name="What administrative tasks can I perform in Docker Hub?" >}}
48-
* [Create and manage teams and organizations](orgs.md)
49-
* [Create a company](../admin/company/new-company.md)
50-
* [Enforce sign in](../security/for-admins/enforce-sign-in/_index.md)
51-
* Set up [SSO](../security/for-admins/single-sign-on/_index.md) and [SCIM](../security/for-admins/provisioning/scim.md)
52-
* Use [Group mapping](group-mapping.md)
53-
* [Carry out domain audits](domain-audit.md)
54-
* [Use Image Access Management](/manuals/security/for-admins/hardened-desktop/image-access-management.md) to control developers' access to certain types of images
55-
* [Turn on Registry Access Management](/manuals/security/for-admins/hardened-desktop/registry-access-management.md)
56-
{{< /tab >}}
57-
{{< /tabs >}}
46+
In addition to the graphical interface, you can interact with Docker Hub using
47+
the [Docker Hub API](../../reference/api/hub/latest.md) or experimental [Docker
48+
Hub CLI tool](https://github.com/docker/hub-tool#readme).
5849

59-
{{< grid >}}
50+
{{< grid >}}

content/manuals/docker-hub/release-notes.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,18 @@ known issues for each Docker Hub release.
1515

1616
Take a look at the [Docker Public Roadmap](https://github.com/orgs/docker/projects/51/views/1?filterQuery=) to see what's coming next.
1717

18+
## 2024-11-11
19+
20+
### New
21+
22+
- [Personal access tokens](/security/for-developers/access-tokens/) (PATs) now support expiration dates.
23+
24+
## 2024-10-15
25+
26+
### New
27+
28+
- Beta: You can now create [organization access tokens](/security/for-admins/access-tokens/) (OATs) to enhance security for organizations and streamline access management for organizations.
29+
1830
## 2024-03-23
1931

2032
### New

content/manuals/scout/how-tos/artifact-types.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You can use prefixes with the following commands:
5656
This section contains a few examples showing how you can use prefixes
5757
to specify artifacts for `docker scout` commands.
5858

59-
## Analyze a local project
59+
### Analyze a local project
6060

6161
The `fs://` prefix lets you analyze local source code directly,
6262
without having to build it into a container image.
@@ -112,7 +112,7 @@ pkg:npm/[email protected]
112112
CRITICAL 0
113113
```
114114

115-
## Compare a local project to an image
115+
### Compare a local project to an image
116116

117117
With `docker scout compare`, you can compare the analysis of source code on
118118
your local filesystem with the analysis of a container image.

content/manuals/security/for-admins/hardened-desktop/_index.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ weight: 60
3737
3838
Hardened Docker Desktop is a group of security features, designed to improve the security of developer environments with minimal impact on developer experience or productivity.
3939

40-
It lets administrators enforce strict security settings, preventing developers and their containers from bypassing these controls, either intentionally or unintentionally. Additionally, you can enhance container isolation, to mitigate potential security threats such as malicious payloads breaching the Docker Desktop Linux VM and the underlying host.
40+
It lets you enforce strict security settings, preventing developers and their containers from bypassing these controls, either intentionally or unintentionally. Additionally, you can enhance container isolation, to mitigate potential security threats such as malicious payloads breaching the Docker Desktop Linux VM and the underlying host.
4141

42-
Hardened Docker Desktop moves the ownership boundary for Docker Desktop configuration to the organization, meaning that any security controls administrators set cannot be altered by the user of Docker Desktop.
42+
Hardened Docker Desktop moves the ownership boundary for Docker Desktop configuration to the organization, meaning that any security controls you set cannot be altered by the user of Docker Desktop.
4343

4444
It is for security conscious organizations who:
4545
- Don’t give their users root or administrator access on their machines
@@ -50,8 +50,8 @@ It is for security conscious organizations who:
5050

5151
Hardened Desktop features work independently but collectively to create a defense-in-depth strategy, safeguarding developer workstations against potential attacks across various functional layers, such as configuring Docker Desktop, pulling container images, and running container images. This multi-layered defense approach ensures comprehensive security. It helps mitigate against threats such as:
5252

53-
- Malware and supply chain attacks: Registry Access Management and Image Access Management prevent developers from accessing certain container registries and image types, significantly lowering the risk of malicious payloads. Additionally, ECI restricts the impact of containers with malicious payloads by running them without root privileges inside a Linux user namespace.
54-
- Lateral movement: Air-Gapped Containers lets administrators configure network access restrictions for containers, thereby preventing malicious containers from performing lateral movement within the organization's network.
55-
- Insider threats: Settings Management configures and locks various Docker Desktop settings so administrators can enforce company policies and prevent developers from introducing insecure configurations, intentionally or unintentionally.
53+
- Malware and supply chain attacks: Registry Access Management and Image Access Management prevent developers from accessing certain container registries and image types, significantly lowering the risk of malicious payloads. Additionally, Enhanced Container Isolation (ECI) restricts the impact of containers with malicious payloads by running them without root privileges inside a Linux user namespace.
54+
- Lateral movement: Air-gapped containers lets you configure network access restrictions for containers, thereby preventing malicious containers from performing lateral movement within the organization's network.
55+
- Insider threats: Settings Management configures and locks various Docker Desktop settings so you can enforce company policies and prevent developers from introducing insecure configurations, intentionally or unintentionally.
5656

5757
{{< grid >}}

0 commit comments

Comments
 (0)