You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Jun 30, 2021. It is now read-only.
There are also additional steps you can take to ensure you're using the correct image:
135
135
136
-
### Option 1 - Use immutable image digests
137
-
Given docker.io currently allows to push the same tag image twice this represent a security concern but since docker >= 1.6.2 is possible to fetch the digest sha256 instead of the tag so you can be sure you're using the exact same docker image every time:
138
-
139
-
# e.g. sha256 for tag v2.46.0-04
140
-
export SHA=TBD
141
-
docker pull elgalu/selenium@sha256:${SHA}
142
-
143
-
### Option 2 - Check the Full Image Id
136
+
### Option 1 - Check the Full Image Id
144
137
145
-
Verify that image id is indeed correct
138
+
You can simply verify that image id is indeed the correct one.
if docker inspect -f='{{.Id}}' elgalu/selenium:v2.46.0-04 |grep ${IMGID} &> /dev/null; then
150
143
echo "Image ID tested ok"
151
144
else
152
145
echo "Image ID doesn't match"
153
146
fi
154
147
148
+
### Option 2 - Use immutable image digests
149
+
150
+
Given docker.io currently allows to push the same tag image twice this represent a security concern but since docker >= 1.6.2 is possible to fetch the digest sha256 instead of the tag so you can be sure you're using the exact same docker image every time:
You can find all digests sha256 and image ids per tag in the [CHANGELOG](./CHANGELOG.md) so as of now you just need to trust the sha256 in the CHANGELOG. Bullet proof is to fork this project and build the images yourself if security is a big concern.
0 commit comments