@@ -943,7 +943,6 @@ The command is run in the host's network environment (similar to
943
943
> which needs to be enabled when starting the buildkitd daemon with
944
944
> ` --allow-insecure-entitlement network.host ` flag or in [ buildkitd config] ( https://github.com/moby/buildkit/blob/master/docs/buildkitd.toml.md ) ,
945
945
> and for a build request with [ ` --allow network.host ` flag] ( https://docs.docker.com/engine/reference/commandline/buildx_build/#allow ) .
946
- { .warning }
947
946
948
947
### RUN --security
949
948
@@ -964,7 +963,6 @@ This is equivalent to running `docker run --privileged`.
964
963
> enabled when starting the buildkitd daemon with
965
964
> ` --allow-insecure-entitlement security.insecure ` flag or in [ buildkitd config] ( https://github.com/moby/buildkit/blob/master/docs/buildkitd.toml.md ) ,
966
965
> and for a build request with [ ` --allow security.insecure ` flag] ( https://docs.docker.com/engine/reference/commandline/buildx_build/#allow ) .
967
- { .warning }
968
966
969
967
Default sandbox mode can be activated via ` --security=sandbox ` , but that is no-op.
970
968
@@ -2261,7 +2259,6 @@ runtime, runs the relevant `ENTRYPOINT` and `CMD` commands.
2261
2259
>
2262
2260
> On Windows, the user must be created first if it's not a built-in account.
2263
2261
> This can be done with the ` net user ` command called as part of a Dockerfile.
2264
- { .warning }
2265
2262
2266
2263
``` dockerfile
2267
2264
FROM microsoft/windowsservercore
@@ -2332,7 +2329,6 @@ flag.
2332
2329
>
2333
2330
> Refer to the [ ` RUN --mount=type=secret ` ] ( #run---mounttypesecret ) section to
2334
2331
> learn about secure ways to use secrets when building images.
2335
- { .warning }
2336
2332
2337
2333
A Dockerfile may include one or more ` ARG ` instructions. For example,
2338
2334
the following is a valid Dockerfile:
0 commit comments