@@ -943,7 +943,6 @@ The command is run in the host's network environment (similar to
943
943
> which needs to be enabled when starting the buildkitd daemon with
944
944
> ` --allow-insecure-entitlement network.host ` flag or in [ buildkitd config] ( https://github.com/moby/buildkit/blob/master/docs/buildkitd.toml.md ) ,
945
945
> and for a build request with [ ` --allow network.host ` flag] ( https://docs.docker.com/engine/reference/commandline/buildx_build/#allow ) .
946
- { .warning }
947
946
948
947
### RUN --security
949
948
@@ -964,7 +963,6 @@ This is equivalent to running `docker run --privileged`.
964
963
> enabled when starting the buildkitd daemon with
965
964
> ` --allow-insecure-entitlement security.insecure ` flag or in [ buildkitd config] ( https://github.com/moby/buildkit/blob/master/docs/buildkitd.toml.md ) ,
966
965
> and for a build request with [ ` --allow security.insecure ` flag] ( https://docs.docker.com/engine/reference/commandline/buildx_build/#allow ) .
967
- { .warning }
968
966
969
967
Default sandbox mode can be activated via ` --security=sandbox ` , but that is no-op.
970
968
@@ -2255,7 +2253,6 @@ runtime, runs the relevant `ENTRYPOINT` and `CMD` commands.
2255
2253
>
2256
2254
> On Windows, the user must be created first if it's not a built-in account.
2257
2255
> This can be done with the ` net user ` command called as part of a Dockerfile.
2258
- { .warning }
2259
2256
2260
2257
``` dockerfile
2261
2258
FROM microsoft/windowsservercore
@@ -2326,7 +2323,6 @@ flag.
2326
2323
>
2327
2324
> Refer to the [ ` RUN --mount=type=secret ` ] ( #run---mounttypesecret ) section to
2328
2325
> learn about secure ways to use secrets when building images.
2329
- { .warning }
2330
2326
2331
2327
A Dockerfile may include one or more ` ARG ` instructions. For example,
2332
2328
the following is a valid Dockerfile:
0 commit comments