From 01a6d5d55f41e0b2d2d7084504e12a1c03b8add6 Mon Sep 17 00:00:00 2001 From: Usha Mandya Date: Fri, 24 Sep 2021 11:46:04 +0100 Subject: [PATCH] Update scan CTA Signed-off-by: Usha Mandya --- _includes/sign-up-cta.html | 7 +++++++ develop/scan-images/index.md | 6 +++--- engine/scan/index.md | 14 ++++++++++---- 3 files changed, 20 insertions(+), 7 deletions(-) create mode 100644 _includes/sign-up-cta.html diff --git a/_includes/sign-up-cta.html b/_includes/sign-up-cta.html new file mode 100644 index 0000000000..409ba63848 --- /dev/null +++ b/_includes/sign-up-cta.html @@ -0,0 +1,7 @@ + diff --git a/develop/scan-images/index.md b/develop/scan-images/index.md index 31cc09132d..edf5083475 100644 --- a/develop/scan-images/index.md +++ b/develop/scan-images/index.md @@ -4,9 +4,9 @@ description: Scan images best practices guide keywords: docker scan, scan, images, snyk, vulnerability --- -{% include upgrade-cta.html - body="Did you know that Docker subscribers receive 200 Snyk vulnerability scans as part of their subscription? Click [here](https://snyk.co/udvnv) to activate your free monthly scans. Upgrade your existing subscription to start scanning your images for vulnerabilities." - header-text="This feature requires a paid Docker subscription" +{% include sign-up-cta.html + body="You can now get 10 free scans per month as part of your Docker subscription. Sign in to Docker to start scanning your images for vulnerabilities." + header-text="This feature requires a Docker subscription" target-url="https://www.docker.com/pricing?utm_source=docker&utm_medium=webreferral&utm_campaign=docs_driven_upgrade_scan" %} diff --git a/engine/scan/index.md b/engine/scan/index.md index e949682c2b..85054fdc72 100644 --- a/engine/scan/index.md +++ b/engine/scan/index.md @@ -6,8 +6,13 @@ toc_min: 1 toc_max: 2 --- +{% include sign-up-cta.html + body="You can now get 10 free scans per month as part of your Docker subscription. Sign in to Docker to start scanning your images for vulnerabilities." + header-text="This feature requires a Docker subscription" + target-url="https://www.docker.com/pricing?utm_source=docker&utm_medium=webreferral&utm_campaign=docs_driven_upgrade_scan" +%} -> Looking to speed up your development cycles? Quickly detect and learn how to remediate CVEs in your images by running `docker scan IMAGE_NAME`. Check out [How to scan images](#how-to-scan-images) for details. +Looking to speed up your development cycles? Quickly detect and learn how to remediate CVEs in your images by running `docker scan IMAGE_NAME`. Check out [How to scan images](#how-to-scan-images) for details. Vulnerability scanning for Docker local images allows developers and development teams to review the security state of the container images and take actions to fix issues identified during the scan, resulting in more secure deployments. Docker Scan runs on Snyk engine, providing users with visibility into the security posture of their local Dockerfiles and local images. @@ -335,10 +340,11 @@ If you use the `--login` flag without any token, you will be redirected to the S To run vulnerability scanning on your Docker images, you must meet the following requirements: -1. Download and install Docker Desktop Edge version 2.3.6.0 or later. +1. Download and install Docker Desktop. - - [Download for Mac](https://desktop.docker.com/mac/edge/Docker.dmg){: target="_blank" rel="noopener" class="_"} - - [Download for Windows](https://desktop.docker.com/win/edge/Docker%20Desktop%20Installer.exe){: target="_blank" rel="noopener" class="_"} + - [Download for Mac with Intel chip](https://desktop.docker.com/mac/main/amd64/Docker.dmg?utm_source=docker&utm_medium=webreferral&utm_campaign=docs-driven-download-mac-amd64) + - [Download for Mac with Apple chip](https://desktop.docker.com/mac/main/arm64/Docker.dmg?utm_source=docker&utm_medium=webreferral&utm_campaign=docs-driven-download-mac-arm64) + - [Download for Windows](https://desktop.docker.com/win/main/amd64/Docker%20Desktop%20Installer.exe) 2. Sign into [Docker Hub](https://hub.docker.com){: target="_blank" rel="noopener" class="_"}.