mirror of https://github.com/docker/docs.git
ENGDOCS-2105 (#20092)
* ENGDOCS-2015 * fix callout * Apply suggestions from code review
This commit is contained in:
parent
08f544060f
commit
09a458f818
|
|
@ -6,13 +6,9 @@ aliases:
|
||||||
- /desktop/hardened-desktop/settings-management/air-gapped-containers/
|
- /desktop/hardened-desktop/settings-management/air-gapped-containers/
|
||||||
---
|
---
|
||||||
|
|
||||||
> **Beta feature**
|
{{< introduced desktop 4.29.0 "../release-notes.md#4290" >}}
|
||||||
>
|
|
||||||
> This feature is in [Beta](../../release-lifecycle.md/#beta).
|
|
||||||
> It's available with Docker Desktop version 4.29 and later.
|
|
||||||
{ .experimental }
|
|
||||||
|
|
||||||
Air-gapped containers allows administrators to restrict containers from accessing network resources, limiting where data can be uploaded to or downloaded from.
|
Air-Gapped Containers allows administrators to restrict containers from accessing network resources, limiting where data can be uploaded to or downloaded from.
|
||||||
|
|
||||||
Docker Desktop can apply a custom set of proxy rules to network traffic from containers. The proxy can be configured to:
|
Docker Desktop can apply a custom set of proxy rules to network traffic from containers. The proxy can be configured to:
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -45,7 +45,7 @@ Using the `admin-settings.json` file, admins can:
|
||||||
- Turn off Docker Desktop's onboarding survey
|
- Turn off Docker Desktop's onboarding survey
|
||||||
- Control the file sharing implementation for your developers on macOS
|
- Control the file sharing implementation for your developers on macOS
|
||||||
- Specify which paths your developers can add file shares to
|
- Specify which paths your developers can add file shares to
|
||||||
- Configure air-gapped containers (Beta)
|
- Configure Air-Gapped Containers
|
||||||
|
|
||||||
For more details on the syntax and options admins can set, see [Configure Settings Management](configure.md).
|
For more details on the syntax and options admins can set, see [Configure Settings Management](configure.md).
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -183,7 +183,7 @@ The following `admin-settings.json` code and table provides an example of the re
|
||||||
| `exposeDockerAPIOnTCP2375` | Windows only| Exposes the Docker API on a specified port. If `value` is set to true, the Docker API is exposed on port 2375. Note: This is unauthenticated and should only be enabled if protected by suitable firewall rules.|
|
| `exposeDockerAPIOnTCP2375` | Windows only| Exposes the Docker API on a specified port. If `value` is set to true, the Docker API is exposed on port 2375. Note: This is unauthenticated and should only be enabled if protected by suitable firewall rules.|
|
||||||
| `proxy` | |If `mode` is set to `system` instead of `manual`, Docker Desktop gets the proxy values from the system and ignores and values set for `http`, `https` and `exclude`. Change `mode` to `manual` to manually configure proxy servers. If the proxy port is custom, specify it in the `http` or `https` property, for example `"https": "http://myotherproxy.com:4321"`. The `exclude` property specifies a comma-separated list of hosts and domains to bypass the proxy. |
|
| `proxy` | |If `mode` is set to `system` instead of `manual`, Docker Desktop gets the proxy values from the system and ignores and values set for `http`, `https` and `exclude`. Change `mode` to `manual` to manually configure proxy servers. If the proxy port is custom, specify it in the `http` or `https` property, for example `"https": "http://myotherproxy.com:4321"`. The `exclude` property specifies a comma-separated list of hosts and domains to bypass the proxy. |
|
||||||
| `windowsDockerdPort` | Windows only | Exposes Docker Desktop's internal proxy locally on this port for the Windows Docker daemon to connect to. If it is set to 0, a random free port is chosen. If the value is greater than 0, use that exact value for the port. The default value is -1 which disables the option. Note: This is available for Windows containers only. |
|
| `windowsDockerdPort` | Windows only | Exposes Docker Desktop's internal proxy locally on this port for the Windows Docker daemon to connect to. If it is set to 0, a random free port is chosen. If the value is greater than 0, use that exact value for the port. The default value is -1 which disables the option. Note: This is available for Windows containers only. |
|
||||||
| `containersProxy` (Beta) | | Allows you to create air-gapped containers. For more information see [Air-gapped containers](../air-gapped-containers.md).|
|
| `containersProxy` (Beta) | | Allows you to create air-gapped containers. For more information see [Air-Gapped Containers](../air-gapped-containers.md).|
|
||||||
| `enhancedContainerIsolation` | | If `value` is set to true, Docker Desktop runs all containers as unprivileged, via the Linux user-namespace, prevents them from modifying sensitive configurations inside the Docker Desktop VM, and uses other advanced techniques to isolate them. For more information, see [Enhanced Container Isolation](../enhanced-container-isolation/index.md).|
|
| `enhancedContainerIsolation` | | If `value` is set to true, Docker Desktop runs all containers as unprivileged, via the Linux user-namespace, prevents them from modifying sensitive configurations inside the Docker Desktop VM, and uses other advanced techniques to isolate them. For more information, see [Enhanced Container Isolation](../enhanced-container-isolation/index.md).|
|
||||||
| `dockerSocketMount` | | By default, enhanced container isolation blocks bind-mounting the Docker Engine socket into containers (e.g., `docker run -v /var/run/docker.sock:/var/run/docker.sock ...`). This allows admins to relax this in a controlled way. See [ECI Configuration](../enhanced-container-isolation/config.md) for more info. |
|
| `dockerSocketMount` | | By default, enhanced container isolation blocks bind-mounting the Docker Engine socket into containers (e.g., `docker run -v /var/run/docker.sock:/var/run/docker.sock ...`). This allows admins to relax this in a controlled way. See [ECI Configuration](../enhanced-container-isolation/config.md) for more info. |
|
||||||
| `imageList` | | Indicates which container images are allowed to bind-mount the Docker Engine socket. |
|
| `imageList` | | Indicates which container images are allowed to bind-mount the Docker Engine socket. |
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue