Removed obsolete snyk mentions related to vulnerabilities reports (#17017)

Signed-off-by: Guillaume Tardif <guillaume.tardif@gmail.com>
This commit is contained in:
Guillaume Tardif 2023-04-03 08:52:56 +01:00 committed by GitHub
parent 43fb84bf13
commit 1eca950459
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 6 additions and 7 deletions

View File

@ -12,7 +12,7 @@ When you open Docker Desktop, the Docker Dashboard displays.
The **Containers** view provides a runtime view of all your containers and applications. It allows you to interact with containers and applications, and manage the lifecycle of your applications directly from your machine. This view also provides an intuitive interface to perform common actions to inspect, interact with, and manage your Docker objects including containers and Docker Compose-based applications. For more information, see [Explore running containers and applications](container.md).
The **Images** view displays a list of your Docker images and allows you to run an image as a container, pull the latest version of an image from Docker Hub, and inspect images. It also displays a summary of the vulnerability scanning report using Snyk. In addition, the **Images** view contains clean-up options to remove unwanted images from the disk to reclaim space. If you are logged in, you can also see the images you and your organization have shared on Docker Hub. For more information, see [Explore your images](images.md).
The **Images** view displays a list of your Docker images and allows you to run an image as a container, pull the latest version of an image from Docker Hub, and inspect images. It also displays a summary of image vulnerabilities. In addition, the **Images** view contains clean-up options to remove unwanted images from the disk to reclaim space. If you are logged in, you can also see the images you and your organization have shared on Docker Hub. For more information, see [Explore your images](images.md).
The **Volumes** view displays a list of volumes and allows you to easily create and delete volumes and see which ones are being used. For more information, see [Explore volumes](volumes.md).
@ -31,7 +31,7 @@ From the Docker Dashboard you can use Quick Search, which is located in the Dash
- Extensions. From here, you can learn more about the extension and install it with a single click. Or, if you already have an extension installed, you can open it straight from the search results.
- Any volume. From here you can view the associated container.
- Any volume. From here you can view the associated container.
## The Docker menu
@ -43,9 +43,9 @@ To display the Docker menu, right-click on the ![whale menu](../../assets/images
- **Sign in/Create Docker ID**
- **Settings**
- **Check for updates**
- **Troubleshoot**
- **Troubleshoot**
- **Switch to Windows containers**
- **About Docker Desktop**. Contains information on the versions you are running, and links to the Subscription Service Agreement for example.
- **About Docker Desktop**. Contains information on the versions you are running, and links to the Subscription Service Agreement for example.
- **Documentation**
- **Quick Start Guide**. Launches the Quick Start Guide.
- **Docker Hub**
@ -54,4 +54,3 @@ To display the Docker menu, right-click on the ![whale menu](../../assets/images
- **Pause**
- **Restart**
- **Quit Docker Desktop**

View File

@ -16,7 +16,7 @@ redirect_from:
- /docker-hub/publish/certify-plugins-logging/
- /docker-hub/publish/trustchain/
- /docker-hub/publish/byol/
- /docker-hub/publish/publisher-center-migration/
- /docker-hub/publish/publisher-center-migration/
---
The Verified Publisher Program provides several features and benefits to Docker
@ -54,7 +54,7 @@ client tool (user agent), and more.
## Vulnerability scanning
Automatic vulnerability scanning using Snyk for images published to Docker Hub.
Automatic vulnerability scanning for images published to Docker Hub.
Scanning images ensures that the published content is secure, and underlines to
developers that it can be trusted. Scanning can be enabled on a per-repository
basis, refer to [vulnerability scanning](/docker-hub/vulnerability-scanning/){: