mirror of https://github.com/docker/docs.git
Changing the screenshots to more useful versions+minor cleanup (#9809)
Signed-off-by: Lena Larionova <lena.larionova@docker.com>
This commit is contained in:
parent
5c918952c5
commit
631c2f6b67
Binary file not shown.
After Width: | Height: | Size: 168 KiB |
Binary file not shown.
After Width: | Height: | Size: 115 KiB |
Binary file not shown.
After Width: | Height: | Size: 188 KiB |
Binary file not shown.
After Width: | Height: | Size: 158 KiB |
|
@ -8,13 +8,15 @@ redirect_from:
|
|||
|
||||
## Permitted content and support options
|
||||
|
||||
* Content that runs on Docker Enterprise may be published on Docker Hub under a Verified Publisher profile. This content may also qualify
|
||||
to become a Docker Certified Container or Plugin image, and thus backed by
|
||||
collaborative Docker/Publisher support.
|
||||
* Content that runs on Docker Enterprise may be published on Docker Hub under a
|
||||
Verified Publisher profile. This content may also qualify to become a Docker
|
||||
Certified Container or Plugin image, and thus become backed by collaborative
|
||||
Docker/Publisher support.
|
||||
|
||||
* Content that runs on the Docker Community may be published in Docker Hub, but is not supported by Docker nor is it eligible to become Certified.
|
||||
* Content that runs on the Docker Community may be published in Docker Hub, but
|
||||
is not supported by Docker nor is it eligible to become Certified.
|
||||
|
||||
* Content that requires a non Certified Infrastructure environment may not be
|
||||
* Content that requires a non-Certified Infrastructure environment may not be
|
||||
published.
|
||||
|
||||
|
||||
|
@ -28,8 +30,7 @@ redirect_from:
|
|||
## Onboarding
|
||||
|
||||
The Docker Hub publishing process begins from the landing page: sign in with
|
||||
your Docker ID and specify a product name and image source from a private or public
|
||||
repository.
|
||||
your Docker ID and specify a product name and image source from a private or public repository.
|
||||
|
||||
After specifying a source, provide the content-manifest items to populate your
|
||||
product details page. These items include logos, descriptions, and licensing and
|
||||
|
@ -208,19 +209,28 @@ To interpret the results of a scanned image:
|
|||
1. Log on to [Docker Hub](https://hub.docker.com){: target="_blank" class="_"}.
|
||||
|
||||
2. Navigate to the repository details page (for example,
|
||||
[busybox](https://hub.docker.com/_/busybox){: target="_blank" class="_"}).
|
||||
[nodejs](https://hub.docker.com/_/nodejs){: target="_blank" class="_"}).
|
||||
|
||||
3. Click **Tags**.
|
||||

|
||||
In this section, you can now view the different architectures separately to easily identify the right image for the architecture you need, complete with image size and operating system information.
|
||||

|
||||
|
||||
4. Click on the digest for a particular architecture, you will now also be able to see the actual source of the image – the layer-by-layer details that make up the image. 
|
||||

|
||||
|
||||
5. Click on the first row, you’ll see that the image contains multiple components and that multiple components have known vulnerabilities ranging from minor to critical. To explore further, click on the caret to expand and view all of the found vulnerabilities:
|
||||
In this section, you can now view the different architectures separately to
|
||||
easily identify the right image for the architecture you need, complete
|
||||
with image size and operating system information.
|
||||
|
||||

|
||||
Each vulnerability is linked directly to the CVE so that you can learn more about the CVE and its implications.
|
||||

|
||||
|
||||
4. Click on the digest for a particular architecture. You can now also see the
|
||||
actual source of the image: the layer-by-layer details that make up the image.
|
||||
|
||||

|
||||
|
||||
5. Click on any row in the **Image History** list. You’ll see that the image contains multiple components, and that some of them have known vulnerabilities ranging from minor to critical. To explore further, click on the caret to expand and view all of the found vulnerabilities:
|
||||
|
||||

|
||||
|
||||
Each vulnerability is linked directly to the CVE (Common Vulnerabilities and Exposures) list entry so that you can learn more about the CVE entry and its implications.
|
||||
|
||||
#### Classification of issues
|
||||
|
||||
|
|
Loading…
Reference in New Issue