Changing the screenshots to more useful versions+minor cleanup (#9809)

Signed-off-by: Lena Larionova <lena.larionova@docker.com>
This commit is contained in:
lena-larionova 2019-11-05 14:36:11 -08:00 committed by GitHub
parent 5c918952c5
commit 631c2f6b67
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 28 additions and 18 deletions

Binary file not shown.

After

Width:  |  Height:  |  Size: 168 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 115 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 188 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 158 KiB

View File

@ -8,13 +8,15 @@ redirect_from:
## Permitted content and support options
* Content that runs on Docker Enterprise may be published on Docker Hub under a Verified Publisher profile. This content may also qualify
to become a Docker Certified Container or Plugin image, and thus backed by
collaborative Docker/Publisher support.
* Content that runs on Docker Enterprise may be published on Docker Hub under a
Verified Publisher profile. This content may also qualify to become a Docker
Certified Container or Plugin image, and thus become backed by collaborative
Docker/Publisher support.
* Content that runs on the Docker Community may be published in Docker Hub, but is not supported by Docker nor is it eligible to become Certified.
* Content that runs on the Docker Community may be published in Docker Hub, but
is not supported by Docker nor is it eligible to become Certified.
* Content that requires a non Certified Infrastructure environment may not be
* Content that requires a non-Certified Infrastructure environment may not be
published.
@ -28,8 +30,7 @@ redirect_from:
## Onboarding
The Docker Hub publishing process begins from the landing page: sign in with
your Docker ID and specify a product name and image source from a private or public
repository.
your Docker ID and specify a product name and image source from a private or public repository.
After specifying a source, provide the content-manifest items to populate your
product details page. These items include logos, descriptions, and licensing and
@ -208,19 +209,28 @@ To interpret the results of a scanned image:
1. Log on to [Docker Hub](https://hub.docker.com){: target="_blank" class="_"}.
2. Navigate to the repository details page (for example,
[busybox](https://hub.docker.com/_/busybox){: target="_blank" class="_"}).
[nodejs](https://hub.docker.com/_/nodejs){: target="_blank" class="_"}).
3. Click **Tags**.
![Scanned tags](images/scan-tags.png)
In this section, you can now view the different architectures separately to easily identify the right image for the architecture you need, complete with image size and operating system information.
![system info](images/Docker-Hub-tags-system-info.png)
4. Click on the digest for a particular architecture, you will now also be able to see the actual source of the image the layer-by-layer details that make up the image. ![system info](images/Docker-Hub-tags-vulnerabilities.png)
![Scanned tags](images/image-tags.png)
5. Click on the first row, youll see that the image contains multiple components and that multiple components have known vulnerabilities ranging from minor to critical. To explore further, click on the caret to expand and view all of the found vulnerabilities:
In this section, you can now view the different architectures separately to
easily identify the right image for the architecture you need, complete
with image size and operating system information.
![Scanned components](images/Docker-hub-tags-vulnerability-details.png)
Each vulnerability is linked directly to the CVE so that you can learn more about the CVE and its implications.
![system info](images/node-tags-system-info.png)
4. Click on the digest for a particular architecture. You can now also see the
actual source of the image: the layer-by-layer details that make up the image.
![system info](images/node-tags-vulnerabilities.png)
5. Click on any row in the **Image History** list. Youll see that the image contains multiple components, and that some of them have known vulnerabilities ranging from minor to critical. To explore further, click on the caret to expand and view all of the found vulnerabilities:
![Scanned components](images/node-tags-vulnerability-details.png)
Each vulnerability is linked directly to the CVE (Common Vulnerabilities and Exposures) list entry so that you can learn more about the CVE entry and its implications.
#### Classification of issues