From 57b5a647ad12f5cf7fe54b7d7ed307a549d49d7e Mon Sep 17 00:00:00 2001 From: Kyle Martin Date: Mon, 27 Dec 2021 19:20:04 -0700 Subject: [PATCH 1/2] Very minor style update to included sample Python Inconsequential and trivial change to ensure code in tutorial is consistently styled. --- language/python/develop.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/language/python/develop.md b/language/python/develop.md index 19b466f30e..20e77bf012 100644 --- a/language/python/develop.md +++ b/language/python/develop.md @@ -87,7 +87,7 @@ def hello_world(): return 'Hello, Docker!' @app.route('/widgets') -def get_widgets() : +def get_widgets(): mydb = mysql.connector.connect( host="mysqldb", user="root", From eae9d83c2465174089f8c34da01226ad705566a4 Mon Sep 17 00:00:00 2001 From: Sebastiaan van Stijn Date: Tue, 11 Jan 2022 14:05:27 +0100 Subject: [PATCH 2/2] engine: fix heading levels to prevent them showing in right-hand nav Signed-off-by: Sebastiaan van Stijn --- engine/release-notes/index.md | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/engine/release-notes/index.md b/engine/release-notes/index.md index 37baf58002..8dd8409479 100644 --- a/engine/release-notes/index.md +++ b/engine/release-notes/index.md @@ -66,7 +66,7 @@ Provider: Snyk (1.790.0 (standalone)) [Read our blog post on CVE-2021-44228](https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/) to learn how to use the `docker scan` command to check if images are vulnerable. -## Packaging +### Packaging - Update `docker scan` to [v0.12.0](https://github.com/docker/scan-cli-plugin/releases/tag/v0.12.0). - Update `docker buildx` to [v0.7.1](https://github.com/docker/buildx/releases/tag/v0.7.1). @@ -97,7 +97,7 @@ to learn how to use the `docker scan` command to check if images are vulnerable. - Fix panic.log file having read-only attribute set [moby/moby#42987](https://github.com/moby/moby/pull/42987). -## Packaging +### Packaging - Update containerd to [v1.4.12](https://github.com/containerd/containerd/releases/tag/v1.4.12) to mitigate [CVE-2021-41190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41190). - Update Golang runtime to Go 1.16.10. @@ -123,7 +123,7 @@ to learn how to use the `docker scan` command to check if images are vulnerable. - Fix platform-matching logic to fix `docker build` using not finding images in the local image cache on Arm machines when using BuildKit [moby/moby#42954](https://github.com/moby/moby/pull/42954) -## Runtime +### Runtime - Add support for `clone3` syscall in the default seccomp policy to support running containers based on recent versions of Fedora and Ubuntu. [moby/moby/#42836](https://github.com/moby/moby/pull/42836). @@ -135,7 +135,7 @@ to learn how to use the `docker scan` command to check if images are vulnerable. - Fix an issue where updating a service did not roll back on failure [moby/moby#42875](https://github.com/moby/moby/pull/42875). -## Packaging +### Packaging - Add packages for Ubuntu 21.10 "Impish Indri" and Fedora 35. - Update `docker scan` to v0.9.0 @@ -158,13 +158,13 @@ well as updated versions of the containerd.io package. > to learn how to configure the Docker Daemon to use a proxy server. {: .important } -## Client +### Client - [CVE-2021-41092](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41092) Ensure default auth config has address field set, to prevent credentials being sent to the default registry. -## Runtime +### Runtime - [CVE-2021-41089](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41089) Create parent directories inside a chroot during `docker cp` to prevent a specially @@ -173,7 +173,7 @@ well as updated versions of the containerd.io package. Lock down file permissions to prevent unprivileged users from discovering and executing programs in `/var/lib/docker`. -## Packaging +### Packaging > **Known issue** >