Skip to content

Docs scanner fixes#24998

Merged
aevesdocker merged 1 commit intodocker:mainfrom
aevesdocker:issue-fixes
May 7, 2026
Merged

Docs scanner fixes#24998
aevesdocker merged 1 commit intodocker:mainfrom
aevesdocker:issue-fixes

Conversation

@aevesdocker
Copy link
Copy Markdown
Contributor

Description

Closes #24957
Closes #24969
Supersedes and closes #24972

Related issues or tickets

Reviews

  • Technical review
  • Editorial review
  • Product review

@netlify
Copy link
Copy Markdown

netlify Bot commented May 7, 2026

Deploy Preview for docsdocker ready!

Name Link
🔨 Latest commit 7799c50
🔍 Latest deploy log https://app.netlify.com/projects/docsdocker/deploys/69fc72b15b65f000085ad5ee
😎 Deploy Preview https://deploy-preview-24998--docsdocker.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link
Copy Markdown

@docker-agent docker-agent left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Assessment: 🟡 NEEDS ATTENTION

This PR restructures ECI protection categories and updates policy precedence descriptions. The table conversion in configure-admin-console.md is a clear improvement. However, three factual accuracy questions in the changed lines need author confirmation before merging.


- Containers created with `docker run` and `docker create`
- Containers using the `docker-container` build driver
- Kubernetes with the Kind provisioner
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[HIGH] Version constraint silently dropped: Kubernetes/Kind ECI support moved to "Always protected"

The previous text stated: Kubernetes: Protected in Docker Desktop 4.38+ when using the kind provisioner (under the "Version dependent" section). The new text moves Kubernetes with the Kind provisioner to "Always protected" with no version qualifier.

If Kind provisioner ECI support is now available in all supported Docker Desktop versions, this change is correct. However, if the 4.38+ requirement still applies to some users, removing it without explanation could mislead users on older Docker Desktop versions into thinking their Kind-based Kubernetes workloads are always protected when they may not be.

Please confirm this change is intentional and that Kind support is now universal across all supported Docker Desktop releases.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

change is intentional

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for confirming! I'll resolve this thread.


- Docker Build: Protected in Docker Desktop 4.30+ (except WSL 2)
- Kubernetes: Protected in Docker Desktop 4.38+ when using the kind provisioner
- Docker Build: Protected in Docker Desktop for Mac, Linux, and Windows with Hyper-V backend
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[HIGH] Docker Build ECI: version floor (4.30+) dropped from description

The previous text read: Docker Build: Protected in Docker Desktop 4.30+ (except WSL 2). The new text reads: Docker Build: Protected in Docker Desktop for Mac, Linux, and Windows with Hyper-V backend.

The platform list (Mac, Linux, and Windows with Hyper-V backend) correctly conveys the same exclusion as the old "except WSL 2" wording — these are semantically equivalent. However, the version floor 4.30+ has been removed entirely.

Users running Docker Desktop versions older than 4.30 would see the new text and incorrectly assume Docker Build is protected on their platform, when it may not be. If Docker Desktop 4.30 is now the minimum supported version and this constraint no longer needs documenting, please add a brief note confirming this intentional removal.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

change is intentional

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for confirming! Since the version floor removal is intentional, this resolves my concern. The platform-specific information alone is sufficient for users to understand Docker Build protection scope.

1. Organization default policy: Applied when no user-specific policy exists
1. Local `admin-settings.json` file: Lowest priority, overridden by Admin Console policies
1. [Configuration profiles](/manuals/enterprise/security/enforce-sign-in/methods.md#configuration-profiles-method-mac-only): Super-set of Docker Admin Console policies.
1. [Configuration profiles](/manuals/enterprise/security/enforce-sign-in/methods.md#configuration-profiles-method-mac-only) when used to control proxy settings
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

[MEDIUM] Configuration profiles description narrowed — verify factual accuracy

The previous text described configuration profiles as: Super-set of Docker Admin Console policies.

The new text scopes this to: when used to control proxy settings

These have very different meanings. The old text implied configuration profiles override all Admin Console policies (making them the highest-priority mechanism). The new text limits this to proxy settings only.

Notably, the new narrower scope is more logically consistent with its position as item 4 (lowest priority) in the precedence list — a true "super-set" of all policies would typically rank first, not last. If the old text was an overstatement and configuration profiles only override proxy-related settings, the new text is a useful correction.

Please confirm: do configuration profiles only affect proxy settings, or do they also override other Admin Console policies? If the scope is broader than proxy settings, the new text may be too narrow and could cause administrators to miss relevant behavior.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the new text is more accurate

Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for confirming! I'll resolve this thread since the narrower scope is the correct representation. Good catch on improving the accuracy — the previous wording would have been misleading for administrators trying to understand the actual behavior of configuration profiles.

Copy link
Copy Markdown
Contributor

@dvdksn dvdksn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me

@aevesdocker aevesdocker merged commit 5070878 into docker:main May 7, 2026
21 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

3 participants