You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The **No unapproved base images** policy lets you restrict which base
252
-
images you allow in your builds.
256
+
The **No unapproved base images** policy ensures that the base images you use
257
+
in your builds are maintained and secure.
253
258
254
259
This policy checks whether the base images used in your builds match any of the
255
260
patterns specified in the policy configuration. The following table shows a few
@@ -268,35 +273,50 @@ An asterisk (`*`) matches up until the character that follows, or until the end
268
273
of the image reference. Note that the `docker.io` prefix is required in order
269
274
to match Docker Hub images. This is the registry hostname of Docker Hub.
270
275
271
-
You can also configure the policy to:
276
+
This policy is configurable with the following options:
277
+
278
+
-**Approved base image sources**
279
+
280
+
Specify the image reference patterns that you want to allow. The policy
281
+
evaluates the base image references against these patterns.
282
+
283
+
Default: `[*]` (any reference is an allowed base image)
272
284
273
-
- Allow only supported tags of Docker Official Images.
285
+
-**Only supported tags**
286
+
287
+
Allow only supported tags when using Docker Official Images.
274
288
275
289
When this option is enabled, images using unsupported tags of official images
276
-
trigger a policy violation. Supported tags for official images are listed in
277
-
the **Supported tags** section of the repository overview on Docker Hub.
290
+
as their base image trigger a policy violation. Supported tags for official
291
+
images are listed in the **Supported tags** section of the repository
292
+
overview on Docker Hub.
293
+
294
+
Enabled by default.
295
+
296
+
-**Only supported OS distributions**
278
297
279
-
-Allow only Docker Official Images of supported distro versions
298
+
Allow only Docker Official Images of supported Linux distribution versions.
280
299
281
300
When this option is enabled, images using unsupported Linux distributions
282
301
that have reached end of life (such as `ubuntu:18.04`) trigger a policy violation.
283
302
284
303
Enabling this option may cause the policy to report no data
285
304
if the operating system version cannot be determined.
286
305
287
-
This policy isn't enabled by default. To enable the policy:
288
-
289
-
1.[Create a new policy](https://scout.docker.com/reports/policies/create?fromDefinition=approved-base-images&fromNamespace=docker) in the Docker Scout Dashboard.
290
-
2. Under **Approved base image sources**, specify the image reference patterns that you want to allow.
291
-
3. Select whether you want to allow only supported tags for official images,
292
-
and supported Linux distribution versions.
293
-
4. Select **Save and enable**.
294
-
295
-
The policy is now enabled for your current organization.
306
+
Enabled by default.
296
307
297
308
Your images need provenance attestations for this policy to successfully
298
309
evaluate. For more information, see [No base image data](#no-base-image-data).
299
310
311
+
## Additional policies
312
+
313
+
In addition to the [out-of-the-box policies](#out-of-the-box-policies) enabled
314
+
by default, Docker Scout supports the following optional policies. Before you
315
+
can enable these policies, you need to either configure the policies, or
316
+
configure the integration that the policy requires.
0 commit comments