Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add: Add quickstart.md improvements #22272

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open

Add: Add quickstart.md improvements #22272

wants to merge 1 commit into from

Conversation

tanure
Copy link

@tanure tanure commented Mar 18, 2025

Description

I did some improvements to the quickstart.md file, adding images and improve some descriptions to be albe to helo learners to find the references mentioned in the file.

Related issues or tickets

No related issues or ticket.

Reviews

  • Technical review
  • Editorial review
  • Product review

@tanure tanure requested a review from craig-osterhout as a code owner March 18, 2025 10:46
@github-actions github-actions bot added the area/scout Relates to Docker Scout label Mar 18, 2025
Copy link

netlify bot commented Mar 18, 2025

Deploy Preview for docsdocker ready!

Name Link
🔨 Latest commit 4410112
🔍 Latest deploy log https://app.netlify.com/sites/docsdocker/deploys/67d94f0282ad8a00084a77b5
😎 Deploy Preview https://deploy-preview-22272--docsdocker.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

@tanure
Copy link
Author

tanure commented Mar 25, 2025

Hi @craig-osterhout ,

I hope you're doing well. Is there anything else I should do on this PR to be considered?

Best Regards,
Albert Tanure

@craig-osterhout
Copy link
Contributor

Thanks @tanure. Nothing further is needed at this moment. If you want a head start on the feedback, please check the comments added by the linters.

Copy link
Contributor

@craig-osterhout craig-osterhout left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you @tanure. This topic definitely needed a refresh. I left some nits from our style guide and some other suggestions.

@@ -95,6 +95,10 @@ the underlying vulnerable express version to 4.17.3 or later.
+ "express": "4.17.3"
}
```
> [!TIP]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The step is definitely wrong, but this callout seems like a band-aid fix. All of step 4 is wrong, and will always be wrong from this point in time going forward.
Suggest rewriting all step 4.

We don't need to fix all the vulnerabilities to show the concept. We can fix just one that we know will always be there.

For example, we can say there are multiple vulnerabilities, but you're going to only fix HIGH CVE-2022-24999. There is a fixed version, 4.17.3 specified, so update to 4.17.3. Then, run the command again and verify that HIGH CVE-2022-24999 is no longer present.

@@ -172,6 +176,10 @@ Policy status FAILED (2/6 policies met, 2 missing data)
? │ Supply chain attestations │ No data
```

> [!NOTE]
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggest using callouts sparingly. Maybe just add it to the paragraph above like,

Now you can run the `quickview` command to get an overview
of the compliance status for the image you just built.
The image is evaluated against the default policy configurations. You'll see output similar to the following.

@@ -209,7 +217,7 @@ The classic image store doesn't support manifest lists,
which is how the provenance attestations are attached to an image.

Open **Settings** in Docker Desktop. Under the **General** section, make sure
that the **Use containerd for pulling and storing images** option is checked.
that the **Use containerd for pulling and storing images** option is checked, then click the `Apply & Restart` button to apply the changes.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
that the **Use containerd for pulling and storing images** option is checked, then click the `Apply & Restart` button to apply the changes.
that the **Use containerd for pulling and storing images** option is checked, then select **Apply & restart**.

@@ -230,7 +238,11 @@ results through a different lens: the Docker Scout Dashboard.
3. Select **Images** in the left-hand navigation.

The images page lists your Scout-enabled repositories.
Select the image in the list to open the **Image details** sidebar.

Select the docker image you want to analyze and click the button shown in the image below to display the **Image details** sidebar.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is not correct.
(1) Select the Docker image you want to analyze and (2) click the button...

Only one thing needs to be selected, and that is anywhere in the row except the links. I'm guessing the confusing part is whether to click on the image name link or something else.
Suggest something more direct like, Select the row for the image you want to view, anywhere in the row except on a link, to open the Image details sidebar.


Select the docker image you want to analyze and click the button shown in the image below to display the **Image details** sidebar.

![View Image Details](./images/image-details.png)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As above, the user can select the icon, or anywhere else in the row. This is unnecessarily prescriptive. Suggest removing as selecting a row is not unordinary enough to require visual instructions.

@@ -239,13 +251,17 @@ The sidebar shows a compliance overview for the last pushed tag of a repository.
> It might take a few minutes before the results appear if this is your
> first time using the Docker Scout Dashboard.

Inspect the **Up-to-Date Base Images** policy.
Go back to the image list and click on the image version, available in the **Most recent image** column.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Go back to the image list and click on the image version, available in the **Most recent image** column.
Go back to the image list and select the image version, available in the **Most recent image** column.

@@ -239,13 +251,17 @@ The sidebar shows a compliance overview for the last pushed tag of a repository.
> It might take a few minutes before the results appear if this is your
> first time using the Docker Scout Dashboard.

Inspect the **Up-to-Date Base Images** policy.
Go back to the image list and click on the image version, available in the **Most recent image** column.
Then, at the top right of the page, click on the **Update base image** button to inspect the policy.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Then, at the top right of the page, click on the **Update base image** button to inspect the policy.
Then, at the top right of the page, select the **Update base image** button to inspect the policy.

Go back to the image list and click on the image version, available in the **Most recent image** column.
Then, at the top right of the page, click on the **Update base image** button to inspect the policy.

![Policy Inspect](./images/policy-inspect.png)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggest remove the image unless there is a step that can't be described with instructions. The user will already see their own screen.

Suggested change
![Policy Inspect](./images/policy-inspect.png)

This policy checks whether base images you use are up-to-date.
It currently has a non-compliant status,
because the example image uses an old version `alpine` as a base image.

Select the **View fix** button next to the policy name for details about the violation,
and recommendations on how to address it.
Close the **Recommended fixes for base image** popup. In the policy listing, click the **View fixes** button, next to the policy name for details about the violation, and recommendations on how to address it.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Close the **Recommended fixes for base image** popup. In the policy listing, click the **View fixes** button, next to the policy name for details about the violation, and recommendations on how to address it.
Close the **Recommended fixes for base image** modal. In the policy listing, select **View fixes**, next to the policy name for details about the violation, and recommendations on how to address it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/scout Relates to Docker Scout status/review
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants