docker Docker 镜像 - 轩辕镜像

library/dockerQuick reference
-
Maintained by:
Tianon (of the Docker Project) -
Where to get help:
the Docker Community Slack, Server Fault, Unix & Linux, or Stack Overflow
Supported tags and respective Dockerfile links
(See "What's the difference between 'Shared' and 'Simple' tags?" in the FAQ.)
Simple Tags
-
29.2.0-rc.1-cli,29-rc-cli,rc-cli,29.2.0-rc.1-cli-alpine3.23 -
29.2.0-rc.1-dind,29-rc-dind,rc-dind,29.2.0-rc.1-dind-alpine3.23,29.2.0-rc.1,29-rc,rc,29.2.0-rc.1-alpine3.23 -
29.2.0-rc.1-dind-rootless,29-rc-dind-rootless,rc-dind-rootless -
29.2.0-rc.1-windowsservercore-ltsc2025,29-rc-windowsservercore-ltsc2025,rc-windowsservercore-ltsc2025 -
29.2.0-rc.1-windowsservercore-ltsc2022,29-rc-windowsservercore-ltsc2022,rc-windowsservercore-ltsc2022 -
29.1.4-cli,29.1-cli,29-cli,cli,29.1.4-cli-alpine3.23 -
29.1.4-dind,29.1-dind,29-dind,dind,29.1.4-dind-alpine3.23,29.1.4,29.1,29,latest,29.1.4-alpine3.23 -
29.1.4-dind-rootless,29.1-dind-rootless,29-dind-rootless,dind-rootless -
29.1.4-windowsservercore-ltsc2025,29.1-windowsservercore-ltsc2025,29-windowsservercore-ltsc2025,windowsservercore-ltsc2025 -
29.1.4-windowsservercore-ltsc2022,29.1-windowsservercore-ltsc2022,29-windowsservercore-ltsc2022,windowsservercore-ltsc2022
Shared Tags
-
29.2.0-rc.1-windowsservercore,29-rc-windowsservercore,rc-windowsservercore:29.2.0-rc.1-windowsservercore-ltsc202529.2.0-rc.1-windowsservercore-ltsc2022
-
29.1.4-windowsservercore,29.1-windowsservercore,29-windowsservercore,windowsservercore:29.1.4-windowsservercore-ltsc202529.1.4-windowsservercore-ltsc2022
Quick reference (cont.)
-
Where to file issues:
[***] -
Supported architectures: (more info)
amd64,arm32v6,arm32v7,arm64v8,windows-amd64 -
Published image artifact details:
repo-info repo'srepos/docker/directory (history)
(image metadata, transfer size, etc) -
Image updates:
official-images repo'slibrary/dockerlabel
official-images repo'slibrary/dockerfile (history) -
Source of this description:
docs repo'sdocker/directory (history)
What is Docker in Docker?
Although running Docker inside Docker is generally not recommended, there are some legitimate use cases, such as development of Docker itself.
Docker is an open-source project that automates the deployment of applications inside software containers, by providing an additional layer of abstraction and automation of operating-system-level virtualization on Linux, Mac OS and Windows.
***.org/wiki/Docker_(software)
!logo
Before running Docker-in-Docker, be sure to read through Jérôme Petazzoni's excellent blog post on the subject, where he outlines some of the pros and cons of doing so (and some nasty gotchas you might run into).
If you are still convinced that you need Docker-in-Docker and not just access to a container's host Docker server, then read on.
How to use this image
. If you use --network=host, shared network namespaces (as in Kubernetes pods), or otherwise have network access to the container (including containers started within the dind instance via their gateway interface), this is a potential security issue (which can lead to access to the host system, for example). It is recommended to enable TLS by setting the variable to an appropriate value (-e DOCKER_TLS_CERTDIR=/certs or similar). In 19.03+, this behavior is enabled by default.
When enabled, the Docker daemon will be started with --host=tcp://0.0.0.0:2376 --tlsverify ... (and when disabled, the Docker daemon will be started with --host=tcp://0.0.0.0:2375).
Inside the directory specified by DOCKER_TLS_CERTDIR, the entrypoint scripts will create/use three directories:
ca: the certificate authority files (cert.pem,key.pem)server: thedockerd(daemon) certificate files (cert.pem,ca.pem,key.pem)client: thedocker(client) certificate files (cert.pem,ca.pem,key.pem; suitable forDOCKER_CERT_PATH)
In order to make use of this functionality from a "client" container, at least the client subdirectory of the $DOCKER_TLS_CERTDIR directory needs to be shared (as illustrated in the following examples).
To disable this image behavior, simply override the container command or entrypoint to run dockerd directly (... docker:dind dockerd ... or ... --entrypoint dockerd docker:dind ...).
Start a daemon instance
console$ docker run --privileged --name some-docker -d \ --network some-network --network-alias docker \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-ca:/certs/ca \ -v some-docker-certs-client:/certs/client \ docker:dind
Note: --privileged is required for Docker-in-Docker to function properly, but it should be used with care as it provides full access to the host environment, as explained in the relevant section of the Docker documentation.
Connect to it from a second container
console$ docker run --rm --network some-network \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-client:/certs/client:ro \ docker:latest version Client: Docker Engine - Community Version: 18.09.8 API version: 1.39 Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:38:58 2019 OS/Arch: linux/amd64 Experimental: false Server: Docker Engine - Community Engine: Version: 18.09.8 API version: 1.39 (minimum version 1.12) Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:48:49 2019 OS/Arch: linux/amd64 Experimental: false
console$ docker run -it --rm --network some-network \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-client:/certs/client:ro \ docker:latest sh / # docker version Client: Docker Engine - Community Version: 18.09.8 API version: 1.39 Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:38:58 2019 OS/Arch: linux/amd64 Experimental: false Server: Docker Engine - Community Engine: Version: 18.09.8 API version: 1.39 (minimum version 1.12) Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:48:49 2019 OS/Arch: linux/amd64 Experimental: false
console$ docker run --rm --network some-network \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-client:/certs/client:ro \ docker:latest info Containers: 0 Running: 0 Paused: 0 Stopped: 0 Images: 0 Server Version: 18.09.8 Storage Driver: overlay2 Backing Filesystem: extfs Supports d_type: true Native Overlay Diff: true Logging Driver: json-file Cgroup Driver: cgroupfs Plugins: Volume: local Network: bridge host macvlan null overlay Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog Swarm: inactive Runtimes: runc Default Runtime: runc Init Binary: docker-init containerd version: 894b81a4b802e4eb2a91d1ce216b8817763c29fb runc version: 425e105d5a03fabd737a126ad93d62a9eeede87f init version: fec3683 Security Options: apparmor seccomp Profile: default Kernel Version: 4.19.0-5-amd64 Operating System: Alpine Linux v3.10 (containerized) OSType: linux Architecture: x86_64 CPUs: 12 Total Memory: 62.79GiB Name: e174d61a4a12 ID: HJXG:3OT7:MGDL:Y2BL:WCYP:CKSP:CGAM:4BLH:NEI4:IURF:4COF:AH6N Docker Root Dir: /var/lib/docker Debug Mode (client): false Debug Mode (server): false Registry: [***] Labels: Experimental: false Insecure Registries: 127.0.0.0/8 Live Restore Enabled: false Product License: Community Engine WARNING: bridge-nf-call-iptables is disabled WARNING: bridge-nf-call-ip6tables is disabled
console$ docker run --rm -v /var/run/docker.sock:/var/run/docker.sock docker:latest version Client: Docker Engine - Community Version: 18.09.8 API version: 1.39 Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:38:58 2019 OS/Arch: linux/amd64 Experimental: false Server: Docker Engine - Community Engine: Version: 18.09.7 API version: 1.39 (minimum version 1.12) Go version: go1.10.8 Git commit: 2d0083d Built: Thu Jun 27 17:23:02 2019 OS/Arch: linux/amd64 Experimental: false
Custom daemon flags
console$ docker run --privileged --name some-docker -d \ --network some-network --network-alias docker \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-ca:/certs/ca \ -v some-docker-certs-client:/certs/client \ docker:dind --storage-driver overlay2
Runtime Settings Considerations
Inspired by the official systemd docker.service configuration, you may want to consider different values for the following runtime configuration options, especially for production Docker instances:
console$ docker run --privileged --name some-docker -d \ ... \ --ulimit nofile=-1 \ --ulimit nproc=-1 \ --ulimit core=-1 \ --pids-limit -1 \ --oom-score-adj -500 \ docker:dind
Some of these will not be supported based on the settings on the host's dockerd, such as --ulimit nofile=-1, giving errors that look like error setting rlimit type 7: operation not permitted, and some may inherit sane values from the host dockerd instance or may not apply for your usage of Docker-in-Docker (for example, you likely want to set --oom-score-adj to a value that's higher than dockerd on the host so that your Docker-in-Docker instance is killed before the host Docker instance is).
Where to Store Data
Important note: There are several ways to store data used by applications that run in Docker containers. We encourage users of the docker images to familiarize themselves with the options available, including:
- Let Docker manage the storage of your data by writing to disk on the host system using its own internal volume management. This is the default and is easy and fairly transparent to the user. The downside is that the files may be hard to locate for tools and applications that run directly on the host system, i.e. outside containers.
- Create a data directory on the host system (outside the container) and mount this to a directory visible from inside the container. This places the files in a known location on the host system, and makes it easy for tools and applications on the host system to access the files. The downside is that the user needs to make sure that the directory exists, and that e.g. directory permissions and other security mechanisms on the host system are set up correctly.
The Docker documentation is a good starting point for understanding the different storage options and variations, and there are multiple blogs and forum postings that discuss and give advice in this area. We will simply show the basic procedure here for the latter option above:
-
Create a data directory on a suitable volume on your host system, e.g.
/my/own/var-lib-docker. -
Start your
dockercontainer like this:console$ docker run --privileged --name some-docker -v /my/own/var-lib-docker:/var/lib/docker -d docker:dind
The -v /my/own/var-lib-docker:/var/lib/docker part of the command mounts the /my/own/var-lib-docker directory from the underlying host system as /var/lib/docker inside the container, where Docker by default will write its data files.
Image Variants
The docker images come in many flavors, each designed for a specific use case.
Note: The docker:stable, docker:test, and related "channel" tags have been deprecated since June 2020 (see docker-library/docker#179) and have not been updated since December 2020 (when Docker 20.10 was released). Suggested alternatives are below. X is a placeholder for the version; see the supported tags list for the current set of tags.
docker:stable⏩docker:latest,docker:dind,docker:X,docker:cli, etcdocker:test⏩docker:rc,docker:rc-dind,docker:X-rc,docker:rc-cli, etc (only updated when there is an active pre-release; will not point to the same thing aslatest)
docker:<version>-cli
This image contains the Docker client command line interface (CLI) and Docker CLI plugins like buildx and compose. This is useful if you need to interact with a remote Docker engine but aren't planning to run the Docker engine in the container.
docker:<version>, docker:<version>-dind
The default variant is the Docker in Docker variant. It contains the Docker engine as well as the Docker CLI and plugins that are included in the cli variant. It is useful for running Docker in Docker and for interacting with a Docker engine via the Docker CLI.
docker:<version>-rootless
For more information about using the experimental "rootless" image variants, see docker-library/docker#174.
Note: just like the regular dind images, --privileged is required for Docker-in-Docker to function properly (docker-library/docker#151 & docker-library/docker#281), which is a security issue that needs to be treated appropriately.
Basic example usage:
console$ docker run -d --name some-docker --privileged docker:dind-rootless $ docker logs --tail=3 some-docker # to verify the daemon has finished generating TLS certificates and is listening successfully time="xxx" level=info msg="Daemon has completed initialization" time="xxx" level=info msg="API listen on /run/user/1000/docker.sock" time="xxx" level=info msg="API listen on [::]:2376" $ docker exec -it some-docker docker-entrypoint.sh sh # using "docker-entrypoint.sh" which auto-sets "DOCKER_HOST" appropriately / $ docker info --format '{{ json .SecurityOptions }}' ["name=seccomp,profile=default","name=rootless"]
To run with a different UID/GID than the one baked into the image, modify /etc/passwd, /etc/group, and filesystem permissions (especially for the rootless user's home directory) as appropriate; for example:
dockerfileFROM docker:dind-rootless USER root RUN set -eux; \ sed -i -e 's/^rootless:x:1000:1000:/rootless:x:1234:5678:/' /etc/passwd; \ sed -i -e 's/^rootless:x:1000:/rootless:x:5678:/' /etc/group; \ chown -R rootless ~rootless USER rootless
docker:<version>-windowsservercore
Unfortunately, Windows does not support nested containers, so this image variant only contains the client (intended for use against an existing Docker engine, ala -v //./pipe/docker_engine://./pipe/docker_engine).
License
View license information for the software contained in this image.
As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).
Some additional license information which was able to be auto-detected might be found in the repo-info repository's docker/ directory.
As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.
轩辕镜像配置手册
探索更多轩辕镜像的使用方法,找到最适合您系统的配置方式
登录仓库拉取
通过 Docker 登录认证访问私有仓库
Linux
在 Linux 系统配置镜像服务
Windows/Mac
在 Docker Desktop 配置镜像
Docker Compose
Docker Compose 项目配置
K8s Containerd
Kubernetes 集群配置 Containerd
K3s
K3s 轻量级 Kubernetes 镜像加速
Dev Containers
VS Code Dev Containers 配置
MacOS OrbStack
MacOS OrbStack 容器配置
宝塔面板
在宝塔面板一键配置镜像
群晖
Synology 群晖 NAS 配置
飞牛
飞牛 fnOS 系统配置镜像
极空间
极空间 NAS 系统配置服务
爱快路由
爱快 iKuai 路由系统配置
绿联
绿联 NAS 系统配置镜像
威联通
QNAP 威联通 NAS 配置
Podman
Podman 容器引擎配置
Singularity/Apptainer
HPC 科学计算容器配置
其他仓库配置
ghcr、Quay、nvcr 等镜像仓库
专属域名拉取
无需登录使用专属域名
需要其他帮助?请查看我们的 常见问题Docker 镜像访问常见问题解答 或 提交工单
镜像拉取常见问题
免费版仅支持 Docker Hub 访问,不承诺可用性和速度;专业版支持更多镜像源,保证可用性和稳定速度,提供优先客服响应。
专业版支持 docker.io、gcr.io、ghcr.io、registry.k8s.io、nvcr.io、quay.io、mcr.microsoft.com、docker.elastic.co 等;免费版仅支持 docker.io。
当返回 402 Payment Required 错误时,表示流量已耗尽,需要充值流量包以恢复服务。
通常由 Docker 版本过低导致,需要升级到 20.x 或更高版本以支持 V2 协议。
先检查 Docker 版本,版本过低则升级;版本正常则验证镜像信息是否正确。
使用 docker tag 命令为镜像打上新标签,去掉域名前缀,使镜像名称更简洁。
用户好评
来自真实用户的反馈,见证轩辕镜像的优质服务