
library/dockerMaintained by:
Tianon (of the Docker Project)
Where to get help:
the Docker Community Slack, Server Fault, Unix & Linux, or Stack Overflow
Dockerfile links(See "What's the difference between 'Shared' and 'Simple' tags?" in the FAQ.)
29.2.0-rc.1-cli, 29-rc-cli, rc-cli, 29.2.0-rc.1-cli-alpine3.23
29.2.0-rc.1-dind, 29-rc-dind, rc-dind, 29.2.0-rc.1-dind-alpine3.23, 29.2.0-rc.1, 29-rc, rc, 29.2.0-rc.1-alpine3.23
29.2.0-rc.1-dind-rootless, 29-rc-dind-rootless, rc-dind-rootless
29.2.0-rc.1-windowsservercore-ltsc2025, 29-rc-windowsservercore-ltsc2025, rc-windowsservercore-ltsc2025
29.2.0-rc.1-windowsservercore-ltsc2022, 29-rc-windowsservercore-ltsc2022, rc-windowsservercore-ltsc2022
29.1.3-cli, 29.1-cli, 29-cli, cli, 29.1.3-cli-alpine3.23
29.1.3-dind, 29.1-dind, 29-dind, dind, 29.1.3-dind-alpine3.23, 29.1.3, 29.1, 29, latest, 29.1.3-alpine3.23
29.1.3-dind-rootless, 29.1-dind-rootless, 29-dind-rootless, dind-rootless
29.1.3-windowsservercore-ltsc2025, 29.1-windowsservercore-ltsc2025, 29-windowsservercore-ltsc2025, windowsservercore-ltsc2025
29.1.3-windowsservercore-ltsc2022, 29.1-windowsservercore-ltsc2022, 29-windowsservercore-ltsc2022, windowsservercore-ltsc2022
29.2.0-rc.1-windowsservercore, 29-rc-windowsservercore, rc-windowsservercore:
29.2.0-rc.1-windowsservercore-ltsc202529.2.0-rc.1-windowsservercore-ltsc202229.1.3-windowsservercore, 29.1-windowsservercore, 29-windowsservercore, windowsservercore:
29.1.3-windowsservercore-ltsc202529.1.3-windowsservercore-ltsc2022Where to file issues:
[***]
Supported architectures: (more info)
amd64, arm32v6, arm32v7, arm64v8, windows-amd64
Published image artifact details:
repo-info repo's repos/docker/ directory (history)
(image metadata, transfer size, etc)
Image updates:
official-images repo's library/docker label
official-images repo's library/docker file (history)
Source of this description:
docs repo's docker/ directory (history)
Although running Docker inside Docker is generally not recommended, there are some legitimate use cases, such as development of Docker itself.
Docker is an open-source project that automates the deployment of applications inside software containers, by providing an additional layer of abstraction and automation of operating-system-level virtualization on Linux, Mac OS and Windows.
***.org/wiki/Docker_(software)
!logo
Before running Docker-in-Docker, be sure to read through Jérôme Petazzoni's excellent blog post on the subject, where he outlines some of the pros and cons of doing so (and some nasty gotchas you might run into).
If you are still convinced that you need Docker-in-Docker and not just access to a container's host Docker server, then read on.
. If you use --network=host, shared network namespaces (as in Kubernetes pods), or otherwise have network access to the container (including containers started within the dind instance via their gateway interface), this is a potential security issue (which can lead to access to the host system, for example). It is recommended to enable TLS by setting the variable to an appropriate value (-e DOCKER_TLS_CERTDIR=/certs or similar). In 19.03+, this behavior is enabled by default.
When enabled, the Docker daemon will be started with --host=tcp://0.0.0.0:2376 --tlsverify ... (and when disabled, the Docker daemon will be started with --host=tcp://0.0.0.0:2375).
Inside the directory specified by DOCKER_TLS_CERTDIR, the entrypoint scripts will create/use three directories:
ca: the certificate authority files (cert.pem, key.pem)server: the dockerd (daemon) certificate files (cert.pem, ca.pem, key.pem)client: the docker (client) certificate files (cert.pem, ca.pem, key.pem; suitable for DOCKER_CERT_PATH)In order to make use of this functionality from a "client" container, at least the client subdirectory of the $DOCKER_TLS_CERTDIR directory needs to be shared (as illustrated in the following examples).
To disable this image behavior, simply override the container command or entrypoint to run dockerd directly (... docker:dind dockerd ... or ... --entrypoint dockerd docker:dind ...).
console$ docker run --privileged --name some-docker -d \ --network some-network --network-alias docker \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-ca:/certs/ca \ -v some-docker-certs-client:/certs/client \ docker:dind
Note: --privileged is required for Docker-in-Docker to function properly, but it should be used with care as it provides full access to the host environment, as explained in the relevant section of the Docker documentation.
console$ docker run --rm --network some-network \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-client:/certs/client:ro \ docker:latest version Client: Docker Engine - Community Version: 18.09.8 API version: 1.39 Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:38:58 2019 OS/Arch: linux/amd64 Experimental: false Server: Docker Engine - Community Engine: Version: 18.09.8 API version: 1.39 (minimum version 1.12) Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:48:49 2019 OS/Arch: linux/amd64 Experimental: false
console$ docker run -it --rm --network some-network \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-client:/certs/client:ro \ docker:latest sh / # docker version Client: Docker Engine - Community Version: 18.09.8 API version: 1.39 Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:38:58 2019 OS/Arch: linux/amd64 Experimental: false Server: Docker Engine - Community Engine: Version: 18.09.8 API version: 1.39 (minimum version 1.12) Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:48:49 2019 OS/Arch: linux/amd64 Experimental: false
console$ docker run --rm --network some-network \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-client:/certs/client:ro \ docker:latest info Containers: 0 Running: 0 Paused: 0 Stopped: 0 Images: 0 Server Version: 18.09.8 Storage Driver: overlay2 Backing Filesystem: extfs Supports d_type: true Native Overlay Diff: true Logging Driver: json-file Cgroup Driver: cgroupfs Plugins: Volume: local Network: bridge host macvlan null overlay Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog Swarm: inactive Runtimes: runc Default Runtime: runc Init Binary: docker-init containerd version: 894b81a4b802e4eb2a91d1ce216b8817763c29fb runc version: 425e105d5a03fabd737a126ad93d62a9eeede87f init version: fec3683 Security Options: apparmor seccomp Profile: default Kernel Version: 4.19.0-5-amd64 Operating System: Alpine Linux v3.10 (containerized) OSType: linux Architecture: x86_64 CPUs: 12 Total Memory: 62.79GiB Name: e174d61a4a12 ID: HJXG:3OT7:MGDL:Y2BL:WCYP:CKSP:CGAM:4BLH:NEI4:IURF:4COF:AH6N Docker Root Dir: /var/lib/docker Debug Mode (client): false Debug Mode (server): false Registry: [***] Labels: Experimental: false Insecure Registries: 127.0.0.0/8 Live Restore Enabled: false Product License: Community Engine WARNING: bridge-nf-call-iptables is disabled WARNING: bridge-nf-call-ip6tables is disabled
console$ docker run --rm -v /var/run/docker.sock:/var/run/docker.sock docker:latest version Client: Docker Engine - Community Version: 18.09.8 API version: 1.39 Go version: go1.10.8 Git commit: 0dd43dd87f Built: Wed Jul 17 17:38:58 2019 OS/Arch: linux/amd64 Experimental: false Server: Docker Engine - Community Engine: Version: 18.09.7 API version: 1.39 (minimum version 1.12) Go version: go1.10.8 Git commit: 2d0083d Built: Thu Jun 27 17:23:02 2019 OS/Arch: linux/amd64 Experimental: false
console$ docker run --privileged --name some-docker -d \ --network some-network --network-alias docker \ -e DOCKER_TLS_CERTDIR=/certs \ -v some-docker-certs-ca:/certs/ca \ -v some-docker-certs-client:/certs/client \ docker:dind --storage-driver overlay2
Inspired by the official systemd docker.service configuration, you may want to consider different values for the following runtime configuration options, especially for production Docker instances:
console$ docker run --privileged --name some-docker -d \ ... \ --ulimit nofile=-1 \ --ulimit nproc=-1 \ --ulimit core=-1 \ --pids-limit -1 \ --oom-score-adj -500 \ docker:dind
Some of these will not be supported based on the settings on the host's dockerd, such as --ulimit nofile=-1, giving errors that look like error setting rlimit type 7: operation not permitted, and some may inherit sane values from the host dockerd instance or may not apply for your usage of Docker-in-Docker (for example, you likely want to set --oom-score-adj to a value that's higher than dockerd on the host so that your Docker-in-Docker instance is killed before the host Docker instance is).
Important note: There are several ways to store data used by applications that run in Docker containers. We encourage users of the docker images to familiarize themselves with the options available, including:
The Docker documentation is a good starting point for understanding the different storage options and variations, and there are multiple blogs and forum postings that discuss and give advice in this area. We will simply show the basic procedure here for the latter option above:
Create a data directory on a suitable volume on your host system, e.g. /my/own/var-lib-docker.
Start your docker container like this:
console$ docker run --privileged --name some-docker -v /my/own/var-lib-docker:/var/lib/docker -d docker:dind
The -v /my/own/var-lib-docker:/var/lib/docker part of the command mounts the /my/own/var-lib-docker directory from the underlying host system as /var/lib/docker inside the container, where Docker by default will write its data files.
The docker images come in many flavors, each designed for a specific use case.
Note: The docker:stable, docker:test, and related "channel" tags have been deprecated since June 2020 (see docker-library/docker#179) and have not been updated since December 2020 (when Docker 20.10 was released). Suggested alternatives are below. X is a placeholder for the version; see the supported tags list for the current set of tags.
docker:stable ⏩ docker:latest, docker:dind, docker:X, docker:cli, etcdocker:test ⏩ docker:rc, docker:rc-dind, docker:X-rc, docker:rc-cli, etc (only updated when there is an active pre-release; will not point to the same thing as latest)docker:<version>-cliThis image contains the Docker client command line interface (CLI) and Docker CLI plugins like buildx and compose. This is useful if you need to interact with a remote Docker engine but aren't planning to run the Docker engine in the container.
docker:<version>, docker:<version>-dindThe default variant is the Docker in Docker variant. It contains the Docker engine as well as the Docker CLI and plugins that are included in the cli variant. It is useful for running Docker in Docker and for interacting with a Docker engine via the Docker CLI.
docker:<version>-rootlessFor more information about using the experimental "rootless" image variants, see docker-library/docker#174.
Note: just like the regular dind images, --privileged is required for Docker-in-Docker to function properly (docker-library/docker#151 & docker-library/docker#281), which is a security issue that needs to be treated appropriately.
Basic example usage:
console$ docker run -d --name some-docker --privileged docker:dind-rootless $ docker logs --tail=3 some-docker # to verify the daemon has finished generating TLS certificates and is listening successfully time="xxx" level=info msg="Daemon has completed initialization" time="xxx" level=info msg="API listen on /run/user/1000/docker.sock" time="xxx" level=info msg="API listen on [::]:2376" $ docker exec -it some-docker docker-entrypoint.sh sh # using "docker-entrypoint.sh" which auto-sets "DOCKER_HOST" appropriately / $ docker info --format '{{ json .SecurityOptions }}' ["name=seccomp,profile=default","name=rootless"]
To run with a different UID/GID than the one baked into the image, modify /etc/passwd, /etc/group, and filesystem permissions (especially for the rootless user's home directory) as appropriate; for example:
dockerfileFROM docker:dind-rootless USER root RUN set -eux; \ sed -i -e 's/^rootless:x:1000:1000:/rootless:x:1234:5678:/' /etc/passwd; \ sed -i -e 's/^rootless:x:1000:/rootless:x:5678:/' /etc/group; \ chown -R rootless ~rootless USER rootless
docker:<version>-windowsservercoreUnfortunately, Windows does not support nested containers, so this image variant only contains the client (intended for use against an existing Docker engine, ala -v //./pipe/docker_engine://./pipe/docker_engine).
View license information for the software contained in this image.
As with all Docker images, these likely also contain other software which may be under other licenses (such as Bash, etc from the base distribution, along with any direct or indirect dependencies of the primary software being contained).
Some additional license information which was able to be auto-detected might be found in the repo-info repository's docker/ directory.
As for any pre-built image usage, it is the image user's responsibility to ensure that any use of this image complies with any relevant licenses for all software contained within.
探索更多轩辕镜像的使用方法,找到最适合您系统的配置方式
通过 Docker 登录认证访问私有仓库
在 Linux 系统配置镜像服务
在 Docker Desktop 配置镜像
Docker Compose 项目配置
Kubernetes 集群配置 Containerd
K3s 轻量级 Kubernetes 镜像加速
在宝塔面板一键配置镜像
Synology 群晖 NAS 配置
飞牛 fnOS 系统配置镜像
极空间 NAS 系统配置服务
爱快 iKuai 路由系统配置
绿联 NAS 系统配置镜像
QNAP 威联通 NAS 配置
Podman 容器引擎配置
HPC 科学计算容器配置
ghcr、Quay、nvcr 等镜像仓库
无需登录使用专属域名
需要其他帮助?请查看我们的 常见问题Docker 镜像访问常见问题解答 或 提交工单
免费版仅支持 Docker Hub 访问,不承诺可用性和速度;专业版支持更多镜像源,保证可用性和稳定速度,提供优先客服响应。
专业版支持 docker.io、gcr.io、ghcr.io、registry.k8s.io、nvcr.io、quay.io、mcr.microsoft.com、docker.elastic.co 等;免费版仅支持 docker.io。
当返回 402 Payment Required 错误时,表示流量已耗尽,需要充值流量包以恢复服务。
通常由 Docker 版本过低导致,需要升级到 20.x 或更高版本以支持 V2 协议。
先检查 Docker 版本,版本过低则升级;版本正常则验证镜像信息是否正确。
使用 docker tag 命令为镜像打上新标签,去掉域名前缀,使镜像名称更简洁。
来自真实用户的反馈,见证轩辕镜像的优质服务