Docker build command docs refresh

Co-authored-by: Sebastiaan van Stijn <github@gone.nl>
Signed-off-by: Chris Chinchilla <chris.ward@docker.com>
This commit is contained in:
Chris Chinchilla 2023-05-02 13:39:06 +02:00 committed by Sebastiaan van Stijn
parent 8812e0ad3a
commit 9be600a97b
No known key found for this signature in database
GPG Key ID: 76698F39D527CE8C
1 changed files with 98 additions and 120 deletions

View File

@ -54,7 +54,7 @@ context. For example, your build can use a [*COPY*](https://docs.docker.com/engi
instruction to reference a file in the context. instruction to reference a file in the context.
The `URL` parameter can refer to three kinds of resources: Git repositories, The `URL` parameter can refer to three kinds of resources: Git repositories,
pre-packaged tarball contexts and plain text files. pre-packaged tarball contexts, and plain text files.
### Git repositories ### Git repositories
@ -62,19 +62,19 @@ When the `URL` parameter points to the location of a Git repository, the
repository acts as the build context. The system recursively fetches the repository acts as the build context. The system recursively fetches the
repository and its submodules. The commit history isn't preserved. A repository and its submodules. The commit history isn't preserved. A
repository is first pulled into a temporary directory on your local host. After repository is first pulled into a temporary directory on your local host. After
that succeeds, the directory is sent to the Docker daemon as the context. that succeeds, the command sends the directory to the Docker daemon as the context.
Local copy gives you the ability to access private repositories using local Local copy gives you the ability to access private repositories using local
user credentials, VPNs, and so forth. user credentials, VPNs, and so forth.
> **Note** > **Note**
> >
> If the `URL` parameter contains a fragment the system will recursively clone > If the `URL` parameter contains a fragment the system recursively clones
> the repository and its submodules using a `git clone --recursive` command. > the repository and its submodules using a `git clone --recursive` command.
Git URLs accept context configuration in their fragment section, separated by a Git URLs accept context configuration in their fragment section, separated by a
colon (`:`). The first part represents the reference that Git will check out, colon (`:`). The first part represents the reference that Git checks out,
and can be either a branch, a tag, or a remote reference. The second part and can be either a branch, a tag, or a remote reference. The second part
represents a subdirectory inside the repository that will be used as a build represents a subdirectory inside the repository used as a build
context. context.
For example, run this command to use a directory called `docker` in the branch For example, run this command to use a directory called `docker` in the branch
@ -100,15 +100,16 @@ contexts:
### Tarball contexts ### Tarball contexts
If you pass a URL to a remote tarball, the URL itself is sent to the daemon: If you pass a URL to a remote tarball, the command sends the URL itself to the
daemon:
```console ```console
$ docker build http://server/context.tar.gz $ docker build http://server/context.tar.gz
``` ```
The download operation will be performed on the host the Docker daemon is The host running the Docker daemon performs the download operation,
running on, which isn't necessarily the same host from which the build command which isn't necessarily the same host that issued the build command.
is being issued. The Docker daemon will fetch `context.tar.gz` and use it as the The Docker daemon fetches `context.tar.gz` and uses it as the
build context. Tarball contexts must be tar archives conforming to the standard build context. Tarball contexts must be tar archives conforming to the standard
`tar` Unix format and can be compressed with any one of the `xz`, `bzip2`, `tar` Unix format and can be compressed with any one of the `xz`, `bzip2`,
`gzip` or `identity` (no compression) formats. `gzip` or `identity` (no compression) formats.
@ -122,21 +123,22 @@ Instead of specifying a context, you can pass a single `Dockerfile` in the
$ docker build - < Dockerfile $ docker build - < Dockerfile
``` ```
With PowerShell on Windows, you can run: With PowerShell on Windows, you run:
```powershell ```powershell
Get-Content Dockerfile | docker build - Get-Content Dockerfile | docker build -
``` ```
If you use `STDIN` or specify a `URL` pointing to a plain text file, the system If you use `STDIN` or specify a `URL` pointing to a plain text file, the daemon
places the contents into a file called `Dockerfile`, and any `-f`, `--file` places the contents into a `Dockerfile`, and ignores any `-f`, `--file`
option is ignored. In this scenario, there is no context. option. In this scenario, there is no context.
By default the `docker build` command will look for a `Dockerfile` at the root By default the `docker build` command looks for a `Dockerfile` at the root
of the build context. The `-f`, `--file`, option lets you specify the path to of the build context. The `-f`, `--file`, option lets you specify the path to
an alternative file to use instead. This is useful in cases where the same set an alternative file to use instead. This is useful in cases that use the same
of files are used for multiple builds. The path must be to a file within the set of files for multiple builds. The path must be to a file within the
build context. Relative path are interpreted as relative to the root of the context. build context. Relative path are interpreted as relative to the root of the
context.
In most cases, it's best to put each Dockerfile in an empty directory. Then, In most cases, it's best to put each Dockerfile in an empty directory. Then,
add to that directory only the files needed for building the Dockerfile. To add to that directory only the files needed for building the Dockerfile. To
@ -144,17 +146,15 @@ increase the build's performance, you can exclude files and directories by
adding a `.dockerignore` file to that directory as well. For information on adding a `.dockerignore` file to that directory as well. For information on
creating one, see the [.dockerignore file](https://docs.docker.com/engine/reference/builder/#dockerignore-file). creating one, see the [.dockerignore file](https://docs.docker.com/engine/reference/builder/#dockerignore-file).
If the Docker client loses connection to the daemon, the build is canceled. If the Docker client loses connection to the daemon, it cancels the build.
This happens if you interrupt the Docker client with `CTRL-c` or if the Docker This happens if you interrupt the Docker client with `CTRL-c` or if the Docker
client is killed for any reason. If the build initiated a pull which is still client is killed for any reason. If the build initiated a pull which is still
running at the time the build is cancelled, the pull is cancelled as well. running at the time the build is cancelled, the client also cancels the pull.
## Return code ## Return code
Successful builds return exit code `0`. Failed builds return a non-zero exit code. Successful builds return exit code `0`. When the build fails, the command
returns a non-zero exit code and prints an error message to `STDERR`:
There should be informational output of the reason for failure output to
`STDERR`:
```console ```console
$ docker build -t fail . $ docker build -t fail .
@ -207,12 +207,12 @@ Removing intermediate container 9c9e81692ae9
Removing intermediate container 02071fceb21b Removing intermediate container 02071fceb21b
``` ```
This example specifies that the `PATH` is `.`, and so all the files in the This example specifies that the `PATH` is `.`, and so `tar`s all the files in the
local directory get `tar`d and sent to the Docker daemon. The `PATH` specifies local directory and sends them to the Docker daemon. The `PATH` specifies
where to find the files for the "context" of the build on the Docker daemon. where to find the files for the "context" of the build on the Docker daemon.
Remember that the daemon could be running on a remote machine and that no Remember that the daemon could be running on a remote machine and that no
parsing of the Dockerfile happens at the client side (where you're running parsing of the Dockerfile happens at the client side (where you're running
`docker build`). That means that all the files at `PATH` get sent, not just `docker build`). That means that all the files at `PATH` are sent, not just
the ones listed to [`ADD`](https://docs.docker.com/engine/reference/builder/#add) the ones listed to [`ADD`](https://docs.docker.com/engine/reference/builder/#add)
in the Dockerfile. in the Dockerfile.
@ -228,8 +228,8 @@ you must use `--rm=false`. This doesn't affect the build cache.
$ docker build github.com/creack/docker-firefox $ docker build github.com/creack/docker-firefox
``` ```
This will clone the GitHub repository and use the cloned repository as context. This clones the GitHub repository, using the cloned repository as context,
The Dockerfile at the root of the repository is used as Dockerfile. You can and the Dockerfile at the root of the repository. You can
specify an arbitrary Git repository by using the `git://` or `git@` scheme. specify an arbitrary Git repository by using the `git://` or `git@` scheme.
```console ```console
@ -251,19 +251,19 @@ Successfully built 377c409b35e4
This sends the URL `http://server/ctx.tar.gz` to the Docker daemon, which This sends the URL `http://server/ctx.tar.gz` to the Docker daemon, which
downloads and extracts the referenced tarball. The `-f ctx/Dockerfile` downloads and extracts the referenced tarball. The `-f ctx/Dockerfile`
parameter specifies a path inside `ctx.tar.gz` to the `Dockerfile` used parameter specifies a path inside `ctx.tar.gz` to the `Dockerfile` used
to build the image. Any `ADD` commands in that `Dockerfile` that refers to local to build the image. Any `ADD` commands in that `Dockerfile` that refer to local
paths must be relative to the root of the contents inside `ctx.tar.gz`. In the paths must be relative to the root of the contents inside `ctx.tar.gz`. In the
example above, the tarball contains a directory `ctx/`, so the `ADD example above, the tarball contains a directory `ctx/`, so the `ADD
ctx/container.cfg /` operation works as expected. ctx/container.cfg /` operation works as expected.
### Build with - ### Build with `-`
```console ```console
$ docker build - < Dockerfile $ docker build - < Dockerfile
``` ```
This will read a Dockerfile from `STDIN` without context. Due to the lack of a This example reads a Dockerfile from `STDIN` without context. Due to the lack of a
context, no contents of any local directory will be sent to the Docker daemon. context, the command doesn't send contents of any local directory to the Docker daemon.
Since there is no context, a Dockerfile `ADD` only works if it refers to a Since there is no context, a Dockerfile `ADD` only works if it refers to a
remote URL. remote URL.
@ -271,8 +271,8 @@ remote URL.
$ docker build - < context.tar.gz $ docker build - < context.tar.gz
``` ```
This will build an image for a compressed context read from `STDIN`. Supported This example builds an image for a compressed context read from `STDIN`.
formats are: `bzip2`, `gzip` and `xz`. Supported formats are: `bzip2`, `gzip` and `xz`.
### Use a .dockerignore file ### Use a .dockerignore file
@ -300,15 +300,15 @@ Successfully built 99cc1ad10469
``` ```
This example shows the use of the `.dockerignore` file to exclude the `.git` This example shows the use of the `.dockerignore` file to exclude the `.git`
directory from the context. Its effect can be seen in the changed size of the directory from the context. You can see its effect in the changed size of the
uploaded context. The builder reference contains detailed information on uploaded context. The builder reference contains detailed information on
[creating a .dockerignore file](https://docs.docker.com/engine/reference/builder/#dockerignore-file). [creating a .dockerignore file](https://docs.docker.com/engine/reference/builder/#dockerignore-file).
When using the [BuildKit backend](https://docs.docker.com/build/buildkit/), When using the [BuildKit backend](https://docs.docker.com/build/buildkit/),
`docker build` searches for a `.dockerignore` file relative to the Dockerfile `docker build` searches for a `.dockerignore` file relative to the Dockerfile
name. For example, running `docker build -f myapp.Dockerfile .` will first look name. For example, running `docker build -f myapp.Dockerfile .` first looks
for an ignore file named `myapp.Dockerfile.dockerignore`. If such a file is not for an ignore file named `myapp.Dockerfile.dockerignore`. If it can't find such a file,
found, the `.dockerignore` file is used if present. Using a Dockerfile based if present, it uses the `.dockerignore` file. Using a Dockerfile based
`.dockerignore` is useful if a project contains multiple Dockerfiles that expect `.dockerignore` is useful if a project contains multiple Dockerfiles that expect
to ignore different sets of files. to ignore different sets of files.
@ -318,13 +318,15 @@ to ignore different sets of files.
$ docker build -t vieux/apache:2.0 . $ docker build -t vieux/apache:2.0 .
``` ```
This will build like the previous example, but it will then tag the resulting This examples builds in the same way as the previous example, but it then tags the resulting
image. The repository name will be `vieux/apache` and the tag will be `2.0`. image. The repository name will be `vieux/apache` and the tag `2.0`.
[Read more about valid tags](tag.md). [Read more about valid tags](tag.md).
You can apply multiple tags to an image. For example, you can apply the `latest` You can apply multiple tags to an image. For example, you can apply the `latest`
tag to a newly built image and add another tag that references a specific tag to a newly built image and add another tag that references a specific
version. version.
For example, to tag an image both as `whenry/fedora-jboss:latest` and For example, to tag an image both as `whenry/fedora-jboss:latest` and
`whenry/fedora-jboss:v2.1`, use the following: `whenry/fedora-jboss:v2.1`, use the following:
@ -338,14 +340,14 @@ $ docker build -t whenry/fedora-jboss:latest -t whenry/fedora-jboss:v2.1 .
$ docker build -f Dockerfile.debug . $ docker build -f Dockerfile.debug .
``` ```
This will use a file called `Dockerfile.debug` for the build instructions This uses a file called `Dockerfile.debug` for the build instructions
instead of `Dockerfile`. instead of `Dockerfile`.
```console ```console
$ curl example.com/remote/Dockerfile | docker build -f - . $ curl example.com/remote/Dockerfile | docker build -f - .
``` ```
The above command will use the current directory as the build context and read The above command uses the current directory as the build context and reads
a Dockerfile from stdin. a Dockerfile from stdin.
```console ```console
@ -353,8 +355,8 @@ $ docker build -f dockerfiles/Dockerfile.debug -t myapp_debug .
$ docker build -f dockerfiles/Dockerfile.prod -t myapp_prod . $ docker build -f dockerfiles/Dockerfile.prod -t myapp_prod .
``` ```
The above commands will build the current build context (as specified by the The above commands build the current build context (as specified by the
`.`) twice, once using a debug version of a `Dockerfile` and once using a `.`) twice. Once using a debug version of a `Dockerfile` and once using a
production version. production version.
```console ```console
@ -364,7 +366,7 @@ $ docker build -f ../../../../dockerfiles/debug /home/me/myapp
``` ```
These two `docker build` commands do the exact same thing. They both use the These two `docker build` commands do the exact same thing. They both use the
contents of the `debug` file instead of looking for a `Dockerfile` and will use contents of the `debug` file instead of looking for a `Dockerfile` and use
`/home/me/myapp` as the root of the build context. Note that `debug` is in the `/home/me/myapp` as the root of the build context. Note that `debug` is in the
directory structure of the build context, regardless of how you refer to it on directory structure of the build context, regardless of how you refer to it on
the command line. the command line.
@ -381,20 +383,20 @@ the command line.
### <a name="cgroup-parent"></a> Use a custom parent cgroup (--cgroup-parent) ### <a name="cgroup-parent"></a> Use a custom parent cgroup (--cgroup-parent)
When `docker build` is run with the `--cgroup-parent` option the containers When you run `docker build` with the `--cgroup-parent` option, the daemon runs the containers
used in the build will be run with the [corresponding `docker run` flag](../run.md#specify-custom-cgroups). used in the build with the [corresponding `docker run` flag](../run.md#specify-custom-cgroups).
### <a name="ulimit"></a> Set ulimits in container (--ulimit) ### <a name="ulimit"></a> Set ulimits in container (--ulimit)
Using the `--ulimit` option with `docker build` will cause each build step's Using the `--ulimit` option with `docker build` causes the daemon to start each build step's
container to be started using those [`--ulimit` flag values](run.md#ulimit). container using those [`--ulimit` flag values](run.md#ulimit).
### <a name="build-arg"></a> Set build-time variables (--build-arg) ### <a name="build-arg"></a> Set build-time variables (--build-arg)
You can use `ENV` instructions in a Dockerfile to define variable You can use `ENV` instructions in a Dockerfile to define variable values. These
values. These values persist in the built image. However, often values persist in the built image. Often persistence isn't what you want. Users
persistence isn't what you want. Users want to specify variables differently want to specify variables differently depending on which host they build an
depending on which host they build an image on. image on.
A good example is `http_proxy` or source versions for pulling intermediate A good example is `http_proxy` or source versions for pulling intermediate
files. The `ARG` instruction lets Dockerfile authors define values that users files. The `ARG` instruction lets Dockerfile authors define values that users
@ -406,25 +408,24 @@ $ docker build --build-arg HTTP_PROXY=http://10.20.30.2:1234 --build-arg FTP_PRO
This flag allows you to pass the build-time variables that are This flag allows you to pass the build-time variables that are
accessed like regular environment variables in the `RUN` instruction of the accessed like regular environment variables in the `RUN` instruction of the
Dockerfile. Also, these values don't persist in the intermediate or final images Dockerfile. These values don't persist in the intermediate or final images
like `ENV` values do. You must add `--build-arg` for each build argument. like `ENV` values do. You must add `--build-arg` for each build argument.
Using this flag will not alter the output you see when the `ARG` lines from the Using this flag doesn't alter the output you see when the build process echoes the`ARG` lines from the
Dockerfile are echoed during the build process. Dockerfile.
For detailed information on using `ARG` and `ENV` instructions, see the For detailed information on using `ARG` and `ENV` instructions, see the
[Dockerfile reference](https://docs.docker.com/engine/reference/builder/). [Dockerfile reference](https://docs.docker.com/engine/reference/builder/).
You may also use the `--build-arg` flag without a value, in which case the value You can also use the `--build-arg` flag without a value, in which case the daemon
from the local environment will be propagated into the Docker container being propagates the value from the local environment into the Docker container it's building:
built:
```console ```console
$ export HTTP_PROXY=http://10.20.30.2:1234 $ export HTTP_PROXY=http://10.20.30.2:1234
$ docker build --build-arg HTTP_PROXY . $ docker build --build-arg HTTP_PROXY .
``` ```
This is similar to how `docker run -e` works. Refer to the [`docker run` documentation](run.md#env) This example is similar to how `docker run -e` works. Refer to the [`docker run` documentation](run.md#env)
for more information. for more information.
### <a name="security-opt"></a> Optional security options (--security-opt) ### <a name="security-opt"></a> Optional security options (--security-opt)
@ -477,9 +478,9 @@ $ docker build --add-host my-hostname:10.180.0.1 --add-host my-hostname_v6=[2001
### <a name="target"></a> Specifying target build stage (--target) ### <a name="target"></a> Specifying target build stage (--target)
When building a Dockerfile with multiple build stages, `--target` can be used to When building a Dockerfile with multiple build stages, you can use the `--target`
specify an intermediate build stage by name as a final stage for the resulting option to specify an intermediate build stage by name as a final stage for the
image. Commands after the target stage will be skipped. resulting image. The daemon skips commands after the target stage.
```dockerfile ```dockerfile
FROM debian AS build-env FROM debian AS build-env
@ -503,21 +504,22 @@ $ docker build -t mybuildimage --target build-env .
> output type options. > output type options.
By default, a local container image is created from the build result. The By default, a local container image is created from the build result. The
`--output` (or `-o`) flag allows you to override this behavior, and a specify a `--output` (or `-o`) flag allows you to override this behavior, and specify a
custom exporter. For example, custom exporters allow you to export the build custom exporter. Custom exporters allow you to export the build
artifacts as files on the local filesystem instead of a Docker image, which can artifacts as files on the local filesystem instead of a Docker image, which can
be useful for generating local binaries, code generation etc. be useful for generating local binaries, code generation etc.
The value for `--output` is a CSV-formatted string defining the exporter type The value for `--output` is a CSV-formatted string defining the exporter type
and options. Currently, `local` and `tar` exporters are supported. The `local` and options that supports `local` and `tar` exporters.
exporter writes the resulting build files to a directory on the client side. The
The `local` exporter writes the resulting build files to a directory on the client side. The
`tar` exporter is similar but writes the files as a single tarball (`.tar`). `tar` exporter is similar but writes the files as a single tarball (`.tar`).
If no type is specified, the value defaults to the output directory of the local If you specify no type, the value defaults to the output directory of the local
exporter. Use a hyphen (`-`) to write the output tarball to standard output exporter. Use a hyphen (`-`) to write the output tarball to standard output
(`STDOUT`). (`STDOUT`).
The following example builds an image using the current directory (`.`) as build The following example builds an image using the current directory (`.`) as a build
context, and exports the files to a directory named `out` in the current directory. context, and exports the files to a directory named `out` in the current directory.
If the directory does not exist, Docker creates the directory automatically: If the directory does not exist, Docker creates the directory automatically:
@ -553,8 +555,8 @@ The `--output` option exports all files from the target stage. A common pattern
for exporting only specific files is to do multi-stage builds and to copy the for exporting only specific files is to do multi-stage builds and to copy the
desired files to a new scratch stage with [`COPY --from`](https://docs.docker.com/engine/reference/builder/#copy). desired files to a new scratch stage with [`COPY --from`](https://docs.docker.com/engine/reference/builder/#copy).
The example `Dockerfile` below uses a separate stage to collect the The example, the `Dockerfile` below uses a separate stage to collect the
build-artifacts for exporting: build artifacts for exporting:
```dockerfile ```dockerfile
FROM golang AS build-stage FROM golang AS build-stage
@ -564,8 +566,8 @@ FROM scratch AS export-stage
COPY --from=build-stage /go/bin/vndr / COPY --from=build-stage /go/bin/vndr /
``` ```
When building the Dockerfile with the `-o` option, only the files from the final When building the Dockerfile with the `-o` option, the command only exports the files from the final
stage are exported to the `out` directory, in this case, the `vndr` binary: stage to the `out` directory, in this case, the `vndr` binary:
```console ```console
$ docker build -o out . $ docker build -o out .
@ -600,13 +602,13 @@ In addition to local build cache, the builder can reuse the cache generated from
previous builds with the `--cache-from` flag pointing to an image in the registry. previous builds with the `--cache-from` flag pointing to an image in the registry.
To use an image as a cache source, cache metadata needs to be written into the To use an image as a cache source, cache metadata needs to be written into the
image on creation. This can be done by setting `--build-arg BUILDKIT_INLINE_CACHE=1` image on creation. You can do this by setting `--build-arg BUILDKIT_INLINE_CACHE=1`
when building the image. After that, the built image can be used as a cache source when building the image. After that, you can use the built image as a cache source
for subsequent builds. for subsequent builds.
Upon importing the cache, the builder will only pull the JSON metadata from the Upon importing the cache, the builder only pulls the JSON metadata from the
registry and determine possible cache hits based on that information. If there registry and determine possible cache hits based on that information. If there
is a cache hit, the matched layers are pulled into the local environment. is a cache hit, the builder pulls the matched layers into the local environment.
In addition to images, the cache can also be pulled from special cache manifests In addition to images, the cache can also be pulled from special cache manifests
generated by [`buildx`](https://github.com/docker/buildx) or the BuildKit CLI generated by [`buildx`](https://github.com/docker/buildx) or the BuildKit CLI
@ -646,20 +648,21 @@ Find more details in the [Dockerfile documentation](https://docs.docker.com/engi
#### Overview #### Overview
Once the image is built, squash the new layers into a new image with a single > **Note**
new layer. Squashing doesn't destroy any existing image, rather it creates a new > The `--squash` option is an experimental feature, and should not be considered
image with the content of the squashed layers. This effectively makes it look > stable.
like all `Dockerfile` commands were created with a single layer. The build
cache is preserved with this method.
The `--squash` option is an experimental feature, and shouldn't be considered Once the image is built, this flag squashes the new layers into a new image with
stable. a single new layer. Squashing doesn't destroy any existing image, rather it
creates a new image with the content of the squashed layers. This effectively
makes it look like all `Dockerfile` commands were created with a single layer.
The `--squash` flag preserves the build cache.
Squashing layers can be beneficial if your Dockerfile produces multiple layers Squashing layers can be beneficial if your Dockerfile produces multiple layers
modifying the same files, for example, files that are created in one step, and modifying the same files. For example, files created in one step and
removed in another step. For other use-cases, squashing images may actually have removed in another step. For other use-cases, squashing images may actually have
a negative impact on performance; when pulling an image consisting of multiple a negative impact on performance. When pulling an image consisting of multiple
layers, layers can be pulled in parallel, and allows sharing layers between layers, the daemon can pull layers in parallel and allows sharing layers between
images (saving space). images (saving space).
For most use cases, multi-stage builds are a better alternative, as they give more For most use cases, multi-stage builds are a better alternative, as they give more
@ -679,7 +682,7 @@ The `--squash` option has a number of known limitations:
layers intact, and one for the squashed version. layers intact, and one for the squashed version.
- While squashing layers may produce smaller images, it may have a negative - While squashing layers may produce smaller images, it may have a negative
impact on performance, as a single layer takes longer to extract, and impact on performance, as a single layer takes longer to extract, and
downloading a single layer can't be parallelized. you can't parallelize downloading a single layer.
- When attempting to squash an image that doesn't make changes to the - When attempting to squash an image that doesn't make changes to the
filesystem (for example, the Dockerfile only contains `ENV` instructions), filesystem (for example, the Dockerfile only contains `ENV` instructions),
the squash step will fail (see [issue #33823](https://github.com/moby/moby/issues/33823)). the squash step will fail (see [issue #33823](https://github.com/moby/moby/issues/33823)).
@ -688,7 +691,7 @@ The `--squash` option has a number of known limitations:
The example on this page is using experimental mode in Docker 23.03. The example on this page is using experimental mode in Docker 23.03.
Experimental mode can be enabled by using the `--experimental` flag when starting You can enable experimental mode by using the `--experimental` flag when starting
the Docker daemon or setting `experimental: true` in the `daemon.json` configuration the Docker daemon or setting `experimental: true` in the `daemon.json` configuration
file. file.
@ -718,31 +721,10 @@ Server: Docker Engine - Community
[...] [...]
``` ```
To enable experimental mode, users need to restart the Docker daemon with the #### Build an image with the `--squash` flag
experimental flag enabled.
#### Enable experimental features The following is an example of a build with the `--squash` flag. Below is the
`Dockerfile`:
To enable experimental features, you need to start the Docker daemon with
`--experimental` flag. You can also enable the daemon flag via
`/etc/docker/daemon.json`, for example:
```json
{
"experimental": true
}
```
Then make sure the experimental flag is enabled:
```console
$ docker version -f '{{.Server.Experimental}}'
true
```
#### Build an image with `--squash` argument
The following is an example of a build with `--squash` argument
```dockerfile ```dockerfile
FROM busybox FROM busybox
@ -753,15 +735,14 @@ ENV HELLO=world
RUN rm /remove_me RUN rm /remove_me
``` ```
An image named `test` is built with `--squash` argument. Next, build an image named `test` using the `--squash` flag.
```console ```console
$ docker build --squash -t test . $ docker build --squash -t test .
<...>
``` ```
If everything is right, the history looks like this: After the build completes, the history looks like the below. The history could show that a layer's
name is `<missing>`, and there is a new layer with COMMENT `merge`.
```console ```console
$ docker history test $ docker history test
@ -777,8 +758,5 @@ IMAGE CREATED CREATED BY
<missing> 7 weeks ago /bin/sh -c #(nop) ADD file:47ca6e777c36a4cfff 1.113 MB <missing> 7 weeks ago /bin/sh -c #(nop) ADD file:47ca6e777c36a4cfff 1.113 MB
``` ```
We could find that a layer's name is `<missing>`, and there is a new layer with
COMMENT `merge`.
Test the image, check for `/remove_me` being gone, make sure `hello\nworld` is Test the image, check for `/remove_me` being gone, make sure `hello\nworld` is
in `/hello`, make sure the `HELLO` environment variable's value is `world`. in `/hello`, make sure the `HELLO` environment variable's value is `world`.