Skip to content
This repository was archived by the owner on Oct 13, 2023. It is now read-only.

Commit 08513b7

Browse files
authored
Merge pull request #2758 from thaJeztah/19.03_backport_update_security_link
[19.03 backport] docs: update URL for security landing page Upstream-commit: 11b255cb7df565b8efa3848d25ef774ee676f110 Component: cli
2 parents caf5ab9 + d54dee5 commit 08513b7

2 files changed

Lines changed: 2 additions & 2 deletions

File tree

components/cli/docs/reference/commandline/login.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ $ cat ~/my_password.txt | docker login --username foo --password-stdin
5353
`docker login` requires user to use `sudo` or be `root`, except when:
5454

5555
1. connecting to a remote daemon, such as a `docker-machine` provisioned `docker engine`.
56-
2. user is added to the `docker` group. This will impact the security of your system; the `docker` group is `root` equivalent. See [Docker Daemon Attack Surface](https://docs.docker.com/engine/security/security/#docker-daemon-attack-surface) for details.
56+
2. user is added to the `docker` group. This will impact the security of your system; the `docker` group is `root` equivalent. See [Docker Daemon Attack Surface](https://docs.docker.com/engine/security/#docker-daemon-attack-surface) for details.
5757

5858
You can log into any public or private repository for which you have
5959
credentials. When you log in, the command stores credentials in

components/cli/man/src/login.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ do not specify a `SERVER`, the command uses Docker's public registry located at
66
`docker login` requires user to use `sudo` or be `root`, except when:
77

88
1. connecting to a remote daemon, such as a `docker-machine` provisioned `docker engine`.
9-
2. user is added to the `docker` group. This will impact the security of your system; the `docker` group is `root` equivalent. See [Docker Daemon Attack Surface](https://docs.docker.com/engine/security/security/#/docker-daemon-attack-surface) for details.
9+
2. user is added to the `docker` group. This will impact the security of your system; the `docker` group is `root` equivalent. See [Docker Daemon Attack Surface](https://docs.docker.com/engine/security/#docker-daemon-attack-surface) for details.
1010

1111
You can log into any public or private repository for which you have
1212
credentials. When you log in, the command stores encoded credentials in

0 commit comments

Comments
 (0)