engine/security: move landing page

Generated yaml files were temporarily updated manually (pending
pull request to be merged in the upstream docker/cli repository)

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
This commit is contained in:
Sebastiaan van Stijn 2020-09-29 21:04:34 +02:00
parent e314b897b2
commit 3823de5c50
No known key found for this signature in database
GPG Key ID: 76698F39D527CE8C
6 changed files with 6 additions and 5 deletions

View File

@ -61,7 +61,7 @@ examples: |-
`docker login` requires user to use `sudo` or be `root`, except when:
1. connecting to a remote daemon, such as a `docker-machine` provisioned `docker engine`.
2. user is added to the `docker` group. This will impact the security of your system; the `docker` group is `root` equivalent. See [Docker Daemon Attack Surface](https://docs.docker.com/engine/security/security/#docker-daemon-attack-surface) for details.
2. user is added to the `docker` group. This will impact the security of your system; the `docker` group is `root` equivalent. See [Docker Daemon Attack Surface](https://docs.docker.com/engine/security/#docker-daemon-attack-surface) for details.
You can log into any public or private repository for which you have
credentials. When you log in, the command stores credentials in

View File

@ -143,7 +143,7 @@ guides:
title: Splunk logging driver
- sectiontitle: Security
section:
- path: /engine/security/security/
- path: /engine/security/
title: Docker security
- path: /engine/security/non-events/
title: Docker security non-events

View File

@ -595,7 +595,7 @@
</a>
</p>
<p>
<a href="/engine/security/security/">
<a href="/engine/security/">
Docker Security best practices
</a>
</p>

View File

@ -57,7 +57,7 @@ Remember to log out and back in for this to take effect!
>
> Adding a user to the "docker" group grants them the ability to run containers
> which can be used to obtain root privileges on the Docker host. Refer to
> [Docker Daemon Attack Surface](https://docs.docker.com/engine/security/security/#docker-daemon-attack-surface)
> [Docker Daemon Attack Surface](/engine/security/#docker-daemon-attack-surface)
> for more information.
{:.warning}

View File

@ -25,7 +25,7 @@ creates a Unix socket accessible by members of the `docker` group.
>
> The `docker` group grants privileges equivalent to the `root`
> user. For details on how this impacts security in your system, see
> [*Docker Daemon Attack Surface*](../security/security.md#docker-daemon-attack-surface).
> [*Docker Daemon Attack Surface*](../security/index.md#docker-daemon-attack-surface).
{: .warning}
> **Note**:

View File

@ -4,6 +4,7 @@ keywords: Docker, Docker documentation, security
redirect_from:
- /articles/security/
- /engine/articles/security/
- /engine/security/security/
- /security/security/
title: Docker security
---