From 9ed6cec8ff91ff100c268fa21817fdc111e77e43 Mon Sep 17 00:00:00 2001 From: Sven Dowideit Date: Thu, 22 Oct 2015 16:59:16 +1000 Subject: [PATCH] Fix some errant links Signed-off-by: Sven Dowideit --- docs/installation/SUSE.md | 6 +++--- docs/misc/deprecated.md | 2 +- docs/reference/run.md | 5 ++--- docs/security/trust/trust_sandbox.md | 2 +- docs/userguide/dockervolumes.md | 4 ++-- 5 files changed, 9 insertions(+), 10 deletions(-) diff --git a/docs/installation/SUSE.md b/docs/installation/SUSE.md index bacf166cf6..dd37062c4e 100644 --- a/docs/installation/SUSE.md +++ b/docs/installation/SUSE.md @@ -109,8 +109,8 @@ You must delete the user created configuration files manually. ## Where to go from here -You can find more details about Docker on openSUSE or SUSE Linux Enterprise in -the [Docker quick start guide](https://www.suse.com/documentation/sles-12/dockerquick/data/dockerquick. -html) on the SUSE website. The document targets SUSE Linux Enterprise, but its contents apply also to openSUSE. +You can find more details about Docker on openSUSE or SUSE Linux Enterprise in the +[Docker quick start guide](https://www.suse.com/documentation/sles-12/dockerquick/data/dockerquick.html) +on the SUSE website. The document targets SUSE Linux Enterprise, but its contents apply also to openSUSE. Continue to the [User Guide](../userguide/). diff --git a/docs/misc/deprecated.md b/docs/misc/deprecated.md index e5dd031977..edc70d455e 100644 --- a/docs/misc/deprecated.md +++ b/docs/misc/deprecated.md @@ -44,7 +44,7 @@ The built-in LXC execution driver is deprecated for an external implementation. The lxc-conf flag and API fields will also be removed. ### Old Command Line Options -**Deprecated In Release: [v1.8.0](../release-notes.md#docker-engine-1-8-0)** +**Deprecated In Release: [v1.8.0](release-notes.md#docker-engine-1-8-0)** **Target For Removal In Release: v1.10** diff --git a/docs/reference/run.md b/docs/reference/run.md index 5d805b6e70..1cd55c7d6a 100644 --- a/docs/reference/run.md +++ b/docs/reference/run.md @@ -126,9 +126,8 @@ and pass along signals. All of that is configurable: -i=false : Keep STDIN open even if not attached If you do not specify `-a` then Docker will [attach all standard -streams]( https://github.com/docker/docker/blob/ -75a7f4d90cde0295bcfb7213004abce8d4779b75/commands.go#L1797). You can -specify to which of the three standard streams (`STDIN`, `STDOUT`, +streams]( https://github.com/docker/docker/blob/75a7f4d90cde0295bcfb7213004abce8d4779b75/commands.go#L1797). +You can specify to which of the three standard streams (`STDIN`, `STDOUT`, `STDERR`) you'd like to connect instead, as in: $ docker run -a stdin -a stdout -i -t ubuntu /bin/bash diff --git a/docs/security/trust/trust_sandbox.md b/docs/security/trust/trust_sandbox.md index 2832d9f719..9d6c2f2120 100644 --- a/docs/security/trust/trust_sandbox.md +++ b/docs/security/trust/trust_sandbox.md @@ -26,7 +26,7 @@ have `sudo` privileges on your local machine or in the VM. This sandbox requires you to install two Docker tools: Docker Engine and Docker Compose. To install the Docker Engine, choose from the [list of supported platforms](../../installation). To install Docker Compose, see the -[detailed instructions here](https://docs.docker.com/compose/install.md). +[detailed instructions here](https://docs.docker.com/compose/install/). Finally, you'll need to have `git` installed on your local system or VM. diff --git a/docs/userguide/dockervolumes.md b/docs/userguide/dockervolumes.md index 0b53e81886..b563506d1c 100644 --- a/docs/userguide/dockervolumes.md +++ b/docs/userguide/dockervolumes.md @@ -150,8 +150,8 @@ Here we've mounted the same `/src/webapp` directory but we've added the `ro` option to specify that the mount should be read-only. Because of [limitations in the `mount` -function](http://lists.linuxfoundation.org/pipermail/containers/2015-April/ -035788.html), moving subdirectories within the host's source directory can give +function](http://lists.linuxfoundation.org/pipermail/containers/2015-April/035788.html), +moving subdirectories within the host's source directory can give access from the container to the host's file system. This requires a malicious user with access to host and its mounted directory.