Skip to content

Commit edf684d

Browse files
authored
Merge pull request #23159 from austinvazquez/fix-moby-profiles-links
fix: links for moby apparmor/seccomp security profiles
2 parents 7edc1a5 + 1ebee90 commit edf684d

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

content/manuals/engine/security/apparmor.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ in the Docker Engine source repository.
2828
The `docker-default` profile is the default for running containers. It is
2929
moderately protective while providing wide application compatibility. The
3030
profile is generated from the following
31-
[template](https://github.com/moby/moby/blob/master/profiles/apparmor/template.go).
31+
[template](https://github.com/moby/profiles/blob/main/apparmor/template.go).
3232

3333
When you run a container, it uses the `docker-default` policy unless you
3434
override it with the `security-opt` option. For example, the following
@@ -280,4 +280,4 @@ Advanced users and package managers can find a profile for `/usr/bin/docker`
280280
in the Docker Engine source repository.
281281

282282
The `docker-default` profile for containers lives in
283-
[profiles/apparmor](https://github.com/moby/moby/tree/master/profiles/apparmor).
283+
[profiles/apparmor](https://github.com/moby/profiles/blob/main/apparmor).

content/manuals/engine/security/seccomp.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ The default `seccomp` profile provides a sane default for running containers wit
2424
seccomp and disables around 44 system calls out of 300+. It is moderately
2525
protective while providing wide application compatibility. The default Docker
2626
profile can be found
27-
[here](https://github.com/moby/moby/blob/master/profiles/seccomp/default.json).
27+
[here](https://github.com/moby/profiles/blob/main/seccomp/default.json).
2828

2929
In effect, the profile is an allowlist that denies access to system calls by
3030
default and then allows specific system calls. The profile works by defining a

0 commit comments

Comments
 (0)