diff --git a/docs/content/contributing/maintainers.md b/docs/content/contributing/maintainers.md index 9c4dde672..ac13e8b8d 100644 --- a/docs/content/contributing/maintainers.md +++ b/docs/content/contributing/maintainers.md @@ -11,7 +11,7 @@ * Ludovic Fernandez [@ldez](https://github.com/ldez) * Julien Salleyron [@juliens](https://github.com/juliens) * Nicolas Mengin [@nmengin](https://github.com/nmengin) -* Marco Jantke [@marco-jantke](https://github.com/marco-jantke) +* Marco Jantke [@mjantke](https://github.com/mjeri) * Michaël Matur [@mmatur](https://github.com/mmatur) * Gérald Croës [@geraldcroes](https://github.com/geraldcroes) * Jean-Baptiste Doumenjou [@jbdoumenjou](https://github.com/jbdoumenjou) diff --git a/docs/content/providers/docker.md b/docs/content/providers/docker.md index fa9254730..5b1b455ee 100644 --- a/docs/content/providers/docker.md +++ b/docs/content/providers/docker.md @@ -144,8 +144,8 @@ You can specify which Docker API Endpoint to use with the directive [`endpoint`] Accessing the Docker API without any restriction is a security concern: If Traefik is attacked, then the attacker might get access to the underlying host. {: #security-note } - - As explained in the Docker documentation: ([Docker Daemon Attack Surface page](https://docs.docker.com/engine/security/security/#docker-daemon-attack-surface)): + + As explained in the Docker documentation: ([Docker Daemon Attack Surface page](https://docs.docker.com/engine/security/#docker-daemon-attack-surface)): !!! quote [...] only **trusted** users should be allowed to control your Docker daemon [...]