diff options
author | TomSweeneyRedHat <tsweeney@redhat.com> | 2019-12-03 11:32:37 -0500 |
---|---|---|
committer | TomSweeneyRedHat <tsweeney@redhat.com> | 2019-12-03 11:32:37 -0500 |
commit | 61e6a5bf390aa02f69c451980f74e1c4676e2ba9 (patch) | |
tree | 7a4a761e959784cc9e5ebc6983fc12d6ab28f4e0 | |
parent | d8bfd1140846baa77bffa0cead0ea700b91ce697 (diff) | |
download | podman-61e6a5bf390aa02f69c451980f74e1c4676e2ba9.tar.gz podman-61e6a5bf390aa02f69c451980f74e1c4676e2ba9.tar.bz2 podman-61e6a5bf390aa02f69c451980f74e1c4676e2ba9.zip |
Quick grammar touchup in rootless.md
Signed-off-by: TomSweeneyRedHat <tsweeney@redhat.com>
-rw-r--r-- | rootless.md | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/rootless.md b/rootless.md index 69de6db21..d8997a261 100644 --- a/rootless.md +++ b/rootless.md @@ -43,4 +43,4 @@ can easily fail * Issues with higher UIDs can cause builds to fail * If a build is attempting to use a UID that is not mapped into the user namespace mapping for a container, then builds will not be able to put the UID in an image. * Making device nodes within a container fails, even when running --privileged. - * Kernel does not allow non root user processes (processes without CAP_MKNOD) to create device nodes. If container needs to create device nodes, it must be run as root. + * The kernel does not allow non root user processes (processes without CAP_MKNOD) to create device nodes. If a container needs to create device nodes, it must be run as root. |