aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTomSweeneyRedHat <tsweeney@redhat.com>2019-12-03 11:32:37 -0500
committerTomSweeneyRedHat <tsweeney@redhat.com>2019-12-03 11:32:37 -0500
commit61e6a5bf390aa02f69c451980f74e1c4676e2ba9 (patch)
tree7a4a761e959784cc9e5ebc6983fc12d6ab28f4e0
parentd8bfd1140846baa77bffa0cead0ea700b91ce697 (diff)
downloadpodman-61e6a5bf390aa02f69c451980f74e1c4676e2ba9.tar.gz
podman-61e6a5bf390aa02f69c451980f74e1c4676e2ba9.tar.bz2
podman-61e6a5bf390aa02f69c451980f74e1c4676e2ba9.zip
Quick grammar touchup in rootless.md
Signed-off-by: TomSweeneyRedHat <tsweeney@redhat.com>
-rw-r--r--rootless.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/rootless.md b/rootless.md
index 69de6db21..d8997a261 100644
--- a/rootless.md
+++ b/rootless.md
@@ -43,4 +43,4 @@ can easily fail
* Issues with higher UIDs can cause builds to fail
* If a build is attempting to use a UID that is not mapped into the user namespace mapping for a container, then builds will not be able to put the UID in an image.
* Making device nodes within a container fails, even when running --privileged.
- * Kernel does not allow non root user processes (processes without CAP_MKNOD) to create device nodes. If container needs to create device nodes, it must be run as root.
+ * The kernel does not allow non root user processes (processes without CAP_MKNOD) to create device nodes. If a container needs to create device nodes, it must be run as root.