diff options
author | openshift-ci[bot] <75433959+openshift-ci[bot]@users.noreply.github.com> | 2022-06-22 20:05:58 +0000 |
---|---|---|
committer | GitHub <noreply@github.com> | 2022-06-22 20:05:58 +0000 |
commit | 0d1fa2b50419236ee46b4daf0c0b6ea97deabcaa (patch) | |
tree | ca92bc40d4a45c07fc1cb0ad0985f4a1a9011210 /rootless.md | |
parent | ca26d44d3b8e1208dafd0e71caadc6b67ebb52b2 (diff) | |
parent | aa4279ae151fa9df5245d3e255f3fb929fe2e86c (diff) | |
download | podman-0d1fa2b50419236ee46b4daf0c0b6ea97deabcaa.tar.gz podman-0d1fa2b50419236ee46b4daf0c0b6ea97deabcaa.tar.bz2 podman-0d1fa2b50419236ee46b4daf0c0b6ea97deabcaa.zip |
Merge pull request #14658 from eriksjolund/setup_to_set_up
"setup" -> "set up" and similar
Diffstat (limited to 'rootless.md')
-rw-r--r-- | rootless.md | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/rootless.md b/rootless.md index 39c961d2a..f5d78b80b 100644 --- a/rootless.md +++ b/rootless.md @@ -8,7 +8,7 @@ Contributors are more than welcomed to help with this work. If you decide to ca * The kernel does not allow processes without CAP_NET_BIND_SERVICE to bind to low ports. * You can modify the `net.ipv4.ip_unprivileged_port_start` sysctl to change the lowest port. For example `sysctl net.ipv4.ip_unprivileged_port_start=443` allows rootless Podman containers to bind to ports >= 443. * “How To” documentation is patchy at best. -* If /etc/subuid and /etc/subgid are not setup for a user, then podman commands +* If /etc/subuid and /etc/subgid are not set up for a user, then podman commands can easily fail * This can be a big issue on machines using Network Based Password information (FreeIPA, Active Directory, LDAP) * We are working to get support for NSSWITCH on the /etc/subuid and /etc/subgid files. @@ -24,7 +24,7 @@ can easily fail * NFS and parallel filesystems enforce file creation on different UIDs on the server side and does not understand User Namespace. * When a container root process like YUM attempts to create a file owned by a different UID, NFS Server/GPFS denies the creation. * Does not work with homedirs mounted with noexec/nodev - * User can setup storage to point to other directories they can write to that are not mounted noexec/nodev + * User can set up storage to point to other directories they can write to that are not mounted noexec/nodev * Support for using native overlayfs as an unprivileged user is only available for Podman version >= 3.1 on a Linux kernel version >= 5.12, otherwise the slower _fuse-overlayfs_ may be used. * A few Linux distributions (e.g. Ubuntu) have supported even older Podman and Linux kernel versions by modifying the normal Linux kernel behaviour. * Only other supported driver is VFS. |