You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -111,9 +111,9 @@ OKD runs with the following security policy by default:
111
111
112
112
Many containers expect to run as root (and therefore edit all the contents of the filesystem). The [Image Author's guide](https://docs.okd.io/latest/openshift_images/create-images.html#images-create-guide-openshift_create-images) gives recommendations on making your image more secure by default:
113
113
114
-
* Don't run as root
115
-
* Make directories you want to write to group-writable and owned by group id 0
116
-
* Set the net-bind capability on your executables if they need to bind to ports < 1024
114
+
* Don't run as root
115
+
* Make directories you want to write to group-writable and owned by group id 0
116
+
* Set the net-bind capability on your executables if they need to bind to ports < 1024
117
117
118
118
If you are running your own cluster and want to run a container as root, you can grant that permission to the containers in your current project with the following command:
0 commit comments