Fix user flag in privileged-helper.md (#15085)

This commit is contained in:
Gabriela Georgieva 2022-07-08 11:25:07 +02:00 committed by GitHub
parent adc61b973e
commit eeee27a3e9
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 2 additions and 2 deletions

View File

@ -14,13 +14,13 @@ While Docker Desktop does not generally require the user running or installing i
The reason for this is that Docker Desktop needs to perform a limited set of privileged operations using the privileged helper process `com.docker.vmnetd`. This approach allows, following the principle of least privilege, `root` access to be used only for the operations for which it is absolutely necessary, while still being able to use Docker Desktop as an unprivileged user.
From version 4.11, it will be possible to avoid running a privileged service in the background by using `com.docker.vmnetd` for setup during installation and disabling it at runtime. In this case the user will not be prompted on the first run. Administrators would be able to do that by using the `user` flag on the [install command](install.md#install-from-the-command-line) which would:
From version 4.11, it will be possible to avoid running a privileged service in the background by using `com.docker.vmnetd` for setup during installation and disabling it at runtime. In this case the user will not be prompted on the first run. Administrators would be able to do that by using the `-user` flag on the [install command](install.md#install-from-the-command-line) which would:
- Uninstall the previous `com.docker.vmnetd` if present
- Set up symlinks for the user
- Ensure that `localhost` and `kubernetes.docker.internal` are present in `/etc/hosts`
This approach will have certain limitations:
- Docker Desktop would only be able to be run by one user account per machine, namely the one specified in the `user` flag.
- Docker Desktop would only be able to be run by one user account per machine, namely the one specified in the `-user` flag.
- Ports 1-79 would be blocked - the containers would run but the port wont be exposed on the host.
- Spindump diagnostics for fine grained CPU utilization would not be gathered.