Merge pull request #37253 from kinvolk/rata/userns
content: Clarify how to verify user abstraction
This commit is contained in:
		
						commit
						cdfab27ffc
					
				| 
						 | 
				
			
			@ -90,9 +90,9 @@ This means containers can run as root and be mapped to a non-root user on the
 | 
			
		|||
host. Inside the container the process will think it is running as root (and
 | 
			
		||||
therefore tools like `apt`, `yum`, etc. work fine), while in reality the process
 | 
			
		||||
doesn't have privileges on the host. You can verify this, for example, if you
 | 
			
		||||
check the user the container process is running `ps` from the host. The user
 | 
			
		||||
`ps` shows is not the same as the user you see if you execute inside the
 | 
			
		||||
container the command `id`.
 | 
			
		||||
check which user the container process is running by executing `ps aux` from
 | 
			
		||||
the host. The user `ps` shows is not the same as the user you see if you
 | 
			
		||||
execute inside the container the command `id`.
 | 
			
		||||
 | 
			
		||||
This abstraction limits what can happen, for example, if the container manages
 | 
			
		||||
to escape to the host. Given that the container is running as a non-privileged
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue