Skip to content

Commit 711567c

Browse files
Fixed typos on the rootless mode page (docker#10330)
* Fixed typos * Minor wording update Co-authored-by: Usha Mandya <[email protected]>
1 parent a4ae7f1 commit 711567c

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

engine/security/rootless.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -5,11 +5,11 @@ title: Run the Docker daemon as a non-root user (Rootless mode)
55
---
66

77
Rootless mode allows running the Docker daemon and containers as a non-root
8-
user, for the sake of mitigating potentail vulnerabilities in the daemon and
8+
user, for the sake of mitigating potential vulnerabilities in the daemon and
99
the container runtime.
1010

1111
Rootless mode does not require root privileges even for installation of the
12-
Docker daemon, as long as [the prerequisites](#prerequiresites) are satisfied.
12+
Docker daemon, as long as [the prerequisites](#prerequisites) are satisfied.
1313

1414
Rootless mode was introduced in Docker Engine 19.03.
1515

@@ -181,7 +181,7 @@ To run the daemon directly without systemd, you need to run
181181
$ dockerd-rootless.sh --experimental --storage-driver vfs
182182
```
183183

184-
As Rootless mode is experimental, currently you always need to run
184+
As Rootless mode is experimental, you need to run
185185
`dockerd-rootless.sh` with `--experimental`.
186186
You also need `--storage-driver vfs` unless using Ubuntu or Debian 10 kernel.
187187
You don't need to care these flags if you manage the daemon using systemd, as
@@ -258,7 +258,7 @@ Or add `net.ipv4.ip_unprivileged_port_start=0` to `/etc/sysctl.conf` (or
258258

259259
### Limiting resources
260260

261-
Currently rootless mode ignores cgroup-related `docker run` flags such as
261+
Currently, rootless mode ignores cgroup-related `docker run` flags such as
262262
`--cpus` and `memory`.
263263

264264
However, traditional `ulimit` and [`cpulimit`](https://github.com/opsengine/cpulimit)

0 commit comments

Comments
 (0)