@@ -5,11 +5,11 @@ title: Run the Docker daemon as a non-root user (Rootless mode)
55---
66
77Rootless mode allows running the Docker daemon and containers as a non-root
8- user, for the sake of mitigating potentail vulnerabilities in the daemon and
8+ user, for the sake of mitigating potential vulnerabilities in the daemon and
99the container runtime.
1010
1111Rootless mode does not require root privileges even for installation of the
12- Docker daemon, as long as [ the prerequisites] ( #prerequiresites ) are satisfied.
12+ Docker daemon, as long as [ the prerequisites] ( #prerequisites ) are satisfied.
1313
1414Rootless mode was introduced in Docker Engine 19.03.
1515
@@ -181,7 +181,7 @@ To run the daemon directly without systemd, you need to run
181181$ dockerd-rootless.sh --experimental --storage-driver vfs
182182```
183183
184- As Rootless mode is experimental, currently you always need to run
184+ As Rootless mode is experimental, you need to run
185185` dockerd-rootless.sh ` with ` --experimental ` .
186186You also need ` --storage-driver vfs ` unless using Ubuntu or Debian 10 kernel.
187187You don't need to care these flags if you manage the daemon using systemd, as
@@ -258,7 +258,7 @@ Or add `net.ipv4.ip_unprivileged_port_start=0` to `/etc/sysctl.conf` (or
258258
259259### Limiting resources
260260
261- Currently rootless mode ignores cgroup-related ` docker run ` flags such as
261+ Currently, rootless mode ignores cgroup-related ` docker run ` flags such as
262262` --cpus ` and ` memory ` .
263263
264264However, traditional ` ulimit ` and [ ` cpulimit ` ] ( https://github.com/opsengine/cpulimit )
0 commit comments