@@ -5,11 +5,11 @@ title: Run the Docker daemon as a non-root user (Rootless mode)
5
5
---
6
6
7
7
Rootless mode allows running the Docker daemon and containers as a non-root
8
- user, for the sake of mitigating potentail vulnerabilities in the daemon and
8
+ user, for the sake of mitigating potential vulnerabilities in the daemon and
9
9
the container runtime.
10
10
11
11
Rootless mode does not require root privileges even for installation of the
12
- Docker daemon, as long as [ the prerequisites] ( #prerequiresites ) are satisfied.
12
+ Docker daemon, as long as [ the prerequisites] ( #prerequisites ) are satisfied.
13
13
14
14
Rootless mode was introduced in Docker Engine 19.03.
15
15
@@ -181,7 +181,7 @@ To run the daemon directly without systemd, you need to run
181
181
$ dockerd-rootless.sh --experimental --storage-driver vfs
182
182
```
183
183
184
- As Rootless mode is experimental, currently you always need to run
184
+ As Rootless mode is experimental, you need to run
185
185
` dockerd-rootless.sh ` with ` --experimental ` .
186
186
You also need ` --storage-driver vfs ` unless using Ubuntu or Debian 10 kernel.
187
187
You don't need to care these flags if you manage the daemon using systemd, as
@@ -258,7 +258,7 @@ Or add `net.ipv4.ip_unprivileged_port_start=0` to `/etc/sysctl.conf` (or
258
258
259
259
### Limiting resources
260
260
261
- Currently rootless mode ignores cgroup-related ` docker run ` flags such as
261
+ Currently, rootless mode ignores cgroup-related ` docker run ` flags such as
262
262
` --cpus ` and ` memory ` .
263
263
264
264
However, traditional ` ulimit ` and [ ` cpulimit ` ] ( https://github.com/opsengine/cpulimit )
0 commit comments