File tree Expand file tree Collapse file tree 1 file changed +5
-3
lines changed Expand file tree Collapse file tree 1 file changed +5
-3
lines changed Original file line number Diff line number Diff line change @@ -50,8 +50,10 @@ Here's an example:
50
50
$ podman run --privileged --pid=host --net=none --security-opt label=type:unconfined_t <image> bootc install --target-no-signature-verification /path/to/disk
51
51
```
52
52
53
- Note that while ` --privileged ` is used, this command will not
54
- perform any destructive action on the host system.
53
+ Note that while ` --privileged ` is used, this command will not perform any
54
+ destructive action on the host system. Among other things, ` --privileged `
55
+ makes sure that all host devices are mounted into container. ` /path/to/disk ` is
56
+ the host's block device ` <image> ` will be installed on.
55
57
56
58
The ` --pid=host --security-opt label=type:unconfined_t ` today
57
59
make it more convenient for bootc to perform some privileged
@@ -121,7 +123,7 @@ in the image - it is per machine state.
121
123
122
124
#### Injecting SSH keys in a container image
123
125
124
- In this example, we will configure OpenSSH to read the
126
+ In the following example, we will configure OpenSSH to read the
125
127
set of authorized keys for the root user from content
126
128
that lives in ` /usr ` (i.e. is owned by the container image).
127
129
We will also create a ` /usr/etc-system ` directory which is intentionally distinct
You can’t perform that action at this time.
0 commit comments