@@ -46,19 +46,22 @@ tmpfs, Secrets use a tmpfs, etc.)
46
46
Some popular filesystems that support idmap mounts in Linux 6.3 are: btrfs,
47
47
ext4, xfs, fat, tmpfs, overlayfs.
48
48
49
- <!-- When merging this with the dev-1.27 branch conflicts will arise. The text
50
- as it is in the dev-1.27 branch should be used. -->
51
49
In addition, support is needed in the
52
50
{{< glossary_tooltip text="container runtime" term_id="container-runtime" >}}
53
51
to use this feature with Kubernetes stateless pods:
54
52
55
53
* CRI-O: version 1.25 (and later) supports user namespaces for containers.
56
54
57
- Please note that containerd v1.7 supports user namespaces for containers,
58
- compatible with Kubernetes {{< skew currentPatchVersion >}}. It should not be used
59
- with Kubernetes 1.27 (and later).
55
+ containerd v1.7 is not compatible with the userns support in Kubernetes v{{< skew currentVersion >}}.
56
+ Kubernetes v1.25 and v1.26 used an earlier implementation that ** is** compatible with containerd v1.7,
57
+ in terms of userns support.
58
+ If you are using a version of Kubernetes other than {{< skew currentVersion >}},
59
+ check the documentation for that version of Kubernetes for the most relevant information.
60
+ If there is a newer release of containerd than v1.7 available for use, also check the containerd
61
+ documentation for compatibility information.
60
62
61
- Support for this in [ cri-dockerd is not planned] [ CRI-dockerd-issue ] yet.
63
+ You can see the status of user namespaces support in cri-dockerd tracked in an [ issue] [ CRI-dockerd-issue ]
64
+ on GitHub.
62
65
63
66
[ CRI-dockerd-issue ] : https://github.com/Mirantis/cri-dockerd/issues/74
64
67
0 commit comments