Skip to content

Commit cdfab27

Browse files
authored
Merge pull request #37253 from kinvolk/rata/userns
content: Clarify how to verify user abstraction
2 parents 0d7cfc9 + 28e090a commit cdfab27

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/en/docs/concepts/workloads/pods/user-namespaces.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -90,9 +90,9 @@ This means containers can run as root and be mapped to a non-root user on the
9090
host. Inside the container the process will think it is running as root (and
9191
therefore tools like `apt`, `yum`, etc. work fine), while in reality the process
9292
doesn't have privileges on the host. You can verify this, for example, if you
93-
check the user the container process is running `ps` from the host. The user
94-
`ps` shows is not the same as the user you see if you execute inside the
95-
container the command `id`.
93+
check which user the container process is running by executing `ps aux` from
94+
the host. The user `ps` shows is not the same as the user you see if you
95+
execute inside the container the command `id`.
9696

9797
This abstraction limits what can happen, for example, if the container manages
9898
to escape to the host. Given that the container is running as a non-privileged

0 commit comments

Comments
 (0)