1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-06 06:46:26 +01:00

clarified /etc/passwd requirement when running images for CRI-O compatibility

Signed-off-by: Jose Angel Morena <jmorenas@redhat.com>
This commit is contained in:
Jose Angel Morena
2024-01-31 20:09:27 +01:00
committed by openshift-cherrypick-robot
parent dc5d8b4589
commit d213d98c19

View File

@@ -39,9 +39,9 @@ Because the container user is always a member of the root group, the container u
[WARNING]
====
Care must be taken when altering the directories and file permissions of sensitive areas of a container, which is no different than to a normal system.
Care must be taken when altering the directories and file permissions of the sensitive areas of a container. If applied to sensitive areas, such as the `/etc/passwd` file, such changes can allow the modification of these files by unintended users, potentially exposing the container or host. CRI-O supports the insertion of arbitrary user IDs into a container's `/etc/passwd` file. As such, changing permissions is never required.
If applied to sensitive areas, such as `/etc/passwd`, this can allow the modification of such files by unintended users potentially exposing the container or host. CRI-O supports the insertion of arbitrary user IDs into the container's `/etc/passwd`, so changing permissions is never required.
Additionally, the `/etc/passwd` file should not exist in any container image. If it does, the CRI-O container runtime will fail to inject a random UID into the `/etc/passwd` file. In such cases, the container might face challenges in resolving the active UID. Failing to meet this requirement could impact the functionality of certain containerized applications.
====
In addition, the processes running in the container must not listen on privileged ports, ports below 1024, since they are not running as a privileged user.