mirror of
https://github.com/openshift/openshift-docs.git
synced 2026-02-06 06:46:26 +01:00
clarified /etc/passwd requirement when running images for CRI-O compatibility
Signed-off-by: Jose Angel Morena <jmorenas@redhat.com>
This commit is contained in:
committed by
openshift-cherrypick-robot
parent
dc5d8b4589
commit
d213d98c19
@@ -39,9 +39,9 @@ Because the container user is always a member of the root group, the container u
|
||||
|
||||
[WARNING]
|
||||
====
|
||||
Care must be taken when altering the directories and file permissions of sensitive areas of a container, which is no different than to a normal system.
|
||||
Care must be taken when altering the directories and file permissions of the sensitive areas of a container. If applied to sensitive areas, such as the `/etc/passwd` file, such changes can allow the modification of these files by unintended users, potentially exposing the container or host. CRI-O supports the insertion of arbitrary user IDs into a container's `/etc/passwd` file. As such, changing permissions is never required.
|
||||
|
||||
If applied to sensitive areas, such as `/etc/passwd`, this can allow the modification of such files by unintended users potentially exposing the container or host. CRI-O supports the insertion of arbitrary user IDs into the container's `/etc/passwd`, so changing permissions is never required.
|
||||
Additionally, the `/etc/passwd` file should not exist in any container image. If it does, the CRI-O container runtime will fail to inject a random UID into the `/etc/passwd` file. In such cases, the container might face challenges in resolving the active UID. Failing to meet this requirement could impact the functionality of certain containerized applications.
|
||||
====
|
||||
|
||||
In addition, the processes running in the container must not listen on privileged ports, ports below 1024, since they are not running as a privileged user.
|
||||
|
||||
Reference in New Issue
Block a user