Information
Enable user namespace support in Docker daemon to utilize container user to host user re-
mapping. This recommendation is beneficial where containers you are using do not have an
explicit container user defined in the container image. If container images that you are
using have a pre-defined non-root user, this recommendation may be skipped since this
feature is still in its infancy and might give you unpredictable issues and complexities.The Linux kernel user namespace support in Docker daemon provides additional security
for the Docker host system. It allows a container to have a unique range of user and group
IDs which are outside the traditional user and group range utilized by the host system.For example, the root user will have expected administrative privilege inside the container
but can effectively be mapped to an unprivileged UID on the host system.
Solution
Please consult Docker documentation for various ways in which this can be configured
depending upon your requirements. Your steps might also vary based on platform - For
example, on Red Hat, sub-UIDs and sub-GIDs mapping creation does not work
automatically. You might have to create your own mapping.
However, the high-level steps are as below-Step 1- Ensure that the files /etc/subuid and /etc/subgid exist.touch /etc/subuid /etc/subgidStep 2- Start the docker daemon with --userns-remap flagdockerd --userns-remap=defaultImpact-User namespace remapping makes quite a few Docker features incompatible and also
currently breaks a few functionalities. Check out the Docker documentation and referenced
links for details.Default Value-By default, user namespace is not remapped.