Merge pull request #4036 from vrothberg/update-readme

Update readme
This commit is contained in:
OpenShift Merge Robot
2019-09-25 16:11:30 +02:00
committed by GitHub
2 changed files with 14 additions and 3 deletions

View File

@ -347,9 +347,6 @@ tracking system.
There is also a [mailing list](https://lists.podman.io/archives/) at `lists.podman.io`. There is also a [mailing list](https://lists.podman.io/archives/) at `lists.podman.io`.
You can subscribe by sending a message to `podman@lists.podman.io` with the subject `subscribe`. You can subscribe by sending a message to `podman@lists.podman.io` with the subject `subscribe`.
[owners]: https://github.com/kubernetes/community/blob/master/contributors/guide/owners.md#owners
### Bot Interactions ### Bot Interactions
The primary human-interface is through comments in pull-requests. Some of these are outlined The primary human-interface is through comments in pull-requests. Some of these are outlined

View File

@ -33,6 +33,20 @@ This project tests all builds against each supported version of Fedora, the late
1. Further work on the podman pod command 1. Further work on the podman pod command
1. Further improvements on rootless containers 1. Further improvements on rootless containers
## Communications
For general questions and discussion, please use the
IRC `#podman` channel on `irc.freenode.net`.
For discussions around issues/bugs and features, you can use the GitHub
[issues](https://github.com/containers/libpod/issues)
and
[PRs](https://github.com/containers/libpod/pulls)
tracking system.
There is also a [mailing list](https://lists.podman.io/archives/) at `lists.podman.io`.
You can subscribe by sending a message to `podman@lists.podman.io` with the subject `subscribe`.
## Rootless ## Rootless
Podman can be easily run as a normal user, without requiring a setuid binary. Podman can be easily run as a normal user, without requiring a setuid binary.
When run without root, Podman containers use user namespaces to set root in the container to the user running Podman. When run without root, Podman containers use user namespaces to set root in the container to the user running Podman.