Update documentation based on change to using unprivileged containers

A recent change made most Divingbell Daemonsets run as unprivileged containers:
https://review.openstack.org/#/c/639435/

Change-Id: If4e04368a3de3c7de7a3cf64692e5dd1294234b6
This commit is contained in:
BARTRA, RICK 2019-03-25 11:29:46 -04:00
parent b8f2792eb6
commit bb582048d9
1 changed files with 1 additions and 1 deletions

View File

@ -20,7 +20,7 @@
Design and Implementation
=========================
Divingbell DaemonSets run as privileged containers which mount the host
Divingbell DaemonSets mostly run as unprivileged containers which mount the host
filesystem and chroot into that filesystem to enforce configuration and package
state, or executes scripts in a namespace of ``systemd`` (PID=1). (The
`diving bell <http://bit.ly/2hSXlai>`_ analogue can be thought of as something