|
@@ -817,7 +817,7 @@ func (s *DockerSuite) TestRunSeccompProfileDenyCloneUserns(c *check.C) {
|
|
|
// TestRunSeccompUnconfinedCloneUserns checks that
|
|
|
// 'docker run --security-opt seccomp:unconfined syscall-test' allows creating a userns.
|
|
|
func (s *DockerSuite) TestRunSeccompUnconfinedCloneUserns(c *check.C) {
|
|
|
- testRequires(c, SameHostDaemon, seccompEnabled, NotUserNamespace)
|
|
|
+ testRequires(c, SameHostDaemon, seccompEnabled, UserNamespaceInKernel, NotUserNamespace)
|
|
|
|
|
|
// make sure running w privileged is ok
|
|
|
runCmd := exec.Command(dockerBinary, "run", "--security-opt", "seccomp:unconfined", "syscall-test", "userns-test", "id")
|
|
@@ -829,7 +829,7 @@ func (s *DockerSuite) TestRunSeccompUnconfinedCloneUserns(c *check.C) {
|
|
|
// TestRunSeccompAllowPrivCloneUserns checks that 'docker run --privileged syscall-test'
|
|
|
// allows creating a userns.
|
|
|
func (s *DockerSuite) TestRunSeccompAllowPrivCloneUserns(c *check.C) {
|
|
|
- testRequires(c, SameHostDaemon, seccompEnabled, NotUserNamespace)
|
|
|
+ testRequires(c, SameHostDaemon, seccompEnabled, UserNamespaceInKernel, NotUserNamespace)
|
|
|
|
|
|
// make sure running w privileged is ok
|
|
|
runCmd := exec.Command(dockerBinary, "run", "--privileged", "syscall-test", "userns-test", "id")
|