|
@@ -726,7 +726,7 @@ func (s *DockerSuite) TestRunTmpfsMounts(c *check.C) {
|
|
|
|
|
|
// TestRunSeccompProfileDenyUnshare checks that 'docker run --security-opt seccomp:/tmp/profile.json debian:jessie unshare' exits with operation not permitted.
|
|
|
func (s *DockerSuite) TestRunSeccompProfileDenyUnshare(c *check.C) {
|
|
|
- testRequires(c, SameHostDaemon, seccompEnabled, NotArm)
|
|
|
+ testRequires(c, SameHostDaemon, seccompEnabled, NotArm, Apparmor)
|
|
|
jsonData := `{
|
|
|
"defaultAction": "SCMP_ACT_ALLOW",
|
|
|
"syscalls": [
|
|
@@ -783,7 +783,7 @@ func (s *DockerSuite) TestRunSeccompProfileDenyChmod(c *check.C) {
|
|
|
// TestRunSeccompProfileDenyUnshareUserns checks that 'docker run debian:jessie unshare --map-root-user --user sh -c whoami' with a specific profile to
|
|
|
// deny unhare of a userns exits with operation not permitted.
|
|
|
func (s *DockerSuite) TestRunSeccompProfileDenyUnshareUserns(c *check.C) {
|
|
|
- testRequires(c, SameHostDaemon, seccompEnabled, NotArm)
|
|
|
+ testRequires(c, SameHostDaemon, seccompEnabled, NotArm, Apparmor)
|
|
|
// from sched.h
|
|
|
jsonData := fmt.Sprintf(`{
|
|
|
"defaultAction": "SCMP_ACT_ALLOW",
|