|
@@ -1140,7 +1140,7 @@ func (s *DockerSuite) TestRunSeccompDefaultProfileNS(c *check.C) {
|
|
}
|
|
}
|
|
|
|
|
|
// TestRunNoNewPrivSetuid checks that --security-opt='no-new-privileges=true' prevents
|
|
// TestRunNoNewPrivSetuid checks that --security-opt='no-new-privileges=true' prevents
|
|
-// effective uid transtions on executing setuid binaries.
|
|
|
|
|
|
+// effective uid transitions on executing setuid binaries.
|
|
func (s *DockerSuite) TestRunNoNewPrivSetuid(c *check.C) {
|
|
func (s *DockerSuite) TestRunNoNewPrivSetuid(c *check.C) {
|
|
testRequires(c, DaemonIsLinux, NotUserNamespace, SameHostDaemon)
|
|
testRequires(c, DaemonIsLinux, NotUserNamespace, SameHostDaemon)
|
|
ensureNNPTest(c)
|
|
ensureNNPTest(c)
|
|
@@ -1153,7 +1153,7 @@ func (s *DockerSuite) TestRunNoNewPrivSetuid(c *check.C) {
|
|
}
|
|
}
|
|
|
|
|
|
// TestLegacyRunNoNewPrivSetuid checks that --security-opt=no-new-privileges prevents
|
|
// TestLegacyRunNoNewPrivSetuid checks that --security-opt=no-new-privileges prevents
|
|
-// effective uid transtions on executing setuid binaries.
|
|
|
|
|
|
+// effective uid transitions on executing setuid binaries.
|
|
func (s *DockerSuite) TestLegacyRunNoNewPrivSetuid(c *check.C) {
|
|
func (s *DockerSuite) TestLegacyRunNoNewPrivSetuid(c *check.C) {
|
|
testRequires(c, DaemonIsLinux, NotUserNamespace, SameHostDaemon)
|
|
testRequires(c, DaemonIsLinux, NotUserNamespace, SameHostDaemon)
|
|
ensureNNPTest(c)
|
|
ensureNNPTest(c)
|