Merge pull request #37799 from scf0920/branch-1
fix typo: transtions->transitions
This commit is contained in:
commit
caca40c8ec
1 changed files with 2 additions and 2 deletions
|
@ -1140,7 +1140,7 @@ func (s *DockerSuite) TestRunSeccompDefaultProfileNS(c *check.C) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// TestRunNoNewPrivSetuid checks that --security-opt='no-new-privileges=true' prevents
|
// TestRunNoNewPrivSetuid checks that --security-opt='no-new-privileges=true' prevents
|
||||||
// effective uid transtions on executing setuid binaries.
|
// effective uid transitions on executing setuid binaries.
|
||||||
func (s *DockerSuite) TestRunNoNewPrivSetuid(c *check.C) {
|
func (s *DockerSuite) TestRunNoNewPrivSetuid(c *check.C) {
|
||||||
testRequires(c, DaemonIsLinux, NotUserNamespace, SameHostDaemon)
|
testRequires(c, DaemonIsLinux, NotUserNamespace, SameHostDaemon)
|
||||||
ensureNNPTest(c)
|
ensureNNPTest(c)
|
||||||
|
@ -1153,7 +1153,7 @@ func (s *DockerSuite) TestRunNoNewPrivSetuid(c *check.C) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// TestLegacyRunNoNewPrivSetuid checks that --security-opt=no-new-privileges prevents
|
// TestLegacyRunNoNewPrivSetuid checks that --security-opt=no-new-privileges prevents
|
||||||
// effective uid transtions on executing setuid binaries.
|
// effective uid transitions on executing setuid binaries.
|
||||||
func (s *DockerSuite) TestLegacyRunNoNewPrivSetuid(c *check.C) {
|
func (s *DockerSuite) TestLegacyRunNoNewPrivSetuid(c *check.C) {
|
||||||
testRequires(c, DaemonIsLinux, NotUserNamespace, SameHostDaemon)
|
testRequires(c, DaemonIsLinux, NotUserNamespace, SameHostDaemon)
|
||||||
ensureNNPTest(c)
|
ensureNNPTest(c)
|
||||||
|
|
Loading…
Reference in a new issue