ca5f5427a88cedfc6e519f493909a22cd057ac8f
On Ubuntu and Debian there is a sysctl which allows to block clone(CLONE_NEWUSER) via "sysctl kernel.unprivileged_userns_clone=0" for unprivileged users that do not have CAP_SYS_ADMIN. See: https://lists.ubuntu.com/archives/kernel-team/2016-January/067926.html The DockerSuite.TestRunSeccompUnconfinedCloneUserns testcase fails if "kernel.unprivileged_userns_clone" is set to 0: docker_cli_run_unix_test.go:1040: c.Fatalf("expected clone userns with --security-opt seccomp=unconfined to succeed, got %s: %v", out, err) ... Error: expected clone userns with --security-opt seccomp=unconfined to succeed, got clone failed: Operation not permitted : exit status 1 So add a check and skip the testcase if kernel.unprivileged_userns_clone is 0. Signed-off-by: Michael Holzheu <holzheu@linux.vnet.ibm.com> Upstream-commit: 87e4e3af68741afcebf11499d1dcbc91b655b349 Component: engine
Description
No description provided
Languages
Go
92%
Shell
5.5%
Dockerfile
1.1%
Go-Checksums
0.9%
Makefile
0.3%
Other
0.2%