mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
Merge pull request #36226 from yongtang/36198-follow-up
Add description to TestContainerNetworkMountsNoChown
This commit is contained in:
commit
7e7f8160fc
1 changed files with 10 additions and 1 deletions
|
@ -136,7 +136,16 @@ func TestContainerNetworkMountsNoChown(t *testing.T) {
|
|||
err = cli.ContainerStart(ctx, ctrCreate.ID, types.ContainerStartOptions{})
|
||||
require.NoError(t, err)
|
||||
|
||||
// check that host-located bind mount network file did not change ownership when the container was started
|
||||
// Check that host-located bind mount network file did not change ownership when the container was started
|
||||
// Note: If the user specifies a mountpath from the host, we should not be
|
||||
// attempting to chown files outside the daemon's metadata directory
|
||||
// (represented by `daemon.repository` at init time).
|
||||
// This forces users who want to use user namespaces to handle the
|
||||
// ownership needs of any external files mounted as network files
|
||||
// (/etc/resolv.conf, /etc/hosts, /etc/hostname) separately from the
|
||||
// daemon. In all other volume/bind mount situations we have taken this
|
||||
// same line--we don't chown host file content.
|
||||
// See GitHub PR 34224 for details.
|
||||
statT, err := system.Stat(tmpNWFileMount)
|
||||
require.NoError(t, err)
|
||||
assert.Equal(t, uint32(0), statT.UID(), "bind mounted network file should not change ownership from root")
|
||||
|
|
Loading…
Add table
Reference in a new issue