mirror of
https://github.com/containers/podman.git
synced 2025-06-17 06:57:43 +08:00
Merge pull request #6280 from mheon/switch_off_noexec
Turn off 'noexec' option by default for named volumes
This commit is contained in:
@ -207,7 +207,7 @@ var _ = Describe("Podman create", func() {
|
||||
session = podmanTest.Podman([]string{"logs", "test_tmpfs"})
|
||||
session.WaitWithDefaultTimeout()
|
||||
Expect(session.ExitCode()).To(Equal(0))
|
||||
Expect(session.OutputToString()).To(ContainSubstring("/create/test rw,nosuid,nodev,noexec,relatime - tmpfs"))
|
||||
Expect(session.OutputToString()).To(ContainSubstring("/create/test rw,nosuid,nodev,relatime - tmpfs"))
|
||||
})
|
||||
|
||||
It("podman create --pod automatically", func() {
|
||||
|
@ -117,7 +117,7 @@ var _ = Describe("Podman run with volumes", func() {
|
||||
session = podmanTest.Podman([]string{"run", "--rm", "--mount", "type=tmpfs,target=" + dest, ALPINE, "grep", dest, "/proc/self/mountinfo"})
|
||||
session.WaitWithDefaultTimeout()
|
||||
Expect(session.ExitCode()).To(Equal(0))
|
||||
Expect(session.OutputToString()).To(ContainSubstring(dest + " rw,nosuid,nodev,noexec,relatime - tmpfs"))
|
||||
Expect(session.OutputToString()).To(ContainSubstring(dest + " rw,nosuid,nodev,relatime - tmpfs"))
|
||||
|
||||
session = podmanTest.Podman([]string{"run", "--rm", "--mount", "type=tmpfs,target=/etc/ssl,tmpcopyup", ALPINE, "ls", "/etc/ssl"})
|
||||
session.WaitWithDefaultTimeout()
|
||||
|
@ -115,7 +115,8 @@ echo "got here -$rand-"
|
||||
EOF
|
||||
chmod 755 $mountpoint/myscript
|
||||
|
||||
# By default, volumes are mounted noexec. This should fail.
|
||||
# By default, volumes are mounted exec, but we have manually added the
|
||||
# noexec option. This should fail.
|
||||
# ARGH. Unfortunately, runc (used for cgroups v1) produces a different error
|
||||
local expect_rc=126
|
||||
local expect_msg='.* OCI runtime permission denied.*'
|
||||
@ -125,12 +126,12 @@ EOF
|
||||
expect_msg='.* exec user process caused.*permission denied'
|
||||
fi
|
||||
|
||||
run_podman ${expect_rc} run --rm --volume $myvolume:/vol:z $IMAGE /vol/myscript
|
||||
run_podman ${expect_rc} run --rm --volume $myvolume:/vol:noexec,z $IMAGE /vol/myscript
|
||||
is "$output" "$expect_msg" "run on volume, noexec"
|
||||
|
||||
# With exec, it should pass
|
||||
run_podman run --rm -v $myvolume:/vol:z,exec $IMAGE /vol/myscript
|
||||
is "$output" "got here -$rand-" "script in volume is runnable with exec"
|
||||
# With the default, it should pass
|
||||
run_podman run --rm -v $myvolume:/vol:z $IMAGE /vol/myscript
|
||||
is "$output" "got here -$rand-" "script in volume is runnable with default (exec)"
|
||||
|
||||
# Clean up
|
||||
run_podman volume rm $myvolume
|
||||
|
Reference in New Issue
Block a user