Skip to content

Commit 2415148

Browse files
committed
pkg/cri/server: Test net.ipv4.ping_group_range works with userns
Signed-off-by: Rodrigo Campos <[email protected]> (cherry picked from commit c17d3bd)
1 parent 801e8c8 commit 2415148

1 file changed

Lines changed: 20 additions & 0 deletions

File tree

pkg/cri/server/sandbox_run_linux_test.go

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -146,6 +146,26 @@ func TestLinuxSandboxContainerSpec(t *testing.T) {
146146
})
147147
},
148148
},
149+
"spec shouldn't have ping_group_range if userns are in use": {
150+
configChange: func(c *runtime.PodSandboxConfig) {
151+
c.Linux.SecurityContext = &runtime.LinuxSandboxSecurityContext{
152+
NamespaceOptions: &runtime.NamespaceOption{
153+
UsernsOptions: &runtime.UserNamespace{
154+
Mode: runtime.NamespaceMode_POD,
155+
Uids: []*runtime.IDMapping{&idMap},
156+
Gids: []*runtime.IDMapping{&idMap},
157+
},
158+
},
159+
}
160+
},
161+
specCheck: func(t *testing.T, spec *runtimespec.Spec) {
162+
require.NotNil(t, spec.Linux)
163+
assert.Contains(t, spec.Linux.Namespaces, runtimespec.LinuxNamespace{
164+
Type: runtimespec.UserNamespace,
165+
})
166+
assert.NotContains(t, spec.Linux.Sysctl["net.ipv4.ping_group_range"], "0 2147483647")
167+
},
168+
},
149169
"host namespace": {
150170
configChange: func(c *runtime.PodSandboxConfig) {
151171
c.Linux.SecurityContext = &runtime.LinuxSandboxSecurityContext{

0 commit comments

Comments
 (0)