Signed-off-by: Jessica Frazelle <acidburn@docker.com>
| ... | ... |
@@ -838,14 +838,14 @@ func (s *DockerSuite) TestRunSeccompAllowPrivCloneUserns(c *check.C) {
|
| 838 | 838 |
} |
| 839 | 839 |
} |
| 840 | 840 |
|
| 841 |
-// TestRunSeccompAllowAptKey checks that 'docker run debian:jessie apt-key' succeeds. |
|
| 842 |
-func (s *DockerSuite) TestRunSeccompAllowAptKey(c *check.C) {
|
|
| 843 |
- testRequires(c, SameHostDaemon, seccompEnabled, Network) |
|
| 841 |
+// TestRunSeccompAllowSetrlimit checks that 'docker run debian:jessie ulimit -v 1048510' succeeds. |
|
| 842 |
+func (s *DockerSuite) TestRunSeccompAllowSetrlimit(c *check.C) {
|
|
| 843 |
+ testRequires(c, SameHostDaemon, seccompEnabled) |
|
| 844 | 844 |
|
| 845 |
- // apt-key uses setrlimit & getrlimit, so we want to make sure we don't break it |
|
| 846 |
- runCmd := exec.Command(dockerBinary, "run", "debian:jessie", "apt-key", "adv", "--keyserver", "hkp://p80.pool.sks-keyservers.net:80", "--recv-keys", "E871F18B51E0147C77796AC81196BA81F6B0FC61") |
|
| 845 |
+ // ulimit uses setrlimit, so we want to make sure we don't break it |
|
| 846 |
+ runCmd := exec.Command(dockerBinary, "run", "debian:jessie", "bash", "-c", "ulimit -v 1048510") |
|
| 847 | 847 |
if out, _, err := runCommandWithOutput(runCmd); err != nil {
|
| 848 |
- c.Fatalf("expected apt-key with seccomp to succeed, got %s: %v", out, err)
|
|
| 848 |
+ c.Fatalf("expected ulimit with seccomp to succeed, got %s: %v", out, err)
|
|
| 849 | 849 |
} |
| 850 | 850 |
} |
| 851 | 851 |
|