Signed-off-by: Shijiang Wei <mountkin@gmail.com>
| ... | ... |
@@ -911,12 +911,12 @@ func (s *DockerSuite) TestRunApparmorProcDirectory(c *check.C) {
|
| 911 | 911 |
testRequires(c, SameHostDaemon, Apparmor) |
| 912 | 912 |
|
| 913 | 913 |
// running w seccomp unconfined tests the apparmor profile |
| 914 |
- runCmd := exec.Command(dockerBinary, "run", "--security-opt", "seccomp:unconfined", "debian:jessie", "chmod", "777", "/proc/1/cgroup") |
|
| 914 |
+ runCmd := exec.Command(dockerBinary, "run", "--security-opt", "seccomp:unconfined", "busybox", "chmod", "777", "/proc/1/cgroup") |
|
| 915 | 915 |
if out, _, err := runCommandWithOutput(runCmd); err == nil || !(strings.Contains(out, "Permission denied") || strings.Contains(out, "Operation not permitted")) {
|
| 916 | 916 |
c.Fatalf("expected chmod 777 /proc/1/cgroup to fail, got %s: %v", out, err)
|
| 917 | 917 |
} |
| 918 | 918 |
|
| 919 |
- runCmd = exec.Command(dockerBinary, "run", "--security-opt", "seccomp:unconfined", "debian:jessie", "chmod", "777", "/proc/1/attr/current") |
|
| 919 |
+ runCmd = exec.Command(dockerBinary, "run", "--security-opt", "seccomp:unconfined", "busybox", "chmod", "777", "/proc/1/attr/current") |
|
| 920 | 920 |
if out, _, err := runCommandWithOutput(runCmd); err == nil || !(strings.Contains(out, "Permission denied") || strings.Contains(out, "Operation not permitted")) {
|
| 921 | 921 |
c.Fatalf("expected chmod 777 /proc/1/attr/current to fail, got %s: %v", out, err)
|
| 922 | 922 |
} |