Skip to content

Commit

Permalink
Merge pull request containerd#10323 from siretart/debian/bug.1044768
Browse files Browse the repository at this point in the history
Allow running test in usernamespace
  • Loading branch information
fuweid authored Jun 13, 2024
2 parents a60edaf + 09d3e20 commit c75f6d4
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion internal/cri/server/podsandbox/sandbox_run_linux_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -33,6 +33,7 @@ import (
"github.com/containerd/containerd/v2/internal/cri/annotations"
"github.com/containerd/containerd/v2/internal/cri/opts"
ostesting "github.com/containerd/containerd/v2/pkg/os/testing"
"github.com/containerd/containerd/v2/pkg/userns"
)

func getRunPodSandboxTestData() (*runtime.PodSandboxConfig, *imagespec.ImageConfig, func(*testing.T, string, *runtimespec.Spec)) {
Expand Down Expand Up @@ -142,7 +143,10 @@ func TestLinuxSandboxContainerSpec(t *testing.T) {
Type: runtimespec.IPCNamespace,
})
assert.Contains(t, spec.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], "0")
assert.Contains(t, spec.Linux.Sysctl["net.ipv4.ping_group_range"], "0 2147483647")
if !userns.RunningInUserNS() {
assert.Contains(t, spec.Linux.Sysctl["net.ipv4.ping_group_range"], "0 2147483647")
}

},
},
{
Expand Down

0 comments on commit c75f6d4

Please sign in to comment.