diff options
author | Matthew Heon <matthew.heon@pm.me> | 2019-12-03 10:27:15 -0500 |
---|---|---|
committer | Matthew Heon <matthew.heon@pm.me> | 2019-12-03 10:27:15 -0500 |
commit | b0b9103cca15278c064e058bbd96139d70acfcd5 (patch) | |
tree | a850354826544c3c736c1f416286c00ea82ea103 /libpod/container.go | |
parent | c9696c451df1efe181c103f9f227787af14dd7b1 (diff) | |
download | podman-b0b9103cca15278c064e058bbd96139d70acfcd5.tar.gz podman-b0b9103cca15278c064e058bbd96139d70acfcd5.tar.bz2 podman-b0b9103cca15278c064e058bbd96139d70acfcd5.zip |
Allow chained network namespace containers
The code currently assumes that the container we delegate network
namespace to will never further delegate to another container, so
when looking up things like /etc/hosts and /etc/resolv.conf we
won't pull the correct files from the chained dependency. The
changes to resolve this are relatively simple - just need to keep
looking until we find a container without NetNsCtr set.
Fixes #4626
Signed-off-by: Matthew Heon <matthew.heon@pm.me>
Diffstat (limited to 'libpod/container.go')
-rw-r--r-- | libpod/container.go | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/libpod/container.go b/libpod/container.go index 4f7fc067e..d978e4e38 100644 --- a/libpod/container.go +++ b/libpod/container.go @@ -1146,7 +1146,7 @@ func (c *Container) NetworkDisabled() (bool, error) { if err != nil { return false, err } - return networkDisabled(container) + return container.NetworkDisabled() } return networkDisabled(c) |