summaryrefslogtreecommitdiff
path: root/pkg
diff options
context:
space:
mode:
authorOpenShift Merge Robot <openshift-merge-robot@users.noreply.github.com>2022-04-01 09:25:26 -0400
committerGitHub <noreply@github.com>2022-04-01 09:25:26 -0400
commit59fcf0e39d91e00d8385ffda3a09c32a1464c117 (patch)
tree2bad250c3c7e36ef6f6c3609b559f7286459eec9 /pkg
parentd1f3a2d6a82ed66d4dab5be62821bc59bfb84dd8 (diff)
parent1cd529b22d40205c1f3246ed49f07e3615cf8292 (diff)
downloadpodman-59fcf0e39d91e00d8385ffda3a09c32a1464c117.tar.gz
podman-59fcf0e39d91e00d8385ffda3a09c32a1464c117.tar.bz2
podman-59fcf0e39d91e00d8385ffda3a09c32a1464c117.zip
Merge pull request #13744 from giuseppe/allow-privileged-cap-add
specgen: permit --privileged and --cap-add
Diffstat (limited to 'pkg')
-rw-r--r--pkg/specgen/container_validate.go4
1 files changed, 0 insertions, 4 deletions
diff --git a/pkg/specgen/container_validate.go b/pkg/specgen/container_validate.go
index e71eafb75..42b70e334 100644
--- a/pkg/specgen/container_validate.go
+++ b/pkg/specgen/container_validate.go
@@ -83,10 +83,6 @@ func (s *SpecGenerator) Validate() error {
//
// ContainerSecurityConfig
//
- // capadd and privileged are exclusive
- if len(s.CapAdd) > 0 && s.Privileged {
- return exclusiveOptions("CapAdd", "privileged")
- }
// userns and idmappings conflict
if s.UserNS.IsPrivate() && s.IDMappings == nil {
return errors.Wrap(ErrInvalidSpecConfig, "IDMappings are required when not creating a User namespace")