aboutsummaryrefslogtreecommitdiff
path: root/test/e2e/run_test.go
diff options
context:
space:
mode:
authorDaniel J Walsh <dwalsh@redhat.com>2018-12-24 06:55:24 -0500
committerDaniel J Walsh <dwalsh@redhat.com>2018-12-24 09:03:53 -0500
commitdf99522c6794cbf9ea77c4c314dadf9e9b5b2a54 (patch)
treef43b0228054882a212b9493f4fca9657918ab88d /test/e2e/run_test.go
parentbbfe7341b7c03cba4a362ec1e1198ff3eb90d962 (diff)
downloadpodman-df99522c6794cbf9ea77c4c314dadf9e9b5b2a54.tar.gz
podman-df99522c6794cbf9ea77c4c314dadf9e9b5b2a54.tar.bz2
podman-df99522c6794cbf9ea77c4c314dadf9e9b5b2a54.zip
Fixes to handle /dev/shm correctly.
We had two problems with /dev/shm, first, you mount the container read/only then /dev/shm was mounted read/only. This is a bug a tmpfs directory should be read/write within a read-only container. The second problem is we were ignoring users mounted /dev/shm from the host. If user specified podman run -d -v /dev/shm:/dev/shm ... We were dropping this mount and still using the internal mount. Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
Diffstat (limited to 'test/e2e/run_test.go')
-rw-r--r--test/e2e/run_test.go7
1 files changed, 7 insertions, 0 deletions
diff --git a/test/e2e/run_test.go b/test/e2e/run_test.go
index d73d8662f..cf366b197 100644
--- a/test/e2e/run_test.go
+++ b/test/e2e/run_test.go
@@ -669,4 +669,11 @@ USER mail`
numContainers := podmanTest.NumberOfContainers()
Expect(numContainers).To(Equal(1))
})
+ It("podman run readonly container should NOT mount /dev/shm read/only", func() {
+ session := podmanTest.Podman([]string{"run", "--read-only", ALPINE, "mount"})
+ session.WaitWithDefaultTimeout()
+ Expect(session.ExitCode()).To(Equal(0))
+
+ Expect(session.OutputToString()).To(Not(ContainSubstring("/dev/shm type tmpfs (ro,")))
+ })
})