diff options
| -rw-r--r-- | pkg/specgen/generate/security.go | 2 | ||||
| -rw-r--r-- | test/e2e/run_privileged_test.go | 9 | 
2 files changed, 10 insertions, 1 deletions
| diff --git a/pkg/specgen/generate/security.go b/pkg/specgen/generate/security.go index 0c97dc496..d3cbac76e 100644 --- a/pkg/specgen/generate/security.go +++ b/pkg/specgen/generate/security.go @@ -172,7 +172,7 @@ func securityConfigureGenerator(s *specgen.SpecGenerator, g *generate.Generator,  	// Clear default Seccomp profile from Generator for unconfined containers  	// and privileged containers which do not specify a seccomp profile. -	if s.SeccompProfilePath == "unconfined" || (s.Privileged && (s.SeccompProfilePath == config.SeccompOverridePath || s.SeccompProfilePath == config.SeccompDefaultPath)) { +	if s.SeccompProfilePath == "unconfined" || (s.Privileged && (s.SeccompProfilePath == "" || s.SeccompProfilePath == config.SeccompOverridePath || s.SeccompProfilePath == config.SeccompDefaultPath)) {  		configSpec.Linux.Seccomp = nil  	} diff --git a/test/e2e/run_privileged_test.go b/test/e2e/run_privileged_test.go index cadda7224..48f9ea76e 100644 --- a/test/e2e/run_privileged_test.go +++ b/test/e2e/run_privileged_test.go @@ -110,6 +110,15 @@ var _ = Describe("Podman privileged container tests", func() {  		Expect("0000000000000000").To(Equal(capEff[1]))  	}) +	It("podman privileged should disable seccomp by default", func() { +		hostSeccomp := SystemExec("grep", []string{"-Ei", "^Seccomp:\\s+0$", "/proc/self/status"}) +		Expect(hostSeccomp.ExitCode()).To(Equal(0)) + +		session := podmanTest.Podman([]string{"run", "--privileged", ALPINE, "grep", "-Ei", "^Seccomp:\\s+0$", "/proc/self/status"}) +		session.WaitWithDefaultTimeout() +		Expect(session.ExitCode()).To(Equal(0)) +	}) +  	It("podman non-privileged should have very few devices", func() {  		session := podmanTest.Podman([]string{"run", "-t", "busybox", "ls", "-l", "/dev"})  		session.WaitWithDefaultTimeout() | 
