From b0b9103cca15278c064e058bbd96139d70acfcd5 Mon Sep 17 00:00:00 2001 From: Matthew Heon Date: Tue, 3 Dec 2019 10:27:15 -0500 Subject: Allow chained network namespace containers The code currently assumes that the container we delegate network namespace to will never further delegate to another container, so when looking up things like /etc/hosts and /etc/resolv.conf we won't pull the correct files from the chained dependency. The changes to resolve this are relatively simple - just need to keep looking until we find a container without NetNsCtr set. Fixes #4626 Signed-off-by: Matthew Heon --- libpod/container.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) (limited to 'libpod/container.go') diff --git a/libpod/container.go b/libpod/container.go index 4f7fc067e..d978e4e38 100644 --- a/libpod/container.go +++ b/libpod/container.go @@ -1146,7 +1146,7 @@ func (c *Container) NetworkDisabled() (bool, error) { if err != nil { return false, err } - return networkDisabled(container) + return container.NetworkDisabled() } return networkDisabled(c) -- cgit v1.2.3-54-g00ecf