Skip to content

Commit

Permalink
Do not run docker specific test under other CRIs
Browse files Browse the repository at this point in the history
```
100630:I0211 13:12:32.952106       1 admission.go:148] unable to validate pod apparmor (generate: ) in namespace podsecuritypolicy-3080 against any pod security policy: [pod.metadata.annotations[container.apparmor.security.beta.kubernetes.io/pause]: Forbidden: localhost/docker-default is not an allowed profile. Allowed values: "runtime/default"]
```
  • Loading branch information
dims committed Feb 11, 2020
1 parent ba4ca45 commit cd4d0bd
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion test/e2e/auth/pod_security_policy.go
Expand Up @@ -168,7 +168,7 @@ func testPrivilegedPods(tester func(pod *v1.Pod)) {
tester(hostipc)
})

if isAppArmorSupported() {
if isAppArmorSupported() && framework.TestContext.ContainerRuntime == "docker" {
ginkgo.By("Running a custom AppArmor profile pod", func() {
aa := restrictedPod("apparmor")
// Every node is expected to have the docker-default profile.
Expand Down

0 comments on commit cd4d0bd

Please sign in to comment.