Skip to content

Commit

Permalink
ci: try fix CI builds on Ubuntu 24.04 images
Browse files Browse the repository at this point in the history
  • Loading branch information
varqox committed Oct 15, 2024
1 parent 0a58f47 commit fdda028
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ jobs:
image: debian:bookworm
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand All @@ -27,6 +28,7 @@ jobs:
image: ubuntu:24.04
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand All @@ -46,6 +48,7 @@ jobs:
image: fedora:39
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand All @@ -64,6 +67,7 @@ jobs:
image: archlinux
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand All @@ -82,6 +86,7 @@ jobs:
image: debian:bookworm
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand All @@ -102,6 +107,7 @@ jobs:
image: debian:bookworm
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand All @@ -121,6 +127,7 @@ jobs:
image: ubuntu:24.04
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand All @@ -140,6 +147,7 @@ jobs:
image: fedora:39
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand All @@ -158,6 +166,7 @@ jobs:
image: archlinux
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand All @@ -176,6 +185,7 @@ jobs:
image: debian:bookworm
options: --security-opt seccomp=unconfined --privileged --security-opt systempaths=unconfined # needed to make clone3() work in the container, and mount cgroup2 read-write, and /proc mountable
steps:
- run: echo 0 > /proc/sys/kernel/apparmor_restrict_unprivileged_userns
- run: mount -t cgroup2 -o nsdelegate,remount none /sys/fs/cgroup
- run: useradd tester
- run: chown -R tester:tester /sys/fs/cgroup
Expand Down

0 comments on commit fdda028

Please sign in to comment.