From 9a394ced2e470ee2b278f6faf527a37a64694887 Mon Sep 17 00:00:00 2001 From: Mark Street Date: Mon, 26 Aug 2024 15:30:51 +0100 Subject: [PATCH] Remove hack that mounted /dev/shm with exec, dosemu2 no longer needs it --- .github/workflows/ci.yml | 1 - docker-compose.yaml | 2 -- 2 files changed, 3 deletions(-) diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index a513d1e3..75dc2fbc 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -182,7 +182,6 @@ jobs: -v $(pwd)/local_files:/local_files \ -v $(pwd)/compilers:/compilers \ -v $(pwd)/libraries:/libraries \ - --tmpfs /dev/shm:exec,uid=1000,gid=1000,size=64M,mode=0700 \ --security-opt apparmor=unconfined \ --security-opt seccomp=unconfined \ --entrypoint /bin/bash \ diff --git a/docker-compose.yaml b/docker-compose.yaml index 9f893fe1..d72ff0fd 100644 --- a/docker-compose.yaml +++ b/docker-compose.yaml @@ -46,8 +46,6 @@ services: volumes: - ./backend:/backend tmpfs: - # explicitly mount /dev/shm with exec as dosemu2 requires exec privilege - - /dev/shm:exec,uid=1000,gid=1000,size=64M,mode=0700 # Use a separate tmpfs to prevent a rogue jailed process # from filling /tmp on the parent container - /sandbox/tmp:exec,uid=1000,gid=1000,size=64M,mode=0700