Remove hack that mounted /dev/shm with exec, dosemu2 no longer needs it (#1334)

This commit is contained in:
Mark Street
2024-08-26 17:03:00 +01:00
committed by GitHub
parent cb6eff636d
commit 1c90e90cd0
2 changed files with 0 additions and 3 deletions
-1
View File
@@ -182,7 +182,6 @@ jobs:
-v $(pwd)/local_files:/local_files \
-v $(pwd)/compilers:/compilers \
-v $(pwd)/libraries:/libraries \
--tmpfs /dev/shm:exec,uid=1000,gid=1000,size=64M,mode=0700 \
--security-opt apparmor=unconfined \
--security-opt seccomp=unconfined \
--entrypoint /bin/bash \
-2
View File
@@ -46,8 +46,6 @@ services:
volumes:
- ./backend:/backend
tmpfs:
# explicitly mount /dev/shm with exec as dosemu2 requires exec privilege
- /dev/shm:exec,uid=1000,gid=1000,size=64M,mode=0700
# Use a separate tmpfs to prevent a rogue jailed process
# from filling /tmp on the parent container
- /sandbox/tmp:exec,uid=1000,gid=1000,size=64M,mode=0700