diff mbox series

[1/1] CI: Reenable Tumbleweed

Message ID 20211027092027.7124-1-pvorel@suse.cz
State Accepted
Headers show
Series [1/1] CI: Reenable Tumbleweed | expand

Commit Message

Petr Vorel Oct. 27, 2021, 9:20 a.m. UTC
50b3bae29 had to disable Tumbleweed due glibc-2.34 using new syscall
clone3 which is not enabled in Docker seccomp filter [1].

Workaround is to disable Docker seccomp filtering, as we don't need this
protection. This should help to avoid seccomp filtering in the future
for all distros.

[1] https://bugzilla.opensuse.org/show_bug.cgi?id=1190670

Fixes: https://github.com/actions/virtual-environments/issues/4193

Signed-off-by: Petr Vorel <pvorel@suse.cz>
---
Tested:
https://github.com/pevik/iputils/runs/4020083152?check_suite_focus=true

 .github/workflows/ci.yml | 6 ++++++
 1 file changed, 6 insertions(+)

Comments

Petr Vorel Oct. 27, 2021, 9:42 a.m. UTC | #1
Hi,

<snip>
>      container:
>        image: ${{ matrix.container }}
>        env: ${{ matrix.env }}
> +      options: --security-opt seccomp=unconfined
Alternatively 'options: --privileged' could be used (to run privileged
container), IMHO does not matter which of these we take.

Kind regards,
Petr
Cyril Hrubis Oct. 27, 2021, 9:52 a.m. UTC | #2
Hi!
> >      container:
> >        image: ${{ matrix.container }}
> >        env: ${{ matrix.env }}
> > +      options: --security-opt seccomp=unconfined
> Alternatively 'options: --privileged' could be used (to run privileged
> container), IMHO does not matter which of these we take.

Looking at docker documentation it looks like --privileged disables much
more than just the seccomp filtering. I do not think that this is a good
idea. Let's go with just disabling seccomp for affected distros.
Petr Vorel Oct. 27, 2021, 10:13 a.m. UTC | #3
> Hi!
> > >      container:
> > >        image: ${{ matrix.container }}
> > >        env: ${{ matrix.env }}
> > > +      options: --security-opt seccomp=unconfined
> > Alternatively 'options: --privileged' could be used (to run privileged
> > container), IMHO does not matter which of these we take.

> Looking at docker documentation it looks like --privileged disables much
> more than just the seccomp filtering. I do not think that this is a good
> idea. Let's go with just disabling seccomp for affected distros.
IMHO both are ok for just compilation (other projects use it as well for just
CI doing compilation), but sure, let's use the minimum.
FYI this disables seccomp for all machines. Is that ok for you?
IMHO that's not a big deal + we will not have to bother when Fedora also gets
new enough glibc (IMHO problem will periodically occurs on bleeding edge distros
when glibc starts to use new enough syscall).

Kind regards,
Petr
Cyril Hrubis Oct. 29, 2021, 8:22 a.m. UTC | #4
Hi!
> > Looking at docker documentation it looks like --privileged disables much
> > more than just the seccomp filtering. I do not think that this is a good
> > idea. Let's go with just disabling seccomp for affected distros.
> IMHO both are ok for just compilation (other projects use it as well for just
> CI doing compilation), but sure, let's use the minimum.
> FYI this disables seccomp for all machines. Is that ok for you?
> IMHO that's not a big deal + we will not have to bother when Fedora also gets
> new enough glibc (IMHO problem will periodically occurs on bleeding edge distros
> when glibc starts to use new enough syscall).

Anyways:

Acked-by: Cyril Hrubis <chrubis@suse.cz>

For the original patch that disables seccomp.
Petr Vorel Oct. 29, 2021, 9:38 a.m. UTC | #5
Hi Cyril,

> Hi!
> > > Looking at docker documentation it looks like --privileged disables much
> > > more than just the seccomp filtering. I do not think that this is a good
> > > idea. Let's go with just disabling seccomp for affected distros.
> > IMHO both are ok for just compilation (other projects use it as well for just
> > CI doing compilation), but sure, let's use the minimum.
> > FYI this disables seccomp for all machines. Is that ok for you?
> > IMHO that's not a big deal + we will not have to bother when Fedora also gets
> > new enough glibc (IMHO problem will periodically occurs on bleeding edge distros
> > when glibc starts to use new enough syscall).

> Anyways:

> Acked-by: Cyril Hrubis <chrubis@suse.cz>

> For the original patch that disables seccomp.

Thanks, pushed!

Kind regards,
Petr
diff mbox series

Patch

diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml
index 3ffde8c48..55d8f5eb5 100644
--- a/.github/workflows/ci.yml
+++ b/.github/workflows/ci.yml
@@ -76,6 +76,11 @@  jobs:
               CC: clang
               METADATA: asciidoc-pdf
 
+          - container: "opensuse/tumbleweed"
+            env:
+              CC: gcc
+              METADATA: asciidoctor
+
           - container: "opensuse/leap"
             env:
               CC: gcc
@@ -110,6 +115,7 @@  jobs:
     container:
       image: ${{ matrix.container }}
       env: ${{ matrix.env }}
+      options: --security-opt seccomp=unconfined
 
     steps:
     - name: Show OS