mirror of
https://github.com/nektos/act.git
synced 2026-04-26 09:25:54 +03:00
[GH-ISSUE #914] Issue: error adding seccomp filter rule for syscall clone3: permission denied": unknown #541
Labels
No labels
area/action
area/cli
area/docs
area/image
area/runner
area/workflow
backlog
confirmed/not-planned
kind/bug
kind/discussion
kind/external
kind/feature-request
kind/question
meta/duplicate
meta/invalid
meta/need-more-info
meta/resolved
meta/wontfix
meta/workaround
needs-work
pull-request
review/not-planned
size/M
size/XL
size/XXL
stale
stale-exempt
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/act#541
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ghenry on GitHub (Dec 3, 2021).
Original GitHub issue: https://github.com/nektos/act/issues/914
Hi all,
This is known issue on Fedora 35 Docker and in other yml I do:
Where would I add this last part ^^^ with GH actions and act?
Thanks.
@catthehacker commented on GitHub (Dec 3, 2021):
Services are currently unsupported and we don't have a way to define seccomp policies for act containers
@ghenry commented on GitHub (Dec 3, 2021):
Ah shame. Thanks. Trying to debug this https://github.com/SentryPeer/SentryPeer/runs/4405983030?check_suite_focus=true
@catthehacker commented on GitHub (Dec 3, 2021):
@ghenry you can try build from https://github.com/nektos/act/actions/runs/1425103929
@ghenry commented on GitHub (Dec 3, 2021):
Thanks @catthehacker
So how would that allow me to add a global security_opt and not touch anything in my repo?
I should research more on how to set this globally within Docker, so apologies for the noise.
Thanks.
@ghenry commented on GitHub (Dec 3, 2021):
Ah, so I'm presuming I could do something like this:
https://docs.docker.com/engine/security/seccomp/#run-without-the-default-seccomp-profile
@catthehacker commented on GitHub (Dec 3, 2021):
No, because
actdoesn't support any other parameters/flags than what's present inact --help@ghenry commented on GitHub (Dec 3, 2021):
Thanks Ryan. So excuse my ignorance, but what are you looking for me to do (apart from go away) with:
@catthehacker commented on GitHub (Dec 3, 2021):
never mind, I just noticed you posted a compose file and not part of your workflow
@github-actions[bot] commented on GitHub (Jan 3, 2022):
Issue is stale and will be closed in 14 days unless there is new activity