mirror of
https://github.com/systemd/systemd
synced 2026-04-06 23:24:52 +02:00
Compare commits
4 Commits
fabf79b0df
...
0da6973c17
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
0da6973c17 | ||
|
|
eb37ed701b | ||
|
|
cc970310a4 | ||
|
|
7e7e31521a |
2
.github/dependabot.yml
vendored
2
.github/dependabot.yml
vendored
@ -5,5 +5,5 @@ updates:
|
||||
- package-ecosystem: "github-actions"
|
||||
directory: "/"
|
||||
schedule:
|
||||
interval: "daily"
|
||||
interval: "weekly"
|
||||
open-pull-requests-limit: 2
|
||||
|
||||
3
.github/workflows/codeql-analysis.yml
vendored
3
.github/workflows/codeql-analysis.yml
vendored
@ -5,6 +5,8 @@
|
||||
name: "CodeQL"
|
||||
|
||||
on:
|
||||
pull_request:
|
||||
branches: [main]
|
||||
# It takes the workflow approximately 30 minutes to analyze the code base
|
||||
# so it doesn't seem to make much sense to trigger it on every PR or commit.
|
||||
# It runs daily at 01:00 to avoid colliding with the Coverity workflow.
|
||||
@ -18,6 +20,7 @@ jobs:
|
||||
analyze:
|
||||
name: Analyze
|
||||
runs-on: ubuntu-latest
|
||||
if: github.event_name == 'schedule' || github.event.pull_request.user.login == 'dependabot[bot]'
|
||||
concurrency:
|
||||
group: ${{ github.workflow }}-${{ matrix.language }}-${{ github.ref }}
|
||||
cancel-in-progress: true
|
||||
|
||||
2
.github/workflows/linter.yml
vendored
2
.github/workflows/linter.yml
vendored
@ -29,7 +29,7 @@ jobs:
|
||||
fetch-depth: 0
|
||||
|
||||
- name: Lint Code Base
|
||||
uses: github/super-linter@7d5dc989c55aaba9d3b7194a7496cdfaa4866af3
|
||||
uses: github/super-linter@563be7dc5568017515b9e700329e9c6d3862f2b7
|
||||
env:
|
||||
DEFAULT_BRANCH: main
|
||||
# Excludes:
|
||||
|
||||
@ -22,10 +22,12 @@ manager, please consider supporting the following interfaces.
|
||||
(that file overrides whatever is pre-initialized by the container manager).
|
||||
|
||||
2. Make sure to pre-mount `/proc/`, `/sys/`, and `/sys/fs/selinux/` before
|
||||
invoking systemd, and mount `/proc/sys/`, `/sys/`, and `/sys/fs/selinux/`
|
||||
read-only in order to prevent the container from altering the host kernel's
|
||||
configuration settings. (As a special exception, if your container has
|
||||
network namespaces enabled, feel free to make `/proc/sys/net/` writable).
|
||||
invoking systemd, and mount `/sys/`, `/sys/fs/selinux/` and `/proc/sys/`
|
||||
read-only (the latter via e.g. a read-only bind mount on itself) in order
|
||||
to prevent the container from altering the host kernel's configuration
|
||||
settings. (As a special exception, if your container has network namespaces
|
||||
enabled, feel free to make `/proc/sys/net/` writable. If it also has user, ipc,
|
||||
uts and pid namespaces enabled, the entire `/proc/sys` can be left writable).
|
||||
systemd and various other subsystems (such as the SELinux userspace) have
|
||||
been modified to behave accordingly when these file systems are read-only.
|
||||
(It's OK to mount `/sys/` as `tmpfs` btw, and only mount a subset of its
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user