Patched options() to let container options propagate to job containers #80
No reviewers
Labels
No Label
duplicate
help wanted
invalid
kind
bug
kind
enhancement
kind
feature
kind
question
proposal
wontfix
No Milestone
No Assignees
5 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: gitea/act#80
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "nicorac/act:main"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This PR let "general" container config to be propagated to each job container.
See:
Is there any possible security problem of this patch?
Which kind of problem are you suspecting could be introduced?
In my mind
config.yaml
file and itscontainer.options
field is managed by the SysAdmin running the docker server (in my case that's me 😉), so a "trusted" entity.It's like if Github SysAdmins will introduce new default env vars to action containers to set new network configs or (like in my case) set proxy config to be used to access the internet).
I'm not an expert and I'd like to know if I'm missing something...
33f5365c02
tod868bb469f
3 issues could be fixed by this PR: 79, 475 and 483.
So please, could anyone who's in charge of PR evaluation/merge... take care of it? 🙄