Skip to content

Conversation

@thelamer
Copy link
Member

After visually seeing how many containers have this in the readme snippet and getting bug reports of people using this flag on Trixie I realized we need to pull this out of all the examples in our readmes.

With this blurb in I want to go through all the desktop app repos and:

  1. Remove seccomp unconfined flag from the examples
  2. Add shm-size to all the examples (this is becoming increasingly needed and apps are randomly crashing without it)
  3. Modify any chromium/electron wrappers to stop detecting the seccomp profile and just pass --no-sandbox by default as on all modern systems you actually need apparmor unconfined as well to not pass it.

@thelamer thelamer requested a review from a team August 31, 2025 10:08
@LinuxServer-CI LinuxServer-CI moved this from PRs to PRs Ready For Team Review in Issue & PR Tracker Aug 31, 2025
@LinuxServer-CI
Copy link
Contributor

I am a bot, here are the test results for this PR:
https://ci-tests.linuxserver.io/lspipepr/jenkins-builder/87aca3ae-pkg-87aca3ae-dev-2bd3ac770590e0ce7dbb2bb962059e49c3914970-pr-350/index.html
https://ci-tests.linuxserver.io/lspipepr/jenkins-builder/87aca3ae-pkg-87aca3ae-dev-2bd3ac770590e0ce7dbb2bb962059e49c3914970-pr-350/shellcheck-result.xml

Tag Passed
amd64-87aca3ae-pkg-87aca3ae-dev-2bd3ac770590e0ce7dbb2bb962059e49c3914970-pr-350
arm64v8-87aca3ae-pkg-87aca3ae-dev-2bd3ac770590e0ce7dbb2bb962059e49c3914970-pr-350

@github-project-automation github-project-automation bot moved this from PRs Ready For Team Review to PRs Approved in Issue & PR Tracker Sep 11, 2025
@thelamer thelamer merged commit 059f343 into master Sep 22, 2025
6 checks passed
@LinuxServer-CI LinuxServer-CI moved this from PRs Approved to Done in Issue & PR Tracker Sep 22, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Development

Successfully merging this pull request may close these issues.

4 participants