-
Notifications
You must be signed in to change notification settings - Fork 3.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Broken filesystem permissions on Ubuntu runners (/usr/share/aclocal) #11212
Comments
Hi @NWilson , Thank you for bringing this issue to our attention. We are looking into this issue and will update you on this issue after investigating. |
Hi @NWilson , Thank you! |
@kishorekumar-anchala I don't understand - I haven't made any changes to the file permissions. You can see my workflow YAML, which is a completely blank minimal test workflow: the file permissions are not correct in the GitHub VM. |
@NWilson - Thank you for your message. We understand the importance of these permissions for your process, and we truly appreciate your transparency. However, as these permissions cannot be modified on our end, we kindly request you to update them according to your specific requirements. Thank you for your understanding! |
But you have modified these permissions, somehow - you own and provide this Ubuntu VM image. It's your image which is providing official Ubuntu packages, but those packages (appear) to have been installed incorrectly. The files in
My "specific requirements" are: could you investigate why GitHub is providing official Ubuntu packages, with incorrect permissions? |
This 3 year old commit is the cause. |
You are making all the system files in the Ubuntu image world-writable and making them all executable? That is not an expected state for an Ubuntu installation. I'm surprised that no-one's noticed for three years. It looks like there were some scripts that were lacking the execute bit, and the original PR author just splatted that over the entire Many thanks for investigating this! I hope it's fixable. |
Wait, what? You've identified the bug, and now you're closing the ticket? |
Hi @NWilson , I mistakenly closed it, but I’ve reopened it now. thanks ! |
Description
When running on the Ubuntu runners (22.04 and 24.04) the filesystem permissions in certain directories are set to
ugo+rwx
.This is very strange: it's an Ubuntu VM, and these files are installed by
apt
(as far as I can tell), and yet they are executable and world-writable. I have no idea what the cause is.Impact
We use the
libtool
build tool, which copies files from/usr/share/aclocal
into the build directory and then creates a tarball containing the copied files. Therefore, the permissions set on files in/usr/share/aclocal
become copied into the release artifacts (the tarball contains file permissions).The permissions on files in
/usr/share/aclocal
actually matter.Detailed permissions
Inside a GitHub actions runner:
Inside an ordinary (non-GitHub) default installation of Ubuntu:
Platforms affected
Runner images affected
Image version and build link
Is it regression?
No
Expected behavior
I expect the files in
/usr/share/aclocal
to have permissionsu+rw, go+r
.Actual behavior
Instead, the files have permissions
ugo+rwx
.Repro steps
Here is a link to a test job:
https://github.com/PCRE2Project/pcre2/actions/runs/12369753741/job/34522316597?pr=630
Here is my Workflow YAML. When this workflow is run, the permissions are clearly wrong (compared to a standard Ubuntu installation), and this messes up the build artifacts for workflows which use
libtool
.The text was updated successfully, but these errors were encountered: