Error Permission on git runner config on RHEL
See original GitHub issueI am following runner configuration instructions for RHEL 7 and on config step
./config.sh --url https://github.com/<myorg> --token <token>
getting following error:
An error occurred: Permission to read the directory contents is required for '/home/1corp.org/myuser/actions-runner' and each directory up the hierarchy. Access to the path '/home/1corp.org' is denied.
Please note that the home directory of my user is not /home/myuser
but /home/1corp.org/myuser
and myuser does not have permissions to access /home/1corp.org
indeed.
I am able to procced by changing the owner for parent folder but that is ugly workaround imho.
Issue Analytics
- State:
- Created 2 years ago
- Comments:5 (2 by maintainers)
Top Results From Across the Web
Troubleshooting GitLab Runner
You can see the Permission Denied error. The most likely cause is that your system uses SELinux (enabled by default on CentOS, Fedora...
Read more >fatal: unable to access 'config' error with gitlab-runner
It turns out the permissions of files inside my .git folder were screwed up. Running: chmod ug+rwX,o+rX .git -R. fixed the issue.
Read more >Permission denied with shell when running ...
When I start the CI with gitlab-runner start as root, running commands such as apt-get update -qy gives me a Permission denied error, ......
Read more >Permission issue with gitlab-runner
1.2-ee self-managed gitlab instance and gitlab-runner. When running the gitlab-runner as a service I'm getting the below error in the pipeline.
Read more >How to Install GitLab Runner on CentOS/RHEL/Fedora
Run below command to install latest GitLab Runner on CentOS/RHEL/Fedora ... Step #3: Grant sudo Permission to GitLab Runner User.
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Hey @thboop, can we revisit this?
It seems like we’re requiring people to compromise their security models in the name of searching for paths that they likely don’t care about.
I tried this recently (linux, node v14.16.0…not even that recent):
The lack of read access was not a problem for node. If there was any readable parent path (or global path) that had
which
available, it used it just fine. Ifwhich
was not available, then it complained aboutError: Cannot find module 'which'
, as expected, after searching through the entire list of search paths (parent and global).I’m wondering if the “node process blowing up” is no longer a thing, or if it is OS dependent. If the latter, it would be great if this check could be relaxed a bit. It seems like:
Hey @abinet sorry for the frustration this is causing you.
This check is done to help us run
node
actions. Essentially, when yourequire()
a package in node, it has an order to check for that package. It starts at the current directory, then keeps checking one directory up until it finds anode_module
folder. This resulted in the node process blowing up if it didn’t have the correct permissions ( most notably this typically occurred to users installing the runner in theMyDocuments
folder on windows). I understand the frustration here in requiring these permissions, but we feel it makes the user experience better then the letting the node process throw.With that in mind, I’m going to close out this issue, as I don’t envision us making any changes here, but I do appreciate you taking the time to report this.