-
-
Notifications
You must be signed in to change notification settings - Fork 269
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Artifacts are installed with wrong permissions #3269
Comments
Is that because Tar.jl normalises permissions? |
I don't think so, because in JuliaCI/PkgEval.jl#189 I'm now using Tar.jl directly to unpack this tarball, and permissions are fine. |
The issue is that Pkg likes to set things to be read-only: Line 79 in 6dd0e7c
I think the reason the areas of the ecosystem that I administer don't run into this is that I'm usually running as
|
Makes sense, but for PkgEval I don't want to run as root in order to spot packages doing questionable things (e.g., using |
I'm having an issue with a rootfs artifact (i.e. containing a Linux OS) being extracted with the wrong permissions. The image in question is used in PkgEval.jl, and the problematic file is a lock whose
u+w
permissions are dropped.First of all, here's the tarball and the permissions the lock file should have:
If I download this tarball using Pkg's
download_verify_unpack
, all seems well (ano+r
permission is added, which isn't great, but also not terrible):However, if I pack this up in an
Artifacts.toml
, I get the following:... and our
u+w
permission is gone. That's bad, here breakingdpkg
in the containers spawned using this rootfs because it can't take the lock.Tested on 1.8.2, reproduces on macOS and Linux. This artifact also seems to trigger an unrelated git tree hash change between 1.7 (
d41ccdb32c924682293a4fe525b9986b7debb11d
) and 1.8 (e5d2359bc94f9d9ddc771c2274c83324ca8cbbcc
).The text was updated successfully, but these errors were encountered: