Skip to content

Conversation

caxu-rh
Copy link

@caxu-rh caxu-rh commented Oct 20, 2025

Currently, the permissions of /home/runner are 750. In some container runtimes and Kubernetes distributions (including OpenShift), a different uid/gid (not runner) may be used when running the image.

The runner expects to be able to read and execute scripts within the home directory, and it will also write ephemeral files, diagnostic data, etc. into the directory as well. Therefore, to support the ability to use the runner as a user apart from runner, full 777 permissions are needed.

A longer-term change to consider which may improve the security posture here would be to separate the executable portions of the application (scripts, etc.) from the places where temporary data is written, and control the permissions of these separately.

@caxu-rh caxu-rh requested a review from a team as a code owner October 20, 2025 15:25
Currently, the permissions of /home/runner are 750. In some container
runtimes and Kubernetes distributions (including OpenShift), a
different uid/gid (not `runner`) may be used when running the image.

The runner expects to be able to read and execute scripts within the
home directory, and it will also write ephemeral files, diagnostic
data, etc. into the directory as well. Therefore, to support the
ability to use the runner as a user apart from `runner`, full 777
permissions are needed.

A longer-term change to consider which may improve the security
posture here would be to separate the executable portions of the
application (scripts, etc.) from the places where temporary data is
written, and control the permissions of these separately.

Signed-off-by: Caleb Xu <caxu@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants