Skip to content

Conversation

@connorjward
Copy link
Contributor

@connorjward connorjward commented Sep 5, 2025

This should fix the permissions issues that we saw building Docker images on CI.

The issue was that the regular CI runs are run in a Docker container as the root user and this means that if a job is cancelled then a bunch of files are left behind that are owned by root. If we subsequently build a Docker image on the same runner we would crash because that workflow is run as an unprivileged user.

I tried to make the regular CI runs use an unprivileged user but I don't think that it is possible. Instead the solution I've found here is to build the Docker images inside another container, and hence as root.

@connorjward connorjward marked this pull request as draft September 5, 2025 11:06
@connorjward
Copy link
Contributor Author

@JHopeCollins don't bother reviewing. Needs more thought.

@connorjward connorjward marked this pull request as ready for review September 5, 2025 16:59
@connorjward
Copy link
Contributor Author

@JHopeCollins I think that this is ready to go now. If you have time please give this a review. The changes look daunting but the core change is we now build the Linux containers inside an ubuntu:latest container instead of directly on the runner.

dham
dham previously approved these changes Sep 24, 2025
@connorjward connorjward merged commit 917d755 into release Sep 25, 2025
5 of 7 checks passed
@connorjward connorjward deleted the connorjward/ci-perms branch September 25, 2025 11:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants