-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Executing Ruby gems produces fatal error due to insecure PATH locations in Akeneo harness #555
Comments
This is set up in https://github.com/my127/docker-php/blob/main/base.Dockerfile#L47 I'd prefer to fix the world writable issue (as they shouldn't be if you are using mutagen or normal mounts), and align akeneo's bin-dir to be bin/ |
Agree, it might be nicer to sort out those permissions. However, in my experience |
It's about the developer experience across all of the php harnesses and affects any tooling placed in the bin folder. The only way around this without inhibiting DX or having a security vulnerability akin to https://blog.golang.org/path-security is to set up bash aliases for tools used. harness-base-php/src/_base/harness/config/commands.yml Lines 121 to 127 in 304e35a
|
I am not sure |
I'd focus on the usage of |
In the Akeneo harness the
bin
andvendor/bin
directories added to PATH (https://github.com/inviqa/harness-akeneo/blob/1.1.x/harness/attributes/docker.yml#L12). They also get 0777 permissions, and when you try to run a ruby gem from that container you get:I can't see a reason for putting these in PATH, so I propose removing this line as a general rule, seeing as it causes problems here and probably is not best practice.
The text was updated successfully, but these errors were encountered: