-
Notifications
You must be signed in to change notification settings - Fork 51
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
/github/home in K8s mode #181
Comments
I ran into the same issue today when deploying self-hosted k8s runners and attempting to run a docker action that created and modified a file at I pulled down the hooks repo and built it into a new actions-runner image with the addition of the volume mount specified for the job container here, which appeared to sort of work. Is
Edit: turns out the HTTP failure was because the action in question was polluting the environment with a value that could not be turned into a Kubernetes secret, but the error message was hidden. Opened a PR to surface the message for future users. |
If I understand
runner-container-hooks/packages/k8s/src/k8s/utils.ts
Lines 18 to 68 in 73655d4
/github/home
does not get added to pods executing a docker container.Some images however (like super-linter) expect
/github/home
to be existent and writable. In my specific case I found out, that when running super-linter in a k8s-mode selfhosted runner it fails to execute, since it tries to modify the user's.gitconfig
(to mark/github/workspace
a git safe directory), which fails since the entire homedir does not exist. I've opened super-linter/super-linter#6242 do fix this issue for super-linter, but I would expect that there are more actions out in the wild that will fail in a similar fashion.Is there any specific reason why this volume mount is excluded?
The text was updated successfully, but these errors were encountered: