Skip to content

fix(ci): use BUNDLE_PATH to avoid insecure install path with Ruby 4.0#261

Merged
matthv merged 2 commits intomainfrom
fix/ci-bundler-path
Feb 6, 2026
Merged

fix(ci): use BUNDLE_PATH to avoid insecure install path with Ruby 4.0#261
matthv merged 2 commits intomainfrom
fix/ci-bundler-path

Conversation

@matthv
Copy link
Member

@matthv matthv commented Feb 6, 2026

Bundler 4.0 (shipped with Ruby 4.0) has stricter security checks on gem installation paths. GitHub Actions runners have world-writable gem directories which trigger InsecureInstallPathError (exit code 38).

Setting BUNDLE_PATH at the job level redirects all gem installs to a temp directory with proper permissions.

matthv and others added 2 commits February 6, 2026 12:06
Bundler 4.0 (shipped with Ruby 4.0) has stricter security checks on
gem installation paths. GitHub Actions runners have world-writable gem
directories which trigger InsecureInstallPathError (exit code 38).

Setting BUNDLE_PATH at the job level redirects all gem installs to a
temp directory with proper permissions.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
runner context is not available at job-level env, only within steps.

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
@matthv matthv merged commit fe2bb53 into main Feb 6, 2026
35 checks passed
@matthv matthv deleted the fix/ci-bundler-path branch February 6, 2026 11:16
forest-bot added a commit that referenced this pull request Feb 6, 2026
## [1.23.2](v1.23.1...v1.23.2) (2026-02-06)

### Bug Fixes

* **ci:** use BUNDLE_PATH to avoid insecure install path with Ruby 4.0 ([#261](#261)) ([fe2bb53](fe2bb53))
@forest-bot
Copy link
Member

🎉 This PR is included in version 1.23.2 🎉

The release is available on GitHub release

Your semantic-release bot 📦🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants