You can use policies to limit access to larger runners that have been added to an organization or enterprise.
Who can use this feature?Larger runners are only available for organizations and enterprises using the GitHub Team or GitHub Enterprise Cloud plans.
Note
The information and instructions in this article only apply to larger runners with Linux and Windows operating systems.
Managing access to larger runnersNote
Before your workflows can send jobs to larger runners, you must first configure permissions for the runner group. See the following sections for more information.
Runner groups are used to control which repositories can run jobs on your larger runners. You must manage access to the group from each level of the management hierarchy, depending on where you've defined the larger runner:
For example, the following diagram has a runner group named grp-ubuntu-20.04-16core
at the enterprise level. Before the repository named octo-repo
can use the runners in the group, you must first configure the group at the enterprise level to allow access to the octo-org
organization. You must then configure the group at the organization level to allow access to octo-repo
.
Warning
If you are using a Fixed IP range, we recommend that you only use larger runners with private repositories. Forks of your repository can potentially run dangerous code on your larger runner by creating a pull request that executes the code in a workflow.
Note
When creating a runner group, you must choose a policy that defines which repositories have access to the runner group. To change which repositories and workflows can access the runner group, organization owners can set a policy for the organization. For more information, see Enforcing policies for GitHub Actions in your enterprise.
All organizations have a single default runner group. Organization owners using the GitHub Team plan can create additional organization-level runner groups.
If no group is specified during the registration process, runners are automatically added to the default group. You can later move the runner from the default group to a custom group.
For information about how to create a runner group with the REST API, see REST API endpoints for GitHub Actions.
On GitHub, navigate to the main page of the organization.
Under your organization name, click Settings. If you cannot see the "Settings" tab, select the dropdown menu, then click Settings.
In the left sidebar, click Actions, then click Runner groups.
In the "Runner groups" section, click New runner group.
Enter a name for your runner group.
Assign a policy for repository access.
You can configure a runner group to be accessible to a specific list of repositories, or to all repositories in the organization. By default, only private repositories can access runners in a runner group, but you can override this. This setting can't be overridden if configuring an organization's runner group that was shared by an enterprise.
Click Create group to create the group and apply the policy.
Warning
If you are using a Fixed IP range, we recommend that you only use larger runners with private repositories. Forks of your repository can potentially run dangerous code on your larger runner by creating a pull request that executes the code in a workflow.
For runner groups in an organization, you can change what repositories in the organization can access a runner group.
Navigate to the main page of the organization where your runner groups are located.
Click Settings.
In the left sidebar, click Actions, then click Runner groups.
In the list of groups, click the runner group you'd like to configure.
Under "Repository access," use the dropdown menu to click Selected repositories.
Click Save group.
You can use GitHub-hosted runners in an Azure VNET. This enables you to use GitHub-managed infrastructure for CI/CD while providing you with full control over the networking policies of your runners. For more information about Azure VNET, see What is Azure Virtual Network? in the Azure documentation.
If you have configured your organization to connect to an Azure VNET, you can give runner groups access to the virtual network. For more information, see Private networking with GitHub-hosted runners.
Changing the name of a runner groupIf you don't specify a runner group during the registration process, your new runners are automatically assigned to the default group, and can then be moved to another group.
On GitHub, navigate to the main page of the organization.
Under your organization name, click Settings. If you cannot see the "Settings" tab, select the dropdown menu, then click Settings.
In the left sidebar, click Actions, then click Runners.
In the "Runners" list, click the runner that you want to configure.
Select the Runner group drop-down.
In "Move runner to group", choose a destination group for the runner.
In order to remove a runner group, you must first move or remove all of the runners from the group.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4