Skip to content

Commit 7d68d57

Browse files
authored
Merge pull request #38910 from github/repo-sync
Repo sync
2 parents 74b2079 + 8a9f62a commit 7d68d57

File tree

4 files changed

+43
-2
lines changed

4 files changed

+43
-2
lines changed

content/actions/hosting-your-own-runners/managing-self-hosted-runners-with-actions-runner-controller/authenticating-to-the-github-api.md

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -85,6 +85,46 @@ ARC can use {% data variables.product.pat_v1_plural %} to register self-hosted r
8585
8686
{% data reusables.actions.actions-runner-controller-helm-chart-options %}
8787
88+
## Authenticating ARC with a {% data variables.product.pat_v2 %}
89+
90+
ARC can use {% data variables.product.pat_v2_plural %} to register self-hosted runners.
91+
92+
{% ifversion ghec or ghes %}
93+
94+
> [!NOTE]
95+
> Authenticating ARC with a {% data variables.product.pat_v1 %} is the only supported authentication method to register runners at the enterprise level.
96+
97+
{% endif %}
98+
99+
1. Create a {% data variables.product.pat_v2 %} with the required scopes. The required scopes are different depending on whether you are registering runners at the repository or organization level. For more information on how to create a {% data variables.product.pat_v2 %}, see [AUTOTITLE](/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token#creating-a-fine-grained-personal-access-token).
100+
101+
The following is the list of required {% data variables.product.pat_generic %} scopes for ARC runners.
102+
103+
* Repository runners:
104+
* **Administration:** Read and write
105+
106+
* Organization runners:
107+
* **Administration:** Read
108+
* **Self-hosted runners:** Read and write
109+
110+
1. To create a Kubernetes secret with the value of your {% data variables.product.pat_v2 %}, use the following command.
111+
112+
{% data reusables.actions.arc-runners-namespace %}
113+
114+
```bash copy
115+
kubectl create secret generic pre-defined-secret \
116+
--namespace=arc-runners \
117+
--from-literal=github_token='YOUR-PAT'
118+
```
119+
120+
1. In your copy of the [`values.yaml`](https://github.com/actions/actions-runner-controller/blob/master/charts/gha-runner-scale-set/values.yaml) file, pass the secret name as a reference.
121+
122+
```yaml
123+
githubConfigSecret: pre-defined-secret
124+
```
125+
126+
{% data reusables.actions.actions-runner-controller-helm-chart-options %}
127+
88128
## Authenticating ARC with vault secrets
89129
90130
> [!NOTE]

content/admin/configuring-settings/hardening-security-for-your-enterprise/enabling-private-mode.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,5 @@ With private mode enabled, you can allow unauthenticated Git operations (and any
3131

3232
{% data reusables.enterprise_site_admin_settings.access-settings %}
3333
{% data reusables.enterprise_site_admin_settings.management-console %}
34-
{% data reusables.enterprise_management_console.privacy %}
3534
1. Select **Private mode**.
3635
{% data reusables.enterprise_management_console.save-settings %}

content/admin/enforcing-policies/enforcing-policies-for-your-enterprise/enforcing-policies-for-github-actions-in-your-enterprise.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,8 @@ When specifying actions{% ifversion actions-workflow-policy %} and reusable work
7777
* To allow all actions{% ifversion actions-workflow-policy %} and reusable workflows{% endif %} in organizations that start with `space-org`, use `space-org*/*`.
7878
* To allow all actions{% ifversion actions-workflow-policy %} and reusable workflows{% endif %} in repositories that start with octocat, use `*/octocat**@*`.
7979

80+
Policies never restrict access to local actions on the runner filesystem (where the `uses:` path start with `./`).
81+
8082
## Runners
8183

8284
By default, anyone with admin access to a repository can add a self-hosted runner for the repository, and self-hosted runners come with risks:
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1. In the "Settings" sidebar, click **Privacy** and uncheck **Privacy mode**.
1+
1. In the "Settings" sidebar, click **Privacy** and uncheck **Private mode**.

0 commit comments

Comments
 (0)