Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow auth token env var for pulling internal/org based actions #992

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

mike-donlon
Copy link

Follow similar logic used for GHES, to allow non GHES to pass an auth token for pulling private/internal/org actions

Follow similar logic used for GHES, to allow non GHES to pass an auth token for pulling private/internal/org actions
@mike-donlon mike-donlon requested a review from a team as a code owner February 18, 2021 15:26
@mike-donlon
Copy link
Author

Adds functionality for 1005

@missedone
Copy link

wow, it's a long waiting feature, hope it can be approved and merge soon.

@tahirmt
Copy link

tahirmt commented Aug 2, 2021

Will this also allow private actions across GitHub enterprise?

@mike-donlon
Copy link
Author

Will this also allow private actions across GitHub enterprise?

Yes, but only per runner, and only to the token allowed access assigned to the runner. I think they might be hesitant about this because an assumption is being made that this token will have elevated perms. But I have tested this with a read only token, specifically assigned to allow access to an internal repo(action repo). Basically, it could be dangerous if you are careless about permissions.

@hross
Copy link
Contributor

hross commented Aug 4, 2021

Yes we are definitely very hesitant about this. It may also allow circumventing policy features on the server (like restricting what actions execute) by providing a token that circumvents those permissions. This is a cool idea but it opens a pretty big policy/security hole so it's not something we are considering merging right now.

@mike-donlon
Copy link
Author

mike-donlon commented Aug 4, 2021

Yes we are definitely very hesitant about this. It may also allow circumventing policy features on the server (like restricting what actions execute) by providing a token that circumvents those permissions. This is a cool idea but it opens a pretty big policy/security hole so it's not something we are considering merging right now.

For the record though, this code is already present in your codebase, but only available for github enterprise self hosted stuff. This doesn't really circumvent anything, only on the pull action stage it uses this env var rather than the runner's scoped working token. Technically, if this token is setup intelligently, then it would likely have less permissions than the scoped token because it would only have read permissions to your internal actions repos and nothing more.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants