You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/github-actions/overview.mdx
+38Lines changed: 38 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -76,3 +76,41 @@ You can configure this retention policy in your Organization Settings to control
76
76
**Available values for time based retention:** 7, 14 **(default)**, and 30 days
77
77
78
78
**Available values for size based retention:** 25GB, 50GB, 100GB, 150GB, 250GB, 500GB, No limit **(default)**
79
+
80
+
## Egress Filtering
81
+
82
+
Egress filtering allows you to control which external services your GitHub Actions runners can connect to.
83
+
84
+
### Configuration
85
+
86
+
You can configure egress rules in your organization's settings page under the **GitHub Actions Runners** section. Look for the **Egress Rules** subsection.
87
+
88
+
By default, Depot Runners will allow outbound connections to any external service. However, you can set the default rule, "`*`", to either `Deny` or `Allow` by default. You can also add specific rules to allow or deny connections to specific IPs, CIDRs, or hostnames.
89
+
90
+
Below is an example set of rules to get a docker build with golang working:
91
+
92
+
[](/images/egress-filter-rules.webp)
93
+
94
+
This example first applies a blanket deny rule, which blocks all outbound connections by default. Then, it allows connections to the following:
95
+
96
+
-`auth.docker.io` and `docker.io` for Docker Hub authentication and registry access
97
+
-`sum.golang.org` and `proxy.golang.org` for Go modules and proxy access
98
+
-`storage.googleapis.com` for Google Cloud Storage access
99
+
100
+
### Pre-configured rules
101
+
102
+
To ensure that runners can still connect to necessary services, we automatically add certain IPs and hosts to the allowlist:
103
+
104
+
-**depot.dev domains**
105
+
-**GitHub Actions service IPs**
106
+
-**AWS service IPs**
107
+
108
+
Additionally, `depot build` works out of the box with egress filtering enabled.
109
+
110
+
### Limitations
111
+
112
+
There are a few limitations to keep in mind when using egress filtering:
113
+
114
+
- Tailscale cannot be used together with egress filters because both modify network config in incompatible ways
115
+
- Any process that's given root access can modify the egress filter rules, so it's important to ensure that untrusted processes don't run with higher privileges than necessary.
116
+
- The egress filter currently isn't supported on macOS and Windows runners
0 commit comments