Home / Companies / GitHub / Blog / Post Details
Content Deep Dive

Connecting to a private network from GitHub-hosted Actions runners

Blog post from GitHub

Post Details
Company
Date Published
Author
Zachary Steindler
Word Count
427
Language
English
Hacker News Points
-
Summary

GitHub Actions offers a flexible solution for automating development workflows, including CI/CD, with GitHub-hosted runners providing a server-free environment for running jobs. However, challenges arise when these jobs need access to resources on a private network, such as signing services or package registries. To address this, GitHub has provided documentation detailing three approaches to connect GitHub-hosted runners to private networks, each with its own advantages and tradeoffs. The options include using the GitHub Actions OpenID Connect (OIDC) token through an API gateway, creating a temporary overlay network with WireGuard, or employing a commercial solution like Tailscale. While these solutions vary in complexity and cost, they aim to offer flexibility for different user needs, alongside the option of self-hosted runners for those who can manage their server infrastructure.