Skip to content

Commit 5ee4598

Browse files
committed
Block outbound calls from ci runners to unallowed endpoints
1 parent a03adea commit 5ee4598

10 files changed

Lines changed: 71 additions & 27 deletions

File tree

.github/workflows/build.yml

Lines changed: 22 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,21 @@ jobs:
2222
security-events: write
2323

2424
steps:
25-
- name: Harden the runner (Audit all outbound calls)
25+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
2626
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
2727
with:
28-
egress-policy: audit
28+
egress-policy: block
29+
allowed-endpoints: >+
30+
github.com:443
31+
api.github.com:443
32+
release-assets.githubusercontent.com:443
33+
pypi.org:443
34+
files.pythonhosted.org:443
35+
packages.microsoft.com:443
36+
azure.archive.ubuntu.com:80
37+
esm.ubuntu.com:443
38+
index.rubygems.org:443
39+
rubygems.org:443
2940
3041
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
3142
with:
@@ -207,10 +218,17 @@ jobs:
207218
runs-on: ubuntu-latest
208219

209220
steps:
210-
- name: Harden the runner (Audit all outbound calls)
221+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
211222
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
212223
with:
213-
egress-policy: audit
224+
egress-policy: block
225+
allowed-endpoints: >+
226+
github.com:443
227+
api.github.com:443
228+
release-assets.githubusercontent.com:443
229+
pypi.org:443
230+
files.pythonhosted.org:443
231+
214232
215233
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
216234
with:

.github/workflows/codeql-analysis.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,10 +34,11 @@ jobs:
3434
runs-on: ubuntu-latest
3535

3636
steps:
37-
- name: Harden the runner (Audit all outbound calls)
37+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
3838
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
3939
with:
40-
egress-policy: audit
40+
egress-policy: block
41+
allowed-endpoints: >+
4142
4243
- name: Checkout repository
4344
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2

.github/workflows/dependency-review.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,11 @@ jobs:
1616
dependency-review:
1717
runs-on: ubuntu-latest
1818
steps:
19-
- name: Harden the runner (Audit all outbound calls)
19+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
2020
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
2121
with:
22-
egress-policy: audit
22+
egress-policy: block
23+
allowed-endpoints: >+
2324
2425
- name: 'Checkout Repository'
2526
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2

.github/workflows/devcontainer.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,12 @@ jobs:
1515
runs-on: ubuntu-latest
1616

1717
steps:
18-
- name: Harden the runner (Audit all outbound calls)
18+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
1919
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
2020
with:
21-
egress-policy: audit
21+
egress-policy: block
22+
allowed-endpoints: >+
23+
registry-1.docker.io:443
2224
2325
- name: Checkout repository
2426
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2

.github/workflows/docs.yml

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,10 +16,11 @@ jobs:
1616
name: Documentation
1717
runs-on: ubuntu-latest
1818
steps:
19-
- name: Harden the runner (Audit all outbound calls)
19+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
2020
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
2121
with:
22-
egress-policy: audit
22+
egress-policy: block
23+
allowed-endpoints: >+
2324
2425
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
2526
with:
@@ -41,10 +42,11 @@ jobs:
4142
name: Landing page
4243
runs-on: ubuntu-latest
4344
steps:
44-
- name: Harden the runner (Audit all outbound calls)
45+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
4546
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
4647
with:
47-
egress-policy: audit
48+
egress-policy: block
49+
allowed-endpoints: >+
4850
4951
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
5052

@@ -75,10 +77,11 @@ jobs:
7577
permissions:
7678
contents: write
7779
steps:
78-
- name: Harden the runner (Audit all outbound calls)
80+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
7981
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
8082
with:
81-
egress-policy: audit
83+
egress-policy: block
84+
allowed-endpoints: >+
8285
8386
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
8487
with:

.github/workflows/python-publish.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,10 +20,11 @@ jobs:
2020
runs-on: ubuntu-latest
2121

2222
steps:
23-
- name: Harden the runner (Audit all outbound calls)
23+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
2424
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
2525
with:
26-
egress-policy: audit
26+
egress-policy: block
27+
allowed-endpoints: >+
2728
2829
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
2930
with:

.github/workflows/release.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,8 @@ jobs:
2323
steps:
2424
- uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
2525
with:
26-
egress-policy: audit
26+
egress-policy: block
27+
allowed-endpoints: >+
2728
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
2829
- uses: actions/setup-python@a309ff8b426b58ec0e2a45f0f869d46889d02405 # v6.2.0
2930
with:

.github/workflows/run.yml

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,11 @@ jobs:
1515
security-events: write
1616

1717
steps:
18-
- name: Harden the runner (Audit all outbound calls)
18+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
1919
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
2020
with:
21-
egress-policy: audit
21+
egress-policy: block
22+
allowed-endpoints: >+
2223
2324
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
2425

@@ -73,10 +74,11 @@ jobs:
7374
security-events: write
7475

7576
steps:
76-
- name: Harden the runner (Audit all outbound calls)
77+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
7778
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
7879
with:
79-
egress-policy: audit
80+
egress-policy: block
81+
allowed-endpoints: >+
8082
8183
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
8284

.github/workflows/scorecard.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,10 +26,11 @@ jobs:
2626
id-token: write
2727

2828
steps:
29-
- name: Harden the runner (Audit all outbound calls)
29+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
3030
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
3131
with:
32-
egress-policy: audit
32+
egress-policy: block
33+
allowed-endpoints: >+
3334
3435
- name: "Checkout code"
3536
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2

.github/workflows/test.yml

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,24 @@ jobs:
1010
test:
1111
runs-on: ubuntu-latest
1212
steps:
13-
- name: Harden the runner (Audit all outbound calls)
13+
- name: "Harden the runner (Block egress traffic: Only allow calls to allowed endpoints)"
1414
uses: step-security/harden-runner@8d3c67de8e2fe68ef647c8db1e6a09f647780f40 # v2.19.0
1515
with:
16-
egress-policy: audit
16+
egress-policy: block
17+
allowed-endpoints: >+
18+
github.com:443
19+
packages.microsoft.com:443
20+
azure.archive.ubuntu.com:80
21+
esm.ubuntu.com:443
22+
pypi.org:443
23+
files.pythonhosted.org:443
24+
svn.code.sf.net:3690
25+
coverage.codacy.com:443
26+
artifacts.codacy.com:443
27+
release-assets.githubusercontent.com:443
28+
api.codacy.com:443
29+
svn.code.sf.net:443
30+
github.com:22
1731
1832
- uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
1933

0 commit comments

Comments
 (0)