About policies for GitHub Actions in your enterprise
GitHub Actions helps members of your enterprise automate software development workflows on GitHub Enterprise Server. For more information, see "Understanding GitHub Actions."
If you enable GitHub Actions, any organization on your GitHub Enterprise Server instance can use GitHub Actions. You can enforce policies to control how members of your enterprise on GitHub Enterprise Server use GitHub Actions. By default, organization owners can manage how members use GitHub Actions. For more information, see "Disabling or limiting GitHub Actions for your organization."
Enforcing a policy to restrict the use of GitHub Actions in your enterprise
You can choose to disable GitHub Actions for all organizations in your enterprise, or only allow specific organizations. You can also limit the use of public actions , so that people can only use local actions that exist in your enterprise.
-
In the top-right corner of GitHub Enterprise Server, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Policies.
-
Under " Policies", click Actions.
-
Under "Policies", select your options.
If you choose Allow select actions, actions within your enterprise are allowed, and there are additional options for allowing other specific actions. For more information, see "Allowing select actions to run."
Note: To enable access to public actions, you must first configure your GitHub Enterprise Server instance to connect to GitHub.com. For more information, see "Enabling automatic access to GitHub.com actions using GitHub Connect."
-
Click Save.
Allowing select actions to run
When you choose Allow select actions, local actions are allowed, and there are additional options for allowing other specific actions:
-
Allow actions created by GitHub: You can allow all actions created by GitHub to be used by workflows. Actions created by GitHub are located in the
actions
andgithub
organizations. For more information, see theactions
andgithub
organizations. -
Allow Marketplace actions by verified creators: This option is available if you have GitHub Connect enabled and configured with GitHub Actions. For more information, see "Enabling automatic access to GitHub.com actions using GitHub Connect." You can allow all GitHub Marketplace actions created by verified creators to be used by workflows. When GitHub has verified the creator of the action as a partner organization, the badge is displayed next to the action in GitHub Marketplace.
-
Allow specified actions: You can restrict workflows to use actions in specific organizations and repositories. Specified actions cannot be set to more than 1000.
To restrict access to specific tags or commit SHAs of an action, use the same syntax used in the workflow to select the action.
- For an action, the syntax is
OWNER/REPOSITORY@TAG-OR-SHA
. For example, useactions/javascript-action@v1.0.1
to select a tag oractions/javascript-action@a824008085750b8e136effc585c3cd6082bd575f
to select a SHA. For more information, see "Finding and customizing actions."
You can use the
*
wildcard character to match patterns. For example, to allow all actions in organizations that start withspace-org
, you can specifyspace-org*/*
. To allow all actions in repositories that start with octocat, you can use*/octocat**@*
. For more information about using the*
wildcard, see "Workflow syntax for GitHub Actions." - For an action, the syntax is
This procedure demonstrates how to add specific actions to the allow list.
-
In the top-right corner of GitHub Enterprise Server, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Policies.
-
Under " Policies", click Actions.
-
Under "Policies", select Allow select actions and add your required actions to the list.
Enforcing a policy for artifact and log retention in your enterprise
GitHub Actions can store artifact and log files. For more information, see "Downloading workflow artifacts."
By default, the artifacts and log files generated by workflows are retained for 90 days before they are automatically deleted. You can change this retention period to anywhere between 1 day or 400 days.
When you customize the retention period, it only applies to new artifacts and log files, and does not retroactively apply to existing objects. For managed repositories and organizations, the maximum retention period cannot exceed the limit set by the managing organization or enterprise.
-
In the top-right corner of GitHub Enterprise Server, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Policies.
-
Under " Policies", click Actions.
-
Under Artifact and log retention, enter a new value.
-
Click Save to apply the change.
Enforcing a policy for fork pull requests in your enterprise
You can enforce policies to control how GitHub Actions behaves for your GitHub Enterprise Server instance when members of your enterprise run workflows from forks.
Enforcing a policy for fork pull requests in private repositories
If you rely on using forks of your private repositories, you can configure policies that control how users can run workflows on pull_request
events. Available to private and internal repositories only, you can configure these policy settings for your enterprise, organizations, or repositories.
If a policy is enabled for an enterprise, the policy can be selectively disabled in individual organizations or repositories. If a policy is disabled for an enterprise, individual organizations or repositories cannot enable it.
- Run workflows from fork pull requests - Allows users to run workflows from fork pull requests, using a
GITHUB_TOKEN
with read-only permission, and with no access to secrets. - Send write tokens to workflows from pull requests - Allows pull requests from forks to use a
GITHUB_TOKEN
with write permission. - Send secrets to workflows from pull requests - Makes all secrets available to the pull request.
-
In the top-right corner of GitHub Enterprise Server, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Policies.
-
Under " Policies", click Actions.
-
Under Fork pull request workflows, select your options.
-
Click Save to apply the settings.
Enforcing a policy for workflow permissions in your enterprise
You can set the default permissions granted to the GITHUB_TOKEN
. For more information about the GITHUB_TOKEN
, see "Automatic token authentication." You can choose a restricted set of permissions as the default, or apply permissive settings.
You can set the default permissions for the GITHUB_TOKEN
in the settings for your enterprise, organizations, or repositories. If you choose a restricted option as the default in your enterprise settings, this prevents the more permissive setting being chosen in the organization or repository settings.
Anyone with write access to a repository can modify the permissions granted to the GITHUB_TOKEN
, adding or removing access as required, by editing the permissions
key in the workflow file. For more information, see permissions
.
Configuring the default GITHUB_TOKEN
permissions
-
In the top-right corner of GitHub Enterprise Server, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Policies.
-
Under " Policies", click Actions.
-
Under "Workflow permissions", choose whether you want the
GITHUB_TOKEN
to have read and write access for all scopes (the permissive setting), or just read access for thecontents
scope (the restricted setting). -
Click Save to apply the settings.
Preventing GitHub Actions from creating or approving pull requests
You can choose to allow or prevent GitHub Actions workflows from creating or approving pull requests.
-
In the top-right corner of GitHub Enterprise Server, click your profile photo, then click Enterprise settings.
-
In the enterprise account sidebar, click Policies.
-
Under " Policies", click Actions.
-
Under "Workflow permissions", use the Allow GitHub Actions to create and approve pull requests setting to configure whether
GITHUB_TOKEN
can create and approve pull requests. -
Click Save to apply the settings.
Enforcing a policy for cache storage in your enterprise
By default, the total cache storage that GitHub Actions uses on the external storage for your GitHub Enterprise Server instance is limited to a maximum of 10 GB per repository, and the maximum allowed size that can be set for a repository is 25 GB. If you exceed the limit, GitHub will save the new cache but will begin evicting caches until the total size is less than the repository limit.
However, you can set an enterprise policy to customize both the default total cache size for each repository, as well as the maximum total cache size allowed for a repository. For example, you might want the default total cache size for each repository to be 5 GB, but also allow repository administrators to configure a total cache size up to 15 GB if necessary.
People with admin access to a repository can set a total cache size for their repository up to the maximum cache size allowed by the enterprise policy setting.
The policy settings for GitHub Actions cache storage can currently only be modified using the REST API:
- To view the current enterprise policy settings, see "GitHub Actions Cache."
- To change the enterprise policy settings, see "GitHub Actions Cache."
Note: Unlike other GitHub Actions policy settings, there is no organization-level policy for setting the GitHub Actions cache size. The enterprise policy is applied directly to repositories.