Using service containers
See original GitHub issueI tried out the harden-runner
action (based on this repo) and
with:
egress-policy: audit
and it worked, until I added a PostgreSQL service container to run a few tests. It looks like traffic to that container is blocked? I tried to add
allowed-endpoints: >
localhost:5432 # `postgres:5432` doesn’t work either
but neither of these two worked. It’s a private organization and I don’t have the privileges to install the app to check the egress audit log.
I disabled the step, and all tests pass just fine. How do you recommend to proceed?
Much thanks!
Issue Analytics
- State:
- Created a year ago
- Comments:11 (6 by maintainers)
Top Results From Across the Web
About service containers - GitHub Docs
You can use service containers to connect databases, web services, memory caches, and other tools to your workflow.
Read more >Service Container - The PHP Framework For Web Artisans
The Laravel service container is a powerful tool for managing class dependencies and performing dependency injection. Dependency injection is a fancy phrase ...
Read more >Service Containers - Azure Pipelines & TFS | Microsoft Learn
A service container enables you to automatically create, network, and manage the lifecycle of your containerized service. Each service container ...
Read more >Service Containers | JetBrains Space Documentation
Service containers are additional containers that run along with the main container defined in a step. The main purpose of service ...
Read more >Databases and service containers | Bitbucket Cloud
Pipelines enforces a maximum of 5 service containers per build step. ... tutorial you'll learn how to define a service and how to...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Confirming that the change works.
This is fixed in the latest release
v1.4.5
with tagdd2c410b088af7c0dc8046f3ac9a8f4148492a95
. You should not need any workaround for this to work. We have also added an integration test for it. Here is an example workflow run:https://github.com/harden-runner-canary/postgres-testing/runs/7810960312?check_suite_focus=true#step:9:10 and insights URL: https://app.stepsecurity.io/github/harden-runner-canary/postgres-testing/actions/runs/2848365031