A GitHub action for connecting to Twingate
This action is used to connect your Github workflows to private resources using Twingate Services. Services in Twingate allow applying zero trust permissions to automated components of your network infrastructure. For more information, see our product announcement.
There are two common use cases:
- Enabling access directly to private resources (eg. a database within a public cloud VPC) directly from your workflows without providing network-wide access. This allowed you to implement narrow, revocable access controls on any workflow.
- Enable running GitHub workflows on public runners while having IP restrictions enabled. Supporting this requires routing traffic to
github.com
via a Twingate Connector. More information on how to use Twingate with IP whitelisting is available in our documentation.
- uses: twingate/github-action@v1
with:
# The Twingate Service Key used to connect Twingate to the proper service
# Learn more about [Twingate Services](https://docs.twingate.com/docs/services)
#
# Required
service-key: ${{ secrets.EXAMPLE_SERVICE_KEY_SECRET_NAME }}
To run action locally to debug you can use act
(brew install act
):
act -j test -s SERVICE_KEY --container-options "--cap-add NET_ADMIN --device /dev/net/tun"
It'll ask for SERVICE_KEY
value interactively.
When releasing a new tag (v1.4
for example) we also have to update the latest major version (v1
in this case)
to point to it.
Example steps:
git tag v1.4
git tag v1 -f
git push origin v1 v1.4 -f
gh release create v1.4 --generate-notes --verify-tag
When running steps that run inside a docker container you'll need to override the container's resolv.conf
to remove the 168.63.129.16
and search statement by running the following commands inside the container:
sed '/^nameserver 168.63.129.16$/d; /^search/d' /etc/resolv.conf > /tmp/resolv.conf && cat /tmp/resolv.conf > /etc/resolv.conf
The reason behind this is that on the VM running the Github workflow, Microsoft adds their own nameserver - nameserver 168.63.129.16
- as part of internal logic to health Azure VMs (see details here).
The VM ad logic to only use that nameserver to resolve an internal Azure DNS:
$> resolvectl status
Global
Protocols: -LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported
resolv.conf mode: stub
Link 2 (eth0)
Current Scopes: DNS
Protocols: +DefaultRoute -LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported
Current DNS Server: 168.63.129.16
DNS Servers: 168.63.129.16
DNS Domain: l2n2ciljpwpefjhhlkzs4uiluc.ex.internal.cloudapp.net
Link 3 (docker0)
Current Scopes: none
Protocols: -DefaultRoute -LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported
Link 4 (sdwan0)
Current Scopes: DNS
Protocols: +DefaultRoute -LLMNR -mDNS -DNSOverTLS DNSSEC=no/unsupported
Current DNS Server: 100.95.0.251
DNS Servers: 100.95.0.251 100.95.0.252 100.95.0.253 100.95.0.254
DNS Domain: ~.
However, when running a docker container that address is also copied to its resolv.conf
file but the logic on when to use it is lost.
Depending on the order of nameservers in resolv.conf
- 168.63.129.16
might appear first and override the system's DNS preventing requests from reaching the Twingate Client.
The only workaround is to remove that nameserver from the container's resolv.conf
file (it will never need it anyway as its not an Azure resource).