Area \ Type | GitHub-hosted | Self-hosted |
---|---|---|
Docs | GitHub-hosted | self-hosted |
High-level differences |
|
|
OS support | ubuntu-22/20/18, macOS-12/11/10, windows-2022/2019 | varies based on your expertise in building and packaging VMs or containers to support use cases, requires time and effort to maintain |
Languages | 22+ | varies based on time and effort to provide variety of options and maintain |
Package Managers | 13+ | varies based on time and effort to provide variety of options and maintain |
Tools | 60+ including automation, builders, transformers, cloud CLIs | varies based on time and effort to provide variety of options and maintain |
Libraries | many | varies based on time and effort to provide variety of options and maintain |
Instance Types | varies based on underlying infrastructure and availability | |
Administrative overhead |
|
|
-
-
Save andyfeller/f77c7f1b5bf04e0efb3441d9d80fe085 to your computer and use it in GitHub Desktop.
One thing I've learned here is that folks who have a community edition or code that is open to the public cannot really run self hosted runners due to security risk of untrusted code being run on company networks.
@rafskov : that is definitely one of the big call outs in https://docs.github.com/en/actions/hosting-your-own-runners/managing-self-hosted-runners/about-self-hosted-runners#self-hosted-runner-security
We recommend that you only use self-hosted runners with private repositories. This is because forks of your public repository can potentially run dangerous code on your self-hosted runner machine by creating a pull request that executes the code in a workflow.
Additionally, people should check out https://securitylab.github.com/research/github-actions-preventing-pwn-requests/ for more information that led to the creation of pull_request_target
event
I think the thing we don't capture well is just how many variations of runners are in use for a given customer and just how much is out dated and contain vulnerabilities. We also don't demonstrate the cost of ownership on administrators and users.