Skip to main content

CDK construct to create GitHub Actions self-hosted runners. A webhook listens to events and creates ephemeral runners on the fly.

Project description

GitHub Self-Hosted Runners CDK Constructs

NPM PyPI Maven Central Go Release License

Use this CDK construct to create ephemeral self-hosted GitHub runners on-demand inside your AWS account.

  • Easy to configure GitHub integration
  • Customizable runners with decent defaults
  • Supports multiple runner configurations controlled by labels
  • Everything fully hosted in your account

Self-hosted runners in AWS are useful when:

  • You need easy access to internal resources in your actions
  • You want to pre-install some software for your actions
  • You want to provide some basic AWS API access (aws-actions/configure-aws-credentials has more security controls)

API

See API.md for full interface documentation.

Providers

A runner provider creates compute resources on-demand and uses actions/runner to start a runner.

Provider Time limit vCPUs RAM Storage sudo Docker
CodeBuild 8 hours (default 1 hour) 2 (default), 4, 8, or 72 3gb (default), 7gb, 15gb or 145gb 50gb to 824gb (default 64gb) TBD #1
Fargate Unlimited 0.25 to 4 (default 1) 512mb to 30gb (default 2gb) 20gb to 200gb (default 25gb) TBD #2
Lambda 15 minutes 1 to 6 (default 2) 128mb to 10gb (default 2gb) Up to 10gb (default 10gb)

The best provider to use mostly depends on your current infrastructure. When in doubt, CodeBuild is always a good choice. Execution history and logs are easy to view, and it has no restrictive limits unless you need to run for more than 8 hours.

You can also create your own provider by implementing IRunnerProvider.

Installation

  1. Confirm you're using CDK v2

  2. Install the appropriate package

    1. Python
    2. TypeScript or JavaScript
    3. Java
    4. Go
  3. Use GitHubRunners construct in your code (starting with defaults is fine)

  4. Deploy your stack

  5. Look for the status command output similar to aws --region us-east-1 lambda invoke --function-name status-XYZ123 status.json

  6. Execute the status command (you may need to specify --profile too) and open the resulting status.json file

  7. Setup GitHub integration as an app or with personal access token

  8. Run status command again to confirm github.auth.status and github.webhook.status are OK

  9. Trigger a GitHub action that has a self-hosted label with runs-on: [self-hosted, linux, codebuild] or similar

  10. If the action is not successful, see troubleshooting

Customizing

The default providers configured by GitHubRunners are useful for testing but probably not too much for actual production work. They run in the default VPC or no VPC and have no added IAM permissions. You would usually want to configure the providers yourself.

For example:

import * as cdk from 'aws-cdk-lib';
import { aws_ec2 as ec2, aws_s3 as s3 } from 'aws-cdk-lib';
import { GitHubRunners, CodeBuildRunner } from '@cloudsnorkel/cdk-github-runners';

const app = new cdk.App();
const stack = new cdk.Stack(
  app,
  'github-runners-test',
  {
     env: {
        account: process.env.CDK_DEFAULT_ACCOUNT,
        region: process.env.CDK_DEFAULT_REGION,
     },
  },
);

const vpc = ec2.Vpc.fromLookup(stack, 'vpc', { vpcId: 'vpc-1234567' });
const runnerSg = new ec2.SecurityGroup(stack, 'runner security group', { vpc: vpc });
const dbSg = ec2.SecurityGroup.fromSecurityGroupId(stack, 'database security group', 'sg-1234567');
const bucket = new s3.Bucket(stack, 'runner bucket');

// create a custom CodeBuild provider
const myProvider = new CodeBuildRunner(
  stack, 'codebuild runner',
  {
     label: 'my-codebuild',
     vpc: vpc,
     securityGroup: runnerSg,
  },
);
// grant some permissions to the provider
bucket.grantReadWrite(myProvider);
dbSg.connections.allowFrom(runnerSg, ec2.Port.tcp(3306), 'allow runners to connect to MySQL database');

// create the runner infrastructure
new GitHubRunners(
  stack,
  'runners',
  {
    providers: [myProvider],
    defaultProviderLabel: 'my-codebuild',
  }
);

app.synth();

Architecture

Architecture diagram

Troubleshooting

  1. Always start with the status function, make sure no errors are reported, and confirm all status codes are OK

  2. Confirm the webhook Lambda was called by visiting the URL in troubleshooting.webhookHandlerUrl from status.json

    1. If it's not called or logs errors, confirm the webhook settings on the GitHub side
    2. If you see too many errors, make sure you're only sending workflow_job events
  3. Check execution details of the orchestrator step function by visiting the URL in troubleshooting.stepFunctionUrl from status.json

    1. Use the details tab to find the specific execution of the provider (Lambda, CodeBuild, Fargate, etc.)
    2. Every step function execution should be successful, even if the runner action inside it failed

Other Options

  1. philips-labs/terraform-aws-github-runner if you're using Terraform
  2. actions-runner-controller/actions-runner-controller if you're using Kubernetes

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

cloudsnorkel.cdk-github-runners-0.0.1.tar.gz (1.0 MB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file cloudsnorkel.cdk-github-runners-0.0.1.tar.gz.

File metadata

File hashes

Hashes for cloudsnorkel.cdk-github-runners-0.0.1.tar.gz
Algorithm Hash digest
SHA256 f26d2d3d2f6f81c7f205723c5dcc7a4ab1893a2ee329adbb3df1a5c2cded97e1
MD5 1189d29a70469078d7ea89aee05c1fdf
BLAKE2b-256 21fd33983cde5b7ac2d99db73703c767e83015e9fe0d0b540dc93d88950499f4

See more details on using hashes here.

File details

Details for the file cloudsnorkel.cdk_github_runners-0.0.1-py3-none-any.whl.

File metadata

File hashes

Hashes for cloudsnorkel.cdk_github_runners-0.0.1-py3-none-any.whl
Algorithm Hash digest
SHA256 698a3a2ad2f2e61df7d2d57d4fcf62fca79b8dcba5dcacfc90ceb6f31cc92d6c
MD5 3a25ec7eff034f6161d9486e100a146d
BLAKE2b-256 d38070b7eb487bf9de99dc0be43495c1dd474edf8f02f6972ca3dfe02980c110

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page