Skip to content

Add assumable IAM role for GitHub Actions workflows#40

Merged
kunduso merged 11 commits intomainfrom
iam-role-gh-runner
Aug 23, 2025
Merged

Add assumable IAM role for GitHub Actions workflows#40
kunduso merged 11 commits intomainfrom
iam-role-gh-runner

Conversation

@kunduso
Copy link
Copy Markdown
Collaborator

@kunduso kunduso commented Aug 23, 2025

This PR implements an assumable IAM role architecture that allows GitHub Actions workflows to assume AWS roles with temporary credentials instead of using long-lived access keys.

Changes Made

  • Added github-actions-role.tf with assumable IAM role and trust policy
  • Updated ASG EC2 role with sts:AssumeRole permission
  • Modified user data script to configure AWS CLI with role assumption
  • Updated EFS and SSM configurations for compatibility

Security Benefits

  • Eliminates need for long-lived AWS access keys
  • Uses temporary credentials with 1-hour session duration
  • Follows AWS security best practices for CI/CD

Closes #24

@github-actions
Copy link
Copy Markdown

github-actions Bot commented Aug 23, 2025

💰 Infracost report

Monthly estimate increased by $1 📈

Changed project Baseline cost Usage cost* Total change New monthly cost
kunduso-org/github-self-hosted-...azon-ec2-terraform/TFplan.JSON +$1 - +$1 (+1%) $131

*Usage costs can be estimated by updating Infracost Cloud settings, see docs for other options.

Estimate details
Key: * usage cost, ~ changed, + added, - removed

──────────────────────────────────
Project: kunduso-org/github-self-hosted-runner-amazon-ec2-terraform/TFplan.JSON

+ aws_kms_key.ssm_parameters
  +$1

    + Customer master key
      +$1

    + Requests
      Monthly cost depends on usage
        +$0.03 per 10k requests

    + ECC GenerateDataKeyPair requests
      Monthly cost depends on usage
        +$0.10 per 10k requests

    + RSA GenerateDataKeyPair requests
      Monthly cost depends on usage
        +$0.10 per 10k requests

+ aws_cloudwatch_log_group.github_runner
  Monthly cost depends on usage

    + Data ingested
      Monthly cost depends on usage
        +$0.50 per GB

    + Archival Storage
      Monthly cost depends on usage
        +$0.03 per GB

    + Insights queries data scanned
      Monthly cost depends on usage
        +$0.005 per GB

Monthly cost change for kunduso-org/github-self-hosted-runner-amazon-ec2-terraform/TFplan.JSON
Amount:  +$1 ($130 → $131)
Percent: +1%

──────────────────────────────────
Key: * usage cost, ~ changed, + added, - removed

*Usage costs can be estimated by updating Infracost Cloud settings, see docs for other options.

60 cloud resources were detected:
∙ 11 were estimated
∙ 49 were free

Infracost estimate: Monthly estimate increased by $1 ↑
┏━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━━━┳━━━━━━━━━━━━━┳━━━━━━━━━━━━━━┓
┃ Changed project                                                  ┃ Baseline cost ┃ Usage cost* ┃ Total change ┃
┣━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━╋━━━━━━━━━━━━━━━╋━━━━━━━━━━━━━╋━━━━━━━━━━━━━━┫
┃ kunduso-org/github-self-hosted-...azon-ec2-terraform/TFplan.JSON ┃           +$1 ┃           - ┃    +$1 (+1%) ┃
┗━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━┻━━━━━━━━━━━━━━━┻━━━━━━━━━━━━━┻━━━━━━━━━━━━━━┛
This comment will be updated when code changes.

@github-actions
Copy link
Copy Markdown

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Plan

terraform
aws_security_group.lambda: Refreshing state... [id=sg-09efac711d1a4f657]
aws_iam_role.lambda_deregistration: Refreshing state... [id=github-self-hosted-runner-lambda-deregistration-role]
aws_kms_key_policy.encrypt_ssm: Refreshing state... [id=939dab50-f649-40ed-9372-33b812e93be3]
aws_lambda_function.runner_deregistration: Refreshing state... [id=github-self-hosted-runner-deregistration]
aws_autoscaling_lifecycle_hook.runner_termination: Refreshing state... [id=github-self-hosted-runner-termination-hook]
aws_sqs_queue.dlq: Refreshing state... [id=https://sqs.us-west-2.amazonaws.com/743794601996/github-self-hosted-runner-lambda-dlq]
aws_kms_alias.encrypt_sns: Refreshing state... [id=alias/github-self-hosted-runner-encrypt-sns]
aws_sns_topic_subscription.runner_lifecycle: Refreshing state... [id=arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle:a97e4ab2-5d9f-4f41-b401-fcccb3fae625]
aws_iam_role_policy_attachment.lambda_vpc_execution: Refreshing state... [id=github-self-hosted-runner-lambda-deregistration-role-20250823150045064900000002]
aws_kms_key.encrypt_efs: Refreshing state... [id=57161dac-ea94-435b-bdd4-6bb40a54de92]
aws_iam_role_policy.lifecycle_hook: Refreshing state... [id=github-self-hosted-runner-lifecycle-hook-role:github-self-hosted-runner-lifecycle-hook-policy]
aws_cloudwatch_log_group.github_runner_lifecycle: Refreshing state... [id=/github-self-hosted-runner/lifecycle]
aws_ssm_parameter.deregistration_script: Refreshing state... [id=/github-self-hosted-runner/deregistration-script]
module.vpc.data.aws_availability_zones.available: Reading...
aws_kms_alias.encrypt_lambda: Refreshing state... [id=alias/github-self-hosted-runner-encryption]
aws_iam_role.lifecycle_hook: Refreshing state... [id=github-self-hosted-runner-lifecycle-hook-role]
aws_kms_key.encrypt_ssm: Refreshing state... [id=939dab50-f649-40ed-9372-33b812e93be3]
aws_kms_key_policy.encrypt_lambda: Refreshing state... [id=6df8fd54-93d4-4771-a855-6d8bba252528]
aws_iam_role_policy.lambda_deregistration: Refreshing state... [id=github-self-hosted-runner-lambda-deregistration-role:github-self-hosted-runner-lambda-deregistration-policy]
aws_kms_key.encrypt_lambda: Refreshing state... [id=6df8fd54-93d4-4771-a855-6d8bba252528]
aws_kms_key.encrypt_sns: Refreshing state... [id=79376031-6274-4fe8-8c1b-01ab85054087]
aws_kms_alias.encrypt_efs: Refreshing state... [id=alias/github-self-hosted-runner-encrypt-efs]
module.vpc.data.aws_availability_zones.available: Read complete after 0s [id=us-west-2]
aws_kms_key_policy.encrypt_sns: Refreshing state... [id=79376031-6274-4fe8-8c1b-01ab85054087]
aws_lambda_layer_version.lambda_layer_pyjwt: Refreshing state... [id=arn:aws:lambda:us-west-2:743794601996:layer:pyjwt:7]
aws_lambda_permission.sns_invoke: Refreshing state... [id=AllowExecutionFromSNS]
aws_sns_topic.runner_lifecycle: Refreshing state... [id=arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle]
aws_kms_key_policy.encrypt_efs: Refreshing state... [id=57161dac-ea94-435b-bdd4-6bb40a54de92]
aws_efs_file_system.github_runner_work: Refreshing state... [id=fs-0b55e9a7011bf7c90]
aws_security_group_rule.lambda_egress: Refreshing state... [id=sgrule-3195649409]
aws_kms_alias.encrypt_ssm: Refreshing state... [id=alias/github-self-hosted-runner-encrypt-ssm]
data.aws_caller_identity.current: Reading...
aws_kms_key.cloudwatch_kms_key: Refreshing state... [id=a725a4e2-3f6c-4a07-ac88-25baafbe7b76]
data.aws_caller_identity.current: Read complete after 0s [id=743794601996]
module.vpc.data.aws_iam_policy_document.assume_role: Reading...
module.vpc.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=2717921857]
data.aws_availability_zones.available: Reading...
module.vpc.aws_vpc.this: Refreshing state... [id=vpc-0f94d52581179e6b3]
module.vpc.aws_eip.nat_gateway[0]: Refreshing state... [id=eipalloc-001340df10b3e1b97]
module.vpc.aws_eip.nat_gateway[1]: Refreshing state... [id=eipalloc-0e79188509e4f565a]
module.vpc.aws_kms_key.custom_kms_key[0]: Refreshing state... [id=a3fd4228-613d-487c-89c6-74f2235bdd36]
aws_iam_policy.github_actions_state: Refreshing state... [id=arn:aws:iam::743794601996:policy/github-self-hosted-runner-github-actions-state-policy]
module.vpc.data.aws_caller_identity.current: Reading...
data.aws_availability_zones.available: Read complete after 0s [id=us-west-2]
data.aws_ami.ubuntu: Reading...
aws_iam_role.github_runner: Refreshing state... [id=github-self-hosted-runner-ec2-role]
aws_kms_key.github_runner_secrets: Refreshing state... [id=c77ff6db-241d-4e88-9317-17c07d0ca952]
module.vpc.data.aws_caller_identity.current: Read complete after 0s [id=743794601996]
data.aws_iam_policy_document.ssm_kms: Reading...
data.aws_iam_policy_document.ssm_kms: Read complete after 0s [id=3292091877]
module.vpc.aws_iam_role.vpc_flow_log_role[0]: Refreshing state... [id=github-self-hosted-runner-vpc-flow-role]
aws_iam_instance_profile.github_runner: Refreshing state... [id=github-self-hosted-runner-ec2-profile]
aws_iam_role_policy_attachment.ssm: Refreshing state... [id=github-self-hosted-runner-ec2-role-20250823150037802000000001]
aws_iam_role.github_actions_runner: Refreshing state... [id=github-self-hosted-runner-github-actions-runner-role]
aws_kms_key_policy.encrypt_cloudwatch: Refreshing state... [id=a725a4e2-3f6c-4a07-ac88-25baafbe7b76]
aws_kms_alias.key: Refreshing state... [id=alias/github-self-hosted-runner]
aws_iam_policy.cloudwatch_logs: Refreshing state... [id=arn:aws:iam::743794601996:policy/github-self-hosted-runner-cloudwatch-logs-policy]
module.vpc.aws_kms_key_policy.encrypt_log[0]: Refreshing state... [id=a3fd4228-613d-487c-89c6-74f2235bdd36]
module.vpc.aws_kms_alias.key[0]: Refreshing state... [id=alias/github-self-hosted-runner-encrypt-flow-log]
module.vpc.aws_cloudwatch_log_group.network_flow_logging[0]: Refreshing state... [id=github-self-hosted-runner-flow-logs]
aws_iam_role_policy_attachment.github_actions_admin: Refreshing state... [id=github-self-hosted-runner-github-actions-runner-role-20250823150045535900000004]
aws_iam_role_policy_attachment.github_actions_state: Refreshing state... [id=github-self-hosted-runner-github-actions-runner-role-20250823150045310200000003]
aws_iam_role_policy_attachment.cloudwatch_logs: Refreshing state... [id=github-self-hosted-runner-ec2-role-20250823150055004200000007]
aws_kms_alias.github_runner_secrets: Refreshing state... [id=alias/github-self-hosted-runner-secret]
aws_kms_key_policy.encrypt_secret: Refreshing state... [id=c77ff6db-241d-4e88-9317-17c07d0ca952]
aws_secretsmanager_secret.github_runner_credentials: Refreshing state... [id=arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo]
data.aws_ami.ubuntu: Read complete after 0s [id=ami-065778886ef8ec7c8]
module.vpc.data.aws_iam_policy_document.vpc_flow_log_policy_document[0]: Reading...
module.vpc.data.aws_iam_policy_document.vpc_flow_log_policy_document[0]: Read complete after 0s [id=54070053]
module.vpc.aws_iam_role_policy.vpc_flow_log_role_policy[0]: Refreshing state... [id=github-self-hosted-runner-vpc-flow-role:github-self-hosted-runner-vpc-flow-policy]
aws_iam_policy.github_runner: Refreshing state... [id=arn:aws:iam::743794601996:policy/github-self-hosted-runner-ec2-policy]
aws_secretsmanager_secret_version.github_runner_credentials: Refreshing state... [id=arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo|terraform-20250823150048623300000006]
aws_iam_role_policy_attachment.github_runner: Refreshing state... [id=github-self-hosted-runner-ec2-role-2025082315011670590000000c]
module.vpc.aws_default_security_group.default: Refreshing state... [id=sg-059fed260f3f7d461]
module.vpc.aws_route_table.private[1]: Refreshing state... [id=rtb-044fac8abc330694a]
module.vpc.aws_flow_log.network_flow_logging[0]: Refreshing state... [id=fl-0ea1bdd10867b211d]
module.vpc.aws_internet_gateway.this_igw[0]: Refreshing state... [id=igw-0a0d939ec05e85391]
module.vpc.aws_subnet.private[0]: Refreshing state... [id=subnet-0da9beaf2e436c556]
module.vpc.aws_subnet.public[0]: Refreshing state... [id=subnet-0febf2c2af76e2c79]
module.vpc.aws_route_table.public[0]: Refreshing state... [id=rtb-03bf97d42f9a82730]
module.vpc.aws_route_table.private[0]: Refreshing state... [id=rtb-09d2063d896d96860]
module.vpc.aws_subnet.public[1]: Refreshing state... [id=subnet-09651f70f6184babe]
aws_security_group.github_runner: Refreshing state... [id=sg-079a81840121b7da7]
module.vpc.aws_subnet.private[1]: Refreshing state... [id=subnet-03e1ed051e9e071c1]
aws_security_group.efs: Refreshing state... [id=sg-024a1e389c84b48ea]
aws_security_group_rule.github_runner_egress: Refreshing state... [id=sgrule-3110254434]
aws_launch_template.github_runner: Refreshing state... [id=lt-0fc3f2cf8d3ca7905]
module.vpc.aws_route.internet_route[0]: Refreshing state... [id=r-rtb-03bf97d42f9a827301080289494]
module.vpc.aws_nat_gateway.public[1]: Refreshing state... [id=nat-0a26d68751d3c1b6f]
module.vpc.aws_nat_gateway.public[0]: Refreshing state... [id=nat-0f2a89d17c306f450]
aws_security_group_rule.efs_ingress: Refreshing state... [id=sgrule-1720110692]
module.vpc.aws_route_table_association.public[1]: Refreshing state... [id=rtbassoc-0d7d71401df749b1a]
module.vpc.aws_route_table_association.public[0]: Refreshing state... [id=rtbassoc-0ef5f4bbe527d85a1]
module.vpc.aws_route_table_association.private[0]: Refreshing state... [id=rtbassoc-03caad7157f63b8cd]
module.vpc.aws_route_table_association.private[1]: Refreshing state... [id=rtbassoc-028d25a5848086fff]
aws_efs_mount_target.github_runner_work[1]: Refreshing state... [id=fsmt-080b547fe91291e3b]
aws_efs_mount_target.github_runner_work[0]: Refreshing state... [id=fsmt-06593fb53f8c2522f]
module.vpc.aws_route.private_route[0]: Refreshing state... [id=r-rtb-09d2063d896d968601080289494]
module.vpc.aws_route.private_route[1]: Refreshing state... [id=r-rtb-044fac8abc330694a1080289494]
aws_ssm_parameter.nat_gateway_public_ips: Refreshing state... [id=/github-self-hosted-runner-ip-address]
aws_autoscaling_group.github_runner: Refreshing state... [id=github-self-hosted-runner-asg]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
  ~ update in-place
  - destroy
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_autoscaling_group.github_runner will be updated in-place
  ~ resource "aws_autoscaling_group" "github_runner" {
        id                               = "github-self-hosted-runner-asg"
        name                             = "github-self-hosted-runner-asg"
        # (31 unchanged attributes hidden)

      ~ launch_template {
            id      = "lt-0fc3f2cf8d3ca7905"
            name    = "github-self-hosted-runner2025082315022253420000000f"
          ~ version = "3" -> (known after apply)
        }

        # (3 unchanged blocks hidden)
    }

  # aws_autoscaling_lifecycle_hook.runner_termination will be destroyed
  # (because aws_autoscaling_lifecycle_hook.runner_termination is not in configuration)
  - resource "aws_autoscaling_lifecycle_hook" "runner_termination" {
      - autoscaling_group_name  = "github-self-hosted-runner-asg" -> null
      - default_result          = "ABANDON" -> null
      - heartbeat_timeout       = 300 -> null
      - id                      = "github-self-hosted-runner-termination-hook" -> null
      - lifecycle_transition    = "autoscaling:EC2_INSTANCE_TERMINATING" -> null
      - name                    = "github-self-hosted-runner-termination-hook" -> null
      - notification_target_arn = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle" -> null
      - role_arn                = "arn:aws:iam::743794601996:role/github-self-hosted-runner-lifecycle-hook-role" -> null
        # (1 unchanged attribute hidden)
    }

  # aws_cloudwatch_log_group.github_runner will be created
  + resource "aws_cloudwatch_log_group" "github_runner" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + kms_key_id        = "arn:aws:kms:us-west-2:743794601996:key/a725a4e2-3f6c-4a07-ac88-25baafbe7b76"
      + log_group_class   = (known after apply)
      + name              = "/github-runner/github-self-hosted-runner/log"
      + name_prefix       = (known after apply)
      + retention_in_days = 365
      + skip_destroy      = false
      + tags              = {
          + "Name" = "github-self-hosted-runner-logs"
        }
      + tags_all          = {
          + "Name"   = "github-self-hosted-runner-logs"
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
    }

  # aws_cloudwatch_log_group.github_runner_lifecycle will be destroyed
  # (because aws_cloudwatch_log_group.github_runner_lifecycle is not in configuration)
  - resource "aws_cloudwatch_log_group" "github_runner_lifecycle" {
      - arn               = "arn:aws:logs:us-west-2:743794601996:log-group:/github-self-hosted-runner/lifecycle" -> null
      - id                = "/github-self-hosted-runner/lifecycle" -> null
      - kms_key_id        = "arn:aws:kms:us-west-2:743794601996:key/a725a4e2-3f6c-4a07-ac88-25baafbe7b76" -> null
      - log_group_class   = "STANDARD" -> null
      - name              = "/github-self-hosted-runner/lifecycle" -> null
      - retention_in_days = 365 -> null
      - skip_destroy      = false -> null
      - tags              = {
          - "Name" = "github-self-hosted-runner-lifecycle-logs"
        } -> null
      - tags_all          = {
          - "Name"   = "github-self-hosted-runner-lifecycle-logs"
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
        # (1 unchanged attribute hidden)
    }

  # aws_iam_policy.cloudwatch_logs will be updated in-place
  ~ resource "aws_iam_policy" "cloudwatch_logs" {
        id               = "arn:aws:iam::743794601996:policy/github-self-hosted-runner-cloudwatch-logs-policy"
        name             = "github-self-hosted-runner-cloudwatch-logs-policy"
      ~ policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "logs:CreateLogGroup",
                          - "logs:CreateLogStream",
                          - "logs:PutLogEvents",
                          - "logs:DescribeLogStreams",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:logs:us-west-2:743794601996:log-group:/github-self-hosted-runner/lifecycle",
                          - "arn:aws:logs:us-west-2:743794601996:log-group:/github-self-hosted-runner/lifecycle:*",
                        ]
                    },
                  - {
                      - Action   = [
                          - "kms:Encrypt",
                          - "kms:Decrypt",
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:DescribeKey",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:kms:us-west-2:743794601996:key/a725a4e2-3f6c-4a07-ac88-25baafbe7b76"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> (known after apply)
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # aws_iam_policy.github_runner will be updated in-place
  ~ resource "aws_iam_policy" "github_runner" {
        id               = "arn:aws:iam::743794601996:policy/github-self-hosted-runner-ec2-policy"
        name             = "github-self-hosted-runner-ec2-policy"
      ~ policy           = jsonencode(
          ~ {
              ~ Statement = [
                    # (3 unchanged elements hidden)
                    {
                        Action   = [
                            "sts:AssumeRole",
                        ]
                        Effect   = "Allow"
                        Resource = "arn:aws:iam::743794601996:role/github-self-hosted-runner-github-actions-runner-role"
                    },
                  - {
                      - Action   = [
                          - "ssm:GetParameter",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:ssm:us-west-2:743794601996:parameter/github-self-hosted-runner/deregistration-script"
                    },
                  - {
                      - Action   = [
                          - "kms:Decrypt",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:kms:us-west-2:743794601996:key/939dab50-f649-40ed-9372-33b812e93be3"
                    },
                  - {
                      - Action   = [
                          - "kms:Decrypt",
                          - "kms:DescribeKey",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:kms:us-west-2:743794601996:key/57161dac-ea94-435b-bdd4-6bb40a54de92"
                    },
                ]
                # (1 unchanged attribute hidden)
            }
        )
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # aws_iam_role.lambda_deregistration will be destroyed
  # (because aws_iam_role.lambda_deregistration is not in configuration)
  - resource "aws_iam_role" "lambda_deregistration" {
      - arn                   = "arn:aws:iam::743794601996:role/github-self-hosted-runner-lambda-deregistration-role" -> null
      - assume_role_policy    = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "sts:AssumeRole"
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "lambda.amazonaws.com"
                        }
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - create_date           = "2025-08-23T15:00:37Z" -> null
      - force_detach_policies = false -> null
      - id                    = "github-self-hosted-runner-lambda-deregistration-role" -> null
      - managed_policy_arns   = [
          - "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole",
        ] -> null
      - max_session_duration  = 3600 -> null
      - name                  = "github-self-hosted-runner-lambda-deregistration-role" -> null
      - path                  = "/" -> null
      - tags                  = {} -> null
      - tags_all              = {
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
      - unique_id             = "AROA22LM46AGKJSCOHWPS" -> null
        # (3 unchanged attributes hidden)

      - inline_policy {
          - name   = "github-self-hosted-runner-lambda-deregistration-policy" -> null
          - policy = jsonencode(
                {
                  - Statement = [
                      - {
                          - Action   = [
                              - "logs:CreateLogGroup",
                              - "logs:CreateLogStream",
                              - "logs:PutLogEvents",
                              - "logs:DescribeLogStreams",
                            ]
                          - Effect   = "Allow"
                          - Resource = "arn:aws:logs:us-west-2:*:*"
                        },
                      - {
                          - Action   = [
                              - "secretsmanager:GetSecretValue",
                            ]
                          - Effect   = "Allow"
                          - Resource = [
                              - "arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo",
                            ]
                        },
                      - {
                          - Action   = [
                              - "kms:Decrypt",
                            ]
                          - Effect   = "Allow"
                          - Resource = "arn:aws:kms:us-west-2:743794601996:key/c77ff6db-241d-4e88-9317-17c07d0ca952"
                        },
                      - {
                          - Action   = [
                              - "logs:CreateLogStream",
                              - "logs:PutLogEvents",
                            ]
                          - Effect   = "Allow"
                          - Resource = [
                              - "arn:aws:logs:us-west-2:743794601996:log-group:/github-self-hosted-runner/lifecycle:*",
                            ]
                        },
                      - {
                          - Action   = [
                              - "autoscaling:CompleteLifecycleAction",
                            ]
                          - Effect   = "Allow"
                          - Resource = [
                              - "arn:aws:autoscaling:us-west-2:743794601996:autoScalingGroup:6901c764-d51d-4900-af39-78d2e1ba7311:autoScalingGroupName/github-self-hosted-runner-asg",
                            ]
                        },
                      - {
                          - Action   = [
                              - "sqs:SendMessage",
                            ]
                          - Effect   = "Allow"
                          - Resource = [
                              - "arn:aws:sqs:us-west-2:743794601996:github-self-hosted-runner-lambda-dlq",
                            ]
                        },
                    ]
                  - Version   = "2012-10-17"
                }
            ) -> null
        }
    }

  # aws_iam_role.lifecycle_hook will be destroyed
  # (because aws_iam_role.lifecycle_hook is not in configuration)
  - resource "aws_iam_role" "lifecycle_hook" {
      - arn                   = "arn:aws:iam::743794601996:role/github-self-hosted-runner-lifecycle-hook-role" -> null
      - assume_role_policy    = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "sts:AssumeRole"
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "autoscaling.amazonaws.com"
                        }
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - create_date           = "2025-08-23T15:00:36Z" -> null
      - force_detach_policies = false -> null
      - id                    = "github-self-hosted-runner-lifecycle-hook-role" -> null
      - managed_policy_arns   = [] -> null
      - max_session_duration  = 3600 -> null
      - name                  = "github-self-hosted-runner-lifecycle-hook-role" -> null
      - path                  = "/" -> null
      - tags                  = {} -> null
      - tags_all              = {
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
      - unique_id             = "AROA22LM46AGFSTBWZ6AZ" -> null
        # (3 unchanged attributes hidden)

      - inline_policy {
          - name   = "github-self-hosted-runner-lifecycle-hook-policy" -> null
          - policy = jsonencode(
                {
                  - Statement = [
                      - {
                          - Action   = [
                              - "sns:Publish",
                            ]
                          - Effect   = "Allow"
                          - Resource = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle"
                        },
                      - {
                          - Action   = [
                              - "kms:Encrypt*",
                              - "kms:Decrypt*",
                              - "kms:ReEncrypt*",
                              - "kms:GenerateDataKey*",
                              - "kms:Describe*",
                            ]
                          - Effect   = "Allow"
                          - Resource = "arn:aws:kms:us-west-2:743794601996:key/79376031-6274-4fe8-8c1b-01ab85054087"
                        },
                    ]
                  - Version   = "2012-10-17"
                }
            ) -> null
        }
    }

  # aws_iam_role_policy.lambda_deregistration will be destroyed
  # (because aws_iam_role_policy.lambda_deregistration is not in configuration)
  - resource "aws_iam_role_policy" "lambda_deregistration" {
      - id          = "github-self-hosted-runner-lambda-deregistration-role:github-self-hosted-runner-lambda-deregistration-policy" -> null
      - name        = "github-self-hosted-runner-lambda-deregistration-policy" -> null
      - policy      = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "logs:CreateLogGroup",
                          - "logs:CreateLogStream",
                          - "logs:PutLogEvents",
                          - "logs:DescribeLogStreams",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:logs:us-west-2:*:*"
                    },
                  - {
                      - Action   = [
                          - "secretsmanager:GetSecretValue",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo",
                        ]
                    },
                  - {
                      - Action   = [
                          - "kms:Decrypt",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:kms:us-west-2:743794601996:key/c77ff6db-241d-4e88-9317-17c07d0ca952"
                    },
                  - {
                      - Action   = [
                          - "logs:CreateLogStream",
                          - "logs:PutLogEvents",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:logs:us-west-2:743794601996:log-group:/github-self-hosted-runner/lifecycle:*",
                        ]
                    },
                  - {
                      - Action   = [
                          - "autoscaling:CompleteLifecycleAction",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:autoscaling:us-west-2:743794601996:autoScalingGroup:6901c764-d51d-4900-af39-78d2e1ba7311:autoScalingGroupName/github-self-hosted-runner-asg",
                        ]
                    },
                  - {
                      - Action   = [
                          - "sqs:SendMessage",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:sqs:us-west-2:743794601996:github-self-hosted-runner-lambda-dlq",
                        ]
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - role        = "github-self-hosted-runner-lambda-deregistration-role" -> null
        # (1 unchanged attribute hidden)
    }

  # aws_iam_role_policy.lifecycle_hook will be destroyed
  # (because aws_iam_role_policy.lifecycle_hook is not in configuration)
  - resource "aws_iam_role_policy" "lifecycle_hook" {
      - id          = "github-self-hosted-runner-lifecycle-hook-role:github-self-hosted-runner-lifecycle-hook-policy" -> null
      - name        = "github-self-hosted-runner-lifecycle-hook-policy" -> null
      - policy      = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "sns:Publish",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle"
                    },
                  - {
                      - Action   = [
                          - "kms:Encrypt*",
                          - "kms:Decrypt*",
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:Describe*",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:kms:us-west-2:743794601996:key/79376031-6274-4fe8-8c1b-01ab85054087"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - role        = "github-self-hosted-runner-lifecycle-hook-role" -> null
        # (1 unchanged attribute hidden)
    }

  # aws_iam_role_policy_attachment.lambda_vpc_execution will be destroyed
  # (because aws_iam_role_policy_attachment.lambda_vpc_execution is not in configuration)
  - resource "aws_iam_role_policy_attachment" "lambda_vpc_execution" {
      - id         = "github-self-hosted-runner-lambda-deregistration-role-20250823150045064900000002" -> null
      - policy_arn = "arn:aws:iam::aws:policy/service-role/AWSLambdaVPCAccessExecutionRole" -> null
      - role       = "github-self-hosted-runner-lambda-deregistration-role" -> null
    }

  # aws_kms_alias.encrypt_efs will be destroyed
  # (because aws_kms_alias.encrypt_efs is not in configuration)
  - resource "aws_kms_alias" "encrypt_efs" {
      - arn            = "arn:aws:kms:us-west-2:743794601996:alias/github-self-hosted-runner-encrypt-efs" -> null
      - id             = "alias/github-self-hosted-runner-encrypt-efs" -> null
      - name           = "alias/github-self-hosted-runner-encrypt-efs" -> null
      - target_key_arn = "arn:aws:kms:us-west-2:743794601996:key/57161dac-ea94-435b-bdd4-6bb40a54de92" -> null
      - target_key_id  = "57161dac-ea94-435b-bdd4-6bb40a54de92" -> null
        # (1 unchanged attribute hidden)
    }

  # aws_kms_alias.encrypt_lambda will be destroyed
  # (because aws_kms_alias.encrypt_lambda is not in configuration)
  - resource "aws_kms_alias" "encrypt_lambda" {
      - arn            = "arn:aws:kms:us-west-2:743794601996:alias/github-self-hosted-runner-encryption" -> null
      - id             = "alias/github-self-hosted-runner-encryption" -> null
      - name           = "alias/github-self-hosted-runner-encryption" -> null
      - target_key_arn = "arn:aws:kms:us-west-2:743794601996:key/6df8fd54-93d4-4771-a855-6d8bba252528" -> null
      - target_key_id  = "6df8fd54-93d4-4771-a855-6d8bba252528" -> null
        # (1 unchanged attribute hidden)
    }

  # aws_kms_alias.encrypt_sns will be destroyed
  # (because aws_kms_alias.encrypt_sns is not in configuration)
  - resource "aws_kms_alias" "encrypt_sns" {
      - arn            = "arn:aws:kms:us-west-2:743794601996:alias/github-self-hosted-runner-encrypt-sns" -> null
      - id             = "alias/github-self-hosted-runner-encrypt-sns" -> null
      - name           = "alias/github-self-hosted-runner-encrypt-sns" -> null
      - target_key_arn = "arn:aws:kms:us-west-2:743794601996:key/79376031-6274-4fe8-8c1b-01ab85054087" -> null
      - target_key_id  = "79376031-6274-4fe8-8c1b-01ab85054087" -> null
        # (1 unchanged attribute hidden)
    }

  # aws_kms_alias.encrypt_ssm will be destroyed
  # (because aws_kms_alias.encrypt_ssm is not in configuration)
  - resource "aws_kms_alias" "encrypt_ssm" {
      - arn            = "arn:aws:kms:us-west-2:743794601996:alias/github-self-hosted-runner-encrypt-ssm" -> null
      - id             = "alias/github-self-hosted-runner-encrypt-ssm" -> null
      - name           = "alias/github-self-hosted-runner-encrypt-ssm" -> null
      - target_key_arn = "arn:aws:kms:us-west-2:743794601996:key/939dab50-f649-40ed-9372-33b812e93be3" -> null
      - target_key_id  = "939dab50-f649-40ed-9372-33b812e93be3" -> null
        # (1 unchanged attribute hidden)
    }

  # aws_kms_alias.ssm_parameters will be created
  + resource "aws_kms_alias" "ssm_parameters" {
      + arn            = (known after apply)
      + id             = (known after apply)
      + name           = "alias/github-self-hosted-runner-ssm"
      + name_prefix    = (known after apply)
      + target_key_arn = (known after apply)
      + target_key_id  = (known after apply)
    }

  # aws_kms_key.encrypt_efs will be destroyed
  # (because aws_kms_key.encrypt_efs is not in configuration)
  - resource "aws_kms_key" "encrypt_efs" {
      - arn                                = "arn:aws:kms:us-west-2:743794601996:key/57161dac-ea94-435b-bdd4-6bb40a54de92" -> null
      - bypass_policy_lockout_safety_check = false -> null
      - customer_master_key_spec           = "SYMMETRIC_DEFAULT" -> null
      - deletion_window_in_days            = 7 -> null
      - description                        = "Key to encrypt EFS file system in github-self-hosted-runner." -> null
      - enable_key_rotation                = true -> null
      - id                                 = "57161dac-ea94-435b-bdd4-6bb40a54de92" -> null
      - is_enabled                         = true -> null
      - key_id                             = "57161dac-ea94-435b-bdd4-6bb40a54de92" -> null
      - key_usage                          = "ENCRYPT_DECRYPT" -> null
      - multi_region                       = false -> null
      - policy                             = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "kms:*"
                      - Effect    = "Allow"
                      - Principal = {
                          - AWS = "arn:aws:iam::743794601996:root"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/57161dac-ea94-435b-bdd4-6bb40a54de92"
                      - Sid       = "Enable full access for root account"
                    },
                  - {
                      - Action    = [
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:Encrypt",
                          - "kms:DescribeKey",
                          - "kms:Decrypt",
                        ]
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "elasticfilesystem.amazonaws.com"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/57161dac-ea94-435b-bdd4-6bb40a54de92"
                      - Sid       = "Allow EFS service"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - rotation_period_in_days            = 365 -> null
      - tags                               = {} -> null
      - tags_all                           = {
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
        # (2 unchanged attributes hidden)
    }

  # aws_kms_key.encrypt_lambda will be destroyed
  # (because aws_kms_key.encrypt_lambda is not in configuration)
  - resource "aws_kms_key" "encrypt_lambda" {
      - arn                                = "arn:aws:kms:us-west-2:743794601996:key/6df8fd54-93d4-4771-a855-6d8bba252528" -> null
      - bypass_policy_lockout_safety_check = false -> null
      - customer_master_key_spec           = "SYMMETRIC_DEFAULT" -> null
      - deletion_window_in_days            = 7 -> null
      - description                        = "Key to encrypt the lambda resource in github-self-hosted-runner." -> null
      - enable_key_rotation                = true -> null
      - id                                 = "6df8fd54-93d4-4771-a855-6d8bba252528" -> null
      - is_enabled                         = true -> null
      - key_id                             = "6df8fd54-93d4-4771-a855-6d8bba252528" -> null
      - key_usage                          = "ENCRYPT_DECRYPT" -> null
      - multi_region                       = false -> null
      - policy                             = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = [
                          - "kms:Update*",
                          - "kms:UntagResource",
                          - "kms:TagResource",
                          - "kms:ScheduleKeyDeletion",
                          - "kms:Revoke*",
                          - "kms:ReEncrypt*",
                          - "kms:Put*",
                          - "kms:List*",
                          - "kms:Get*",
                          - "kms:GenerateDataKey*",
                          - "kms:Encrypt",
                          - "kms:Enable*",
                          - "kms:Disable*",
                          - "kms:DescribeKey",
                          - "kms:Delete*",
                          - "kms:Decrypt",
                          - "kms:Create*",
                          - "kms:CancelKeyDeletion",
                        ]
                      - Effect    = "Allow"
                      - Principal = {
                          - AWS = "arn:aws:iam::743794601996:root"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/6df8fd54-93d4-4771-a855-6d8bba252528"
                      - Sid       = "Enable IAM User Permissions"
                    },
                  - {
                      - Action    = [
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:Encrypt",
                          - "kms:DescribeKey",
                          - "kms:Decrypt",
                          - "kms:CreateGrant",
                        ]
                      - Condition = {
                          - StringEquals = {
                              - "aws:RequestedRegion"                      = "us-west-2"
                              - "kms:EncryptionContext:LambdaFunctionName" = "github-self-hosted-runner"
                            }
                        }
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "lambda.amazonaws.com"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/6df8fd54-93d4-4771-a855-6d8bba252528"
                      - Sid       = "Allow Lambda to use the key"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - rotation_period_in_days            = 365 -> null
      - tags                               = {} -> null
      - tags_all                           = {
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
        # (2 unchanged attributes hidden)
    }

  # aws_kms_key.encrypt_sns will be destroyed
  # (because aws_kms_key.encrypt_sns is not in configuration)
  - resource "aws_kms_key" "encrypt_sns" {
      - arn                                = "arn:aws:kms:us-west-2:743794601996:key/79376031-6274-4fe8-8c1b-01ab85054087" -> null
      - bypass_policy_lockout_safety_check = false -> null
      - customer_master_key_spec           = "SYMMETRIC_DEFAULT" -> null
      - deletion_window_in_days            = 7 -> null
      - description                        = "Key to encrypt SNS topic in github-self-hosted-runner." -> null
      - enable_key_rotation                = true -> null
      - id                                 = "79376031-6274-4fe8-8c1b-01ab85054087" -> null
      - is_enabled                         = true -> null
      - key_id                             = "79376031-6274-4fe8-8c1b-01ab85054087" -> null
      - key_usage                          = "ENCRYPT_DECRYPT" -> null
      - multi_region                       = false -> null
      - policy                             = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "kms:*"
                      - Effect    = "Allow"
                      - Principal = {
                          - AWS = "arn:aws:iam::743794601996:root"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/79376031-6274-4fe8-8c1b-01ab85054087"
                      - Sid       = "Enable full access for root account"
                    },
                  - {
                      - Action    = [
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:Encrypt",
                          - "kms:DescribeKey",
                          - "kms:Decrypt",
                        ]
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "sns.amazonaws.com"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/79376031-6274-4fe8-8c1b-01ab85054087"
                      - Sid       = "Allow AWS services"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - rotation_period_in_days            = 365 -> null
      - tags                               = {} -> null
      - tags_all                           = {
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
        # (2 unchanged attributes hidden)
    }

  # aws_kms_key.encrypt_ssm will be destroyed
  # (because aws_kms_key.encrypt_ssm is not in configuration)
  - resource "aws_kms_key" "encrypt_ssm" {
      - arn                                = "arn:aws:kms:us-west-2:743794601996:key/939dab50-f649-40ed-9372-33b812e93be3" -> null
      - bypass_policy_lockout_safety_check = false -> null
      - customer_master_key_spec           = "SYMMETRIC_DEFAULT" -> null
      - deletion_window_in_days            = 7 -> null
      - description                        = "Key to encrypt the ssm resource in github-self-hosted-runner." -> null
      - enable_key_rotation                = true -> null
      - id                                 = "939dab50-f649-40ed-9372-33b812e93be3" -> null
      - is_enabled                         = true -> null
      - key_id                             = "939dab50-f649-40ed-9372-33b812e93be3" -> null
      - key_usage                          = "ENCRYPT_DECRYPT" -> null
      - multi_region                       = false -> null
      - policy                             = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "kms:*"
                      - Effect    = "Allow"
                      - Principal = {
                          - AWS = "arn:aws:iam::743794601996:root"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/939dab50-f649-40ed-9372-33b812e93be3"
                      - Sid       = "Enable IAM User Permissions"
                    },
                  - {
                      - Action    = [
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey",
                          - "kms:Encrypt",
                          - "kms:DescribeKey",
                          - "kms:Decrypt",
                        ]
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "ssm.amazonaws.com"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/939dab50-f649-40ed-9372-33b812e93be3"
                      - Sid       = "Allow SSM Service"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
      - rotation_period_in_days            = 365 -> null
      - tags                               = {} -> null
      - tags_all                           = {
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
        # (2 unchanged attributes hidden)
    }

  # aws_kms_key.ssm_parameters will be created
  + resource "aws_kms_key" "ssm_parameters" {
      + arn                                = (known after apply)
      + bypass_policy_lockout_safety_check = false
      + customer_master_key_spec           = "SYMMETRIC_DEFAULT"
      + deletion_window_in_days            = 7
      + description                        = "KMS key for SSM parameter encryption"
      + enable_key_rotation                = true
      + id                                 = (known after apply)
      + is_enabled                         = true
      + key_id                             = (known after apply)
      + key_usage                          = "ENCRYPT_DECRYPT"
      + multi_region                       = (known after apply)
      + policy                             = jsonencode(
            {
              + Statement = [
                  + {
                      + Action    = "kms:*"
                      + Effect    = "Allow"
                      + Principal = {
                          + AWS = "arn:aws:iam::743794601996:root"
                        }
                      + Resource  = "*"
                      + Sid       = "Enable IAM User Permissions"
                    },
                  + {
                      + Action    = [
                          + "kms:ReEncrypt*",
                          + "kms:GenerateDataKey",
                          + "kms:Encrypt",
                          + "kms:DescribeKey",
                          + "kms:Decrypt",
                        ]
                      + Effect    = "Allow"
                      + Principal = {
                          + Service = "ssm.amazonaws.com"
                        }
                      + Resource  = "*"
                      + Sid       = "Allow SSM Service"
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + rotation_period_in_days            = (known after apply)
      + tags_all                           = {
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
    }

  # aws_kms_key_policy.encrypt_cloudwatch will be updated in-place
  ~ resource "aws_kms_key_policy" "encrypt_cloudwatch" {
        id                                 = "a725a4e2-3f6c-4a07-ac88-25baafbe7b76"
      ~ policy                             = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action    = "kms:*"
                        Effect    = "Allow"
                        Principal = {
                            AWS = "arn:aws:iam::743794601996:root"
                        }
                        Resource  = "*"
                        Sid       = "Enable IAM User Permissions"
                    },
                  ~ {
                      ~ Condition = {
                          ~ ArnEquals = {
                              ~ "kms:EncryptionContext:aws:logs:arn" = [
                                  ~ "arn:aws:logs:us-west-2:743794601996:log-group:/github-self-hosted-runner/lifecycle" -> "arn:aws:logs:us-west-2:743794601996:log-group:/github-runner/github-self-hosted-runner/log",
                                ]
                            }
                        }
                        # (4 unchanged attributes hidden)
                    },
                ]
                # (2 unchanged attributes hidden)
            }
        )
        # (2 unchanged attributes hidden)
    }

  # aws_kms_key_policy.encrypt_efs will be destroyed
  # (because aws_kms_key_policy.encrypt_efs is not in configuration)
  - resource "aws_kms_key_policy" "encrypt_efs" {
      - bypass_policy_lockout_safety_check = false -> null
      - id                                 = "57161dac-ea94-435b-bdd4-6bb40a54de92" -> null
      - key_id                             = "57161dac-ea94-435b-bdd4-6bb40a54de92" -> null
      - policy                             = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "kms:*"
                      - Effect    = "Allow"
                      - Principal = {
                          - AWS = "arn:aws:iam::743794601996:root"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/57161dac-ea94-435b-bdd4-6bb40a54de92"
                      - Sid       = "Enable full access for root account"
                    },
                  - {
                      - Action    = [
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:Encrypt",
                          - "kms:DescribeKey",
                          - "kms:Decrypt",
                        ]
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "elasticfilesystem.amazonaws.com"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/57161dac-ea94-435b-bdd4-6bb40a54de92"
                      - Sid       = "Allow EFS service"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
    }

  # aws_kms_key_policy.encrypt_lambda will be destroyed
  # (because aws_kms_key_policy.encrypt_lambda is not in configuration)
  - resource "aws_kms_key_policy" "encrypt_lambda" {
      - bypass_policy_lockout_safety_check = false -> null
      - id                                 = "6df8fd54-93d4-4771-a855-6d8bba252528" -> null
      - key_id                             = "6df8fd54-93d4-4771-a855-6d8bba252528" -> null
      - policy                             = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = [
                          - "kms:Update*",
                          - "kms:UntagResource",
                          - "kms:TagResource",
                          - "kms:ScheduleKeyDeletion",
                          - "kms:Revoke*",
                          - "kms:ReEncrypt*",
                          - "kms:Put*",
                          - "kms:List*",
                          - "kms:Get*",
                          - "kms:GenerateDataKey*",
                          - "kms:Encrypt",
                          - "kms:Enable*",
                          - "kms:Disable*",
                          - "kms:DescribeKey",
                          - "kms:Delete*",
                          - "kms:Decrypt",
                          - "kms:Create*",
                          - "kms:CancelKeyDeletion",
                        ]
                      - Effect    = "Allow"
                      - Principal = {
                          - AWS = "arn:aws:iam::743794601996:root"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/6df8fd54-93d4-4771-a855-6d8bba252528"
                      - Sid       = "Enable IAM User Permissions"
                    },
                  - {
                      - Action    = [
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:Encrypt",
                          - "kms:DescribeKey",
                          - "kms:Decrypt",
                          - "kms:CreateGrant",
                        ]
                      - Condition = {
                          - StringEquals = {
                              - "aws:RequestedRegion"                      = "us-west-2"
                              - "kms:EncryptionContext:LambdaFunctionName" = "github-self-hosted-runner"
                            }
                        }
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "lambda.amazonaws.com"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/6df8fd54-93d4-4771-a855-6d8bba252528"
                      - Sid       = "Allow Lambda to use the key"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
    }

  # aws_kms_key_policy.encrypt_sns will be destroyed
  # (because aws_kms_key_policy.encrypt_sns is not in configuration)
  - resource "aws_kms_key_policy" "encrypt_sns" {
      - bypass_policy_lockout_safety_check = false -> null
      - id                                 = "79376031-6274-4fe8-8c1b-01ab85054087" -> null
      - key_id                             = "79376031-6274-4fe8-8c1b-01ab85054087" -> null
      - policy                             = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "kms:*"
                      - Effect    = "Allow"
                      - Principal = {
                          - AWS = "arn:aws:iam::743794601996:root"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/79376031-6274-4fe8-8c1b-01ab85054087"
                      - Sid       = "Enable full access for root account"
                    },
                  - {
                      - Action    = [
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:Encrypt",
                          - "kms:DescribeKey",
                          - "kms:Decrypt",
                        ]
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "sns.amazonaws.com"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/79376031-6274-4fe8-8c1b-01ab85054087"
                      - Sid       = "Allow AWS services"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
    }

  # aws_kms_key_policy.encrypt_ssm will be destroyed
  # (because aws_kms_key_policy.encrypt_ssm is not in configuration)
  - resource "aws_kms_key_policy" "encrypt_ssm" {
      - bypass_policy_lockout_safety_check = false -> null
      - id                                 = "939dab50-f649-40ed-9372-33b812e93be3" -> null
      - key_id                             = "939dab50-f649-40ed-9372-33b812e93be3" -> null
      - policy                             = jsonencode(
            {
              - Statement = [
                  - {
                      - Action    = "kms:*"
                      - Effect    = "Allow"
                      - Principal = {
                          - AWS = "arn:aws:iam::743794601996:root"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/939dab50-f649-40ed-9372-33b812e93be3"
                      - Sid       = "Enable IAM User Permissions"
                    },
                  - {
                      - Action    = [
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey",
                          - "kms:Encrypt",
                          - "kms:DescribeKey",
                          - "kms:Decrypt",
                        ]
                      - Effect    = "Allow"
                      - Principal = {
                          - Service = "ssm.amazonaws.com"
                        }
                      - Resource  = "arn:aws:kms:us-west-2:743794601996:key/939dab50-f649-40ed-9372-33b812e93be3"
                      - Sid       = "Allow SSM Service"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> null
    }

  # aws_lambda_function.runner_deregistration will be destroyed
  # (because aws_lambda_function.runner_deregistration is not in configuration)
  - resource "aws_lambda_function" "runner_deregistration" {
      - architectures                  = [
          - "x86_64",
        ] -> null
      - arn                            = "arn:aws:lambda:us-west-2:743794601996:function:github-self-hosted-runner-deregistration" -> null
      - code_sha256                    = "fMFiWq/NWXhGvBY+NU3Qo0KILSf1yLYG/0aUKLw3G5Y=" -> null
      - filename                       = "runner_deregistration.zip" -> null
      - function_name                  = "github-self-hosted-runner-deregistration" -> null
      - handler                        = "index.handler" -> null
      - id                             = "github-self-hosted-runner-deregistration" -> null
      - invoke_arn                     = "arn:aws:apigateway:us-west-2:lambda:path/2015-03-31/functions/arn:aws:lambda:us-west-2:743794601996:function:github-self-hosted-runner-deregistration/invocations" -> null
      - kms_key_arn                    = "arn:aws:kms:us-west-2:743794601996:key/6df8fd54-93d4-4771-a855-6d8bba252528" -> null
      - last_modified                  = "2025-08-23T15:03:05.382+0000" -> null
      - layers                         = [
          - "arn:aws:lambda:us-west-2:743794601996:layer:pyjwt:7",
        ] -> null
      - memory_size                    = 128 -> null
      - package_type                   = "Zip" -> null
      - publish                        = false -> null
      - qualified_arn                  = "arn:aws:lambda:us-west-2:743794601996:function:github-self-hosted-runner-deregistration:$LATEST" -> null
      - qualified_invoke_arn           = "arn:aws:apigateway:us-west-2:lambda:path/2015-03-31/functions/arn:aws:lambda:us-west-2:743794601996:function:github-self-hosted-runner-deregistration:$LATEST/invocations" -> null
      - reserved_concurrent_executions = 5 -> null
      - role                           = "arn:aws:iam::743794601996:role/github-self-hosted-runner-lambda-deregistration-role" -> null
      - runtime                        = "python3.12" -> null
      - skip_destroy                   = false -> null
      - source_code_hash               = "fMFiWq/NWXhGvBY+NU3Qo0KILSf1yLYG/0aUKLw3G5Y=" -> null
      - source_code_size               = 2233 -> null
      - tags                           = {} -> null
      - tags_all                       = {
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
      - timeout                        = 60 -> null
      - version                        = "$LATEST" -> null
        # (5 unchanged attributes hidden)

      - dead_letter_config {
          - target_arn = "arn:aws:sqs:us-west-2:743794601996:github-self-hosted-runner-lambda-dlq" -> null
        }

      - environment {
          - variables = {
              - "GITHUB_ORGANIZATION" = "kunduso-org"
              - "LIFECYCLE_LOG_GROUP" = "/github-self-hosted-runner/lifecycle"
              - "REGION"              = "us-west-2"
              - "SECRET_NAME"         = "github-self-hosted-runner-credentials-v2"
            } -> null
        }

      - ephemeral_storage {
          - size = 512 -> null
        }

      - logging_config {
          - log_format            = "Text" -> null
          - log_group             = "/aws/lambda/github-self-hosted-runner-deregistration" -> null
            # (2 unchanged attributes hidden)
        }

      - tracing_config {
          - mode = "Active" -> null
        }

      - vpc_config {
          - ipv6_allowed_for_dual_stack = false -> null
          - security_group_ids          = [
              - "sg-09efac711d1a4f657",
            ] -> null
          - subnet_ids                  = [
              - "subnet-03e1ed051e9e071c1",
              - "subnet-0da9beaf2e436c556",
            ] -> null
          - vpc_id                      = "vpc-0f94d52581179e6b3" -> null
        }
    }

  # aws_lambda_layer_version.lambda_layer_pyjwt will be destroyed
  # (because aws_lambda_layer_version.lambda_layer_pyjwt is not in configuration)
  - resource "aws_lambda_layer_version" "lambda_layer_pyjwt" {
      - arn                         = "arn:aws:lambda:us-west-2:743794601996:layer:pyjwt:7" -> null
      - code_sha256                 = "wIADZnX/t6eAZcPI5PzKpqyeHttwc7KsK0Df1MLVwqs=" -> null
      - compatible_architectures    = [] -> null
      - compatible_runtimes         = [
          - "python3.12",
        ] -> null
      - created_date                = "2025-08-23T15:00:57.949+0000" -> null
      - filename                    = "./lambda_layer.zip" -> null
      - id                          = "arn:aws:lambda:us-west-2:743794601996:layer:pyjwt:7" -> null
      - layer_arn                   = "arn:aws:lambda:us-west-2:743794601996:layer:pyjwt" -> null
      - layer_name                  = "pyjwt" -> null
      - skip_destroy                = false -> null
      - source_code_hash            = "wIADZnX/t6eAZcPI5PzKpqyeHttwc7KsK0Df1MLVwqs=" -> null
      - source_code_size            = 5660225 -> null
      - version                     = "7" -> null
        # (4 unchanged attributes hidden)
    }

  # aws_lambda_permission.sns_invoke will be destroyed
  # (because aws_lambda_permission.sns_invoke is not in configuration)
  - resource "aws_lambda_permission" "sns_invoke" {
      - action              = "lambda:InvokeFunction" -> null
      - function_name       = "github-self-hosted-runner-deregistration" -> null
      - id                  = "AllowExecutionFromSNS" -> null
      - principal           = "sns.amazonaws.com" -> null
      - source_arn          = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle" -> null
      - statement_id        = "AllowExecutionFromSNS" -> null
        # (2 unchanged attributes hidden)
    }

  # aws_launch_template.github_runner will be updated in-place
  ~ resource "aws_launch_template" "github_runner" {
        id                                   = "lt-0fc3f2cf8d3ca7905"
      ~ latest_version                       = 3 -> (known after apply)
        name                                 = "github-self-hosted-runner2025082315022253420000000f"
        tags                                 = {}
      ~ user_data                            = "#!/bin/bash
set -e

# Setup logging
REGISTRATION_LOG_FILE="/var/log/github-runner-registration.log"
exec > >(tee -a $REGISTRATION_LOG_FILE)
exec 2>&1

echo "$(date): Starting GitHub runner setup"

# Network connectivity validation
echo "$(date): Validating network connectivity..."
retry_count=0
max_retries=12  # 2 minutes total

until curl -s --connect-timeout 5 https://aws.amazon.com > /dev/null; do
    retry_count=$((retry_count + 1))
    if [ $retry_count -ge $max_retries ]; then
        echo "$(date): ERROR - Network connectivity failed after $max_retries attempts"
        exit 1
    fi
    echo "$(date): Network not ready, waiting... (attempt $retry_count/$max_retries)"
    sleep 10
done

echo "$(date): Network connectivity confirmed"

# Test critical AWS services
echo "$(date): Testing AWS services connectivity..."
aws_services=(
    "https://s3.us-west-2.amazonaws.com"
    "https://secretsmanager.us-west-2.amazonaws.com"
    "https://logs.us-west-2.amazonaws.com"
)

for service in "${aws_services[@]}"; do
    echo "$(date): Testing connectivity to $service..."
    if ! curl -s --connect-timeout 10 "$service" > /dev/null; then
        echo "$(date): WARNING - Cannot reach $service"
    else
        echo "$(date): Successfully connected to $service"
    fi
done

echo "$(date): AWS services connectivity test completed"

# Get instance ID for runner naming using IMDSv2
TOKEN=$(curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600")
INSTANCE_ID=$(curl -H "X-aws-ec2-metadata-token: $TOKEN" -s http://169.254.169.254/latest/meta-data/instance-id)

# Update system
echo "$(date): Updating system packages"
apt-get update
apt-get install -y curl jq awscli python3-pip git binutils nfs-common
pip3 install PyJWT requests
echo "$(date): System packages updated successfully"

# Install NFS client for EFS mounting
echo "$(date): Installing NFS client"
apt-get -y install nfs-common
echo "$(date): NFS client installed successfully"

# Setup CloudWatch logging
echo "$(date): Setting up CloudWatch logging"

# Install CloudWatch Logs agent
curl -o /tmp/amazon-cloudwatch-agent.deb https://s3.amazonaws.com/amazoncloudwatch-agent/debian/amd64/latest/amazon-cloudwatch-agent.deb
dpkg -i /tmp/amazon-cloudwatch-agent.deb
rm /tmp/amazon-cloudwatch-agent.deb

# Configure CloudWatch Logs agent
cat > /opt/aws/amazon-cloudwatch-agent/etc/amazon-cloudwatch-agent.json <<EOF
{
  "logs": {
    "logs_collected": {
      "files": {
        "collect_list": [
          {
            "file_path": "/var/log/github-runner-registration.log",
            "log_group_name": "/github-self-hosted-runner/lifecycle",
            "log_stream_name": "{instance_id}/registration",
            "timezone": "UTC"
          },
          {
            "file_path": "/var/log/github-runner-deregistration.log",
            "log_group_name": "/github-self-hosted-runner/lifecycle",
            "log_stream_name": "{instance_id}/deregistration",
            "timezone": "UTC"
          },
          {
            "file_path": "/var/log/github-runner.log",
            "log_group_name": "/github-self-hosted-runner/lifecycle",
            "log_stream_name": "{instance_id}/execution",
            "timezone": "UTC"
          }
        ]
      }
    }
  }
}
EOF

# Start CloudWatch agent
/opt/aws/amazon-cloudwatch-agent/bin/amazon-cloudwatch-agent-ctl -a fetch-config -m ec2 -s -c file:/opt/aws/amazon-cloudwatch-agent/etc/amazon-cloudwatch-agent.json
echo "$(date): CloudWatch Logs agent configured and started"

# Setup EFS mount
echo "$(date): Setting up EFS mount"
mkdir -p /home/runner/_work
echo "fs-0b55e9a7011bf7c90.efs.us-west-2.amazonaws.com:/ /home/runner/_work nfs4 nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,retrans=2 0 0" >> /etc/fstab
mount /home/runner/_work
echo "$(date): EFS mounted successfully"

# Install Docker
echo "$(date): Installing Docker"
curl -fsSL https://get.docker.com -o get-docker.sh
sh get-docker.sh
usermod -aG docker ubuntu
echo "$(date): Docker installed successfully"

# Install Terraform
echo "$(date): Installing Terraform"
wget -O- https://apt.releases.hashicorp.com/gpg | gpg --dearmor | tee /usr/share/keyrings/hashicorp-archive-keyring.gpg
echo "deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | tee /etc/apt/sources.list.d/hashicorp.list
apt update && apt install -y terraform
echo "$(date): Terraform installed successfully"

# Create runner user
echo "$(date): Creating runner user"
useradd -m -s /bin/bash runner
usermod -aG docker runner
# Fix EFS mount ownership
chown -R runner:runner /home/runner/_work
echo "$(date): Runner user created successfully and EFS ownership fixed"

# Download GitHub Actions runner
echo "$(date): Downloading GitHub Actions runner"
cd /home/runner
curl -o actions-runner-linux-x64-2.321.0.tar.gz -L https://github.com/actions/runner/releases/download/v2.321.0/actions-runner-linux-x64-2.321.0.tar.gz
tar xzf actions-runner-linux-x64-2.321.0.tar.gz
echo "$(date): GitHub Actions runner downloaded successfully"

# Get GitHub credentials from Secrets Manager
echo "$(date): Retrieving GitHub credentials from Secrets Manager"
SECRET=$(aws secretsmanager get-secret-value --secret-id "github-self-hosted-runner-credentials-v2" --region "us-west-2" --query SecretString --output text)
APP_ID=$(echo $SECRET | jq -r '.app_id')
INSTALLATION_ID=$(echo $SECRET | jq -r '.installation_id')
PRIVATE_KEY=$(echo $SECRET | jq -r '.private_key')

# For debugging (showing only non-sensitive data)
echo "$(date): App ID: $APP_ID"
echo "$(date): Installation ID: $INSTALLATION_ID"
echo "$(date): Organization: kunduso-org"
echo "$(date): GitHub credentials retrieved successfully"

# Generate JWT token for GitHub App authentication
echo "$(date): Generating GitHub App JWT token"

# Create Python script for JWT generation
cat > /tmp/jwt_script.py <<EOFPYTHON
import jwt
import time
import json
import requests
import sys
import os

print('DEBUG: Starting JWT script', file=sys.stderr)

try:
    print('DEBUG: Reading environment variables', file=sys.stderr)
    app_id = os.environ['APP_ID']
    installation_id = os.environ['INSTALLATION_ID']
    private_key = os.environ['PRIVATE_KEY']
    
    # Convert escaped newlines to actual newlines
    private_key = private_key.replace('\\n', '\n')
    
    print('DEBUG: App ID: ' + app_id, file=sys.stderr)
    print('DEBUG: Installation ID: ' + installation_id, file=sys.stderr)
    print('DEBUG: Private key length: ' + str(len(private_key)), file=sys.stderr)
    
    print('DEBUG: Creating JWT payload', file=sys.stderr)
    payload = {
        'iat': int(time.time()),
        'exp': int(time.time()) + 600,
        'iss': app_id
    }
    
    print('DEBUG: Encoding JWT token', file=sys.stderr)
    token = jwt.encode(payload, private_key, algorithm='RS256')
    print('DEBUG: JWT token created successfully', file=sys.stderr)
    
    print('DEBUG: Preparing API request headers', file=sys.stderr)
    headers = {
        'Authorization': 'Bearer ' + str(token),
        'Accept': 'application/vnd.github.v3+json'
    }
    
    api_url = 'https://api.github.com/app/installations/' + installation_id + '/access_tokens'
    print('DEBUG: Making request to: ' + api_url, file=sys.stderr)
    
    response = requests.post(api_url, headers=headers, timeout=30)
    
    print('DEBUG: API response status: ' + str(response.status_code), file=sys.stderr)
    
    if response.status_code != 201:
        print('ERROR: Failed to get access token. Status: ' + str(response.status_code))
        print('Response body: ' + response.text)
        sys.exit(1)
    
    print('DEBUG: Parsing response JSON', file=sys.stderr)
    access_token = response.json()['token']
    print('DEBUG: Access token obtained successfully', file=sys.stderr)
    print(access_token)
except Exception as e:
    print('ERROR: ' + str(e), file=sys.stderr)
    import traceback
    traceback.print_exc(file=sys.stderr)
    sys.exit(1)
EOFPYTHON

# Pass variables to Python script via environment
export APP_ID="$APP_ID"
export INSTALLATION_ID="$INSTALLATION_ID"
export PRIVATE_KEY="$PRIVATE_KEY"

echo "$(date): Executing JWT generation script..."

# Run JWT script with timeout
if ! timeout 60 python3 /tmp/jwt_script.py > /tmp/jwt_output.txt 2> /tmp/jwt_error.txt; then
    JWT_EXIT_CODE=$?
    echo "$(date): ERROR - JWT generation failed or timed out with exit code $JWT_EXIT_CODE"
    echo "$(date): Check CloudWatch logs for detailed error information"
    rm -f /tmp/jwt_script.py /tmp/jwt_output.txt /tmp/jwt_error.txt
    exit 1
fi

GITHUB_TOKEN=$(cat /tmp/jwt_output.txt)
rm -f /tmp/jwt_script.py /tmp/jwt_output.txt /tmp/jwt_error.txt

if [ -z "$GITHUB_TOKEN" ] || [ "$GITHUB_TOKEN" = "null" ]; then
    echo "$(date): ERROR - JWT token is empty or null"
    exit 1
fi

echo "$(date): GitHub App JWT token generated successfully"

# Get registration token for organization
echo "$(date): Getting registration token for GitHub organization"
ORG_URL="https://github.com/kunduso-org"
echo "$(date): Organization URL: $ORG_URL"

echo "$(date): Making API request to GitHub..."
API_RESPONSE=$(curl -s -w "HTTP_CODE:%{http_code}" -X POST -H "Authorization: token $GITHUB_TOKEN" "https://api.github.com/orgs/kunduso-org/actions/runners/registration-token")
HTTP_CODE=$(echo "$API_RESPONSE" | grep -o "HTTP_CODE:[0-9]*" | cut -d: -f2)
API_BODY=$(echo "$API_RESPONSE" | sed 's/HTTP_CODE:[0-9]*$//')

echo "$(date): GitHub API response code: $HTTP_CODE"

if [ "$HTTP_CODE" != "201" ]; then
    echo "$(date): ERROR - GitHub API request failed with HTTP code $HTTP_CODE"
    echo "$(date): Check GitHub App permissions and installation"
    exit 1
fi

REG_TOKEN=$(echo "$API_BODY" | jq -r '.token')

if [ "$REG_TOKEN" = "null" ] || [ -z "$REG_TOKEN" ]; then
    echo "$(date): ERROR - Registration token is null or empty"
    echo "$(date): GitHub API returned invalid response"
    exit 1
fi
echo "$(date): Registration token obtained successfully"

# Configure and start runner
echo "$(date): Configuring GitHub runner"
echo "$(date): Running config.sh with parameters:"
echo "$(date): URL: $ORG_URL"
echo "$(date): Name: $INSTANCE_ID"
echo "$(date): Labels: us-west-2"

if ! sudo -u runner ./config.sh --url "$ORG_URL" --token "$REG_TOKEN" --name "$INSTANCE_ID" --work /home/runner/_work --labels "us-west-2" --replace --unattended 2>&1; then
    echo "$(date): ERROR - Runner configuration failed"
    exit 1
fi
echo "$(date): GitHub runner configured successfully"

echo "$(date): Starting GitHub runner"
sudo -u runner nohup ./run.sh > /var/log/github-runner.log 2>&1 &
echo "$(date): GitHub runner started in background"

# Install runner as service
echo "$(date): Installing runner as service"
if ! ./svc.sh install runner 2>&1; then
    echo "$(date): ERROR - Failed to install runner service"
    exit 1
fi

if ! ./svc.sh start 2>&1; then
    echo "$(date): ERROR - Failed to start runner service"
    exit 1
fi
echo "$(date): Runner service installed and started successfully"

# Setup deregistration script
echo "$(date): Setting up runner deregistration service"
aws ssm get-parameter --name "/github-self-hosted-runner/deregistration-script" --with-decryption --region "us-west-2" --query Parameter.Value --output text > /usr/local/bin/deregister-runner.sh
chmod +x /usr/local/bin/deregister-runner.sh

# Create systemd service for deregistration
cat > /etc/systemd/system/github-runner-deregister.service <<EOF
[Unit]
Description=GitHub Runner Deregistration
DefaultDependencies=false
Before=shutdown.target reboot.target halt.target

[Service]
Type=oneshot
RemainAfterExit=true
ExecStart=/bin/true
ExecStop=/usr/local/bin/deregister-runner.sh
TimeoutStopSec=30

[Install]
WantedBy=multi-user.target
EOF

systemctl enable github-runner-deregister.service
systemctl start github-runner-deregister.service
echo "$(date): Deregistration service configured"

echo "$(date): GitHub runner setup completed successfully"" -> "#!/bin/bash
set -e

# Setup logging
LOG_FILE="/var/log/github-runner-setup.log"
exec > >(tee -a $LOG_FILE)
exec 2>&1

echo "$(date): Starting GitHub runner setup"

# Network connectivity validation
echo "$(date): Validating network connectivity..."
retry_count=0
max_retries=12  # 2 minutes total

until curl -s --connect-timeout 5 https://aws.amazon.com > /dev/null; do
    retry_count=$((retry_count + 1))
    if [ $retry_count -ge $max_retries ]; then
        echo "$(date): ERROR - Network connectivity failed after $max_retries attempts"
        exit 1
    fi
    echo "$(date): Network not ready, waiting... (attempt $retry_count/$max_retries)"
    sleep 10
done

echo "$(date): Network connectivity confirmed"

# Test critical AWS services
echo "$(date): Testing AWS services connectivity..."
aws_services=(
    "https://s3.us-west-2.amazonaws.com"
    "https://secretsmanager.us-west-2.amazonaws.com"
    "https://logs.us-west-2.amazonaws.com"
)

for service in "${aws_services[@]}"; do
    echo "$(date): Testing connectivity to $service..."
    if ! curl -s --connect-timeout 10 "$service" > /dev/null; then
        echo "$(date): WARNING - Cannot reach $service"
    else
        echo "$(date): Successfully connected to $service"
    fi
done

echo "$(date): AWS services connectivity test completed"

# Get instance ID for runner naming using IMDSv2
TOKEN=$(curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600")
INSTANCE_ID=$(curl -H "X-aws-ec2-metadata-token: $TOKEN" -s http://169.254.169.254/latest/meta-data/instance-id)

# Update system
echo "$(date): Updating system packages"
apt-get update
apt-get install -y curl jq awscli python3-pip git binutils nfs-common
pip3 install PyJWT requests
echo "$(date): System packages updated successfully"

# Install NFS client for EFS mounting
echo "$(date): Installing NFS client"
apt-get -y install nfs-common
echo "$(date): NFS client installed successfully"

# Setup CloudWatch logging
echo "$(date): Setting up CloudWatch logging"

# Install CloudWatch Logs agent
curl -o /tmp/amazon-cloudwatch-agent.deb https://s3.amazonaws.com/amazoncloudwatch-agent/debian/amd64/latest/amazon-cloudwatch-agent.deb
dpkg -i /tmp/amazon-cloudwatch-agent.deb
rm /tmp/amazon-cloudwatch-agent.deb

# Configure CloudWatch Logs agent
cat > /opt/aws/amazon-cloudwatch-agent/etc/amazon-cloudwatch-agent.json <<EOF
{
  "logs": {
    "logs_collected": {
      "files": {
        "collect_list": [
          {
            "file_path": "/var/log/github-runner-setup.log",
            "log_group_name": "/github-runner/github-self-hosted-runner/log",
            "log_stream_name": "{instance_id}-setup",
            "timezone": "UTC"
          },
          {
            "file_path": "/var/log/github-runner.log",
            "log_group_name": "/github-runner/github-self-hosted-runner/log",
            "log_stream_name": "{instance_id}-runner",
            "timezone": "UTC"
          }
        ]
      }
    }
  }
}
EOF

# Start CloudWatch agent
/opt/aws/amazon-cloudwatch-agent/bin/amazon-cloudwatch-agent-ctl -a fetch-config -m ec2 -s -c file:/opt/aws/amazon-cloudwatch-agent/etc/amazon-cloudwatch-agent.json
echo "$(date): CloudWatch Logs agent configured and started"

# Setup EFS mount
echo "$(date): Setting up EFS mount"
mkdir -p /home/runner/_work
echo "fs-0b55e9a7011bf7c90.efs.us-west-2.amazonaws.com:/ /home/runner/_work nfs4 nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,retrans=2 0 0" >> /etc/fstab
mount /home/runner/_work
echo "$(date): EFS mounted successfully"

# Install Docker
echo "$(date): Installing Docker"
curl -fsSL https://get.docker.com -o get-docker.sh
sh get-docker.sh
usermod -aG docker ubuntu
echo "$(date): Docker installed successfully"

# Install Terraform
echo "$(date): Installing Terraform"
wget -O- https://apt.releases.hashicorp.com/gpg | gpg --dearmor | tee /usr/share/keyrings/hashicorp-archive-keyring.gpg
echo "deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | tee /etc/apt/sources.list.d/hashicorp.list
apt update && apt install -y terraform
echo "$(date): Terraform installed successfully"

# Create runner user
echo "$(date): Creating runner user"
useradd -m -s /bin/bash runner
usermod -aG docker runner
echo "$(date): Runner user created successfully"

# Download GitHub Actions runner
echo "$(date): Downloading GitHub Actions runner"
cd /home/runner
curl -o actions-runner-linux-x64-2.321.0.tar.gz -L https://github.com/actions/runner/releases/download/v2.321.0/actions-runner-linux-x64-2.321.0.tar.gz
tar xzf actions-runner-linux-x64-2.321.0.tar.gz
chown -R runner:runner /home/runner
echo "$(date): GitHub Actions runner downloaded successfully"

# Get GitHub credentials from Secrets Manager
echo "$(date): Retrieving GitHub credentials from Secrets Manager"
SECRET=$(aws secretsmanager get-secret-value --secret-id "github-self-hosted-runner-credentials-v2" --region "us-west-2" --query SecretString --output text)
APP_ID=$(echo $SECRET | jq -r '.app_id')
INSTALLATION_ID=$(echo $SECRET | jq -r '.installation_id')
PRIVATE_KEY=$(echo $SECRET | jq -r '.private_key')

# For debugging (showing only non-sensitive data)
echo "$(date): App ID: $APP_ID"
echo "$(date): Installation ID: $INSTALLATION_ID"
echo "$(date): Organization: kunduso-org"
echo "$(date): GitHub credentials retrieved successfully"

# Generate JWT token for GitHub App authentication
echo "$(date): Generating GitHub App JWT token"

# Create Python script for JWT generation
cat > /tmp/jwt_script.py <<EOFPYTHON
import jwt
import time
import json
import requests
import sys
import os

print('DEBUG: Starting JWT script', file=sys.stderr)

try:
    print('DEBUG: Reading environment variables', file=sys.stderr)
    app_id = os.environ['APP_ID']
    installation_id = os.environ['INSTALLATION_ID']
    private_key = os.environ['PRIVATE_KEY']
    
    # Convert escaped newlines to actual newlines
    private_key = private_key.replace('\\n', '\n')
    
    print('DEBUG: App ID: ' + app_id, file=sys.stderr)
    print('DEBUG: Installation ID: ' + installation_id, file=sys.stderr)
    print('DEBUG: Private key length: ' + str(len(private_key)), file=sys.stderr)
    
    print('DEBUG: Creating JWT payload', file=sys.stderr)
    payload = {
        'iat': int(time.time()),
        'exp': int(time.time()) + 600,
        'iss': app_id
    }
    
    print('DEBUG: Encoding JWT token', file=sys.stderr)
    token = jwt.encode(payload, private_key, algorithm='RS256')
    print('DEBUG: JWT token created successfully', file=sys.stderr)
    
    print('DEBUG: Preparing API request headers', file=sys.stderr)
    headers = {
        'Authorization': 'Bearer ' + str(token),
        'Accept': 'application/vnd.github.v3+json'
    }
    
    api_url = 'https://api.github.com/app/installations/' + installation_id + '/access_tokens'
    print('DEBUG: Making request to: ' + api_url, file=sys.stderr)
    
    response = requests.post(api_url, headers=headers, timeout=30)
    
    print('DEBUG: API response status: ' + str(response.status_code), file=sys.stderr)
    
    if response.status_code != 201:
        print('ERROR: Failed to get access token. Status: ' + str(response.status_code))
        print('Response body: ' + response.text)
        sys.exit(1)
    
    print('DEBUG: Parsing response JSON', file=sys.stderr)
    access_token = response.json()['token']
    print('DEBUG: Access token obtained successfully', file=sys.stderr)
    print(access_token)
except Exception as e:
    print('ERROR: ' + str(e), file=sys.stderr)
    import traceback
    traceback.print_exc(file=sys.stderr)
    sys.exit(1)
EOFPYTHON

# Pass variables to Python script via environment
export APP_ID="$APP_ID"
export INSTALLATION_ID="$INSTALLATION_ID"
export PRIVATE_KEY="$PRIVATE_KEY"

echo "$(date): Executing JWT generation script..."

# Run JWT script with timeout
if ! timeout 60 python3 /tmp/jwt_script.py > /tmp/jwt_output.txt 2> /tmp/jwt_error.txt; then
    JWT_EXIT_CODE=$?
    echo "$(date): ERROR - JWT generation failed or timed out with exit code $JWT_EXIT_CODE"
    echo "$(date): Check CloudWatch logs for detailed error information"
    rm -f /tmp/jwt_script.py /tmp/jwt_output.txt /tmp/jwt_error.txt
    exit 1
fi

GITHUB_TOKEN=$(cat /tmp/jwt_output.txt)
rm -f /tmp/jwt_script.py /tmp/jwt_output.txt /tmp/jwt_error.txt

if [ -z "$GITHUB_TOKEN" ] || [ "$GITHUB_TOKEN" = "null" ]; then
    echo "$(date): ERROR - JWT token is empty or null"
    exit 1
fi

echo "$(date): GitHub App JWT token generated successfully"

# Get registration token for organization
echo "$(date): Getting registration token for GitHub organization"
ORG_URL="https://github.com/kunduso-org"
echo "$(date): Organization URL: $ORG_URL"

echo "$(date): Making API request to GitHub..."
API_RESPONSE=$(curl -s -w "HTTP_CODE:%{http_code}" -X POST -H "Authorization: token $GITHUB_TOKEN" "https://api.github.com/orgs/kunduso-org/actions/runners/registration-token")
HTTP_CODE=$(echo "$API_RESPONSE" | grep -o "HTTP_CODE:[0-9]*" | cut -d: -f2)
API_BODY=$(echo "$API_RESPONSE" | sed 's/HTTP_CODE:[0-9]*$//')

echo "$(date): GitHub API response code: $HTTP_CODE"

if [ "$HTTP_CODE" != "201" ]; then
    echo "$(date): ERROR - GitHub API request failed with HTTP code $HTTP_CODE"
    echo "$(date): Check GitHub App permissions and installation"
    exit 1
fi

REG_TOKEN=$(echo "$API_BODY" | jq -r '.token')

if [ "$REG_TOKEN" = "null" ] || [ -z "$REG_TOKEN" ]; then
    echo "$(date): ERROR - Registration token is null or empty"
    echo "$(date): GitHub API returned invalid response"
    exit 1
fi
echo "$(date): Registration token obtained successfully"

# Configure and start runner
echo "$(date): Configuring GitHub runner"
chown -R runner:runner /home/runner/_work
echo "$(date): Running config.sh with parameters:"
echo "$(date): URL: $ORG_URL"
echo "$(date): Name: $INSTANCE_ID"
echo "$(date): Labels: us-west-2"

if ! sudo -u runner ./config.sh --url "$ORG_URL" --token "$REG_TOKEN" --name "$INSTANCE_ID" --work /home/runner/_work --labels "us-west-2" --replace --unattended 2>&1; then
    echo "$(date): ERROR - Runner configuration failed"
    exit 1
fi
echo "$(date): GitHub runner configured successfully"

echo "$(date): Starting GitHub runner"
sudo -u runner nohup ./run.sh > /var/log/github-runner.log 2>&1 &
echo "$(date): GitHub runner started in background"

# Install runner as service
echo "$(date): Installing runner as service"
if ! ./svc.sh install runner 2>&1; then
    echo "$(date): ERROR - Failed to install runner service"
    exit 1
fi

if ! ./svc.sh start 2>&1; then
    echo "$(date): ERROR - Failed to start runner service"
    exit 1
fi
echo "$(date): Runner service installed and started successfully"

echo "$(date): GitHub runner setup completed successfully""
        # (16 unchanged attributes hidden)

        # (3 unchanged blocks hidden)
    }

  # aws_secretsmanager_secret_version.github_runner_credentials must be replaced
-/+ resource "aws_secretsmanager_secret_version" "github_runner_credentials" {
      ~ arn                  = "arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo" -> (known after apply)
      + has_secret_string_wo = (known after apply)
      ~ id                   = "arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo|terraform-20250823150048623300000006" -> (known after apply)
      ~ secret_string        = (sensitive value) # forces replacement
      ~ version_id           = "terraform-20250823150048623300000006" -> (known after apply)
      ~ version_stages       = [
          - "AWSCURRENT",
        ] -> (known after apply)
        # (3 unchanged attributes hidden)
    }

  # aws_security_group.lambda will be destroyed
  # (because aws_security_group.lambda is not in configuration)
  - resource "aws_security_group" "lambda" {
      - arn                    = "arn:aws:ec2:us-west-2:743794601996:security-group/sg-09efac711d1a4f657" -> null
      - description            = "Security group for Lambda function" -> null
      - egress                 = [
          - {
              - cidr_blocks      = [
                  - "0.0.0.0/0",
                ]
              - description      = "Allow all outbound traffic for Lambda"
              - from_port        = 0
              - ipv6_cidr_blocks = []
              - prefix_list_ids  = []
              - protocol         = "-1"
              - security_groups  = []
              - self             = false
              - to_port          = 0
            },
        ] -> null
      - id                     = "sg-09efac711d1a4f657" -> null
      - ingress                = [] -> null
      - name                   = "github-self-hosted-runner-lambda-sg" -> null
      - owner_id               = "743794601996" -> null
      - revoke_rules_on_delete = false -> null
      - tags                   = {
          - "Name" = "github-self-hosted-runner-lambda-sg"
        } -> null
      - tags_all               = {
          - "Name"   = "github-self-hosted-runner-lambda-sg"
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
      - vpc_id                 = "vpc-0f94d52581179e6b3" -> null
        # (1 unchanged attribute hidden)
    }

  # aws_security_group_rule.lambda_egress will be destroyed
  # (because aws_security_group_rule.lambda_egress is not in configuration)
  - resource "aws_security_group_rule" "lambda_egress" {
      - cidr_blocks            = [
          - "0.0.0.0/0",
        ] -> null
      - description            = "Allow all outbound traffic for Lambda" -> null
      - from_port              = 0 -> null
      - id                     = "sgrule-3195649409" -> null
      - protocol               = "-1" -> null
      - security_group_id      = "sg-09efac711d1a4f657" -> null
      - security_group_rule_id = "sgr-0111d48fe00625300" -> null
      - self                   = false -> null
      - to_port                = 0 -> null
      - type                   = "egress" -> null
    }

  # aws_sns_topic.runner_lifecycle will be destroyed
  # (because aws_sns_topic.runner_lifecycle is not in configuration)
  - resource "aws_sns_topic" "runner_lifecycle" {
      - application_success_feedback_sample_rate = 0 -> null
      - arn                                      = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle" -> null
      - content_based_deduplication              = false -> null
      - fifo_topic                               = false -> null
      - firehose_success_feedback_sample_rate    = 0 -> null
      - http_success_feedback_sample_rate        = 0 -> null
      - id                                       = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle" -> null
      - kms_master_key_id                        = "79376031-6274-4fe8-8c1b-01ab85054087" -> null
      - lambda_success_feedback_sample_rate      = 0 -> null
      - name                                     = "github-self-hosted-runner-lifecycle" -> null
      - owner                                    = "743794601996" -> null
      - policy                                   = jsonencode(
            {
              - Id        = "__default_policy_ID"
              - Statement = [
                  - {
                      - Action    = [
                          - "SNS:GetTopicAttributes",
                          - "SNS:SetTopicAttributes",
                          - "SNS:AddPermission",
                          - "SNS:RemovePermission",
                          - "SNS:DeleteTopic",
                          - "SNS:Subscribe",
                          - "SNS:ListSubscriptionsByTopic",
                          - "SNS:Publish",
                        ]
                      - Condition = {
                          - StringEquals = {
                              - "AWS:SourceOwner" = "743794601996"
                            }
                        }
                      - Effect    = "Allow"
                      - Principal = {
                          - AWS = "*"
                        }
                      - Resource  = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle"
                      - Sid       = "__default_statement_ID"
                    },
                ]
              - Version   = "2008-10-17"
            }
        ) -> null
      - signature_version                        = 0 -> null
      - sqs_success_feedback_sample_rate         = 0 -> null
      - tags                                     = {} -> null
      - tags_all                                 = {
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
        # (16 unchanged attributes hidden)
    }

  # aws_sns_topic_subscription.runner_lifecycle will be destroyed
  # (because aws_sns_topic_subscription.runner_lifecycle is not in configuration)
  - resource "aws_sns_topic_subscription" "runner_lifecycle" {
      - arn                             = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle:a97e4ab2-5d9f-4f41-b401-fcccb3fae625" -> null
      - confirmation_timeout_in_minutes = 1 -> null
      - confirmation_was_authenticated  = true -> null
      - endpoint                        = "arn:aws:lambda:us-west-2:743794601996:function:github-self-hosted-runner-deregistration" -> null
      - endpoint_auto_confirms          = false -> null
      - id                              = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle:a97e4ab2-5d9f-4f41-b401-fcccb3fae625" -> null
      - owner_id                        = "743794601996" -> null
      - pending_confirmation            = false -> null
      - protocol                        = "lambda" -> null
      - raw_message_delivery            = false -> null
      - topic_arn                       = "arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle" -> null
        # (6 unchanged attributes hidden)
    }

  # aws_sqs_queue.dlq will be destroyed
  # (because aws_sqs_queue.dlq is not in configuration)
  - resource "aws_sqs_queue" "dlq" {
      - arn                               = "arn:aws:sqs:us-west-2:743794601996:github-self-hosted-runner-lambda-dlq" -> null
      - content_based_deduplication       = false -> null
      - delay_seconds                     = 0 -> null
      - fifo_queue                        = false -> null
      - id                                = "https://sqs.us-west-2.amazonaws.com/743794601996/github-self-hosted-runner-lambda-dlq" -> null
      - kms_data_key_reuse_period_seconds = 300 -> null
      - kms_master_key_id                 = "arn:aws:kms:us-west-2:743794601996:key/6df8fd54-93d4-4771-a855-6d8bba252528" -> null
      - max_message_size                  = 262144 -> null
      - message_retention_seconds         = 345600 -> null
      - name                              = "github-self-hosted-runner-lambda-dlq" -> null
      - receive_wait_time_seconds         = 0 -> null
      - sqs_managed_sse_enabled           = false -> null
      - tags                              = {} -> null
      - tags_all                          = {
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
      - url                               = "https://sqs.us-west-2.amazonaws.com/743794601996/github-self-hosted-runner-lambda-dlq" -> null
      - visibility_timeout_seconds        = 30 -> null
        # (6 unchanged attributes hidden)
    }

  # aws_ssm_parameter.deregistration_script will be destroyed
  # (because aws_ssm_parameter.deregistration_script is not in configuration)
  - resource "aws_ssm_parameter" "deregistration_script" {
      - arn             = "arn:aws:ssm:us-west-2:743794601996:parameter/github-self-hosted-runner/deregistration-script" -> null
      - data_type       = "text" -> null
      - id              = "/github-self-hosted-runner/deregistration-script" -> null
      - key_id          = "arn:aws:kms:us-west-2:743794601996:key/939dab50-f649-40ed-9372-33b812e93be3" -> null
      - name            = "/github-self-hosted-runner/deregistration-script" -> null
      - tags            = {
          - "Name" = "github-self-hosted-runner-deregistration-script"
        } -> null
      - tags_all        = {
          - "Name"   = "github-self-hosted-runner-deregistration-script"
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
      - tier            = "Standard" -> null
      - type            = "SecureString" -> null
      - value           = (sensitive value) -> null
      - value_wo        = (write-only attribute) -> null
      - version         = 1 -> null
        # (2 unchanged attributes hidden)
    }

  # aws_ssm_parameter.nat_gateway_public_ips will be updated in-place
  ~ resource "aws_ssm_parameter" "nat_gateway_public_ips" {
        id              = "/github-self-hosted-runner-ip-address"
      ~ key_id          = "arn:aws:kms:us-west-2:743794601996:key/939dab50-f649-40ed-9372-33b812e93be3" -> (known after apply)
        name            = "/github-self-hosted-runner-ip-address"
        tags            = {
            "Name" = "github-self-hosted-runner-ip-addresses"
        }
      ~ type            = "SecureString" -> "StringList"
        # (9 unchanged attributes hidden)
    }

Plan: 4 to add, 6 to change, 29 to destroy.

Warning: 'launch_template' always triggers an instance refresh and can be removed

  with aws_autoscaling_group.github_runner,
  on asg.tf line 155, in resource "aws_autoscaling_group" "github_runner":
 155:     triggers = ["launch_template"]


─────────────────────────────────────────────────────────────────────────────

Saved the plan to: TFplan.JSON

To perform exactly these actions, run the following command to apply:
    terraform apply "TFplan.JSON"

Pushed by: @kunduso, Action: pull_request

@github-actions
Copy link
Copy Markdown

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Plan

terraform
data.aws_ami.ubuntu: Reading...
aws_kms_key.encrypt_efs: Refreshing state... [id=57161dac-ea94-435b-bdd4-6bb40a54de92]
aws_kms_key.github_runner_secrets: Refreshing state... [id=c77ff6db-241d-4e88-9317-17c07d0ca952]
aws_iam_role.lambda_deregistration: Refreshing state... [id=github-self-hosted-runner-lambda-deregistration-role]
module.vpc.aws_vpc.this: Refreshing state... [id=vpc-0f94d52581179e6b3]
aws_kms_alias.encrypt_sns: Refreshing state... [id=alias/github-self-hosted-runner-encrypt-sns]
aws_iam_policy.github_actions_state: Refreshing state... [id=arn:aws:iam::743794601996:policy/github-self-hosted-runner-github-actions-state-policy]
aws_iam_role.github_runner: Refreshing state... [id=github-self-hosted-runner-ec2-role]
module.vpc.aws_kms_key.custom_kms_key[0]: Refreshing state... [id=a3fd4228-613d-487c-89c6-74f2235bdd36]
aws_lambda_function.runner_deregistration: Refreshing state... [id=github-self-hosted-runner-deregistration]
aws_kms_key_policy.encrypt_lambda: Refreshing state... [id=6df8fd54-93d4-4771-a855-6d8bba252528]
aws_kms_key_policy.encrypt_ssm: Refreshing state... [id=939dab50-f649-40ed-9372-33b812e93be3]
aws_kms_key_policy.encrypt_sns: Refreshing state... [id=79376031-6274-4fe8-8c1b-01ab85054087]
module.vpc.data.aws_caller_identity.current: Reading...
aws_kms_key.cloudwatch_kms_key: Refreshing state... [id=a725a4e2-3f6c-4a07-ac88-25baafbe7b76]
module.vpc.data.aws_caller_identity.current: Read complete after 0s [id=743794601996]
aws_lambda_layer_version.lambda_layer_pyjwt: Refreshing state... [id=arn:aws:lambda:us-west-2:743794601996:layer:pyjwt:7]
aws_ssm_parameter.deregistration_script: Refreshing state... [id=/github-self-hosted-runner/deregistration-script]
aws_kms_alias.encrypt_ssm: Refreshing state... [id=alias/github-self-hosted-runner-encrypt-ssm]
aws_sns_topic_subscription.runner_lifecycle: Refreshing state... [id=arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle:a97e4ab2-5d9f-4f41-b401-fcccb3fae625]
aws_kms_key.encrypt_lambda: Refreshing state... [id=6df8fd54-93d4-4771-a855-6d8bba252528]
aws_autoscaling_lifecycle_hook.runner_termination: Refreshing state... [id=github-self-hosted-runner-termination-hook]
aws_security_group.lambda: Refreshing state... [id=sg-09efac711d1a4f657]
aws_security_group_rule.lambda_egress: Refreshing state... [id=sgrule-3195649409]
aws_kms_alias.encrypt_lambda: Refreshing state... [id=alias/github-self-hosted-runner-encryption]
data.aws_ami.ubuntu: Read complete after 0s [id=ami-065778886ef8ec7c8]
aws_cloudwatch_log_group.github_runner_lifecycle: Refreshing state... [id=/github-self-hosted-runner/lifecycle]
aws_kms_key.encrypt_sns: Refreshing state... [id=79376031-6274-4fe8-8c1b-01ab85054087]
aws_iam_role_policy.lambda_deregistration: Refreshing state... [id=github-self-hosted-runner-lambda-deregistration-role:github-self-hosted-runner-lambda-deregistration-policy]
aws_kms_key.encrypt_ssm: Refreshing state... [id=939dab50-f649-40ed-9372-33b812e93be3]
aws_iam_role_policy.lifecycle_hook: Refreshing state... [id=github-self-hosted-runner-lifecycle-hook-role:github-self-hosted-runner-lifecycle-hook-policy]
aws_kms_key_policy.encrypt_efs: Refreshing state... [id=57161dac-ea94-435b-bdd4-6bb40a54de92]
aws_kms_alias.encrypt_efs: Refreshing state... [id=alias/github-self-hosted-runner-encrypt-efs]
aws_iam_role.lifecycle_hook: Refreshing state... [id=github-self-hosted-runner-lifecycle-hook-role]
aws_sns_topic.runner_lifecycle: Refreshing state... [id=arn:aws:sns:us-west-2:743794601996:github-self-hosted-runner-lifecycle]
aws_iam_role_policy_attachment.lambda_vpc_execution: Refreshing state... [id=github-self-hosted-runner-lambda-deregistration-role-20250823150045064900000002]
aws_lambda_permission.sns_invoke: Refreshing state... [id=AllowExecutionFromSNS]
aws_sqs_queue.dlq: Refreshing state... [id=https://sqs.us-west-2.amazonaws.com/743794601996/github-self-hosted-runner-lambda-dlq]
module.vpc.aws_eip.nat_gateway[0]: Refreshing state... [id=eipalloc-001340df10b3e1b97]
module.vpc.aws_eip.nat_gateway[1]: Refreshing state... [id=eipalloc-0e79188509e4f565a]
module.vpc.data.aws_availability_zones.available: Reading...
data.aws_availability_zones.available: Reading...
data.aws_caller_identity.current: Reading...
data.aws_caller_identity.current: Read complete after 0s [id=743794601996]
module.vpc.data.aws_iam_policy_document.assume_role: Reading...
module.vpc.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=2717921857]
aws_efs_file_system.github_runner_work: Refreshing state... [id=fs-0b55e9a7011bf7c90]
module.vpc.data.aws_availability_zones.available: Read complete after 0s [id=us-west-2]
module.vpc.aws_kms_alias.key[0]: Refreshing state... [id=alias/github-self-hosted-runner-encrypt-flow-log]
aws_secretsmanager_secret.github_runner_credentials: Refreshing state... [id=arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo]
data.aws_availability_zones.available: Read complete after 0s [id=us-west-2]
module.vpc.aws_cloudwatch_log_group.network_flow_logging[0]: Refreshing state... [id=github-self-hosted-runner-flow-logs]
aws_kms_alias.github_runner_secrets: Refreshing state... [id=alias/github-self-hosted-runner-secret]
aws_kms_alias.key: Refreshing state... [id=alias/github-self-hosted-runner]
data.aws_iam_policy_document.ssm_kms: Reading...
data.aws_iam_policy_document.ssm_kms: Read complete after 0s [id=3292091877]
module.vpc.aws_iam_role.vpc_flow_log_role[0]: Refreshing state... [id=github-self-hosted-runner-vpc-flow-role]
module.vpc.aws_kms_key_policy.encrypt_log[0]: Refreshing state... [id=a3fd4228-613d-487c-89c6-74f2235bdd36]
aws_kms_key_policy.encrypt_secret: Refreshing state... [id=c77ff6db-241d-4e88-9317-17c07d0ca952]
aws_iam_policy.cloudwatch_logs: Refreshing state... [id=arn:aws:iam::743794601996:policy/github-self-hosted-runner-cloudwatch-logs-policy]
aws_kms_key_policy.encrypt_cloudwatch: Refreshing state... [id=a725a4e2-3f6c-4a07-ac88-25baafbe7b76]
module.vpc.data.aws_iam_policy_document.vpc_flow_log_policy_document[0]: Reading...
module.vpc.data.aws_iam_policy_document.vpc_flow_log_policy_document[0]: Read complete after 0s [id=54070053]
aws_iam_role.github_actions_runner: Refreshing state... [id=github-self-hosted-runner-github-actions-runner-role]
aws_iam_instance_profile.github_runner: Refreshing state... [id=github-self-hosted-runner-ec2-profile]
aws_iam_role_policy_attachment.ssm: Refreshing state... [id=github-self-hosted-runner-ec2-role-20250823150037802000000001]
module.vpc.aws_subnet.public[1]: Refreshing state... [id=subnet-09651f70f6184babe]
module.vpc.aws_default_security_group.default: Refreshing state... [id=sg-059fed260f3f7d461]
module.vpc.aws_subnet.private[0]: Refreshing state... [id=subnet-0da9beaf2e436c556]
module.vpc.aws_subnet.private[1]: Refreshing state... [id=subnet-03e1ed051e9e071c1]
module.vpc.aws_route_table.private[0]: Refreshing state... [id=rtb-09d2063d896d96860]
module.vpc.aws_route_table.private[1]: Refreshing state... [id=rtb-044fac8abc330694a]
module.vpc.aws_subnet.public[0]: Refreshing state... [id=subnet-0febf2c2af76e2c79]
module.vpc.aws_route_table.public[0]: Refreshing state... [id=rtb-03bf97d42f9a82730]
module.vpc.aws_internet_gateway.this_igw[0]: Refreshing state... [id=igw-0a0d939ec05e85391]
aws_secretsmanager_secret_version.github_runner_credentials: Refreshing state... [id=arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo|terraform-20250823150048623300000006]
aws_iam_policy.github_runner: Refreshing state... [id=arn:aws:iam::743794601996:policy/github-self-hosted-runner-ec2-policy]
aws_security_group.efs: Refreshing state... [id=sg-024a1e389c84b48ea]
aws_security_group.github_runner: Refreshing state... [id=sg-079a81840121b7da7]
aws_iam_role_policy_attachment.cloudwatch_logs: Refreshing state... [id=github-self-hosted-runner-ec2-role-20250823150055004200000007]
module.vpc.aws_route_table_association.private[1]: Refreshing state... [id=rtbassoc-028d25a5848086fff]
module.vpc.aws_route_table_association.private[0]: Refreshing state... [id=rtbassoc-03caad7157f63b8cd]
module.vpc.aws_route.internet_route[0]: Refreshing state... [id=r-rtb-03bf97d42f9a827301080289494]
module.vpc.aws_route_table_association.public[0]: Refreshing state... [id=rtbassoc-0ef5f4bbe527d85a1]
module.vpc.aws_nat_gateway.public[0]: Refreshing state... [id=nat-0f2a89d17c306f450]
module.vpc.aws_nat_gateway.public[1]: Refreshing state... [id=nat-0a26d68751d3c1b6f]
module.vpc.aws_route_table_association.public[1]: Refreshing state... [id=rtbassoc-0d7d71401df749b1a]
aws_efs_mount_target.github_runner_work[0]: Refreshing state... [id=fsmt-06593fb53f8c2522f]
aws_efs_mount_target.github_runner_work[1]: Refreshing state... [id=fsmt-080b547fe91291e3b]
aws_security_group_rule.github_runner_egress: Refreshing state... [id=sgrule-3110254434]
aws_security_group_rule.efs_ingress: Refreshing state... [id=sgrule-1720110692]
aws_iam_role_policy_attachment.github_actions_admin: Refreshing state... [id=github-self-hosted-runner-github-actions-runner-role-20250823150045535900000004]
aws_launch_template.github_runner: Refreshing state... [id=lt-0fc3f2cf8d3ca7905]
module.vpc.aws_flow_log.network_flow_logging[0]: Refreshing state... [id=fl-0ea1bdd10867b211d]
aws_iam_role_policy_attachment.github_actions_state: Refreshing state... [id=github-self-hosted-runner-github-actions-runner-role-20250823150045310200000003]
module.vpc.aws_iam_role_policy.vpc_flow_log_role_policy[0]: Refreshing state... [id=github-self-hosted-runner-vpc-flow-role:github-self-hosted-runner-vpc-flow-policy]
module.vpc.aws_route.private_route[0]: Refreshing state... [id=r-rtb-09d2063d896d968601080289494]
module.vpc.aws_route.private_route[1]: Refreshing state... [id=r-rtb-044fac8abc330694a1080289494]
aws_iam_role_policy_attachment.github_runner: Refreshing state... [id=github-self-hosted-runner-ec2-role-2025082315011670590000000c]
aws_ssm_parameter.nat_gateway_public_ips: Refreshing state... [id=/github-self-hosted-runner-ip-address]
aws_autoscaling_group.github_runner: Refreshing state... [id=github-self-hosted-runner-asg]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
  ~ update in-place
  - destroy
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_cloudwatch_log_group.github_runner will be created
  + resource "aws_cloudwatch_log_group" "github_runner" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + kms_key_id        = "arn:aws:kms:us-west-2:743794601996:key/a725a4e2-3f6c-4a07-ac88-25baafbe7b76"
      + log_group_class   = (known after apply)
      + name              = "/github-runner/github-self-hosted-runner/log"
      + name_prefix       = (known after apply)
      + retention_in_days = 365
      + skip_destroy      = false
      + tags              = {
          + "Name" = "github-self-hosted-runner-logs"
        }
      + tags_all          = {
          + "Name"   = "github-self-hosted-runner-logs"
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
    }

  # aws_iam_policy.cloudwatch_logs will be updated in-place
  ~ resource "aws_iam_policy" "cloudwatch_logs" {
        id               = "arn:aws:iam::743794601996:policy/github-self-hosted-runner-cloudwatch-logs-policy"
        name             = "github-self-hosted-runner-cloudwatch-logs-policy"
      ~ policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "logs:CreateLogGroup",
                          - "logs:CreateLogStream",
                          - "logs:PutLogEvents",
                          - "logs:DescribeLogStreams",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:logs:us-west-2:743794601996:log-group:/github-runner/github-self-hosted-runner/log",
                          - "arn:aws:logs:us-west-2:743794601996:log-group:/github-runner/github-self-hosted-runner/log:*",
                        ]
                    },
                  - {
                      - Action   = [
                          - "kms:Encrypt",
                          - "kms:Decrypt",
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:DescribeKey",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:kms:us-west-2:743794601996:key/a725a4e2-3f6c-4a07-ac88-25baafbe7b76"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> (known after apply)
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # aws_kms_alias.ssm_parameters will be created
  + resource "aws_kms_alias" "ssm_parameters" {
      + arn            = (known after apply)
      + id             = (known after apply)
      + name           = "alias/github-self-hosted-runner-ssm"
      + name_prefix    = (known after apply)
      + target_key_arn = (known after apply)
      + target_key_id  = (known after apply)
    }

  # aws_kms_key.ssm_parameters will be created
  + resource "aws_kms_key" "ssm_parameters" {
      + arn                                = (known after apply)
      + bypass_policy_lockout_safety_check = false
      + customer_master_key_spec           = "SYMMETRIC_DEFAULT"
      + deletion_window_in_days            = 7
      + description                        = "KMS key for SSM parameter encryption"
      + enable_key_rotation                = true
      + id                                 = (known after apply)
      + is_enabled                         = true
      + key_id                             = (known after apply)
      + key_usage                          = "ENCRYPT_DECRYPT"
      + multi_region                       = (known after apply)
      + policy                             = jsonencode(
            {
              + Statement = [
                  + {
                      + Action    = "kms:*"
                      + Effect    = "Allow"
                      + Principal = {
                          + AWS = "arn:aws:iam::743794601996:root"
                        }
                      + Resource  = "*"
                      + Sid       = "Enable IAM User Permissions"
                    },
                  + {
                      + Action    = [
                          + "kms:ReEncrypt*",
                          + "kms:GenerateDataKey",
                          + "kms:Encrypt",
                          + "kms:DescribeKey",
                          + "kms:Decrypt",
                        ]
                      + Effect    = "Allow"
                      + Principal = {
                          + Service = "ssm.amazonaws.com"
                        }
                      + Resource  = "*"
                      + Sid       = "Allow SSM Service"
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + rotation_period_in_days            = (known after apply)
      + tags_all                           = {
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
    }

  # aws_secretsmanager_secret_version.github_runner_credentials must be replaced
-/+ resource "aws_secretsmanager_secret_version" "github_runner_credentials" {
      ~ arn                  = "arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo" -> (known after apply)
      + has_secret_string_wo = (known after apply)
      ~ id                   = "arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo|terraform-20250823150048623300000006" -> (known after apply)
      ~ secret_string        = (sensitive value) # forces replacement
      ~ version_id           = "terraform-20250823150048623300000006" -> (known after apply)
      ~ version_stages       = [
          - "AWSPREVIOUS",
        ] -> (known after apply)
        # (3 unchanged attributes hidden)
    }

  # aws_security_group.lambda will be destroyed
  # (because aws_security_group.lambda is not in configuration)
  - resource "aws_security_group" "lambda" {
      - arn                    = "arn:aws:ec2:us-west-2:743794601996:security-group/sg-09efac711d1a4f657" -> null
      - description            = "Security group for Lambda function" -> null
      - egress                 = [] -> null
      - id                     = "sg-09efac711d1a4f657" -> null
      - ingress                = [] -> null
      - name                   = "github-self-hosted-runner-lambda-sg" -> null
      - owner_id               = "743794601996" -> null
      - revoke_rules_on_delete = false -> null
      - tags                   = {
          - "Name" = "github-self-hosted-runner-lambda-sg"
        } -> null
      - tags_all               = {
          - "Name"   = "github-self-hosted-runner-lambda-sg"
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
      - vpc_id                 = "vpc-0f94d52581179e6b3" -> null
        # (1 unchanged attribute hidden)
    }

  # aws_ssm_parameter.nat_gateway_public_ips will be updated in-place
  ~ resource "aws_ssm_parameter" "nat_gateway_public_ips" {
        id              = "/github-self-hosted-runner-ip-address"
      + key_id          = (known after apply)
        name            = "/github-self-hosted-runner-ip-address"
        tags            = {
            "Name" = "github-self-hosted-runner-ip-addresses"
        }
        # (10 unchanged attributes hidden)
    }

Plan: 4 to add, 2 to change, 2 to destroy.

Warning: 'launch_template' always triggers an instance refresh and can be removed

  with aws_autoscaling_group.github_runner,
  on asg.tf line 155, in resource "aws_autoscaling_group" "github_runner":
 155:     triggers = ["launch_template"]


─────────────────────────────────────────────────────────────────────────────

Saved the plan to: TFplan.JSON

To perform exactly these actions, run the following command to apply:
    terraform apply "TFplan.JSON"

Pushed by: @kunduso, Action: pull_request

@kunduso kunduso merged commit e0902ef into main Aug 23, 2025
2 of 4 checks passed
@kunduso kunduso deleted the iam-role-gh-runner branch August 23, 2025 21:58
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add assumable IAM role for GitHub Actions infrastructure provisioning

1 participant