Skip to content

Implement Automated GitHub Runner Deregistration and Enhanced Infrastructure#45

Merged
kunduso merged 28 commits intomainfrom
runner-deregistration
Aug 23, 2025
Merged

Implement Automated GitHub Runner Deregistration and Enhanced Infrastructure#45
kunduso merged 28 commits intomainfrom
runner-deregistration

Conversation

@kunduso
Copy link
Copy Markdown
Collaborator

@kunduso kunduso commented Aug 23, 2025

This PR implements a comprehensive automated GitHub runner deregistration system along with enhanced infrastructure components for better monitoring, performance, and reliability.

🚀 Key Features

Automated Runner Deregistration System

  • Auto Scaling Lifecycle Hooks: Intercept instance termination events
  • Lambda-based Deregistration: Automated GitHub API calls to remove offline runners
  • SNS Integration: Reliable event notification system
  • Backup Deregistration: Systemd service as fallback mechanism
  • CloudWatch Logging: Comprehensive audit trail for all lifecycle events

Enhanced Infrastructure Components

  • Lambda Layer: Optimized Python dependencies (PyJWT, cryptography) for GitHub API authentication
  • EFS Integration: Persistent shared workspace storage across runner instances
  • CloudWatch Monitoring: Structured logging for registration, execution, and deregistration phases
  • Performance Optimization: Tuned NFS mount parameters and error handling

🔧 Technical Implementation

New Files Added

  • lifecycle-hook.tf: Auto Scaling lifecycle hook, SNS topic, Lambda function, and IAM roles
  • lambda_layer.tf: Lambda layer for Python dependencies
  • lambda_package/lambda_deregistration.py: Lambda function for GitHub API integration
  • scripts/deregister-runner.sh: Backup shell script for systemd service
  • lambda_layer/: Pre-built Python dependencies (PyJWT, cryptography, etc.)

Modified Files

  • scripts/user_data.sh: Enhanced CloudWatch logging, EFS mounting, and deregistration service setup
  • asg.tf: Updated IAM permissions for lifecycle hooks and EFS access
  • cloudwatch.tf: Enhanced log group configuration
  • kms.tf: Additional KMS permissions for SNS and Lambda
  • ssm.tf: Deregistration script parameter storage

🛡️ Security Enhancements

  • KMS Encryption: All SNS topics, Lambda functions, and EFS encrypted with customer-managed keys
  • IAM Least Privilege: Minimal required permissions for each component
  • Secrets Management: GitHub credentials securely stored in AWS Secrets Manager
  • Network Security: EFS mount targets restricted to private subnets

📊 Operational Benefits

  • Zero Manual Intervention: Fully automated runner lifecycle management
  • Improved Monitoring: Comprehensive CloudWatch logging and metrics
  • Enhanced Performance: Persistent workspace storage and dependency caching
  • Cost Optimization: Reduced data transfer and improved resource utilization
  • Reliability: Dual deregistration mechanisms prevent orphaned runners

🔗 Related Issues

This PR addresses multiple enhancement requests and infrastructure improvements:

Closes #25
Closes #41
Closes #42
Closes #43
Closes #44

✅ Testing and Validation

  • Auto Scaling lifecycle hooks trigger correctly on instance termination
  • Lambda function successfully deregisters runners from GitHub organization
  • EFS mounts properly with correct permissions
  • CloudWatch logs capture all lifecycle events
  • Backup deregistration service functions as fallback
  • All components work together seamlessly

📋 Deployment Notes

  1. KMS Permissions: Ensure proper KMS key policies for all services
  2. GitHub App: Verify GitHub App has necessary organization permissions
  3. EFS Performance: Monitor EFS performance metrics after deployment
  4. CloudWatch Costs: Review log retention settings for cost optimization

🎯 Success Criteria

  • ✅ Eliminated orphaned GitHub runners in organization
  • ✅ Comprehensive audit trail for all runner lifecycle events
  • ✅ Persistent workspace storage across instance replacements
  • ✅ Optimized performance for GitHub Actions workflows
  • ✅ Enhanced security with encryption and least privilege access

@kunduso kunduso self-assigned this Aug 23, 2025
@github-actions
Copy link
Copy Markdown

💰 Infracost report

Monthly estimate generated

Changed project Baseline cost Usage cost* Total change New monthly cost
kunduso-org/github-self-hosted-...azon-ec2-terraform/TFplan.JSON +$0 - +$0 $131

*Usage costs can be estimated by updating Infracost Cloud settings, see docs for other options.

Estimate details
Key: * usage cost, ~ changed, + added, - removed

──────────────────────────────────
Project: kunduso-org/github-self-hosted-runner-amazon-ec2-terraform/TFplan.JSON

- aws_cloudwatch_log_group.github_runner
  Monthly cost depends on usage

    - Data ingested
      Monthly cost depends on usage
        -$0.50 per GB

    - Archival Storage
      Monthly cost depends on usage
        -$0.03 per GB

    - Insights queries data scanned
      Monthly cost depends on usage
        -$0.005 per GB

+ aws_cloudwatch_log_group.github_runner_lifecycle
  Monthly cost depends on usage

    + Data ingested
      Monthly cost depends on usage
        +$0.50 per GB

    + Archival Storage
      Monthly cost depends on usage
        +$0.03 per GB

    + Insights queries data scanned
      Monthly cost depends on usage
        +$0.005 per GB

+ aws_lambda_function.runner_deregistration
  Monthly cost depends on usage

    + Requests
      Monthly cost depends on usage
        +$0.20 per 1M requests

    + Ephemeral storage
      Monthly cost depends on usage
        +$0.0000000309 per GB-seconds

    + Duration (first 6B)
      Monthly cost depends on usage
        +$0.0000166667 per GB-seconds

+ aws_sns_topic.runner_lifecycle
  Monthly cost depends on usage

    + API requests (over 1M)
      Monthly cost depends on usage
        +$0.50 per 1M requests

    + HTTP/HTTPS notifications (over 100k)
      Monthly cost depends on usage
        +$0.06 per 100k notifications

    + Email/Email-JSON notifications (over 1k)
      Monthly cost depends on usage
        +$2.00 per 100k notifications

    + Kinesis Firehose notifications
      Monthly cost depends on usage
        +$0.19 per 1M notifications

    + Mobile Push notifications
      Monthly cost depends on usage
        +$0.50 per 1M notifications

    + MacOS notifications
      Monthly cost depends on usage
        +$0.50 per 1M notifications

Monthly cost change for kunduso-org/github-self-hosted-runner-amazon-ec2-terraform/TFplan.JSON
Amount:  $0.00 ($131 → $131)
Percent: 0%

──────────────────────────────────
Key: * usage cost, ~ changed, + added, - removed

*Usage costs can be estimated by updating Infracost Cloud settings, see docs for other options.

71 cloud resources were detected:
∙ 13 were estimated
∙ 58 were free
This comment will be updated when code changes.

@github-actions
Copy link
Copy Markdown

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Plan 📖success

Terraform Validation 🤖success

Show Plan

terraform
data.archive_file.lambda_zip: Reading...
data.archive_file.lambda_layer_pyjwt: Reading...
data.archive_file.lambda_zip: Read complete after 0s [id=85af42f0bfb7d1cfaedb0399f1045465f4d28866]
aws_kms_key.github_runner_secrets: Refreshing state... [id=c77ff6db-241d-4e88-9317-17c07d0ca952]
aws_iam_policy.github_actions_state: Refreshing state... [id=arn:aws:iam::743794601996:policy/github-self-hosted-runner-github-actions-state-policy]
aws_kms_key.cloudwatch_kms_key: Refreshing state... [id=a725a4e2-3f6c-4a07-ac88-25baafbe7b76]
aws_cloudwatch_log_group.github_runner: Refreshing state... [id=/github-runner/github-self-hosted-runner/log]
data.aws_caller_identity.current: Reading...
module.vpc.aws_kms_key.custom_kms_key[0]: Refreshing state... [id=a3fd4228-613d-487c-89c6-74f2235bdd36]
data.aws_availability_zones.available: Reading...
data.aws_ami.ubuntu: Reading...
aws_efs_file_system.github_runner_work: Refreshing state... [id=fs-0b55e9a7011bf7c90]
data.aws_caller_identity.current: Read complete after 0s [id=743794601996]
module.vpc.data.aws_availability_zones.available: Reading...
data.aws_availability_zones.available: Read complete after 0s [id=us-west-2]
module.vpc.data.aws_iam_policy_document.assume_role: Reading...
module.vpc.aws_vpc.this: Refreshing state... [id=vpc-0f94d52581179e6b3]
module.vpc.data.aws_iam_policy_document.assume_role: Read complete after 0s [id=2717921857]
module.vpc.data.aws_caller_identity.current: Reading...
module.vpc.data.aws_availability_zones.available: Read complete after 0s [id=us-west-2]
module.vpc.aws_eip.nat_gateway[0]: Refreshing state... [id=eipalloc-001340df10b3e1b97]
module.vpc.aws_eip.nat_gateway[1]: Refreshing state... [id=eipalloc-0e79188509e4f565a]
aws_iam_role.github_runner: Refreshing state... [id=github-self-hosted-runner-ec2-role]
data.aws_iam_policy_document.ssm_kms: Reading...
module.vpc.data.aws_caller_identity.current: Read complete after 0s [id=743794601996]
data.aws_iam_policy_document.ssm_kms: Read complete after 0s [id=3292091877]
module.vpc.aws_iam_role.vpc_flow_log_role[0]: Refreshing state... [id=github-self-hosted-runner-vpc-flow-role]
aws_kms_alias.key: Refreshing state... [id=alias/github-self-hosted-runner]
aws_kms_alias.github_runner_secrets: Refreshing state... [id=alias/github-self-hosted-runner-secret]
aws_secretsmanager_secret.github_runner_credentials: Refreshing state... [id=arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo]
module.vpc.aws_cloudwatch_log_group.network_flow_logging[0]: Refreshing state... [id=github-self-hosted-runner-flow-logs]
data.aws_ami.ubuntu: Read complete after 0s [id=ami-065778886ef8ec7c8]
module.vpc.aws_kms_alias.key[0]: Refreshing state... [id=alias/github-self-hosted-runner-encrypt-flow-log]
aws_kms_key_policy.encrypt_cloudwatch: Refreshing state... [id=a725a4e2-3f6c-4a07-ac88-25baafbe7b76]
aws_kms_key_policy.encrypt_secret: Refreshing state... [id=c77ff6db-241d-4e88-9317-17c07d0ca952]
data.archive_file.lambda_layer_pyjwt: Read complete after 1s [id=c695122e3691f4ce6af7f8076ecef8b11a043b76]
aws_kms_key.ssm_parameters: Refreshing state... [id=8c717a58-141f-4ddd-88eb-d30645daebdb]
aws_iam_policy.cloudwatch_logs: Refreshing state... [id=arn:aws:iam::743794601996:policy/github-self-hosted-runner-cloudwatch-logs-policy]
module.vpc.aws_kms_key_policy.encrypt_log[0]: Refreshing state... [id=a3fd4228-613d-487c-89c6-74f2235bdd36]
module.vpc.data.aws_iam_policy_document.vpc_flow_log_policy_document[0]: Reading...
module.vpc.data.aws_iam_policy_document.vpc_flow_log_policy_document[0]: Read complete after 0s [id=54070053]
aws_secretsmanager_secret_version.github_runner_credentials: Refreshing state... [id=arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo|terraform-20250823212320163400000001]
aws_kms_alias.ssm_parameters: Refreshing state... [id=alias/github-self-hosted-runner-ssm]
aws_iam_policy.github_runner: Refreshing state... [id=arn:aws:iam::743794601996:policy/github-self-hosted-runner-ec2-policy]
module.vpc.aws_subnet.private[0]: Refreshing state... [id=subnet-0da9beaf2e436c556]
module.vpc.aws_route_table.public[0]: Refreshing state... [id=rtb-03bf97d42f9a82730]
aws_security_group.github_runner: Refreshing state... [id=sg-079a81840121b7da7]
module.vpc.aws_route_table.private[1]: Refreshing state... [id=rtb-044fac8abc330694a]
module.vpc.aws_default_security_group.default: Refreshing state... [id=sg-059fed260f3f7d461]
module.vpc.aws_route_table.private[0]: Refreshing state... [id=rtb-09d2063d896d96860]
module.vpc.aws_subnet.private[1]: Refreshing state... [id=subnet-03e1ed051e9e071c1]
module.vpc.aws_internet_gateway.this_igw[0]: Refreshing state... [id=igw-0a0d939ec05e85391]
aws_security_group.efs: Refreshing state... [id=sg-024a1e389c84b48ea]
module.vpc.aws_subnet.public[0]: Refreshing state... [id=subnet-0febf2c2af76e2c79]
module.vpc.aws_subnet.public[1]: Refreshing state... [id=subnet-09651f70f6184babe]
aws_security_group_rule.github_runner_egress: Refreshing state... [id=sgrule-3110254434]
aws_iam_role_policy_attachment.ssm: Refreshing state... [id=github-self-hosted-runner-ec2-role-20250823150037802000000001]
aws_iam_role_policy_attachment.cloudwatch_logs: Refreshing state... [id=github-self-hosted-runner-ec2-role-20250823150055004200000007]
aws_iam_role.github_actions_runner: Refreshing state... [id=github-self-hosted-runner-github-actions-runner-role]
aws_iam_instance_profile.github_runner: Refreshing state... [id=github-self-hosted-runner-ec2-profile]
aws_iam_role_policy_attachment.github_runner: Refreshing state... [id=github-self-hosted-runner-ec2-role-2025082315011670590000000c]
module.vpc.aws_route.internet_route[0]: Refreshing state... [id=r-rtb-03bf97d42f9a827301080289494]
module.vpc.aws_route_table_association.private[0]: Refreshing state... [id=rtbassoc-03caad7157f63b8cd]
module.vpc.aws_route_table_association.private[1]: Refreshing state... [id=rtbassoc-028d25a5848086fff]
aws_security_group_rule.efs_ingress: Refreshing state... [id=sgrule-1720110692]
aws_efs_mount_target.github_runner_work[0]: Refreshing state... [id=fsmt-06593fb53f8c2522f]
module.vpc.aws_route_table_association.public[1]: Refreshing state... [id=rtbassoc-0d7d71401df749b1a]
module.vpc.aws_route_table_association.public[0]: Refreshing state... [id=rtbassoc-0ef5f4bbe527d85a1]
aws_efs_mount_target.github_runner_work[1]: Refreshing state... [id=fsmt-080b547fe91291e3b]
module.vpc.aws_nat_gateway.public[0]: Refreshing state... [id=nat-0f2a89d17c306f450]
module.vpc.aws_nat_gateway.public[1]: Refreshing state... [id=nat-0a26d68751d3c1b6f]
module.vpc.aws_iam_role_policy.vpc_flow_log_role_policy[0]: Refreshing state... [id=github-self-hosted-runner-vpc-flow-role:github-self-hosted-runner-vpc-flow-policy]
module.vpc.aws_flow_log.network_flow_logging[0]: Refreshing state... [id=fl-0ea1bdd10867b211d]
module.vpc.aws_route.private_route[0]: Refreshing state... [id=r-rtb-09d2063d896d968601080289494]
module.vpc.aws_route.private_route[1]: Refreshing state... [id=r-rtb-044fac8abc330694a1080289494]
aws_ssm_parameter.nat_gateway_public_ips: Refreshing state... [id=/github-self-hosted-runner-ip-address]
aws_launch_template.github_runner: Refreshing state... [id=lt-0fc3f2cf8d3ca7905]
aws_iam_role_policy_attachment.github_actions_admin: Refreshing state... [id=github-self-hosted-runner-github-actions-runner-role-20250823150045535900000004]
aws_iam_role_policy_attachment.github_actions_state: Refreshing state... [id=github-self-hosted-runner-github-actions-runner-role-20250823150045310200000003]
aws_autoscaling_group.github_runner: Refreshing state... [id=github-self-hosted-runner-asg]

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
  ~ update in-place
  - destroy

Terraform will perform the following actions:

  # aws_autoscaling_group.github_runner will be updated in-place
  ~ resource "aws_autoscaling_group" "github_runner" {
        id                               = "github-self-hosted-runner-asg"
        name                             = "github-self-hosted-runner-asg"
        # (31 unchanged attributes hidden)

      ~ launch_template {
            id      = "lt-0fc3f2cf8d3ca7905"
            name    = "github-self-hosted-runner2025082315022253420000000f"
          ~ version = "4" -> (known after apply)
        }

        # (3 unchanged blocks hidden)
    }

  # aws_autoscaling_lifecycle_hook.runner_termination will be created
  + resource "aws_autoscaling_lifecycle_hook" "runner_termination" {
      + autoscaling_group_name  = "github-self-hosted-runner-asg"
      + default_result          = "ABANDON"
      + heartbeat_timeout       = 300
      + id                      = (known after apply)
      + lifecycle_transition    = "autoscaling:EC2_INSTANCE_TERMINATING"
      + name                    = "github-self-hosted-runner-termination-hook"
      + notification_target_arn = (known after apply)
      + role_arn                = (known after apply)
    }

  # aws_cloudwatch_log_group.github_runner will be destroyed
  # (because aws_cloudwatch_log_group.github_runner is not in configuration)
  - resource "aws_cloudwatch_log_group" "github_runner" {
      - arn               = "arn:aws:logs:us-west-2:743794601996:log-group:/github-runner/github-self-hosted-runner/log" -> null
      - id                = "/github-runner/github-self-hosted-runner/log" -> null
      - kms_key_id        = "arn:aws:kms:us-west-2:743794601996:key/a725a4e2-3f6c-4a07-ac88-25baafbe7b76" -> null
      - log_group_class   = "STANDARD" -> null
      - name              = "/github-runner/github-self-hosted-runner/log" -> null
      - retention_in_days = 365 -> null
      - skip_destroy      = false -> null
      - tags              = {
          - "Name" = "github-self-hosted-runner-logs"
        } -> null
      - tags_all          = {
          - "Name"   = "github-self-hosted-runner-logs"
          - "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        } -> null
        # (1 unchanged attribute hidden)
    }

  # aws_cloudwatch_log_group.github_runner_lifecycle will be created
  + resource "aws_cloudwatch_log_group" "github_runner_lifecycle" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + kms_key_id        = "arn:aws:kms:us-west-2:743794601996:key/a725a4e2-3f6c-4a07-ac88-25baafbe7b76"
      + log_group_class   = (known after apply)
      + name              = "/github-runner/github-self-hosted-runner/lifecycle"
      + name_prefix       = (known after apply)
      + retention_in_days = 14
      + skip_destroy      = false
      + tags              = {
          + "Name" = "github-self-hosted-runner-lifecycle-logs"
        }
      + tags_all          = {
          + "Name"   = "github-self-hosted-runner-lifecycle-logs"
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
    }

  # aws_iam_policy.cloudwatch_logs will be updated in-place
  ~ resource "aws_iam_policy" "cloudwatch_logs" {
        id               = "arn:aws:iam::743794601996:policy/github-self-hosted-runner-cloudwatch-logs-policy"
        name             = "github-self-hosted-runner-cloudwatch-logs-policy"
      ~ policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "logs:CreateLogGroup",
                          - "logs:CreateLogStream",
                          - "logs:PutLogEvents",
                          - "logs:DescribeLogStreams",
                        ]
                      - Effect   = "Allow"
                      - Resource = [
                          - "arn:aws:logs:us-west-2:743794601996:log-group:/github-runner/github-self-hosted-runner/log",
                          - "arn:aws:logs:us-west-2:743794601996:log-group:/github-runner/github-self-hosted-runner/log:*",
                        ]
                    },
                  - {
                      - Action   = [
                          - "kms:Encrypt",
                          - "kms:Decrypt",
                          - "kms:ReEncrypt*",
                          - "kms:GenerateDataKey*",
                          - "kms:DescribeKey",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:kms:us-west-2:743794601996:key/a725a4e2-3f6c-4a07-ac88-25baafbe7b76"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> (known after apply)
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # aws_iam_policy.github_runner will be updated in-place
  ~ resource "aws_iam_policy" "github_runner" {
        id               = "arn:aws:iam::743794601996:policy/github-self-hosted-runner-ec2-policy"
        name             = "github-self-hosted-runner-ec2-policy"
      ~ policy           = jsonencode(
            {
              - Statement = [
                  - {
                      - Action   = [
                          - "secretsmanager:GetSecretValue",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:secretsmanager:us-west-2:743794601996:secret:github-self-hosted-runner-credentials-v2-QXLXJo"
                    },
                  - {
                      - Action   = [
                          - "kms:Decrypt",
                          - "kms:DescribeKey",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:kms:us-west-2:743794601996:key/c77ff6db-241d-4e88-9317-17c07d0ca952"
                    },
                  - {
                      - Action   = [
                          - "elasticfilesystem:ClientMount",
                          - "elasticfilesystem:ClientWrite",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:elasticfilesystem:us-west-2:743794601996:file-system/fs-0b55e9a7011bf7c90"
                    },
                  - {
                      - Action   = [
                          - "sts:AssumeRole",
                        ]
                      - Effect   = "Allow"
                      - Resource = "arn:aws:iam::743794601996:role/github-self-hosted-runner-github-actions-runner-role"
                    },
                ]
              - Version   = "2012-10-17"
            }
        ) -> (known after apply)
        tags             = {}
        # (7 unchanged attributes hidden)
    }

  # aws_iam_role.lambda_deregistration will be created
  + resource "aws_iam_role" "lambda_deregistration" {
      + arn                   = (known after apply)
      + assume_role_policy    = jsonencode(
            {
              + Statement = [
                  + {
                      + Action    = "sts:AssumeRole"
                      + Effect    = "Allow"
                      + Principal = {
                          + Service = "lambda.amazonaws.com"
                        }
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + create_date           = (known after apply)
      + force_detach_policies = false
      + id                    = (known after apply)
      + managed_policy_arns   = (known after apply)
      + max_session_duration  = 3600
      + name                  = "github-self-hosted-runner-lambda-deregistration-role"
      + name_prefix           = (known after apply)
      + path                  = "/"
      + tags_all              = {
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
      + unique_id             = (known after apply)

      + inline_policy (known after apply)
    }

  # aws_iam_role.lifecycle_hook will be created
  + resource "aws_iam_role" "lifecycle_hook" {
      + arn                   = (known after apply)
      + assume_role_policy    = jsonencode(
            {
              + Statement = [
                  + {
                      + Action    = "sts:AssumeRole"
                      + Effect    = "Allow"
                      + Principal = {
                          + Service = "autoscaling.amazonaws.com"
                        }
                    },
                ]
              + Version   = "2012-10-17"
            }
        )
      + create_date           = (known after apply)
      + force_detach_policies = false
      + id                    = (known after apply)
      + managed_policy_arns   = (known after apply)
      + max_session_duration  = 3600
      + name                  = "github-self-hosted-runner-lifecycle-hook-role"
      + name_prefix           = (known after apply)
      + path                  = "/"
      + tags_all              = {
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
      + unique_id             = (known after apply)

      + inline_policy (known after apply)
    }

  # aws_iam_role_policy.lambda_deregistration will be created
  + resource "aws_iam_role_policy" "lambda_deregistration" {
      + id          = (known after apply)
      + name        = "github-self-hosted-runner-lambda-deregistration-policy"
      + name_prefix = (known after apply)
      + policy      = (known after apply)
      + role        = (known after apply)
    }

  # aws_iam_role_policy.lifecycle_hook will be created
  + resource "aws_iam_role_policy" "lifecycle_hook" {
      + id          = (known after apply)
      + name        = "github-self-hosted-runner-lifecycle-hook-policy"
      + name_prefix = (known after apply)
      + policy      = (known after apply)
      + role        = (known after apply)
    }

  # aws_kms_key_policy.encrypt_cloudwatch will be updated in-place
  ~ resource "aws_kms_key_policy" "encrypt_cloudwatch" {
        id                                 = "a725a4e2-3f6c-4a07-ac88-25baafbe7b76"
      ~ policy                             = jsonencode(
          ~ {
              ~ Statement = [
                    {
                        Action    = "kms:*"
                        Effect    = "Allow"
                        Principal = {
                            AWS = "arn:aws:iam::743794601996:root"
                        }
                        Resource  = "*"
                        Sid       = "Enable IAM User Permissions"
                    },
                  ~ {
                      ~ Condition = {
                          ~ ArnEquals = {
                              ~ "kms:EncryptionContext:aws:logs:arn" = [
                                  ~ "arn:aws:logs:us-west-2:743794601996:log-group:/github-runner/github-self-hosted-runner/log" -> "arn:aws:logs:us-west-2:743794601996:log-group:/github-runner/github-self-hosted-runner/lifecycle",
                                ]
                            }
                        }
                        # (4 unchanged attributes hidden)
                    },
                ]
                # (2 unchanged attributes hidden)
            }
        )
        # (2 unchanged attributes hidden)
    }

  # aws_lambda_function.runner_deregistration will be created
  + resource "aws_lambda_function" "runner_deregistration" {
      + architectures                  = (known after apply)
      + arn                            = (known after apply)
      + code_sha256                    = (known after apply)
      + filename                       = "runner_deregistration.zip"
      + function_name                  = "github-self-hosted-runner-deregistration"
      + handler                        = "index.handler"
      + id                             = (known after apply)
      + invoke_arn                     = (known after apply)
      + last_modified                  = (known after apply)
      + layers                         = (known after apply)
      + memory_size                    = 128
      + package_type                   = "Zip"
      + publish                        = false
      + qualified_arn                  = (known after apply)
      + qualified_invoke_arn           = (known after apply)
      + reserved_concurrent_executions = -1
      + role                           = (known after apply)
      + runtime                        = "python3.12"
      + signing_job_arn                = (known after apply)
      + signing_profile_version_arn    = (known after apply)
      + skip_destroy                   = false
      + source_code_hash               = "fMFiWq/NWXhGvBY+NU3Qo0KILSf1yLYG/0aUKLw3G5Y="
      + source_code_size               = (known after apply)
      + tags_all                       = {
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
      + timeout                        = 60
      + version                        = (known after apply)

      + environment {
          + variables = {
              + "GITHUB_ORGANIZATION" = "kunduso-org"
              + "LIFECYCLE_LOG_GROUP" = "/github-runner/github-self-hosted-runner/lifecycle"
              + "REGION"              = "us-west-2"
              + "SECRET_NAME"         = "github-self-hosted-runner-credentials-v2"
            }
        }

      + ephemeral_storage (known after apply)

      + logging_config (known after apply)

      + tracing_config (known after apply)
    }

  # aws_lambda_layer_version.lambda_layer_pyjwt will be created
  + resource "aws_lambda_layer_version" "lambda_layer_pyjwt" {
      + arn                         = (known after apply)
      + code_sha256                 = (known after apply)
      + compatible_runtimes         = [
          + "python3.12",
        ]
      + created_date                = (known after apply)
      + filename                    = "./lambda_layer.zip"
      + id                          = (known after apply)
      + layer_arn                   = (known after apply)
      + layer_name                  = "pyjwt"
      + signing_job_arn             = (known after apply)
      + signing_profile_version_arn = (known after apply)
      + skip_destroy                = false
      + source_code_hash            = "wIADZnX/t6eAZcPI5PzKpqyeHttwc7KsK0Df1MLVwqs="
      + source_code_size            = (known after apply)
      + version                     = (known after apply)
    }

  # aws_lambda_permission.sns_invoke will be created
  + resource "aws_lambda_permission" "sns_invoke" {
      + action              = "lambda:InvokeFunction"
      + function_name       = "github-self-hosted-runner-deregistration"
      + id                  = (known after apply)
      + principal           = "sns.amazonaws.com"
      + source_arn          = (known after apply)
      + statement_id        = "AllowExecutionFromSNS"
      + statement_id_prefix = (known after apply)
    }

  # aws_launch_template.github_runner will be updated in-place
  ~ resource "aws_launch_template" "github_runner" {
        id                                   = "lt-0fc3f2cf8d3ca7905"
      ~ latest_version                       = 4 -> (known after apply)
        name                                 = "github-self-hosted-runner2025082315022253420000000f"
        tags                                 = {}
      ~ user_data                            = "#!/bin/bash
set -e

# Setup logging
LOG_FILE="/var/log/github-runner-setup.log"
exec > >(tee -a $LOG_FILE)
exec 2>&1

echo "$(date): Starting GitHub runner setup"

# Network connectivity validation
echo "$(date): Validating network connectivity..."
retry_count=0
max_retries=12  # 2 minutes total

until curl -s --connect-timeout 5 https://aws.amazon.com > /dev/null; do
    retry_count=$((retry_count + 1))
    if [ $retry_count -ge $max_retries ]; then
        echo "$(date): ERROR - Network connectivity failed after $max_retries attempts"
        exit 1
    fi
    echo "$(date): Network not ready, waiting... (attempt $retry_count/$max_retries)"
    sleep 10
done

echo "$(date): Network connectivity confirmed"

# Test critical AWS services
echo "$(date): Testing AWS services connectivity..."
aws_services=(
    "https://s3.us-west-2.amazonaws.com"
    "https://secretsmanager.us-west-2.amazonaws.com"
    "https://logs.us-west-2.amazonaws.com"
)

for service in "${aws_services[@]}"; do
    echo "$(date): Testing connectivity to $service..."
    if ! curl -s --connect-timeout 10 "$service" > /dev/null; then
        echo "$(date): WARNING - Cannot reach $service"
    else
        echo "$(date): Successfully connected to $service"
    fi
done

echo "$(date): AWS services connectivity test completed"

# Get instance ID for runner naming using IMDSv2
TOKEN=$(curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600")
INSTANCE_ID=$(curl -H "X-aws-ec2-metadata-token: $TOKEN" -s http://169.254.169.254/latest/meta-data/instance-id)

# Update system
echo "$(date): Updating system packages"
apt-get update
apt-get install -y curl jq awscli python3-pip git binutils nfs-common
pip3 install PyJWT requests
echo "$(date): System packages updated successfully"

# Install NFS client for EFS mounting
echo "$(date): Installing NFS client"
apt-get -y install nfs-common
echo "$(date): NFS client installed successfully"

# Setup CloudWatch logging
echo "$(date): Setting up CloudWatch logging"

# Install CloudWatch Logs agent
curl -o /tmp/amazon-cloudwatch-agent.deb https://s3.amazonaws.com/amazoncloudwatch-agent/debian/amd64/latest/amazon-cloudwatch-agent.deb
dpkg -i /tmp/amazon-cloudwatch-agent.deb
rm /tmp/amazon-cloudwatch-agent.deb

# Configure CloudWatch Logs agent
cat > /opt/aws/amazon-cloudwatch-agent/etc/amazon-cloudwatch-agent.json <<EOF
{
  "logs": {
    "logs_collected": {
      "files": {
        "collect_list": [
          {
            "file_path": "/var/log/github-runner-setup.log",
            "log_group_name": "/github-runner/github-self-hosted-runner/log",
            "log_stream_name": "{instance_id}-setup",
            "timezone": "UTC"
          },
          {
            "file_path": "/var/log/github-runner.log",
            "log_group_name": "/github-runner/github-self-hosted-runner/log",
            "log_stream_name": "{instance_id}-runner",
            "timezone": "UTC"
          }
        ]
      }
    }
  }
}
EOF

# Start CloudWatch agent
/opt/aws/amazon-cloudwatch-agent/bin/amazon-cloudwatch-agent-ctl -a fetch-config -m ec2 -s -c file:/opt/aws/amazon-cloudwatch-agent/etc/amazon-cloudwatch-agent.json
echo "$(date): CloudWatch Logs agent configured and started"

# Setup EFS mount
echo "$(date): Setting up EFS mount"
mkdir -p /home/runner/_work
echo "fs-0b55e9a7011bf7c90.efs.us-west-2.amazonaws.com:/ /home/runner/_work nfs4 nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,retrans=2 0 0" >> /etc/fstab
mount /home/runner/_work
echo "$(date): EFS mounted successfully"

# Install Docker
echo "$(date): Installing Docker"
curl -fsSL https://get.docker.com -o get-docker.sh
sh get-docker.sh
usermod -aG docker ubuntu
echo "$(date): Docker installed successfully"

# Install Terraform
echo "$(date): Installing Terraform"
wget -O- https://apt.releases.hashicorp.com/gpg | gpg --dearmor | tee /usr/share/keyrings/hashicorp-archive-keyring.gpg
echo "deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | tee /etc/apt/sources.list.d/hashicorp.list
apt update && apt install -y terraform
echo "$(date): Terraform installed successfully"

# Create runner user
echo "$(date): Creating runner user"
useradd -m -s /bin/bash runner
usermod -aG docker runner
echo "$(date): Runner user created successfully"

# Download GitHub Actions runner
echo "$(date): Downloading GitHub Actions runner"
cd /home/runner
curl -o actions-runner-linux-x64-2.321.0.tar.gz -L https://github.com/actions/runner/releases/download/v2.321.0/actions-runner-linux-x64-2.321.0.tar.gz
tar xzf actions-runner-linux-x64-2.321.0.tar.gz
chown -R runner:runner /home/runner
echo "$(date): GitHub Actions runner downloaded successfully"

# Get GitHub credentials from Secrets Manager
echo "$(date): Retrieving GitHub credentials from Secrets Manager"
SECRET=$(aws secretsmanager get-secret-value --secret-id "github-self-hosted-runner-credentials-v2" --region "us-west-2" --query SecretString --output text)
APP_ID=$(echo $SECRET | jq -r '.app_id')
INSTALLATION_ID=$(echo $SECRET | jq -r '.installation_id')
PRIVATE_KEY=$(echo $SECRET | jq -r '.private_key')

# For debugging (showing only non-sensitive data)
echo "$(date): App ID: $APP_ID"
echo "$(date): Installation ID: $INSTALLATION_ID"
echo "$(date): Organization: kunduso-org"
echo "$(date): GitHub credentials retrieved successfully"

# Generate JWT token for GitHub App authentication
echo "$(date): Generating GitHub App JWT token"

# Create Python script for JWT generation
cat > /tmp/jwt_script.py <<EOFPYTHON
import jwt
import time
import json
import requests
import sys
import os

print('DEBUG: Starting JWT script', file=sys.stderr)

try:
    print('DEBUG: Reading environment variables', file=sys.stderr)
    app_id = os.environ['APP_ID']
    installation_id = os.environ['INSTALLATION_ID']
    private_key = os.environ['PRIVATE_KEY']
    
    # Convert escaped newlines to actual newlines
    private_key = private_key.replace('\\n', '\n')
    
    print('DEBUG: App ID: ' + app_id, file=sys.stderr)
    print('DEBUG: Installation ID: ' + installation_id, file=sys.stderr)
    print('DEBUG: Private key length: ' + str(len(private_key)), file=sys.stderr)
    
    print('DEBUG: Creating JWT payload', file=sys.stderr)
    payload = {
        'iat': int(time.time()),
        'exp': int(time.time()) + 600,
        'iss': app_id
    }
    
    print('DEBUG: Encoding JWT token', file=sys.stderr)
    token = jwt.encode(payload, private_key, algorithm='RS256')
    print('DEBUG: JWT token created successfully', file=sys.stderr)
    
    print('DEBUG: Preparing API request headers', file=sys.stderr)
    headers = {
        'Authorization': 'Bearer ' + str(token),
        'Accept': 'application/vnd.github.v3+json'
    }
    
    api_url = 'https://api.github.com/app/installations/' + installation_id + '/access_tokens'
    print('DEBUG: Making request to: ' + api_url, file=sys.stderr)
    
    response = requests.post(api_url, headers=headers, timeout=30)
    
    print('DEBUG: API response status: ' + str(response.status_code), file=sys.stderr)
    
    if response.status_code != 201:
        print('ERROR: Failed to get access token. Status: ' + str(response.status_code))
        print('Response body: ' + response.text)
        sys.exit(1)
    
    print('DEBUG: Parsing response JSON', file=sys.stderr)
    access_token = response.json()['token']
    print('DEBUG: Access token obtained successfully', file=sys.stderr)
    print(access_token)
except Exception as e:
    print('ERROR: ' + str(e), file=sys.stderr)
    import traceback
    traceback.print_exc(file=sys.stderr)
    sys.exit(1)
EOFPYTHON

# Pass variables to Python script via environment
export APP_ID="$APP_ID"
export INSTALLATION_ID="$INSTALLATION_ID"
export PRIVATE_KEY="$PRIVATE_KEY"

echo "$(date): Executing JWT generation script..."

# Run JWT script with timeout
if ! timeout 60 python3 /tmp/jwt_script.py > /tmp/jwt_output.txt 2> /tmp/jwt_error.txt; then
    JWT_EXIT_CODE=$?
    echo "$(date): ERROR - JWT generation failed or timed out with exit code $JWT_EXIT_CODE"
    echo "$(date): Check CloudWatch logs for detailed error information"
    rm -f /tmp/jwt_script.py /tmp/jwt_output.txt /tmp/jwt_error.txt
    exit 1
fi

GITHUB_TOKEN=$(cat /tmp/jwt_output.txt)
rm -f /tmp/jwt_script.py /tmp/jwt_output.txt /tmp/jwt_error.txt

if [ -z "$GITHUB_TOKEN" ] || [ "$GITHUB_TOKEN" = "null" ]; then
    echo "$(date): ERROR - JWT token is empty or null"
    exit 1
fi

echo "$(date): GitHub App JWT token generated successfully"

# Get registration token for organization
echo "$(date): Getting registration token for GitHub organization"
ORG_URL="https://github.com/kunduso-org"
echo "$(date): Organization URL: $ORG_URL"

echo "$(date): Making API request to GitHub..."
API_RESPONSE=$(curl -s -w "HTTP_CODE:%{http_code}" -X POST -H "Authorization: token $GITHUB_TOKEN" "https://api.github.com/orgs/kunduso-org/actions/runners/registration-token")
HTTP_CODE=$(echo "$API_RESPONSE" | grep -o "HTTP_CODE:[0-9]*" | cut -d: -f2)
API_BODY=$(echo "$API_RESPONSE" | sed 's/HTTP_CODE:[0-9]*$//')

echo "$(date): GitHub API response code: $HTTP_CODE"

if [ "$HTTP_CODE" != "201" ]; then
    echo "$(date): ERROR - GitHub API request failed with HTTP code $HTTP_CODE"
    echo "$(date): Check GitHub App permissions and installation"
    exit 1
fi

REG_TOKEN=$(echo "$API_BODY" | jq -r '.token')

if [ "$REG_TOKEN" = "null" ] || [ -z "$REG_TOKEN" ]; then
    echo "$(date): ERROR - Registration token is null or empty"
    echo "$(date): GitHub API returned invalid response"
    exit 1
fi
echo "$(date): Registration token obtained successfully"

# Configure and start runner
echo "$(date): Configuring GitHub runner"
chown -R runner:runner /home/runner/_work
echo "$(date): Running config.sh with parameters:"
echo "$(date): URL: $ORG_URL"
echo "$(date): Name: $INSTANCE_ID"
echo "$(date): Labels: us-west-2"

if ! sudo -u runner ./config.sh --url "$ORG_URL" --token "$REG_TOKEN" --name "$INSTANCE_ID" --work /home/runner/_work --labels "us-west-2" --replace --unattended 2>&1; then
    echo "$(date): ERROR - Runner configuration failed"
    exit 1
fi
echo "$(date): GitHub runner configured successfully"

echo "$(date): Starting GitHub runner"
sudo -u runner nohup ./run.sh > /var/log/github-runner.log 2>&1 &
echo "$(date): GitHub runner started in background"

# Install runner as service
echo "$(date): Installing runner as service"
if ! ./svc.sh install runner 2>&1; then
    echo "$(date): ERROR - Failed to install runner service"
    exit 1
fi

if ! ./svc.sh start 2>&1; then
    echo "$(date): ERROR - Failed to start runner service"
    exit 1
fi
echo "$(date): Runner service installed and started successfully"

echo "$(date): GitHub runner setup completed successfully"" -> "#!/bin/bash
set -e

# Setup logging
REGISTRATION_LOG_FILE="/var/log/github-runner-registration.log"
exec > >(tee -a $REGISTRATION_LOG_FILE)
exec 2>&1

echo "$(date): Starting GitHub runner setup"

# Network connectivity validation
echo "$(date): Validating network connectivity..."
retry_count=0
max_retries=12  # 2 minutes total

until curl -s --connect-timeout 5 https://aws.amazon.com > /dev/null; do
    retry_count=$((retry_count + 1))
    if [ $retry_count -ge $max_retries ]; then
        echo "$(date): ERROR - Network connectivity failed after $max_retries attempts"
        exit 1
    fi
    echo "$(date): Network not ready, waiting... (attempt $retry_count/$max_retries)"
    sleep 10
done

echo "$(date): Network connectivity confirmed"

# Test critical AWS services
echo "$(date): Testing AWS services connectivity..."
aws_services=(
    "https://s3.us-west-2.amazonaws.com"
    "https://secretsmanager.us-west-2.amazonaws.com"
    "https://logs.us-west-2.amazonaws.com"
)

for service in "${aws_services[@]}"; do
    echo "$(date): Testing connectivity to $service..."
    if ! curl -s --connect-timeout 10 "$service" > /dev/null; then
        echo "$(date): WARNING - Cannot reach $service"
    else
        echo "$(date): Successfully connected to $service"
    fi
done

echo "$(date): AWS services connectivity test completed"

# Get instance ID for runner naming using IMDSv2
TOKEN=$(curl -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600")
INSTANCE_ID=$(curl -H "X-aws-ec2-metadata-token: $TOKEN" -s http://169.254.169.254/latest/meta-data/instance-id)

# Update system
echo "$(date): Updating system packages"
apt-get update
apt-get install -y curl jq awscli python3-pip git binutils nfs-common
pip3 install PyJWT requests
echo "$(date): System packages updated successfully"

# Install NFS client for EFS mounting
echo "$(date): Installing NFS client"
apt-get -y install nfs-common
echo "$(date): NFS client installed successfully"

# Setup CloudWatch logging
echo "$(date): Setting up CloudWatch logging"

# Install CloudWatch Logs agent
curl -o /tmp/amazon-cloudwatch-agent.deb https://s3.amazonaws.com/amazoncloudwatch-agent/debian/amd64/latest/amazon-cloudwatch-agent.deb
dpkg -i /tmp/amazon-cloudwatch-agent.deb
rm /tmp/amazon-cloudwatch-agent.deb

# Configure CloudWatch Logs agent
cat > /opt/aws/amazon-cloudwatch-agent/etc/amazon-cloudwatch-agent.json <<EOF
{
  "logs": {
    "logs_collected": {
      "files": {
        "collect_list": [
          {
            "file_path": "/var/log/github-runner-registration.log",
            "log_group_name": "/github-runner/github-self-hosted-runner/lifecycle",
            "log_stream_name": "{instance_id}/registration",
            "timezone": "UTC"
          },
          {
            "file_path": "/var/log/github-runner-deregistration.log",
            "log_group_name": "/github-runner/github-self-hosted-runner/lifecycle",
            "log_stream_name": "{instance_id}/deregistration",
            "timezone": "UTC"
          },
          {
            "file_path": "/var/log/github-runner.log",
            "log_group_name": "/github-runner/github-self-hosted-runner/lifecycle",
            "log_stream_name": "{instance_id}/execution",
            "timezone": "UTC"
          }
        ]
      }
    }
  }
}
EOF

# Start CloudWatch agent
/opt/aws/amazon-cloudwatch-agent/bin/amazon-cloudwatch-agent-ctl -a fetch-config -m ec2 -s -c file:/opt/aws/amazon-cloudwatch-agent/etc/amazon-cloudwatch-agent.json
echo "$(date): CloudWatch Logs agent configured and started"

# Setup EFS mount
echo "$(date): Setting up EFS mount"
mkdir -p /home/runner/_work
echo "fs-0b55e9a7011bf7c90.efs.us-west-2.amazonaws.com:/ /home/runner/_work nfs4 nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,retrans=2 0 0" >> /etc/fstab
mount /home/runner/_work
echo "$(date): EFS mounted successfully"

# Install Docker
echo "$(date): Installing Docker"
curl -fsSL https://get.docker.com -o get-docker.sh
sh get-docker.sh
usermod -aG docker ubuntu
echo "$(date): Docker installed successfully"

# Install Terraform
echo "$(date): Installing Terraform"
wget -O- https://apt.releases.hashicorp.com/gpg | gpg --dearmor | tee /usr/share/keyrings/hashicorp-archive-keyring.gpg
echo "deb [signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | tee /etc/apt/sources.list.d/hashicorp.list
apt update && apt install -y terraform
echo "$(date): Terraform installed successfully"

# Create runner user
echo "$(date): Creating runner user"
useradd -m -s /bin/bash runner
usermod -aG docker runner
echo "$(date): Runner user created successfully"

# Download GitHub Actions runner
echo "$(date): Downloading GitHub Actions runner"
cd /home/runner
curl -o actions-runner-linux-x64-2.321.0.tar.gz -L https://github.com/actions/runner/releases/download/v2.321.0/actions-runner-linux-x64-2.321.0.tar.gz
tar xzf actions-runner-linux-x64-2.321.0.tar.gz
echo "$(date): GitHub Actions runner downloaded successfully"

# Get GitHub credentials from Secrets Manager
echo "$(date): Retrieving GitHub credentials from Secrets Manager"
SECRET=$(aws secretsmanager get-secret-value --secret-id "github-self-hosted-runner-credentials-v2" --region "us-west-2" --query SecretString --output text)
APP_ID=$(echo $SECRET | jq -r '.app_id')
INSTALLATION_ID=$(echo $SECRET | jq -r '.installation_id')
PRIVATE_KEY=$(echo $SECRET | jq -r '.private_key')

# For debugging (showing only non-sensitive data)
echo "$(date): App ID: $APP_ID"
echo "$(date): Installation ID: $INSTALLATION_ID"
echo "$(date): Organization: kunduso-org"
echo "$(date): GitHub credentials retrieved successfully"

# Generate JWT token for GitHub App authentication
echo "$(date): Generating GitHub App JWT token"

# Create Python script for JWT generation
cat > /tmp/jwt_script.py <<EOFPYTHON
import jwt
import time
import json
import requests
import sys
import os

print('DEBUG: Starting JWT script', file=sys.stderr)

try:
    print('DEBUG: Reading environment variables', file=sys.stderr)
    app_id = os.environ['APP_ID']
    installation_id = os.environ['INSTALLATION_ID']
    private_key = os.environ['PRIVATE_KEY']
    
    # Convert escaped newlines to actual newlines
    private_key = private_key.replace('\\n', '\n')
    
    print('DEBUG: App ID: ' + app_id, file=sys.stderr)
    print('DEBUG: Installation ID: ' + installation_id, file=sys.stderr)
    print('DEBUG: Private key length: ' + str(len(private_key)), file=sys.stderr)
    
    print('DEBUG: Creating JWT payload', file=sys.stderr)
    payload = {
        'iat': int(time.time()),
        'exp': int(time.time()) + 600,
        'iss': app_id
    }
    
    print('DEBUG: Encoding JWT token', file=sys.stderr)
    token = jwt.encode(payload, private_key, algorithm='RS256')
    print('DEBUG: JWT token created successfully', file=sys.stderr)
    
    print('DEBUG: Preparing API request headers', file=sys.stderr)
    headers = {
        'Authorization': 'Bearer ' + str(token),
        'Accept': 'application/vnd.github.v3+json'
    }
    
    api_url = 'https://api.github.com/app/installations/' + installation_id + '/access_tokens'
    print('DEBUG: Making request to: ' + api_url, file=sys.stderr)
    
    response = requests.post(api_url, headers=headers, timeout=30)
    
    print('DEBUG: API response status: ' + str(response.status_code), file=sys.stderr)
    
    if response.status_code != 201:
        print('ERROR: Failed to get access token. Status: ' + str(response.status_code))
        print('Response body: ' + response.text)
        sys.exit(1)
    
    print('DEBUG: Parsing response JSON', file=sys.stderr)
    access_token = response.json()['token']
    print('DEBUG: Access token obtained successfully', file=sys.stderr)
    print(access_token)
except Exception as e:
    print('ERROR: ' + str(e), file=sys.stderr)
    import traceback
    traceback.print_exc(file=sys.stderr)
    sys.exit(1)
EOFPYTHON

# Pass variables to Python script via environment
export APP_ID="$APP_ID"
export INSTALLATION_ID="$INSTALLATION_ID"
export PRIVATE_KEY="$PRIVATE_KEY"

echo "$(date): Executing JWT generation script..."

# Run JWT script with timeout
if ! timeout 60 python3 /tmp/jwt_script.py > /tmp/jwt_output.txt 2> /tmp/jwt_error.txt; then
    JWT_EXIT_CODE=$?
    echo "$(date): ERROR - JWT generation failed or timed out with exit code $JWT_EXIT_CODE"
    echo "$(date): Check CloudWatch logs for detailed error information"
    rm -f /tmp/jwt_script.py /tmp/jwt_output.txt /tmp/jwt_error.txt
    exit 1
fi

GITHUB_TOKEN=$(cat /tmp/jwt_output.txt)
rm -f /tmp/jwt_script.py /tmp/jwt_output.txt /tmp/jwt_error.txt

if [ -z "$GITHUB_TOKEN" ] || [ "$GITHUB_TOKEN" = "null" ]; then
    echo "$(date): ERROR - JWT token is empty or null"
    exit 1
fi

echo "$(date): GitHub App JWT token generated successfully"

# Get registration token for organization
echo "$(date): Getting registration token for GitHub organization"
ORG_URL="https://github.com/kunduso-org"
echo "$(date): Organization URL: $ORG_URL"

echo "$(date): Making API request to GitHub..."
API_RESPONSE=$(curl -s -w "HTTP_CODE:%{http_code}" -X POST -H "Authorization: token $GITHUB_TOKEN" "https://api.github.com/orgs/kunduso-org/actions/runners/registration-token")
HTTP_CODE=$(echo "$API_RESPONSE" | grep -o "HTTP_CODE:[0-9]*" | cut -d: -f2)
API_BODY=$(echo "$API_RESPONSE" | sed 's/HTTP_CODE:[0-9]*$//')

echo "$(date): GitHub API response code: $HTTP_CODE"

if [ "$HTTP_CODE" != "201" ]; then
    echo "$(date): ERROR - GitHub API request failed with HTTP code $HTTP_CODE"
    echo "$(date): Check GitHub App permissions and installation"
    exit 1
fi

REG_TOKEN=$(echo "$API_BODY" | jq -r '.token')

if [ "$REG_TOKEN" = "null" ] || [ -z "$REG_TOKEN" ]; then
    echo "$(date): ERROR - Registration token is null or empty"
    echo "$(date): GitHub API returned invalid response"
    exit 1
fi
echo "$(date): Registration token obtained successfully"

# Configure and start runner
echo "$(date): Configuring GitHub runner"
echo "$(date): Running config.sh with parameters:"
echo "$(date): URL: $ORG_URL"
echo "$(date): Name: $INSTANCE_ID"
echo "$(date): Labels: us-west-2"

if ! sudo -u runner ./config.sh --url "$ORG_URL" --token "$REG_TOKEN" --name "$INSTANCE_ID" --work /home/runner/_work --labels "us-west-2" --replace --unattended 2>&1; then
    echo "$(date): ERROR - Runner configuration failed"
    exit 1
fi
echo "$(date): GitHub runner configured successfully"

echo "$(date): Starting GitHub runner"
sudo -u runner nohup ./run.sh > /var/log/github-runner.log 2>&1 &
echo "$(date): GitHub runner started in background"

# Install runner as service
echo "$(date): Installing runner as service"
if ! ./svc.sh install runner 2>&1; then
    echo "$(date): ERROR - Failed to install runner service"
    exit 1
fi

if ! ./svc.sh start 2>&1; then
    echo "$(date): ERROR - Failed to start runner service"
    exit 1
fi
echo "$(date): Runner service installed and started successfully"

# Setup deregistration script
echo "$(date): Setting up runner deregistration service"
aws ssm get-parameter --name "/github-self-hosted-runner/deregistration-script" --with-decryption --region "us-west-2" --query Parameter.Value --output text > /usr/local/bin/deregister-runner.sh
chmod +x /usr/local/bin/deregister-runner.sh

# Create systemd service for deregistration
cat > /etc/systemd/system/github-runner-deregister.service <<EOF
[Unit]
Description=GitHub Runner Deregistration
DefaultDependencies=false
Before=shutdown.target reboot.target halt.target

[Service]
Type=oneshot
RemainAfterExit=true
ExecStart=/bin/true
ExecStop=/usr/local/bin/deregister-runner.sh
TimeoutStopSec=30

[Install]
WantedBy=multi-user.target
EOF

systemctl enable github-runner-deregister.service
systemctl start github-runner-deregister.service
echo "$(date): Deregistration service configured"

echo "$(date): GitHub runner setup completed successfully""
        # (16 unchanged attributes hidden)

        # (3 unchanged blocks hidden)
    }

  # aws_sns_topic.runner_lifecycle will be created
  + resource "aws_sns_topic" "runner_lifecycle" {
      + arn                         = (known after apply)
      + beginning_archive_time      = (known after apply)
      + content_based_deduplication = false
      + fifo_topic                  = false
      + id                          = (known after apply)
      + name                        = "github-self-hosted-runner-lifecycle"
      + name_prefix                 = (known after apply)
      + owner                       = (known after apply)
      + policy                      = (known after apply)
      + signature_version           = (known after apply)
      + tags_all                    = {
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
      + tracing_config              = (known after apply)
    }

  # aws_sns_topic_subscription.runner_lifecycle will be created
  + resource "aws_sns_topic_subscription" "runner_lifecycle" {
      + arn                             = (known after apply)
      + confirmation_timeout_in_minutes = 1
      + confirmation_was_authenticated  = (known after apply)
      + endpoint                        = (known after apply)
      + endpoint_auto_confirms          = false
      + filter_policy_scope             = (known after apply)
      + id                              = (known after apply)
      + owner_id                        = (known after apply)
      + pending_confirmation            = (known after apply)
      + protocol                        = "lambda"
      + raw_message_delivery            = false
      + topic_arn                       = (known after apply)
    }

  # aws_ssm_parameter.deregistration_script will be created
  + resource "aws_ssm_parameter" "deregistration_script" {
      + arn            = (known after apply)
      + data_type      = (known after apply)
      + has_value_wo   = (known after apply)
      + id             = (known after apply)
      + insecure_value = (known after apply)
      + key_id         = "arn:aws:kms:us-west-2:743794601996:key/8c717a58-141f-4ddd-88eb-d30645daebdb"
      + name           = "/github-self-hosted-runner/deregistration-script"
      + tags           = {
          + "Name" = "github-self-hosted-runner-deregistration-script"
        }
      + tags_all       = {
          + "Name"   = "github-self-hosted-runner-deregistration-script"
          + "Source" = "https://github.com/kunduso-org/github-self-hosted-runner-amazon-ec2-terraform"
        }
      + tier           = (known after apply)
      + type           = "SecureString"
      + value          = (sensitive value)
      + value_wo       = (write-only attribute)
      + version        = (known after apply)
    }

  # aws_ssm_parameter.nat_gateway_public_ips will be updated in-place
  ~ resource "aws_ssm_parameter" "nat_gateway_public_ips" {
        id              = "/github-self-hosted-runner-ip-address"
      + key_id          = "arn:aws:kms:us-west-2:743794601996:key/8c717a58-141f-4ddd-88eb-d30645daebdb"
        name            = "/github-self-hosted-runner-ip-address"
        tags            = {
            "Name" = "github-self-hosted-runner-ip-addresses"
        }
        # (10 unchanged attributes hidden)
    }

Plan: 12 to add, 6 to change, 1 to destroy.

Warning: 'launch_template' always triggers an instance refresh and can be removed

  with aws_autoscaling_group.github_runner,
  on asg.tf line 170, in resource "aws_autoscaling_group" "github_runner":
 170:     triggers = ["launch_template"]


─────────────────────────────────────────────────────────────────────────────

Saved the plan to: TFplan.JSON

To perform exactly these actions, run the following command to apply:
    terraform apply "TFplan.JSON"

Pushed by: @kunduso, Action: pull_request

@kunduso kunduso merged commit 0d06453 into main Aug 23, 2025
2 of 4 checks passed
@kunduso kunduso deleted the runner-deregistration branch August 23, 2025 23:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment