Movatterモバイル変換


[0]ホーム

URL:


Skip to main content
GitHub Docs

Actions Runner Controller

You can host your own runners and customize the environment used to run jobs in your GitHub Actions workflows.

About Actions Runner Controller

Actions Runner Controller (ARC) is a Kubernetes operator that orchestrates and scales self-hosted runners for GitHub Actions. For more information, seeOperator pattern in the Kubernetes documentation.

With ARC, you can create runner scale sets that automatically scale based on the number of workflows running in your repository, organization, or enterprise. Because controlled runners can be ephemeral and based on containers, new runner instances can scale up or down rapidly and cleanly. For more information about autoscaling, seeSelf-hosted runners reference.

The following diagram illustrates the architecture of ARC's autoscaling runner scale set mode.

Note

To view the following diagram in a larger size, see theAutoscaling Runner Scale Sets mode documentation in the Actions Runner Controller repository.

Diagram showing ARC's autoscaling runner ScaleSet mode.

  1. Actions Runner Controller is installed using the supplied Helm charts, and the controller manager pod is deployed in the specified namespace. A new AutoScalingRunnerSet resource is deployed via the supplied Helm charts or a customized manifest file. The AutoScalingRunnerSet Controller calls GitHub's APIs to fetch the runner group ID that the runner scale set will belong to.
  2. The AutoScalingRunnerSet Controller calls the APIs one more time to either fetch or create a runner scale set in the GitHub Actions service before creating the Runner ScaleSet Listener resource.
  3. A Runner ScaleSet Listener pod is deployed by the AutoScalingListener Controller. In this pod, the listener application connects to the GitHub Actions Service to authenticate and establish an HTTPS long poll connection. The listener stays idle until it receives aJob Available message from the GitHub Actions Service.
  4. When a workflow run is triggered from a repository, the GitHub Actions Service dispatches individual job runs to the runners or runner scale sets where theruns-on key matches the name of the runner scale set or labels of self-hosted runners.
  5. When the Runner ScaleSet Listener receives theJob Available message, it checks whether it can scale up to the desired count. If it can, the Runner ScaleSet Listener acknowledges the message.
  6. The Runner ScaleSet Listener uses a Service Account and a Role bound to that account to make an HTTPS call through the Kubernetes APIs to patch the Ephemeral RunnerSet resource with the number of desired replicas count.
  7. The Ephemeral RunnerSet attempts to create new runners and the EphemeralRunner Controller requests a Just-in-Time (JIT) configuration token to register these runners. The controller attempts to create runner pods. If the pod's status isfailed, the controller retries up to 5 times. After 24 hours the GitHub Actions Service unassigns the job if no runner accepts it.
  8. Once the runner pod is created, the runner application in the pod uses the JIT configuration token to register itself with the GitHub Actions Service. It then establishes another HTTPS long poll connection to receive the job details it needs to execute.
  9. The GitHub Actions Service acknowledges the runner registration and dispatches the job run details.
  10. Throughout the job run execution, the runner continuously communicates the logs and job run status back to the GitHub Actions Service.
  11. When the runner completes its job successfully, the EphemeralRunner Controller checks with the GitHub Actions Service to see if runner can be deleted. If it can, the Ephemeral RunnerSet deletes the runner.

Actions Runner Controller components

ARC consists of a set of resources, some of which are created specifically for ARC. An ARC deployment applies these resources onto a Kubernetes cluster. Once applied, it creates a set of Pods that contain your self-hosted runners' containers. With ARC, GitHub can treat these runner containers as self-hosted runners and allocate jobs to them as needed.

Each resource that is deployed by ARC is given a name composed of:

  • An installation name, which is the installation name you specify when you install the Helm chart.
  • A resource identification suffix, which is a string that identifies the resource type. This value is not configurable.

Note

Different versions of Kubernetes have different length limits for names of resources. The length limit for the resource name is calculated by adding the length of the installation name and the length of the resource identification suffix. If the resource name is longer than the reserved length, you will receive an error.

Resources deployed bygha-runner-scale-set-controller

TemplateResource KindNameReserved LengthDescriptionNotes
deployment.yamlDeploymentINSTALLATION_NAME-gha-rs-controller18The resource running controller-managerThe pods created by this resource have the ReplicaSet suffix and the Pod suffix.
serviceaccount.yamlServiceAccountINSTALLATION_NAME-gha-rs-controller18This is created ifserviceAccount.create invalues.yaml is set to true.The name can be customized invalues.yaml
manager_cluster_role.yamlClusterRoleINSTALLATION_NAME-gha-rs-controller18ClusterRole for the controller managerThis is created if the value offlags.watchSingleNamespace is empty.
manager_cluster_role_binding.yamlClusterRoleBindingINSTALLATION_NAME-gha-rs-controller18ClusterRoleBinding for the controller managerThis is created if the value offlags.watchSingleNamespace is empty.
manager_single_namespace_controller_role.yamlRoleINSTALLATION_NAME-gha-rs-controller-single-namespace35Role for the controller managerThis is created if the value offlags.watchSingleNamespace is set.
manager_single_namespace_controller_role_binding.yamlRoleBindingINSTALLATION_NAME-gha-rs-controller-single-namespace35RoleBinding for the controller managerThis is created if the value offlags.watchSingleNamespace is set.
manager_single_namespace_watch_role.yamlRoleINSTALLATION_NAME-gha-rs-controller-single-namespace-watch41Role for the controller manager for the namespace configuredThis is created if the value offlags.watchSingleNamespace is set.
manager_single_namespace_watch_role_binding.yamlRoleBindingINSTALLATION_NAME-gha-rs-controller-single-namespace-watch41RoleBinding for the controller manager for the namespace configuredThis is created if the value offlags.watchSingleNamespace is set.
manager_listener_role.yamlRoleINSTALLATION_NAME-gha-rs-controller-listener26Role for the listenerThis is always created.
manager_listener_role_binding.yamlRoleBindingINSTALLATION_NAME-gha-rs-controller-listener26RoleBinding for the listenerThis is always created and binds the listener role with the service account, which is either created byserviceaccount.yaml or configured withvalues.yaml.

Resources deployed bygha-runner-scale-set

TemplateResource KindNameReserved LengthDescriptionNotes
autoscalingrunnerset.yamlAutoscalingRunnerSetINSTALLATION_NAME0Top level resource working with scale setsThe name is limited to 45 characters in length.
no_permission_service_account.yamlServiceAccountINSTALLATION_NAME-gha-rs-no-permission21Service account mounted to the runner containerThis is created if the container mode is not "kubernetes" andtemplate.spec.serviceAccountName is not specified.
githubsecret.yamlSecretINSTALLATION_NAME-gha-rs-github-secret20Secret containing values needed to authenticate to the GitHub APIThis is created ifgithubConfigSecret is an object. If a string is provided, this secret will not be created.
manager_role.yamlRoleINSTALLATION_NAME-gha-rs-manager15Role provided to the manager to be able to reconcile on resources in the autoscaling runner set's namespaceThis is always created.
manager_role_binding.yamlRoleBindingINSTALLATION_NAME-gha-rs-manager15Binding manager_role to the manager service account.This is always created.
kube_mode_role.yamlRoleINSTALLATION_NAME-gha-rs-kube-mode17Role providing necessary permissions for the hookThis is created when the container mode is set to "kubernetes" andtemplate.spec.serviceAccount is not provided.
kube_mode_serviceaccount.yamlServiceAccountINSTALLATION_NAME-gha-rs-kube-mode17Service account bound to the runner pod.This is created when the container mode is set to "kubernetes" andtemplate.spec.serviceAccount is not provided.

About custom resources

ARC consists of several custom resource definitions (CRDs). For more information on custom resources, seeCustom Resources in the Kubernetes documentation. You can find the list of custom resource definitions used for ARC in the following API schema definitions.

Because custom resources are extensions of the Kubernetes API, they won't be available in a default Kubernetes installation. You will need to install these custom resources to use ARC. For more information on installing custom resources, seeQuickstart for Actions Runner Controller.

Once the custom resources are installed, you can deploy ARC into your Kubernetes cluster. For information about deploying ARC, seeDeploying runner scale sets with Actions Runner Controller.

About the runner container image

GitHub maintains aminimal runner container image. A new image will be published with every runner binaries release. The most recent image will have the runner binaries version andlatest as tags.

This image contains the least amount of packages necessary for the container runtime and the runner binaries. To install additional software, you can create your own runner image. You can use ARC's runner image as a base, or use the corresponding setup actions. For instance,actions/setup-java for Java oractions/setup-node for Node.

You can find the definition of ARC's runner image inthis Dockerfile. To view the current base image, check theFROM line in the runner image Dockerfile, then search for that tag in thedotnet/dotnet-docker repository.

For example, if theFROM line in the runner image Dockerfile ismcr.microsoft.com/dotnet/runtime-deps:8.0-jammy AS build, then you can find the base image inhttps://github.com/dotnet/dotnet-docker/blob/main/src/runtime-deps/8.0/jammy/amd64/Dockerfile.

Creating your own runner image

You can create your own runner image that meets your requirements. Your runner image must fulfill the following conditions.

You can use the following example Dockerfile to start creating your own runner image.

Dockerfile
FROM mcr.microsoft.com/dotnet/runtime-deps:6.0 as build# Replace value with the latest runner release version# source: https://github.com/actions/runner/releases# ex: 2.303.0ARG RUNNER_VERSION=""ARG RUNNER_ARCH="x64"# Replace value with the latest runner-container-hooks release version# source: https://github.com/actions/runner-container-hooks/releases# ex: 0.3.1ARG RUNNER_CONTAINER_HOOKS_VERSION=""ENV DEBIAN_FRONTEND=noninteractiveENV RUNNER_MANUALLY_TRAP_SIG=1ENV ACTIONS_RUNNER_PRINT_LOG_TO_STDOUT=1RUN apt update -y && apt install curl unzip -yRUN adduser --disabled-password --gecos"" --uid 1001 runner \    && groupadd docker --gid 123 \    && usermod -aGsudo runner \    && usermod -aG docker runner \    &&echo"%sudo ALL=(ALL:ALL) NOPASSWD:ALL" > /etc/sudoers \    &&echo"Defaults env_keep += \"DEBIAN_FRONTEND\"" >> /etc/sudoersWORKDIR /home/runnerRUN curl -f -L -o runner.tar.gz https://github.com/actions/runner/releases/download/v${RUNNER_VERSION}/actions-runner-linux-${RUNNER_ARCH}-${RUNNER_VERSION}.tar.gz \    && tar xzf ./runner.tar.gz \    &&rm runner.tar.gzRUN curl -f -L -o runner-container-hooks.zip https://github.com/actions/runner-container-hooks/releases/download/v${RUNNER_CONTAINER_HOOKS_VERSION}/actions-runner-hooks-k8s-${RUNNER_CONTAINER_HOOKS_VERSION}.zip \    && unzip ./runner-container-hooks.zip -d ./k8s \    &&rm runner-container-hooks.zipUSER runner

Software installed in the ARC runner image

The ARCrunner image is bundled with the following software:

For more information, seeARC's runner image Dockerfile in the Actions repository.

Assets and releases

ARC is released as two Helm charts and one container image. The Helm charts are only published as Open Container Initiative (OCI) packages. ARC does not provide tarballs or Helm repositories via GitHub Pages.

You can find the latest releases of ARC's Helm charts and container image on GitHub Packages:

The supported runner image is released as a separate container image, which you can find atactions-runner on GitHub Packages.

Legal notice

Portions have been adapted fromhttps://github.com/actions/actions-runner-controller/ under the Apache-2.0 license:

Copyright 2019 Moto IshizawaLicensed under the Apache License, Version 2.0 (the "License");you may not use this file except in compliance with the License.You may obtain a copy of the License at    http://www.apache.org/licenses/LICENSE-2.0Unless required by applicable law or agreed to in writing, softwaredistributed under the License is distributed on an "AS IS" BASIS,WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.See the License for the specific language governing permissions andlimitations under the License.

Next steps

When you're ready to use ARC to execute workflows, seeUsing Actions Runner Controller runners in a workflow.

You cannot use additional labels to target runners created by ARC. You can only use the installation name of the runner scale set that you specified during the installation or by defining the value of therunnerScaleSetName field in yourvalues.yaml file. These are used as the 'single label' to use as yourruns-on target. SeeUsing self-hosted runners in a workflow.

You can scale runners statically or dynamically depending on your needs. SeeDeploying runner scale sets with Actions Runner Controller.


[8]ページ先頭

©2009-2025 Movatter.jp