GitHub runner
- Canonical IS DevOps
Channel | Revision | Published | Runs on |
---|---|---|---|
latest/stable | 302 | 02 Dec 2024 | |
latest/stable | 299 | 02 Dec 2024 | |
latest/stable | 1 | 09 Feb 2022 | |
latest/beta | 308 | 02 Dec 2024 | |
latest/beta | 310 | 28 Nov 2024 | |
latest/edge | 311 | 03 Dec 2024 | |
latest/edge | 310 | 28 Nov 2024 | |
latest/edge | 4 | 26 Apr 2022 | |
local-lxd/edge | 306 | 27 Nov 2024 | |
1/stable | 177 | 05 Jun 2024 | |
1/edge | 177 | 05 Jun 2024 |
juju deploy github-runner
Deploy universal operators easily with Juju, the Universal Operator Lifecycle Manager.
Platform:
GitHub runner cryptographic overview
This document provides an overview of the cryptographic technologies used in the GitHub runner charm, including encryption, decryption, hashing and digital signatures.
Overall Description of Cryptographic Technology Use
The GitHub runner charm uses various cryptographic technologies to ensure secure communication and data integrity. The following sections describe each of the components.
TLS
The GitHub runner communicates with GitHub to receive information about the workflows to be executed, retrieve the repositories config and send back workflow logs to the user. This communication uses urllib3 under the hood using TLS 1.3.
In OpenStack mode, the runner creates virtual machines to run the workload in OpenStack. The GitHub runner charm interacts with the OpenStack API to create and manage virtual machines. These interactions are secured via TLS. The communication between these virtual machines and runner is done via SSH and secured by 256 byte keypairs.
DockerHub Registry is used as a cache between the official DockerHub and GitHub runners to avoid rate limiting. Communication between GitHub runners and DockerHub cache is secured via TLS 1.3 and certified by Let’s Encrypt.
Images that run in the OpenStack VM are built using the Image Builder. This application needs to download the runner binary, yq and the cloud image to base the image on. All these images are downloaded with TLS.
The GitHub runner charm supports being deployed behind an HTTP proxy. Aproxy is installed and enabled when an HTTP proxy is detected so that jobs executing in the runner VMs don’t have to configure the proxy themselves. Aproxy is a transparent proxy service for HTTP and HTTPS/TLS connections. Aproxy works by pre-reading the Host header in HTTP requests and SNI in TLS hellos; it forwards HTTP proxy requests with the hostname therefore, complies with HTTP proxies requiring destination hostname for auditing or access control. Aproxy doesn’t and can’t decrypt the TLS connections. It works by reading the plaintext SNI information in the client hello during the TLS handshake, so the authentication and encryption of TLS are never compromised. Aproxy supports TLS 1.0 and above except TLS 1.3 Encrypted Client Hello.
Signature Verification
Images that run in the OpenStack VM (Cloud images) are verified by SHA256 checksum. Runner binary is also downloaded by GitHub Runner Charm and verified by SHA256 in this charm.
User SSH Access
Sometimes users need to access the VM instance that is running the workload, to establish this connection Tmate is used. Tmate uses the SSH protocol to secure shell connections between users and the GitHub runner. The connection is secured with RSA keypair and ed25519 fingerprints.
Cryptographic Technology Used by the Product
The following cryptographic technologies are used internally by our product:
TLS
- Communication with GitHub is done via TLS v1.3
- The Repo Policy Compliance tool communicates with the GitHub API using TLS v1.3.
- Communication with the OpenStack API uses TLS v1.3.
Signature Verification
Cloud images that are downloaded by the Image Builder are verified by SHA256 checksum. Runner binary is also downloaded by the GitHub Runner Charm and verified by SHA256 in this charm.
User SSH Access
Tmate secures SSH connections using OpenSSL.
RSA
The communication between these virtual machines and the runner is done via SSH and secured by RSA 256 byte keypairs.
Cryptographic Technology Exposed to Users
The following sections describe the cryptographic technologies exposed to the user:
Tmate
- Tmate uses RSA (384 byte) and ED25519 (32 byte) fingerprints for connections from users to Tmate and from the managers to Tmate. OpenSSL is being used by Tmate to secure the connection between the user/manager to the runner.
Docker Hub Cache
Docker Hub cache connection is secured via TLS 1.3 and certified by Let’s Encrypt.
Aproxy
Aproxy supports TLS 1.0 and above except TLS 1.3 Encrypted Client Hello.
Packages or Technology Providing Cryptographic Functionality
The following packages or technologies provide cryptographic functionality:
- OpenSSL library is being used for TLS and HTTPS connections.
- Urllib3 python library is being used for TLS and HTTPS connections.
- Default clients in Ubuntu for SSH and TLS are being used.
- Python hashlib package is being used for SHA256 checksum calculation/verification of runner binary and Cloud Init.
- OpenStack client is being used to generate keypairs.
- Aproxy using the golang.org/x/crypto package to parse TLS client hello message.