TL; DR: Given plenty of free time of Github hosted runners, I’m tempted to use it instead of running self-hosted ones in my GCP environment. Here are some options to grant network access to my GCP VPC.
Prerequisites: Google Workload Identity Federation for Github Runners
Option #1, grab the public IP of the runner on-the-fly and grant/revoke access using Google’s firewall rules.
YAML
x
35
35
1
jobs
2
ssh-test
3
runs-on ubuntu-latest
4
permissions
5
contents'read'
6
id-token'write'
7
steps
8
# prerequisite steps here
9
name Temporary firewall rule
10
run
11
RUNNER_IP=$(curl -s https://httpbin.org/ip |jq -r '.origin')
12
gcloud compute firewall-rules create gha-runner-to-bastion \
13
--allow=tcp:22 \
14
--source-ranges="$RUNNER_IP/32" \
15
--description="Allowing the GH runner to access to bastion" \
16
--project=my-gcp-project \
17
--network=my-gcp-vpc \
18
--target-service-accounts=gha-runner@my-gcp-project.iam.gserviceaccount.com
19
name SSH Setup
20
id ssh_setup
21
run
22
mkdir -p ~/.ssh
23
echo "$SSH_PK" > ~/.ssh/google_compute_engine
24
chmod 600 ~/.ssh/google_compute_engine
25
ssh-keygen -y -f ~/.ssh/google_compute_engine > ~/.ssh/google_compute_engine.pub
26
read instance_name instance_zone <<<$(gcloud compute instances list --filter=labels.app=bastion --format "value(name,zone)" |head -n1)
27
echo "BASTION=${instance_name}" >> $GITHUB_ENV
28
echo "ZONE=${instance_zone}" >> $GITHUB_ENV
29
env
30
SSH_PK $ secrets.SSH_PK
31
# steps to do ssh stuff here
32
name Clean up
33
run
34
gcloud compute firewall-rules delete gha-runner-to-bastion \
35
--project=my-gcp-project --quiet
Option #2, use Google IAP(Identity Aware Proxy) tunnel, which I think it’s better
YAML
xxxxxxxxxx
1
23
23
1
jobs
2
ssh-test
3
runs-on ubuntu-latest
4
permissions
5
contents'read'
6
id-token'write'
7
steps
8
# prerequisite steps here including the SSH setup step
9
name Open IAP
10
run
11
CLOUDSQL_PORT=3306
12
13
# SSH Tunneling...
14
gcloud compute ssh ${BASTION} --zone=${ZONE} --ssh-key-file=~/.ssh/google_compute_engine -- \
15
-fN -L "1$CLOUDSQL_PORT:$CLOUDSQL_HOST:$CLOUDSQL_PORT" \
16
-M -S bastion-socket \
17
-o UserKnownHostsFile=/dev/null \
18
-o StrictHostKeyChecking=no
19
# do stuff with the SSH tunnel here
20
name Close IAP
21
run
22
gcloud compute ssh ${BASTION} --zone=${ZONE} -- \
23
-S bastion-socket -O exit