{"id":21802625,"url":"https://github.com/yc-actions/yc-github-runner","last_synced_at":"2025-10-06T23:04:28.654Z","repository":{"id":103402055,"uuid":"587379963","full_name":"yc-actions/yc-github-runner","owner":"yc-actions","description":"On-demand self-hosted Yandex Cloud runner for GitHub Actions","archived":false,"fork":false,"pushed_at":"2025-10-06T18:07:30.000Z","size":36791,"stargazers_count":19,"open_issues_count":1,"forks_count":6,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-10-06T23:02:52.924Z","etag":null,"topics":["actions","github","github-actions","runner","yandex-cloud"],"latest_commit_sha":null,"homepage":"","language":"TypeScript","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/yc-actions.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2023-01-10T16:05:43.000Z","updated_at":"2025-10-06T18:05:52.000Z","dependencies_parsed_at":"2023-09-26T12:36:38.309Z","dependency_job_id":"73c6db35-2557-43ed-9919-a76e5347319b","html_url":"https://github.com/yc-actions/yc-github-runner","commit_stats":{"total_commits":351,"total_committers":3,"mean_commits":117.0,"dds":0.06552706552706555,"last_synced_commit":"f045763c8978372076df73e36f6e6f850f0554d6"},"previous_names":[],"tags_count":11,"template":false,"template_full_name":null,"purl":"pkg:github/yc-actions/yc-github-runner","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yc-actions%2Fyc-github-runner","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yc-actions%2Fyc-github-runner/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yc-actions%2Fyc-github-runner/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yc-actions%2Fyc-github-runner/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/yc-actions","download_url":"https://codeload.github.com/yc-actions/yc-github-runner/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yc-actions%2Fyc-github-runner/sbom","scorecard":{"id":440249,"data":{"date":"2025-07-28","repo":{"name":"github.com/yc-actions/yc-github-runner","commit":"7659cb33580649610316f2dc9edea1b2ef678ecf"},"scorecard":{"version":"v5.2.1-26-g4feedb85","commit":"4feedb857ab8d82158aa9774bf8054df41992180"},"score":4.2,"checks":[{"name":"Code-Review","score":0,"reason":"Found 0/1 approved changesets -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#code-review"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#binary-artifacts"}},{"name":"Maintained","score":10,"reason":"30 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#maintained"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#dangerous-workflow"}},{"name":"Packaging","score":-1,"reason":"packaging workflow not detected","details":["Warn: no GitHub/GitLab publishing workflow detected."],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#packaging"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/check-dist.yml:1","Warn: no topLevel permission defined: .github/workflows/test.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#token-permissions"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#cii-best-practices"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: MIT License: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#license"}},{"name":"Signed-Releases","score":-1,"reason":"no releases found","details":null,"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":0,"reason":"branch protection not enabled on development/release branches","details":["Warn: branch protection not enabled for branch 'main'"],"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#branch-protection"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#security-policy"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 29 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#sast"}},{"name":"Pinned-Dependencies","score":1,"reason":"dependency not pinned by hash detected -- score normalized to 1","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/check-dist.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/yc-actions/yc-github-runner/check-dist.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/check-dist.yml:27: update your workflow using https://app.stepsecurity.io/secureworkflow/yc-actions/yc-github-runner/check-dist.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/check-dist.yml:47: update your workflow using https://app.stepsecurity.io/secureworkflow/yc-actions/yc-github-runner/check-dist.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/test.yml:13: update your workflow using https://app.stepsecurity.io/secureworkflow/yc-actions/yc-github-runner/test.yml/main?enable=pin","Warn: npmCommand not pinned by hash: .github/workflows/test.yml:15","Info:   0 out of   4 GitHub-owned GitHubAction dependencies pinned","Info:   1 out of   2 npmCommand dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#pinned-dependencies"}},{"name":"Vulnerabilities","score":8,"reason":"2 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GHSA-xffm-g5w8-qvg7","Warn: Project is vulnerable to: GHSA-fjxv-7rqg-78g4"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/4feedb857ab8d82158aa9774bf8054df41992180/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-19T05:26:48.825Z","repository_id":103402055,"created_at":"2025-08-19T05:26:48.825Z","updated_at":"2025-08-19T05:26:48.825Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":278692939,"owners_count":26029408,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-06T02:00:05.630Z","response_time":65,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["actions","github","github-actions","runner","yandex-cloud"],"created_at":"2024-11-27T11:29:52.688Z","updated_at":"2025-10-06T23:04:28.623Z","avatar_url":"https://github.com/yc-actions.png","language":"TypeScript","readme":"## GitHub Action to On-demand self-hosted YC runner for GitHub Actions.\n\nStart your Yandex Cloud self-hosted runner right before you need it. Run the job on it. Finally, stop it when you\nfinish. And all this automatically as a part of your GitHub Actions workflow.\n\n**Table of Contents**\n\n\u003c!-- toc --\u003e\n\n- [Usage](#usage)\n- [Permissions](#permissions)\n- [License Summary](#license-summary)\n\n\u003c!-- tocstop --\u003e\n\n## Usage\n\n```yaml\nname: do-the-job\non: pull_request\njobs:\n  start-runner:\n    name: Start self-hosted YC runner\n    runs-on: ubuntu-latest\n    outputs:\n      label: ${{ steps.start-yc-runner.outputs.label }}\n      instance-id: ${{ steps.start-yc-runner.outputs.instance-id }}\n    steps:\n      - name: Start YC runner\n        id: start-yc-runner\n        uses: yc-actions/yc-github-runner@v2\n        with:\n          mode: start\n          yc-sa-json-credentials: ${{ secrets.YC_SA_JSON_CREDENTIALS }}\n          github-token: ${{ secrets.GH_PERSONAL_ACCESS_TOKEN }}\n          folder-id: b1g*********\n          image-id: fd80*********\n          cores: 2\n          memory: 2GB\n          core-fraction: 100\n          subnet-id: e9b*********\n          ttl: PT24H\n  do-the-job:\n    name: Do the job on the runner\n    needs: start-runner # required to start the main job when the runner is ready\n    runs-on: ${{ needs.start-runner.outputs.label }} # run the job on the newly created runner\n    steps:\n      - name: Hello World\n        run: echo 'Hello World!'\n  stop-runner:\n    name: Stop self-hosted YC runner\n    needs:\n      - start-runner # required to get output from the start-runner job\n      - do-the-job # required to wait when the main job is done\n    runs-on: ubuntu-latest\n    if: ${{ always() }} # required to stop the runner even if the error happened in the previous jobs\n    steps:\n      - name: Stop YC runner\n        uses: yc-actions/yc-github-runner@v2\n        with:\n          mode: stop\n          yc-sa-json-credentials: ${{ secrets.YC_SA_JSON_CREDENTIALS }}\n          github-token: ${{ secrets.GH_PERSONAL_ACCESS_TOKEN }}\n          label: ${{ needs.start-runner.outputs.label }}\n          instance-id: ${{ needs.start-runner.outputs.instance-id }}\n```\n\nOne of `yc-sa-json-credentials`, `yc-iam-token` or `yc-sa-id` should be provided depending on the authentication method you\nwant to use. The action will use the first one it finds.\n* `yc-sa-json-credentials` should contain JSON with authorized key for Service Account. More info\n  in [Yandex Cloud IAM documentation](https://yandex.cloud/en/docs/iam/operations/authentication/manage-authorized-keys#cli_1).\n* `yc-iam-token` should contain IAM token. It can be obtained using `yc iam create-token` command or using\n  [yc-actions/yc-iam-token-fed](https://github.com/yc-actions/yc-iam-token-fed)\n```yaml\n  - name: Get Yandex Cloud IAM token\n    id: get-iam-token\n    uses: docker://ghcr.io/yc-actions/yc-iam-token-fed:1.0.0\n    with:\n      yc-sa-id: aje***\n```\n* `yc-sa-id` should contain Service Account ID. It can be obtained using `yc iam service-accounts list` command. It is\n  used to exchange GitHub token for IAM token using Workload Identity Federation. More info in [Yandex Cloud IAM documentation](https://yandex.cloud/ru/docs/iam/concepts/workload-identity).\n\n\nSee [action.yml](action.yml) for the full documentation for this action's inputs and outputs.\n\n### TTL input\nIf it is set, `expires` label will be added to the instance with the value of the current time plus TTL in seconds.\nInstance won't automatically be destroyed by Yandex.Cloud, you should handle it yourself.\nFor example, by using Cron trigger that will call Cloud Function to destroy the instance.\n\n## Permissions\n\nTo perform this action, it is required that the service account on behalf of which we are acting has granted\nthe `compute.admin` role or greater.\n\n## License Summary\n\nThis code is made available under the MIT license.\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fyc-actions%2Fyc-github-runner","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fyc-actions%2Fyc-github-runner","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fyc-actions%2Fyc-github-runner/lists"}