You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+21-1Lines changed: 21 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,25 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
8
8
## [Unreleased]
9
9
10
+
## [0.5.0] - 2020-08-25
11
+
12
+
### Added
13
+
14
+
- feat: Manage log groups via module. When upgrading you have to import the log groups by AWS into your state. See below the example commands for the default example.
- feat: Added option to binaries syncer to upgrade to pre-releases, preventing any auto-updating on startup. Option `runner_allow_prerelease_binaries` is disabled by default. (#141, #165) @sjagoe
24
+
25
+
- feat: SSM policies are by default disabled, set `enable_ssm_on_runners` to `true` to enable access to the runner instances via SSM. (#143) @HenryNguyen5
26
+
27
+
- feat: Log full sqs event (#147) @HenryNguyen5
28
+
10
29
## [0.4.0] - 2020-08-10
11
30
12
31
### Added
@@ -50,7 +69,8 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
@@ -132,7 +132,7 @@ Next create a second terraform workspace and initiate the module, see the exampl
132
132
```terraform
133
133
module "github-runner" {
134
134
source = "philips-labs/github-runner/aws"
135
-
version = "0.2.0"
135
+
version = "0.5.0"
136
136
137
137
aws_region = "eu-west-1"
138
138
vpc_id = "vpc-123"
@@ -297,10 +297,12 @@ No requirements.
297
297
| instance_profile_path | The path that will be added to the instance_profile, if not set the environment name will be used. |`string`|`null`| no |
298
298
| instance_type | Instance type for the action runner. |`string`|`"m5.large"`| no |
299
299
| kms_key_id | Custom KMS key to encrypted lambda secrets, if not provided and `encrypt_secrets` = `true` a KMS key will be created by the module. Secrets will be encrypted with a context `Environment = var.environment`. |`string`|`null`| no |
300
+
| logging_retention_in_days | Specifies the number of days you want to retain log events for the lambda log group. Possible values are: 0, 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, and 3653. |`number`|`7`| no |
300
301
| manage_kms_key | Let the module manage the KMS key. |`bool`|`true`| no |
301
302
| minimum_running_time_in_minutes | The time an ec2 action runner should be running at minimum before terminated if non busy. |`number`|`5`| no |
302
303
| role_path | The path that will be added to role path for created roles, if not set the environment name will be used. |`string`|`null`| no |
303
304
| role_permissions_boundary | Permissions boundary that will be added to the created roles. |`string`|`null`| no |
305
+
| runner_allow_prerelease_binaries | Allow the runners to update to prerelease binaries. |`bool`|`false`| no |
304
306
| runner_as_root | Run the action runner under the root user. |`bool`|`false`| no |
305
307
| runner_binaries_syncer_lambda_timeout | Time out of the binaries sync lambda in seconds. |`number`|`300`| no |
306
308
| runner_binaries_syncer_lambda_zip | File location of the binaries sync lambda zip file. |`string`|`null`| no |
@@ -317,6 +319,7 @@ No requirements.
317
319
| vpc_id | The VPC for security groups of the action runners. |`string`| n/a | yes |
318
320
| webhook_lambda_timeout | Time out of the webhook lambda in seconds. |`number`|`10`| no |
319
321
| webhook_lambda_zip | File location of the webhook lambda zip file. |`string`|`null`| no |
322
+
| enable_ssm_on_runners | Enable to allow access the runner instances for debugging purposes via SSM. Note that this adds additional permissions to the runner instances. |`bool`|`false`| no |
Copy file name to clipboardExpand all lines: modules/runner-binaries-syncer/README.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,8 +54,10 @@ No requirements.
54
54
| lambda\_schedule\_expression | Scheduler expression for action runner binary syncer. |`string`|`"cron(27 * * * ? *)"`| no |
55
55
| lambda\_timeout | Time out of the lambda in seconds. |`number`|`300`| no |
56
56
| lambda\_zip | File location of the lambda zip file. |`string`|`null`| no |
57
+
| logging\_retention\_in\_days | Specifies the number of days you want to retain log events for the lambda log group. Possible values are: 0, 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180, 365, 400, 545, 731, 1827, and 3653. |`number`|`7`| no |
57
58
| role\_path | The path that will be added to the role, if not set the environment name will be used. |`string`|`null`| no |
58
59
| role\_permissions\_boundary | Permissions boundary that will be added to the created role for the lambda. |`string`|`null`| no |
60
+
| runner\_allow\_prerelease\_binaries | Allow the runners to update to prerelease binaries. |`bool`|`false`| no |
59
61
| runner\_architecture | The platform architecture for the runner instance (x64, arm64), defaults to 'x64' |`string`|`"x64"`| no |
60
62
| tags | Map of tags that will be added to created resources. By default resources will be tagged with name and environment. |`map(string)`|`{}`| no |
0 commit comments