Skip to content

Releases: philips-labs/terraform-aws-github-runner

Release v0.9.1

22 Jan 20:47
Compare
Choose a tag to compare

Fixed

Release v0.9.0

21 Jan 16:04
Compare
Choose a tag to compare

Added

Changed

  • Log groups per type of logging #476
  • Copy directory after installing zip #444 @masterful
  • Update ubuntu example with rootless docker and non privileged user #433
  • Changed strategy in scaling. Previous the module scaled by checking for any queued workflow for the repo initiation the check_run event. Now the module scales only if the correlated check_run is still in queued state. #423

Fixed

Migrations

Changes related to logging groups introduced via #476 will destroy existing logging group in AWS cloudwatch for runners log. In case you would like to keep the logging ensure you remove the log group from the state before running an apply

export RESOURCE=$(terraform state list | grep "aws_cloudwatch_log_group.runner")
terraform state rm $RESOURCE

Release v0.9.0_next

20 Jan 09:14
ff43686
Compare
Choose a tag to compare
Release v0.9.0_next Pre-release
Pre-release
Pre release 0.9.0

Release v0.8.1

08 Dec 16:27
Compare
Choose a tag to compare

Changed

  • Policy is missing for streaming logs to cloudwatch #388

Release v0.8.0

08 Dec 08:25
Compare
Choose a tag to compare

Changed

  • Examples upgraded to Terraform 13 (#372)

Added

  • Streaming runner logs to cloudwatch #375

Release v0.7.0

04 Dec 08:57
Compare
Choose a tag to compare

Changed

Added

  • Allow operator to pass in a list of managed IAM policy ARNs for the runner role #361 @jpalomaki
  • expand options for sourcing lambda to include S3 #292 @eky5006

Release v0.6.0

10 Oct 11:00
Compare
Choose a tag to compare

Added

  • Only allow tagging and termination of runner instances #201 @jpalomaki

Fixed

Release v0.5.0

25 Aug 20:46
Compare
Choose a tag to compare

Added

  • feat: Manage log groups via module. When upgrading you have to import the log groups by AWS into your state. See below the example commands for the default example.
terraform import module.runners.module.runner_binaries.aws_cloudwatch_log_group.syncer "/aws/lambda/default-syncer"
terraform import module.runners.module.runners.aws_cloudwatch_log_group.scale_up "/aws/lambda/default-scale-up"
terraform import module.runners.module.runners.aws_cloudwatch_log_group.scale_down "/aws/lambda/default-scale-down"
terraform import module.runners.module.webhook.aws_cloudwatch_log_group.webhook "/aws/lambda/default-webhook"
  • feat: Added option to binaries syncer to upgrade to pre-releases, preventing any auto-updating on startup. Option runner_allow_prerelease_binaries is disabled by default. (#141, #165) @sjagoe

  • feat: SSM policies are by default disabled, set enable_ssm_on_runners to true to enable access to the runner instances via SSM. (#143) @HenryNguyen5

  • feat: Log full sqs event (#147) @HenryNguyen5

Release v0.4.0

10 Aug 15:55
Compare
Choose a tag to compare

Added

  • Add option to keep runners idle

Release v0.3.0

06 Aug 11:44
Compare
Choose a tag to compare

Added

  • feat: Add support for ARM64 runners #102 @bdruth
  • feat: added variables in the root module to allow passing in pre and and post install #45 @jaydenrasmussen

Updated