You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+33-1Lines changed: 33 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -7,11 +7,42 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
8
8
## [Unreleased]
9
9
10
+
## [0.9.0] - 2020-12-08
11
+
12
+
### Added
13
+
14
+
- Add support for GitHub Enterprise Server (GHES) #412, #481, #467@mcaulifn@jonico
15
+
- Allow configuring additional security groups #392@surminus
16
+
17
+
### Changed
18
+
19
+
- Log groups per type of logging #476
20
+
- Copy directory *after* installing zip #444@masterful
21
+
- Update ubuntu example with rootless docker and non privileged user #433
22
+
- Changed strategy in scaling. Previous the module scaled by checking for any queued workflow for the repo initiation the check_run event. Now the module scales only if the correlated check_run is still in queued state. #423
23
+
10
24
### Fixed
25
+
11
26
- Fix missing permissions for CloudWatch Agent #445@bennettp123
27
+
- Swap scale up/scale down timeout description #468@jonico
28
+
- Fix for invalid configuration #466@jonico
29
+
- Add ssm:GetParameter to runner-ssm-parameters #446@bennettp123
30
+
- Replace crypto #429
31
+
- Scale up lambda deprecated attribute #410
32
+
33
+
### Mirgrations
34
+
35
+
Changes related to logging groups introduced via #476 will destroy existing logging group in AWS cloudwatch for runners log. In case you would like to keep the logging ensure you remove the log group from the state before running an apply
36
+
37
+
```bash
38
+
export RESOURCE=$(terraform state list | grep "aws_cloudwatch_log_group.runner")
39
+
terraform state rm $RESOURCE
40
+
```
12
41
13
42
## [0.8.1] - 2020-12-08
43
+
14
44
### Changed
45
+
15
46
- Policy is missing for streaming logs to cloudwatch #388
0 commit comments