Releases: github-aws-runners/terraform-aws-github-runner
Releases · github-aws-runners/terraform-aws-github-runner
v0.14.0
v0.13.1
0.13.1 (2021-06-01)
Bug Fixes
- .gitignore for 'secrets.auto.tfvars' (38d7df0)
- Add some essential dependecies on ubuntu example (0079d16)
- fail to download wrong tag of lambda (#840) (1112ca8)
- increase runner sync lambda memory setting and upgrade npm dependencies (#844) (b9e36e9)
- revert dependency updates on runner module (#784) (76cdbe3)
- ubuntu example runner_log_files variable (5b3fc5b)
- ubuntu example to log syslog instead of messages (#785) (fb3e5d2)
- Update ubuntu example with assume_role comment (2478daf)
- upgrade runner module to support upgrade octokit auth-app (#786) (e110318)
- docs: fix variable name create_service_linked_role_spot in readme (#750) (42b0427), closes #736
v0.13.0
v0.12.0
Release v0.11.0
Release v0.10.0
Added
- Support runner groups (#496)
Release v0.9.1
Release v0.9.0
Added
- Add support for GitHub Enterprise Server (GHES) #412, #481, #467 @mcaulifn @jonico
- Allow configuring additional security groups #392 @surminus
Changed
- Log groups per type of logging #476
- Copy directory after installing zip #444 @masterful
- Update ubuntu example with rootless docker and non privileged user #433
- Changed strategy in scaling. Previous the module scaled by checking for any queued workflow for the repo initiation the check_run event. Now the module scales only if the correlated check_run is still in queued state. #423
Fixed
- Fix missing permissions for CloudWatch Agent #445 @bennettp123
- Swap scale up/scale down timeout description #468 @jonico
- Fix for invalid configuration #466 @jonico
- Add ssm:GetParameter to runner-ssm-parameters #446 @bennettp123
- Replace crypto #429
- Scale up lambda deprecated attribute #410
Migrations
Changes related to logging groups introduced via #476 will destroy existing logging group in AWS cloudwatch for runners log. In case you would like to keep the logging ensure you remove the log group from the state before running an apply
export RESOURCE=$(terraform state list | grep "aws_cloudwatch_log_group.runner")
terraform state rm $RESOURCE
Release v0.9.0_next
Pre release 0.9.0
Release v0.8.1
Changed
- Policy is missing for streaming logs to cloudwatch #388