@cloudsnorkel/cdk-github-runners 0.14.19 β 0.14.20
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +101 -76
- package/API.md +73 -24
- package/README.md +2 -2
- package/lib/access.js +1 -1
- package/lib/image-builders/api.js +1 -1
- package/lib/image-builders/aws-image-builder/base-image.js +2 -2
- package/lib/image-builders/aws-image-builder/builder.js +1 -1
- package/lib/image-builders/aws-image-builder/deprecated/ami.js +1 -1
- package/lib/image-builders/aws-image-builder/deprecated/container.js +1 -1
- package/lib/image-builders/aws-image-builder/deprecated/linux-components.js +1 -1
- package/lib/image-builders/aws-image-builder/deprecated/windows-components.js +1 -1
- package/lib/image-builders/codebuild-deprecated.js +1 -1
- package/lib/image-builders/codebuild.d.ts +10 -0
- package/lib/image-builders/codebuild.js +1 -1
- package/lib/image-builders/components.js +1 -1
- package/lib/image-builders/static.js +1 -1
- package/lib/providers/codebuild.d.ts +12 -0
- package/lib/providers/codebuild.js +3 -3
- package/lib/providers/common.js +3 -3
- package/lib/providers/composite.js +16 -31
- package/lib/providers/ec2.js +2 -2
- package/lib/providers/ecs.d.ts +3 -1
- package/lib/providers/ecs.js +2 -2
- package/lib/providers/fargate.d.ts +14 -0
- package/lib/providers/fargate.js +3 -3
- package/lib/providers/lambda.d.ts +2 -0
- package/lib/providers/lambda.js +3 -3
- package/lib/runner.js +1 -1
- package/lib/secrets.js +1 -1
- package/package.json +1 -1
package/.jsii
CHANGED
|
@@ -3858,7 +3858,7 @@
|
|
|
3858
3858
|
},
|
|
3859
3859
|
"name": "@cloudsnorkel/cdk-github-runners",
|
|
3860
3860
|
"readme": {
|
|
3861
|
-
"markdown": "# GitHub Self-Hosted Runners CDK Constructs\n\n[][7]\n[][6]\n[][8]\n[][11]\n[][12]\n[](https://github.com/CloudSnorkel/cdk-github-runners/actions/workflows/release.yml)\n[](https://github.com/CloudSnorkel/cdk-github-runners/blob/main/LICENSE)\n\nUse this CDK construct to create ephemeral [self-hosted GitHub runners][1] on-demand inside your AWS account.\n\n* π§© Easy to configure GitHub integration with a web-based interface\n* π§ Customizable runners with decent defaults\n* ππ» Multiple runner configurations controlled by labels\n* π Everything fully hosted in your account\n* π Automatically updated build environment with latest runner version\n\nSelf-hosted runners in AWS are useful when:\n\n* You need easy access to internal resources in your actions\n* You want to pre-install some software for your actions\n* You want to provide some basic AWS API access (but [aws-actions/configure-aws-credentials][2] has more security controls)\n* You are using GitHub Enterprise Server\n\nEphemeral (or on-demand) runners are the [recommended way by GitHub][14] for auto-scaling, and they make sure all jobs run with a clean image. Runners are started on-demand. You don't pay unless a job is running.\n\n## API\n\nThe best way to browse API documentation is on [Constructs Hub][13]. It is available in all supported programming languages.\n\n## Providers\n\nA runner provider creates compute resources on-demand and uses [actions/runner][5] to start a runner.\n\n| | EC2 | CodeBuild | Fargate | ECS | Lambda |\n|------------------|-------------------|----------------------------|----------------|----------------|---------------|\n| **Time limit** | Unlimited | 8 hours | Unlimited | Unlimited | 15 minutes |\n| **vCPUs** | Unlimited | 2, 4, 8, or 72 | 0.25 to 4 | Unlimited | 1 to 6 |\n| **RAM** | Unlimited | 3gb, 7gb, 15gb, or 145gb | 512mb to 30gb | Unlimited | 128mb to 10gb |\n| **Storage** | Unlimited | 50gb to 824gb | 20gb to 200gb | Unlimited | Up to 10gb |\n| **Architecture** | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 |\n| **sudo** | β | β | β | β | β |\n| **Docker** | β | β (Linux only) | β | β | β |\n| **Spot pricing** | β | β | β | β | β |\n| **OS** | Linux, Windows | Linux, Windows | Linux, Windows | Linux, Windows | Linux |\n\nThe best provider to use mostly depends on your current infrastructure. When in doubt, CodeBuild is always a good choice. Execution history and logs are easy to view, and it has no restrictive limits unless you need to run for more than 8 hours.\n\n* EC2 is useful when you want runners to have complete access to the host\n* ECS is useful when you want to control the infrastructure, like leaving the runner host running for faster startups\n* Lambda is useful for short jobs that can work within time, size and readonly system constraints\n\nYou can also create your own provider by implementing `IRunnerProvider`.\n\n## Installation\n\n1. Install and use the appropriate package\n <details><summary>Python</summary>\n\n ### Install\n Available on [PyPI][6].\n ```bash\n pip install cloudsnorkel.cdk-github-runners\n ```\n ### Use\n ```python\n from aws_cdk import App, Stack\n from cloudsnorkel.cdk_github_runners import GitHubRunners\n\n app = App()\n stack = Stack(app, \"github-runners\")\n GitHubRunners(stack, \"runners\")\n\n app.synth()\n ```\n </details>\n <details><summary>TypeScript or JavaScript</summary>\n\n ### Install\n Available on [npm][7].\n ```bash\n npm i @cloudsnorkel/cdk-github-runners\n ```\n ### Use\n ```typescript\n import { App, Stack } from 'aws-cdk-lib';\n import { GitHubRunners } from '@cloudsnorkel/cdk-github-runners';\n\n const app = new App();\n const stack = new Stack(app, 'github-runners');\n new GitHubRunners(stack, 'runners');\n\n app.synth();\n ```\n </details>\n <details><summary>Java</summary>\n\n ### Install\n Available on [Maven][8].\n ```xml\n <dependency>\n <groupId>com.cloudsnorkel</groupId>\n <artifactId>cdk.github.runners</artifactId>\n </dependency>\n ```\n ### Use\n ```java\n import software.amazon.awscdk.App;\n import software.amazon.awscdk.Stack;\n import com.cloudsnorkel.cdk.github.runners.GitHubRunners;\n\n public class Example {\n public static void main(String[] args){\n App app = new App();\n Stack stack = new Stack(app, \"github-runners\");\n GitHubRunners.Builder.create(stack, \"runners\").build();\n\n app.synth();\n }\n }\n ```\n </details>\n <details><summary>Go</summary>\n\n ### Install\n Available on [GitHub][11].\n ```bash\n go get github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\n ```\n ### Use\n ```go\n package main\n\n import (\n \"github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\"\n \"github.com/aws/aws-cdk-go/awscdk/v2\"\n \"github.com/aws/jsii-runtime-go\"\n )\n\n func main() {\n app := awscdk.NewApp(nil)\n stack := awscdk.NewStack(app, jsii.String(\"github-runners\"), &awscdk.StackProps{})\n cloudsnorkelcdkgithubrunners.NewGitHubRunners(stack, jsii.String(\"runners\"), &cloudsnorkelcdkgithubrunners.GitHubRunnersProps{})\n\n app.Synth(nil)\n }\n ```\n </details>\n <details><summary>.NET</summary>\n\n ### Install\n Available on [Nuget][12].\n ```bash\n dotnet add package CloudSnorkel.Cdk.Github.Runners\n ```\n ### Use\n ```csharp\n using Amazon.CDK;\n using CloudSnorkel;\n\n namespace Example\n {\n sealed class Program\n {\n public static void Main(string[] args)\n {\n var app = new App();\n var stack = new Stack(app, \"github-runners\");\n new GitHubRunners(stack, \"runners\");\n app.Synth();\n }\n }\n }\n ```\n </details>\n2. Use `GitHubRunners` construct in your code (starting with default arguments is fine)\n3. Deploy your stack\n4. Look for the status command output similar to `aws --region us-east-1 lambda invoke --function-name status-XYZ123 status.json`\n ```\n β
github-runners-test\n\n β¨ Deployment time: 260.01s\n\n Outputs:\n github-runners-test.runnersstatuscommand4A30F0F5 = aws --region us-east-1 lambda invoke --function-name github-runners-test-runnersstatus1A5771C0-mvttg8oPQnQS status.json\n ```\n5. Execute the status command (you may need to specify `--profile` too) and open the resulting `status.json` file\n6. Open the URL in `github.setup.url` from `status.json` or [manually setup GitHub](SETUP_GITHUB.md) integration as an app or with personal access token\n7. Run status command again to confirm `github.auth.status` and `github.webhook.status` are OK\n8. Trigger a GitHub action that has a `self-hosted` label with `runs-on: [self-hosted, codebuild]` (or non-default labels you set in step 2)\n9. If the action is not successful, see [troubleshooting](#Troubleshooting)\n\n[](https://youtu.be/wlyv_3V8lIw)\n\n## Customizing\n\nThe default providers configured by `GitHubRunners` are useful for testing but probably not too much for actual production work. They run in the default VPC or no VPC and have no added IAM permissions. You would usually want to configure the providers yourself.\n\nFor example:\n\n```typescript\nlet vpc: ec2.Vpc;\nlet runnerSg: ec2.SecurityGroup;\nlet dbSg: ec2.SecurityGroup;\nlet bucket: s3.Bucket;\n\n// create a custom CodeBuild provider\nconst myProvider = new CodeBuildRunnerProvider(this, 'codebuild runner', {\n labels: ['my-codebuild'],\n vpc: vpc,\n securityGroups: [runnerSg],\n});\n// grant some permissions to the provider\nbucket.grantReadWrite(myProvider);\ndbSg.connections.allowFrom(runnerSg, ec2.Port.tcp(3306), 'allow runners to connect to MySQL database');\n\n// create the runner infrastructure\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nAnother way to customize runners is by modifying the image used to spin them up. The image contains the [runner][5], any required dependencies, and integration code with the provider. You may choose to customize this image by adding more packages, for example.\n\n```typescript\nconst myBuilder = FargateRunnerProvider.imageBuilder(this, 'image builder');\nmyBuilder.addComponent(\n RunnerImageComponent.custom({ commands: ['apt install -y nginx xz-utils'] }),\n);\n\nconst myProvider = new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['customized-fargate'],\n imageBuilder: myBuilder,\n});\n\n// create the runner infrastructure\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nYour workflow will then look like:\n\n```yaml\nname: self-hosted example\non: push\njobs:\n self-hosted:\n runs-on: [self-hosted, customized-fargate]\n steps:\n - run: echo hello world\n```\n\nWindows images can also be customized the same way.\n\n```typescript\nconst myWindowsBuilder = FargateRunnerProvider.imageBuilder(this, 'Windows image builder', {\n architecture: Architecture.X86_64,\n os: Os.WINDOWS,\n});\nmyWindowsBuilder.addComponent(\n RunnerImageComponent.custom({\n name: 'Ninja',\n commands: [\n 'Invoke-WebRequest -UseBasicParsing -Uri \"https://github.com/ninja-build/ninja/releases/download/v1.11.1/ninja-win.zip\" -OutFile ninja.zip',\n 'Expand-Archive ninja.zip -DestinationPath C:\\\\actions',\n 'del ninja.zip',\n ],\n }),\n);\n\nconst myProvider = new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['customized-windows-fargate'],\n imageBuilder: myWindowsBuilder,\n});\n\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nThe runner OS and architecture is determined by the image it is set to use. For example, to create a Fargate runner provider for ARM64 set the `architecture` property for the image builder to `Architecture.ARM64` in the image builder properties.\n\n```typescript\nnew GitHubRunners(this, 'runners', {\n providers: [\n new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['arm64', 'fargate'],\n imageBuilder: FargateRunnerProvider.imageBuilder(this, 'image builder', {\n architecture: Architecture.ARM64,\n os: Os.LINUX_UBUNTU,\n }),\n }),\n ],\n});\n```\n\n### Composite Providers\n\nComposite providers allow you to combine multiple runner providers with different strategies. There are two types:\n\n**Fallback Strategy**: Try providers in order until one succeeds. Useful for trying spot instances first, then falling back to on-demand if spot capacity is unavailable.\n\n```typescript\n// Try spot instances first, fall back to on-demand if spot is unavailable\nconst ecsFallback = CompositeProvider.fallback(this, 'ECS Fallback', [\n new EcsRunnerProvider(this, 'ECS Spot', {\n labels: ['ecs', 'linux', 'x64'],\n spot: true,\n // ... other config\n }),\n new EcsRunnerProvider(this, 'ECS On-Demand', {\n labels: ['ecs', 'linux', 'x64'],\n spot: false,\n // ... other config\n }),\n]);\n\nnew GitHubRunners(this, 'runners', {\n providers: [ecsFallback],\n});\n```\n\n**Weighted Distribution Strategy**: Randomly select a provider based on weights. Useful for distributing load across multiple availability zones or instance types.\n\n```typescript\n// Distribute 60% of traffic to AZ-1, 40% to AZ-2\nconst distributedProvider = CompositeProvider.distribute(this, 'Fargate Distribution', [\n {\n weight: 3, // 3/(3+2) = 60%\n provider: new FargateRunnerProvider(this, 'Fargate AZ-1', {\n labels: ['fargate', 'linux', 'x64'],\n subnetSelection: vpc.selectSubnets({\n availabilityZones: [vpc.availabilityZones[0]],\n }),\n // ... other config\n }),\n },\n {\n weight: 2, // 2/(3+2) = 40%\n provider: new FargateRunnerProvider(this, 'Fargate AZ-2', {\n labels: ['fargate', 'linux', 'x64'],\n subnetSelection: vpc.selectSubnets({\n availabilityZones: [vpc.availabilityZones[1]],\n }),\n // ... other config\n }),\n },\n]);\n\nnew GitHubRunners(this, 'runners', {\n providers: [distributedProvider],\n});\n```\n\n**Important**: All providers in a composite must have the exact same labels. This ensures any provisioned runner can match the labels requested by the GitHub workflow job.\n\n### Custom Provider Selection\n\nBy default, providers are selected based on label matching: the first provider that has all the labels requested by the job is selected. You can customize this behavior using a provider selector Lambda function to:\n\n* Filter out certain jobs (prevent runner provisioning)\n* Dynamically select a provider based on job characteristics (repository, branch, time of day, etc.)\n* Customize labels for the runner (add, remove, or modify labels dynamically)\n\nThe selector function receives the full GitHub webhook payload, a map of all available providers and their labels, and the default provider/labels that would have been selected. It returns the provider to use (or `undefined` to skip runner creation) and the labels to assign to the runner.\n\n**Example: Route jobs to different providers based on repository**\n\n```typescript\nimport { ComputeType } from 'aws-cdk-lib/aws-codebuild';\nimport { Function, Code, Runtime } from 'aws-cdk-lib/aws-lambda';\nimport { GitHubRunners, CodeBuildRunnerProvider } from '@cloudsnorkel/cdk-github-runners';\n\nconst defaultProvider = new CodeBuildRunnerProvider(this, 'default', {\n labels: ['custom-runner', 'default'],\n});\nconst productionProvider = new CodeBuildRunnerProvider(this, 'production', {\n labels: ['custom-runner', 'production'],\n computeType: ComputeType.LARGE,\n});\n\nconst providerSelector = new Function(this, 'provider-selector', {\n runtime: Runtime.NODEJS_LATEST,\n handler: 'index.handler',\n code: Code.fromInline(`\n exports.handler = async (event) => {\n const { payload, providers, defaultProvider, defaultLabels } = event;\n\n // Route production repos to dedicated provider\n if (payload.repository.name.includes('prod')) {\n return {\n provider: '${productionProvider.node.path}',\n labels: ['custom-runner', 'production', 'modified-via-selector'],\n };\n }\n\n // Filter out draft PRs\n if (payload.workflow_job.head_branch?.startsWith('draft/')) {\n return { provider: undefined }; // Skip runner provisioning\n }\n\n // Use default for everything else\n return {\n provider: defaultProvider,\n labels: defaultLabels,\n };\n };\n `),\n});\n\nnew GitHubRunners(this, 'runners', {\n providers: [defaultProvider, productionProvider],\n providerSelector: providerSelector,\n});\n```\n\n**Example: Add dynamic labels based on job metadata**\n\n```typescript\nconst providerSelector = new Function(this, 'provider-selector', {\n runtime: Runtime.NODEJS_LATEST,\n handler: 'index.handler',\n code: Code.fromInline(`\n exports.handler = async (event) => {\n const { payload, defaultProvider, defaultLabels } = event;\n\n // Add branch name as a label\n const branch = payload.workflow_job.head_branch || 'unknown';\n const labels = [...(defaultLabels || []), 'branch:' + branch];\n\n return {\n provider: defaultProvider,\n labels: labels,\n };\n };\n `),\n});\n```\n\n**Important considerations:**\n\n* β οΈ **Label matching responsibility**: You are responsible for ensuring the selected provider's labels match what the job requires. If labels don't match, the runner will be provisioned but GitHub Actions won't assign the job to it.\n* β οΈ **No guarantee of assignment**: Provider selection only determines which provider will provision a runner. GitHub Actions may still route the job to any available runner with matching labels. For reliable provider assignment, consider repo-level runner registration (the default).\n* β‘ **Performance**: The selector runs synchronously during webhook processing. Keep it fast and efficientβthe webhook has a 30-second timeout total.\n\n## Examples\n\nWe provide comprehensive examples in the [`examples/`](examples/) folder to help you get started quickly:\n\n### Getting Started\n- **[Simple CodeBuild](examples/typescript/simple-codebuild/)** - Basic setup with just a CodeBuild provider (also available in [Python](examples/python/simple-codebuild/))\n\n### Provider Configuration\n- **[Composite Provider](examples/typescript/composite-provider/)** - Fallback and weighted distribution strategies (also available in [Python](examples/python/composite-provider/))\n- **[Provider Selector](examples/typescript/provider-selector/)** - Custom provider selection with Lambda function (also available in [Python](examples/python/provider-selector/))\n- **[EC2 Windows Provider](examples/typescript/ec2-windows-provider/)** - EC2 configuration for Windows runners (also available in [Python](examples/python/ec2-windows-provider/))\n\n### Compute & Performance\n- **[Compute Options](examples/typescript/compute-options/)** - Configure CPU, memory, and instance types for different providers (also available in [Python](examples/python/compute-options/))\n- **[Spot Instances](examples/typescript/spot-instances/)** - Use spot instances for cost savings across EC2, Fargate, and ECS (also available in [Python](examples/python/spot-instances/))\n- **[Storage Options](examples/typescript/storage-options/)** - Custom EBS storage options for EC2 runners (also available in [Python](examples/python/storage-options/))\n- **[ECS Scaling](examples/typescript/ecs-scaling/)** - Custom autoscaling group scaling policies for ECS providers (also available in [Python](examples/python/ecs-scaling/))\n\n### Security & Access\n- **[IAM Permissions](examples/typescript/iam-permissions/)** - Grant AWS IAM permissions to runners (also available in [Python](examples/python/iam-permissions/))\n- **[Network Access](examples/typescript/network-access/)** - Configure network access with VPCs and security groups (also available in [Python](examples/python/network-access/))\n- **[Access Control](examples/typescript/access-control/)** - Configure access control for webhook and setup functions (also available in [Python](examples/python/access-control/))\n\n### Customization\n- **[Add Software](examples/typescript/add-software/)** - Add custom software to runner images (also available in [Python](examples/python/add-software/))\n\n### Enterprise & Monitoring\n- **[GHES](examples/typescript/ghes/)** - Configure runners for GitHub Enterprise Server (also available in [Python](examples/python/ghes/))\n- **[Monitoring](examples/typescript/monitoring/)** - Set up CloudWatch alarms and SNS notifications (also available in [Python](examples/python/monitoring/))\n\nEach example is self-contained with its own dependencies and README. Start with the simple examples and work your way up to more advanced configurations.\n\nAnother good and very full example is the [integration test](test/default.integ.ts).\n\nIf you have more to share, please open a PR adding examples to the `examples` folder.\n\n## Architecture\n\n\n\n## Troubleshooting\n\nRunners are started in response to a webhook coming in from GitHub. If there are any issues starting the runner like missing capacity or transient API issues, the provider will keep retrying for 24 hours. Configuration issue related errors like pointing to a missing AMI will not be retried. GitHub itself will cancel the job if it can't find a runner for 24 hours. If your jobs don't start, follow the steps below to examine all parts of this workflow.\n\n1. Always start with the status function, make sure no errors are reported, and confirm all status codes are OK\n2. Make sure `runs-on` in the workflow matches the expected labels set in the runner provider\n3. Diagnose relevant executions of the orchestrator step function by visiting the URL in `troubleshooting.stepFunctionUrl` from `status.json`\n 1. If the execution failed, check your runner provider configuration for errors\n 2. If the execution is still running for a long time, check the execution events to see why runner starting is being retried\n 3. If there are no relevant executions, move to the next step\n4. Confirm the webhook Lambda was called by visiting the URL in `troubleshooting.webhookHandlerUrl` from `status.json`\n 1. If it's not called or logs errors, confirm the webhook settings on the GitHub side\n 2. If you see too many errors, make sure you're only sending `workflow_job` events\n5. When using GitHub app, make sure there are active installations in `github.auth.app.installations`\n\nAll logs are saved in CloudWatch.\n* Log group names can be found in `status.json` for each provider, image builder, and other parts of the system\n* Some useful Logs Insights queries can be enabled with `GitHubRunners.createLogsInsightsQueries()`\n\nTo get `status.json`, check out the CloudFormation stack output for a command that generates it. The command looks like:\n\n```\naws --region us-east-1 lambda invoke --function-name status-XYZ123 status.json\n```\n\n## Monitoring\n\nThere are two important ways to monitor your runners:\n\n1. Make sure runners don't fail to start. When that happens, jobs may sit and wait. Use `GitHubRunners.metricFailed()` to get a metric for the number of failed runner starts. You should use this metric to trigger an alarm.\n2. Make sure runner images don't fail to build. Failed runner image builds mean you will get stuck with out-of-date software on your runners. It may lead to security vulnerabilities, or it may lead to slower runner start-ups as the runner software itself needs to be updated. Use `GitHubRunners.failedImageBuildsTopic()` to get SNS topic that gets notified of failed runner image builds. You should subscribe to this topic.\n\nOther useful metrics to track:\n\n1. Use `GitHubRunners.metricJobCompleted()` to get a metric for the number of completed jobs broken down by labels and job success.\n2. Use `GitHubRunners.metricTime()` to get a metric for the total time a runner is running. This includes the overhead of starting the runner.\n\n## Contributing\n\nIf you use and love this project, please consider contributing.\n\n1. πͺ³ If you see something, say something. [Issues][16] help improve the quality of the project.\n * Include relevant logs and package versions for bugs.\n * When possible, describe the use-case behind feature requests.\n1. π οΈ [Pull requests][17] are welcome.\n * Run `npm run build` before submitting to make sure all tests pass.\n * Allow edits from maintainers so small adjustments can be made easily.\n1. π΅ Consider [sponsoring][15] the project to show your support and optionally get your name listed below.\n\n## Other Options\n\n1. [philips-labs/terraform-aws-github-runner][3] if you're using Terraform\n2. [actions/actions-runner-controller][4] if you're using Kubernetes\n\n\n[1]: https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners\n[2]: https://github.com/marketplace/actions/configure-aws-credentials-action-for-github-actions\n[3]: https://github.com/philips-labs/terraform-aws-github-runner\n[4]: https://github.com/actions/actions-runner-controller\n[5]: https://github.com/actions/runner\n[6]: https://pypi.org/project/cloudsnorkel.cdk-github-runners\n[7]: https://www.npmjs.com/package/@cloudsnorkel/cdk-github-runners\n[8]: https://central.sonatype.com/artifact/com.cloudsnorkel/cdk.github.runners/\n[9]: https://docs.github.com/en/developers/apps/getting-started-with-apps/about-apps\n[10]: https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token\n[11]: https://pkg.go.dev/github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\n[12]: https://www.nuget.org/packages/CloudSnorkel.Cdk.Github.Runners/\n[13]: https://constructs.dev/packages/@cloudsnorkel/cdk-github-runners/\n[14]: https://docs.github.com/en/actions/hosting-your-own-runners/autoscaling-with-self-hosted-runners#using-ephemeral-runners-for-autoscaling\n[15]: https://github.com/sponsors/CloudSnorkel\n[16]: https://github.com/CloudSnorkel/cdk-github-runners/issues\n[17]: https://github.com/CloudSnorkel/cdk-github-runners/pulls\n"
|
|
3861
|
+
"markdown": "# GitHub Self-Hosted Runners CDK Constructs\n\n[][7]\n[][6]\n[][8]\n[][11]\n[][12]\n[](https://github.com/CloudSnorkel/cdk-github-runners/actions/workflows/release.yml)\n[](https://github.com/CloudSnorkel/cdk-github-runners/blob/main/LICENSE)\n\nUse this CDK construct to create ephemeral [self-hosted GitHub runners][1] on-demand inside your AWS account.\n\n* π§© Easy to configure GitHub integration with a web-based interface\n* π§ Customizable runners with decent defaults\n* ππ» Multiple runner configurations controlled by labels\n* π Everything fully hosted in your account\n* π Automatically updated build environment with latest runner version\n\nSelf-hosted runners in AWS are useful when:\n\n* You need easy access to internal resources in your actions\n* You want to pre-install some software for your actions\n* You want to provide some basic AWS API access (but [aws-actions/configure-aws-credentials][2] has more security controls)\n* You are using GitHub Enterprise Server\n\nEphemeral (or on-demand) runners are the [recommended way by GitHub][14] for auto-scaling, and they make sure all jobs run with a clean image. Runners are started on-demand. You don't pay unless a job is running.\n\n## API\n\nThe best way to browse API documentation is on [Constructs Hub][13]. It is available in all supported programming languages.\n\n## Providers\n\nA runner provider creates compute resources on-demand and uses [actions/runner][5] to start a runner.\n\n| | EC2 | CodeBuild | Fargate | ECS | Lambda |\n|------------------|-------------------|----------------------------|----------------|----------------|---------------|\n| **Time limit** | Unlimited | 8 hours | Unlimited | Unlimited | 15 minutes |\n| **vCPUs** | Unlimited | 2, 4, 8, or 72 | 0.25 to 4 | Unlimited | 1 to 6 |\n| **RAM** | Unlimited | 3gb, 7gb, 15gb, or 145gb | 512mb to 30gb | Unlimited | 128mb to 10gb |\n| **Storage** | Unlimited | 50gb to 824gb | 20gb to 200gb | Unlimited | Up to 10gb |\n| **Architecture** | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 |\n| **sudo** | β | β | β | β | β |\n| **Docker** | β | β (Linux only) | β | β | β |\n| **Spot pricing** | β | β | β | β | β |\n| **OS** | Linux, Windows | Linux, Windows | Linux, Windows | Linux, Windows | Linux |\n\nThe best provider to use mostly depends on your current infrastructure. When in doubt, CodeBuild is always a good choice. Execution history and logs are easy to view, and it has no restrictive limits unless you need to run for more than 8 hours.\n\n* EC2 is useful when you want runners to have complete access to the host\n* ECS is useful when you want to control the infrastructure, like leaving the runner host running for faster startups\n* Lambda is useful for short jobs that can work within time, size and readonly system constraints\n\nYou can also create your own provider by implementing `IRunnerProvider`.\n\n## Installation\n\n1. Install and use the appropriate package\n <details><summary>Python</summary>\n\n ### Install\n Available on [PyPI][6].\n ```bash\n pip install cloudsnorkel.cdk-github-runners\n ```\n ### Use\n ```python\n from aws_cdk import App, Stack\n from cloudsnorkel.cdk_github_runners import GitHubRunners\n\n app = App()\n stack = Stack(app, \"github-runners\")\n GitHubRunners(stack, \"runners\")\n\n app.synth()\n ```\n </details>\n <details><summary>TypeScript or JavaScript</summary>\n\n ### Install\n Available on [npm][7].\n ```bash\n npm i @cloudsnorkel/cdk-github-runners\n ```\n ### Use\n ```typescript\n import { App, Stack } from 'aws-cdk-lib';\n import { GitHubRunners } from '@cloudsnorkel/cdk-github-runners';\n\n const app = new App();\n const stack = new Stack(app, 'github-runners');\n new GitHubRunners(stack, 'runners');\n\n app.synth();\n ```\n </details>\n <details><summary>Java</summary>\n\n ### Install\n Available on [Maven][8].\n ```xml\n <dependency>\n <groupId>com.cloudsnorkel</groupId>\n <artifactId>cdk.github.runners</artifactId>\n </dependency>\n ```\n ### Use\n ```java\n import software.amazon.awscdk.App;\n import software.amazon.awscdk.Stack;\n import com.cloudsnorkel.cdk.github.runners.GitHubRunners;\n\n public class Example {\n public static void main(String[] args){\n App app = new App();\n Stack stack = new Stack(app, \"github-runners\");\n GitHubRunners.Builder.create(stack, \"runners\").build();\n\n app.synth();\n }\n }\n ```\n </details>\n <details><summary>Go</summary>\n\n ### Install\n Available on [GitHub][11].\n ```bash\n go get github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\n ```\n ### Use\n ```go\n package main\n\n import (\n \"github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\"\n \"github.com/aws/aws-cdk-go/awscdk/v2\"\n \"github.com/aws/jsii-runtime-go\"\n )\n\n func main() {\n app := awscdk.NewApp(nil)\n stack := awscdk.NewStack(app, jsii.String(\"github-runners\"), &awscdk.StackProps{})\n cloudsnorkelcdkgithubrunners.NewGitHubRunners(stack, jsii.String(\"runners\"), &cloudsnorkelcdkgithubrunners.GitHubRunnersProps{})\n\n app.Synth(nil)\n }\n ```\n </details>\n <details><summary>.NET</summary>\n\n ### Install\n Available on [Nuget][12].\n ```bash\n dotnet add package CloudSnorkel.Cdk.Github.Runners\n ```\n ### Use\n ```csharp\n using Amazon.CDK;\n using CloudSnorkel;\n\n namespace Example\n {\n sealed class Program\n {\n public static void Main(string[] args)\n {\n var app = new App();\n var stack = new Stack(app, \"github-runners\");\n new GitHubRunners(stack, \"runners\");\n app.Synth();\n }\n }\n }\n ```\n </details>\n2. Use `GitHubRunners` construct in your code (starting with default arguments is fine)\n3. Deploy your stack\n4. Look for the status command output similar to `aws --region us-east-1 lambda invoke --function-name status-XYZ123 status.json`\n ```\n β
github-runners-test\n\n β¨ Deployment time: 260.01s\n\n Outputs:\n github-runners-test.runnersstatuscommand4A30F0F5 = aws --region us-east-1 lambda invoke --function-name github-runners-test-runnersstatus1A5771C0-mvttg8oPQnQS status.json\n ```\n5. Execute the status command (you may need to specify `--profile` too) and open the resulting `status.json` file\n6. Open the URL in `github.setup.url` from `status.json` or [manually setup GitHub](SETUP_GITHUB.md) integration as an app or with personal access token\n7. Run status command again to confirm `github.auth.status` and `github.webhook.status` are OK\n8. Trigger a GitHub action that has a `self-hosted` label with `runs-on: [self-hosted, codebuild]` (or non-default labels you set in step 2)\n9. If the action is not successful, see [troubleshooting](#Troubleshooting)\n\n[](https://youtu.be/wlyv_3V8lIw)\n\n## Customizing\n\nThe default providers configured by `GitHubRunners` are useful for testing but probably not too much for actual production work. They run in the default VPC or no VPC and have no added IAM permissions. You would usually want to configure the providers yourself.\n\nFor example:\n\n```typescript\nlet vpc: ec2.Vpc;\nlet runnerSg: ec2.SecurityGroup;\nlet dbSg: ec2.SecurityGroup;\nlet bucket: s3.Bucket;\n\n// create a custom CodeBuild provider\nconst myProvider = new CodeBuildRunnerProvider(this, 'codebuild runner', {\n labels: ['my-codebuild'],\n vpc: vpc,\n securityGroups: [runnerSg],\n});\n// grant some permissions to the provider\nbucket.grantReadWrite(myProvider);\ndbSg.connections.allowFrom(runnerSg, ec2.Port.tcp(3306), 'allow runners to connect to MySQL database');\n\n// create the runner infrastructure\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nAnother way to customize runners is by modifying the image used to spin them up. The image contains the [runner][5], any required dependencies, and integration code with the provider. You may choose to customize this image by adding more packages, for example.\n\n```typescript\nconst myBuilder = FargateRunnerProvider.imageBuilder(this, 'image builder');\nmyBuilder.addComponent(\n RunnerImageComponent.custom({ commands: ['apt install -y nginx xz-utils'] }),\n);\n\nconst myProvider = new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['customized-fargate'],\n imageBuilder: myBuilder,\n});\n\n// create the runner infrastructure\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nYour workflow will then look like:\n\n```yaml\nname: self-hosted example\non: push\njobs:\n self-hosted:\n runs-on: [self-hosted, customized-fargate]\n steps:\n - run: echo hello world\n```\n\nWindows images can also be customized the same way.\n\n```typescript\nconst myWindowsBuilder = FargateRunnerProvider.imageBuilder(this, 'Windows image builder', {\n architecture: Architecture.X86_64,\n os: Os.WINDOWS,\n});\nmyWindowsBuilder.addComponent(\n RunnerImageComponent.custom({\n name: 'Ninja',\n commands: [\n 'Invoke-WebRequest -UseBasicParsing -Uri \"https://github.com/ninja-build/ninja/releases/download/v1.11.1/ninja-win.zip\" -OutFile ninja.zip',\n 'Expand-Archive ninja.zip -DestinationPath C:\\\\actions',\n 'del ninja.zip',\n ],\n }),\n);\n\nconst myProvider = new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['customized-windows-fargate'],\n imageBuilder: myWindowsBuilder,\n});\n\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nThe runner OS and architecture is determined by the image it is set to use. For example, to create a Fargate runner provider for ARM64 set the `architecture` property for the image builder to `Architecture.ARM64` in the image builder properties.\n\n```typescript\nnew GitHubRunners(this, 'runners', {\n providers: [\n new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['arm64', 'fargate'],\n imageBuilder: FargateRunnerProvider.imageBuilder(this, 'image builder', {\n architecture: Architecture.ARM64,\n os: Os.LINUX_UBUNTU,\n }),\n }),\n ],\n});\n```\n\n### Composite Providers\n\nComposite providers allow you to combine multiple runner providers with different strategies. There are two types:\n\n**Fallback Strategy**: Try providers in order until one succeeds. Useful for trying spot instances first, then falling back to on-demand if spot capacity is unavailable.\n\n```typescript\n// Try spot instances first, fall back to on-demand if spot is unavailable\nconst ecsFallback = CompositeProvider.fallback(this, 'ECS Fallback', [\n new EcsRunnerProvider(this, 'ECS Spot', {\n labels: ['ecs', 'linux', 'x64'],\n spot: true,\n // ... other config\n }),\n new EcsRunnerProvider(this, 'ECS On-Demand', {\n labels: ['ecs', 'linux', 'x64'],\n spot: false,\n // ... other config\n }),\n]);\n\nnew GitHubRunners(this, 'runners', {\n providers: [ecsFallback],\n});\n```\n\n**Weighted Distribution Strategy**: Randomly select a provider based on weights. Useful for distributing load across multiple availability zones or instance types.\n\n```typescript\n// Distribute 60% of traffic to AZ-1, 40% to AZ-2\nconst distributedProvider = CompositeProvider.distribute(this, 'Fargate Distribution', [\n {\n weight: 3, // 3/(3+2) = 60%\n provider: new FargateRunnerProvider(this, 'Fargate AZ-1', {\n labels: ['fargate', 'linux', 'x64'],\n subnetSelection: vpc.selectSubnets({\n availabilityZones: [vpc.availabilityZones[0]],\n }),\n // ... other config\n }),\n },\n {\n weight: 2, // 2/(3+2) = 40%\n provider: new FargateRunnerProvider(this, 'Fargate AZ-2', {\n labels: ['fargate', 'linux', 'x64'],\n subnetSelection: vpc.selectSubnets({\n availabilityZones: [vpc.availabilityZones[1]],\n }),\n // ... other config\n }),\n },\n]);\n\nnew GitHubRunners(this, 'runners', {\n providers: [distributedProvider],\n});\n```\n\n**Important**: All providers in a composite must have the exact same labels. This ensures any provisioned runner can match the labels requested by the GitHub workflow job.\n\n### Custom Provider Selection\n\nBy default, providers are selected based on label matching: the first provider that has all the labels requested by the job is selected. You can customize this behavior using a provider selector Lambda function to:\n\n* Filter out certain jobs (prevent runner provisioning)\n* Dynamically select a provider based on job characteristics (repository, branch, time of day, etc.)\n* Customize labels for the runner (add, remove, or modify labels dynamically)\n\nThe selector function receives the full GitHub webhook payload, a map of all available providers and their labels, and the default provider/labels that would have been selected. It returns the provider to use (or `undefined` to skip runner creation) and the labels to assign to the runner.\n\n**Example: Route jobs to different providers based on repository**\n\n```typescript\nimport { ComputeType } from 'aws-cdk-lib/aws-codebuild';\nimport { Function, Code, Runtime } from 'aws-cdk-lib/aws-lambda';\nimport { GitHubRunners, CodeBuildRunnerProvider } from '@cloudsnorkel/cdk-github-runners';\n\nconst defaultProvider = new CodeBuildRunnerProvider(this, 'default', {\n labels: ['custom-runner', 'default'],\n});\nconst productionProvider = new CodeBuildRunnerProvider(this, 'production', {\n labels: ['custom-runner', 'production'],\n computeType: ComputeType.LARGE,\n});\n\nconst providerSelector = new Function(this, 'provider-selector', {\n runtime: Runtime.NODEJS_LATEST,\n handler: 'index.handler',\n code: Code.fromInline(`\n exports.handler = async (event) => {\n const { payload, providers, defaultProvider, defaultLabels } = event;\n\n // Route production repos to dedicated provider\n if (payload.repository.name.includes('prod')) {\n return {\n provider: '${productionProvider.node.path}',\n labels: ['custom-runner', 'production', 'modified-via-selector'],\n };\n }\n\n // Filter out draft PRs\n if (payload.workflow_job.head_branch?.startsWith('draft/')) {\n return { provider: undefined }; // Skip runner provisioning\n }\n\n // Use default for everything else\n return {\n provider: defaultProvider,\n labels: defaultLabels,\n };\n };\n `),\n});\n\nnew GitHubRunners(this, 'runners', {\n providers: [defaultProvider, productionProvider],\n providerSelector: providerSelector,\n});\n```\n\n**Example: Add dynamic labels based on job metadata**\n\n```typescript\nconst providerSelector = new Function(this, 'provider-selector', {\n runtime: Runtime.NODEJS_LATEST,\n handler: 'index.handler',\n code: Code.fromInline(`\n exports.handler = async (event) => {\n const { payload, defaultProvider, defaultLabels } = event;\n\n // Add branch name as a label\n const branch = payload.workflow_job.head_branch || 'unknown';\n const labels = [...(defaultLabels || []), 'branch:' + branch];\n\n return {\n provider: defaultProvider,\n labels: labels,\n };\n };\n `),\n});\n```\n\n**Important considerations:**\n\n* β οΈ **Label matching responsibility**: You are responsible for ensuring the selected provider's labels match what the job requires. If labels don't match, the runner will be provisioned but GitHub Actions won't assign the job to it.\n* β οΈ **No guarantee of assignment**: Provider selection only determines which provider will provision a runner. GitHub Actions may still route the job to any available runner with matching labels. For reliable provider assignment, consider repo-level runner registration (the default).\n* β‘ **Performance**: The selector runs synchronously during webhook processing. Keep it fast and efficientβthe webhook has a 30-second timeout total.\n\n## Examples\n\nWe provide comprehensive examples in the [`examples/`](examples/) folder to help you get started quickly:\n\n### Getting Started\n- **[Simple CodeBuild](examples/typescript/simple-codebuild/)** - Basic setup with just a CodeBuild provider (also available in [Python](examples/python/simple-codebuild/))\n\n### Provider Configuration\n- **[Composite Provider](examples/typescript/composite-provider/)** - Fallback and weighted distribution strategies (also available in [Python](examples/python/composite-provider/))\n- **[Provider Selector](examples/typescript/provider-selector/)** - Custom provider selection with Lambda function (also available in [Python](examples/python/provider-selector/))\n- **[EC2 Windows Provider](examples/typescript/ec2-windows-provider/)** - EC2 configuration for Windows runners (also available in [Python](examples/python/ec2-windows-provider/))\n\n### Compute & Performance\n- **[Compute Options](examples/typescript/compute-options/)** - Configure CPU, memory, and instance types for different providers (also available in [Python](examples/python/compute-options/))\n- **[Spot Instances](examples/typescript/spot-instances/)** - Use spot instances for cost savings across EC2, Fargate, and ECS (also available in [Python](examples/python/spot-instances/))\n- **[Storage Options](examples/typescript/storage-options/)** - Custom EBS storage options for EC2 runners (also available in [Python](examples/python/storage-options/))\n- **[ECS Scaling](examples/typescript/ecs-scaling/)** - Custom autoscaling group scaling policies for ECS providers (also available in [Python](examples/python/ecs-scaling/))\n\n### Security & Access\n- **[IAM Permissions](examples/typescript/iam-permissions/)** - Grant AWS IAM permissions to runners (also available in [Python](examples/python/iam-permissions/))\n- **[Network Access](examples/typescript/network-access/)** - Configure network access with VPCs and security groups (also available in [Python](examples/python/network-access/))\n- **[Access Control](examples/typescript/access-control/)** - Configure access control for webhook and setup functions (also available in [Python](examples/python/access-control/))\n\n### Customization\n- **[Add Software](examples/typescript/add-software/)** - Add custom software to runner images (also available in [Python](examples/python/add-software/))\n\n### Enterprise & Monitoring\n- **[GHES](examples/typescript/ghes/)** - Configure runners for GitHub Enterprise Server (also available in [Python](examples/python/ghes/))\n- **[Monitoring](examples/typescript/monitoring/)** - Set up CloudWatch alarms and SNS notifications (also available in [Python](examples/python/monitoring/))\n\nEach example is self-contained with its own dependencies and README. Start with the simple examples and work your way up to more advanced configurations.\n\nAnother good and very full example is the [integration test](test/default.integ.ts).\n\nIf you have more to share, please open a PR adding examples to the `examples` folder.\n\n## Architecture\n\n\n\n## Troubleshooting\n\nRunners are started in response to a webhook coming in from GitHub. If there are any issues starting the runner like missing capacity or transient API issues, the provider will keep retrying for 24 hours. Configuration issue related errors like pointing to a missing AMI will not be retried. GitHub itself will cancel the job if it can't find a runner for 24 hours. If your jobs don't start, follow the steps below to examine all parts of this workflow.\n\n1. Always start with the status function, make sure no errors are reported, and confirm all status codes are OK\n2. Make sure `runs-on` in the workflow matches the expected labels set in the runner provider\n3. Diagnose relevant executions of the orchestrator step function by visiting the URL in `troubleshooting.stepFunctionUrl` from `status.json`\n 1. If the execution failed, check your runner provider configuration for errors\n 2. If the execution is still running for a long time, check the execution events to see why runner starting is being retried\n 3. If there are no relevant executions, move to the next step\n4. Confirm the webhook Lambda was called by visiting the URL in `troubleshooting.webhookHandlerUrl` from `status.json`\n 1. If it's not called or logs errors, confirm the webhook settings on the GitHub side\n 2. If you see too many errors, make sure you're only sending `workflow_job` events\n5. When using GitHub app, make sure there are active installations in `github.auth.app.installations`\n\nAll logs are saved in CloudWatch.\n* Log group names can be found in `status.json` for each provider, image builder, and other parts of the system\n* Some useful Logs Insights queries can be enabled with `GitHubRunners.createLogsInsightsQueries()`\n\nTo get `status.json`, check out the CloudFormation stack output for a command that generates it. The command looks like:\n\n```\naws --region us-east-1 lambda invoke --function-name status-XYZ123 status.json\n```\n\n## Monitoring\n\nThere are two important ways to monitor your runners:\n\n1. Make sure runners don't fail to start. When that happens, jobs may sit and wait. Use `GitHubRunners.metricFailed()` to get a metric for the number of failed runner starts. You should use this metric to trigger an alarm.\n2. Make sure runner images don't fail to build. Failed runner image builds mean you will get stuck with out-of-date software on your runners. It may lead to security vulnerabilities, or it may lead to slower runner start-ups as the runner software itself needs to be updated. Use `GitHubRunners.failedImageBuildsTopic()` to get SNS topic that gets notified of failed runner image builds. You should subscribe to this topic.\n\nOther useful metrics to track:\n\n1. Use `GitHubRunners.metricJobCompleted()` to get a metric for the number of completed jobs broken down by labels and job success.\n2. Use `GitHubRunners.metricTime()` to get a metric for the total time a runner is running. This includes the overhead of starting the runner.\n\n## Contributing\n\nIf you use and love this project, please consider contributing.\n\n1. πͺ³ If you see something, say something. [Issues][16] help improve the quality of the project.\n * Include relevant logs and package versions for bugs.\n * When possible, describe the use-case behind feature requests.\n1. π οΈ [Pull requests][17] are welcome.\n * Run `npm run build` before submitting to make sure all tests pass.\n * Allow edits from maintainers so small adjustments can be made easily.\n1. π΅ Consider [sponsoring][15] the project to show your support and optionally get your name listed below.\n\n## Other Options\n\n1. [github-aws-runners/terraform-aws-github-runner][3] if you're using Terraform\n2. [actions/actions-runner-controller][4] if you're using Kubernetes\n\n\n[1]: https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners\n[2]: https://github.com/marketplace/actions/configure-aws-credentials-action-for-github-actions\n[3]: https://github.com/github-aws-runners/terraform-aws-github-runner\n[4]: https://github.com/actions/actions-runner-controller\n[5]: https://github.com/actions/runner\n[6]: https://pypi.org/project/cloudsnorkel.cdk-github-runners\n[7]: https://www.npmjs.com/package/@cloudsnorkel/cdk-github-runners\n[8]: https://central.sonatype.com/artifact/com.cloudsnorkel/cdk.github.runners/\n[9]: https://docs.github.com/en/developers/apps/getting-started-with-apps/about-apps\n[10]: https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token\n[11]: https://pkg.go.dev/github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\n[12]: https://www.nuget.org/packages/CloudSnorkel.Cdk.Github.Runners/\n[13]: https://constructs.dev/packages/@cloudsnorkel/cdk-github-runners/\n[14]: https://docs.github.com/en/actions/hosting-your-own-runners/autoscaling-with-self-hosted-runners#using-ephemeral-runners-for-autoscaling\n[15]: https://github.com/sponsors/CloudSnorkel\n[16]: https://github.com/CloudSnorkel/cdk-github-runners/issues\n[17]: https://github.com/CloudSnorkel/cdk-github-runners/pulls\n"
|
|
3862
3862
|
},
|
|
3863
3863
|
"repository": {
|
|
3864
3864
|
"type": "git",
|
|
@@ -5884,7 +5884,7 @@
|
|
|
5884
5884
|
},
|
|
5885
5885
|
"locationInModule": {
|
|
5886
5886
|
"filename": "src/providers/codebuild.ts",
|
|
5887
|
-
"line":
|
|
5887
|
+
"line": 256
|
|
5888
5888
|
},
|
|
5889
5889
|
"parameters": [
|
|
5890
5890
|
{
|
|
@@ -5911,7 +5911,7 @@
|
|
|
5911
5911
|
"kind": "class",
|
|
5912
5912
|
"locationInModule": {
|
|
5913
5913
|
"filename": "src/providers/codebuild.ts",
|
|
5914
|
-
"line":
|
|
5914
|
+
"line": 493
|
|
5915
5915
|
},
|
|
5916
5916
|
"name": "CodeBuildRunner",
|
|
5917
5917
|
"symbolId": "src/providers/codebuild:CodeBuildRunner"
|
|
@@ -5941,7 +5941,7 @@
|
|
|
5941
5941
|
"immutable": true,
|
|
5942
5942
|
"locationInModule": {
|
|
5943
5943
|
"filename": "src/image-builders/codebuild.ts",
|
|
5944
|
-
"line":
|
|
5944
|
+
"line": 59
|
|
5945
5945
|
},
|
|
5946
5946
|
"name": "buildImage",
|
|
5947
5947
|
"optional": true,
|
|
@@ -5953,14 +5953,14 @@
|
|
|
5953
5953
|
"abstract": true,
|
|
5954
5954
|
"docs": {
|
|
5955
5955
|
"default": "{@link ComputeType#SMALL }",
|
|
5956
|
-
"remarks": "
|
|
5956
|
+
"remarks": "The compute type determines CPU, memory, and disk space:\n- SMALL: 2 vCPU, 3 GB RAM, 64 GB disk\n- MEDIUM: 4 vCPU, 7 GB RAM, 128 GB disk\n- LARGE: 8 vCPU, 15 GB RAM, 128 GB disk\n- X2_LARGE: 72 vCPU, 145 GB RAM, 256 GB disk (Linux) or 824 GB disk (Windows)\n\nUse a larger compute type when you need more disk space for building larger Docker images.\n\nFor more details, see https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html#environment.types",
|
|
5957
5957
|
"stability": "experimental",
|
|
5958
|
-
"summary": "The type of compute to use for this build."
|
|
5958
|
+
"summary": "The type of compute to use for this build. See the {@link ComputeType} enum for the possible values."
|
|
5959
5959
|
},
|
|
5960
5960
|
"immutable": true,
|
|
5961
5961
|
"locationInModule": {
|
|
5962
5962
|
"filename": "src/image-builders/codebuild.ts",
|
|
5963
|
-
"line":
|
|
5963
|
+
"line": 50
|
|
5964
5964
|
},
|
|
5965
5965
|
"name": "computeType",
|
|
5966
5966
|
"optional": true,
|
|
@@ -5979,7 +5979,7 @@
|
|
|
5979
5979
|
"immutable": true,
|
|
5980
5980
|
"locationInModule": {
|
|
5981
5981
|
"filename": "src/image-builders/codebuild.ts",
|
|
5982
|
-
"line":
|
|
5982
|
+
"line": 68
|
|
5983
5983
|
},
|
|
5984
5984
|
"name": "timeout",
|
|
5985
5985
|
"optional": true,
|
|
@@ -6005,7 +6005,7 @@
|
|
|
6005
6005
|
},
|
|
6006
6006
|
"locationInModule": {
|
|
6007
6007
|
"filename": "src/providers/codebuild.ts",
|
|
6008
|
-
"line":
|
|
6008
|
+
"line": 256
|
|
6009
6009
|
},
|
|
6010
6010
|
"parameters": [
|
|
6011
6011
|
{
|
|
@@ -6035,7 +6035,7 @@
|
|
|
6035
6035
|
"kind": "class",
|
|
6036
6036
|
"locationInModule": {
|
|
6037
6037
|
"filename": "src/providers/codebuild.ts",
|
|
6038
|
-
"line":
|
|
6038
|
+
"line": 150
|
|
6039
6039
|
},
|
|
6040
6040
|
"methods": [
|
|
6041
6041
|
{
|
|
@@ -6046,7 +6046,7 @@
|
|
|
6046
6046
|
},
|
|
6047
6047
|
"locationInModule": {
|
|
6048
6048
|
"filename": "src/providers/codebuild.ts",
|
|
6049
|
-
"line":
|
|
6049
|
+
"line": 199
|
|
6050
6050
|
},
|
|
6051
6051
|
"name": "imageBuilder",
|
|
6052
6052
|
"parameters": [
|
|
@@ -6085,7 +6085,7 @@
|
|
|
6085
6085
|
},
|
|
6086
6086
|
"locationInModule": {
|
|
6087
6087
|
"filename": "src/providers/codebuild.ts",
|
|
6088
|
-
"line":
|
|
6088
|
+
"line": 406
|
|
6089
6089
|
},
|
|
6090
6090
|
"name": "getStepFunctionTask",
|
|
6091
6091
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -6114,7 +6114,7 @@
|
|
|
6114
6114
|
},
|
|
6115
6115
|
"locationInModule": {
|
|
6116
6116
|
"filename": "src/providers/codebuild.ts",
|
|
6117
|
-
"line":
|
|
6117
|
+
"line": 460
|
|
6118
6118
|
},
|
|
6119
6119
|
"name": "grantStateMachine",
|
|
6120
6120
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -6183,7 +6183,7 @@
|
|
|
6183
6183
|
},
|
|
6184
6184
|
"locationInModule": {
|
|
6185
6185
|
"filename": "src/providers/codebuild.ts",
|
|
6186
|
-
"line":
|
|
6186
|
+
"line": 463
|
|
6187
6187
|
},
|
|
6188
6188
|
"name": "status",
|
|
6189
6189
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -6215,7 +6215,7 @@
|
|
|
6215
6215
|
"immutable": true,
|
|
6216
6216
|
"locationInModule": {
|
|
6217
6217
|
"filename": "src/providers/codebuild.ts",
|
|
6218
|
-
"line":
|
|
6218
|
+
"line": 179
|
|
6219
6219
|
},
|
|
6220
6220
|
"name": "LINUX_ARM64_DOCKERFILE_PATH",
|
|
6221
6221
|
"static": true,
|
|
@@ -6234,7 +6234,7 @@
|
|
|
6234
6234
|
"immutable": true,
|
|
6235
6235
|
"locationInModule": {
|
|
6236
6236
|
"filename": "src/providers/codebuild.ts",
|
|
6237
|
-
"line":
|
|
6237
|
+
"line": 164
|
|
6238
6238
|
},
|
|
6239
6239
|
"name": "LINUX_X64_DOCKERFILE_PATH",
|
|
6240
6240
|
"static": true,
|
|
@@ -6250,7 +6250,7 @@
|
|
|
6250
6250
|
"immutable": true,
|
|
6251
6251
|
"locationInModule": {
|
|
6252
6252
|
"filename": "src/providers/codebuild.ts",
|
|
6253
|
-
"line":
|
|
6253
|
+
"line": 485
|
|
6254
6254
|
},
|
|
6255
6255
|
"name": "connections",
|
|
6256
6256
|
"overrides": "aws-cdk-lib.aws_ec2.IConnectable",
|
|
@@ -6266,7 +6266,7 @@
|
|
|
6266
6266
|
"immutable": true,
|
|
6267
6267
|
"locationInModule": {
|
|
6268
6268
|
"filename": "src/providers/codebuild.ts",
|
|
6269
|
-
"line":
|
|
6269
|
+
"line": 229
|
|
6270
6270
|
},
|
|
6271
6271
|
"name": "grantPrincipal",
|
|
6272
6272
|
"overrides": "aws-cdk-lib.aws_iam.IGrantable",
|
|
@@ -6276,14 +6276,15 @@
|
|
|
6276
6276
|
},
|
|
6277
6277
|
{
|
|
6278
6278
|
"docs": {
|
|
6279
|
+
"deprecated": "This field is internal and should not be accessed directly.",
|
|
6279
6280
|
"remarks": "The image is built by an image builder and is specific to CodeBuild.",
|
|
6280
|
-
"stability": "
|
|
6281
|
+
"stability": "deprecated",
|
|
6281
6282
|
"summary": "Docker image loaded with GitHub Actions Runner and its prerequisites."
|
|
6282
6283
|
},
|
|
6283
6284
|
"immutable": true,
|
|
6284
6285
|
"locationInModule": {
|
|
6285
6286
|
"filename": "src/providers/codebuild.ts",
|
|
6286
|
-
"line":
|
|
6287
|
+
"line": 236
|
|
6287
6288
|
},
|
|
6288
6289
|
"name": "image",
|
|
6289
6290
|
"type": {
|
|
@@ -6298,7 +6299,7 @@
|
|
|
6298
6299
|
"immutable": true,
|
|
6299
6300
|
"locationInModule": {
|
|
6300
6301
|
"filename": "src/providers/codebuild.ts",
|
|
6301
|
-
"line":
|
|
6302
|
+
"line": 224
|
|
6302
6303
|
},
|
|
6303
6304
|
"name": "labels",
|
|
6304
6305
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -6320,7 +6321,7 @@
|
|
|
6320
6321
|
"immutable": true,
|
|
6321
6322
|
"locationInModule": {
|
|
6322
6323
|
"filename": "src/providers/codebuild.ts",
|
|
6323
|
-
"line":
|
|
6324
|
+
"line": 243
|
|
6324
6325
|
},
|
|
6325
6326
|
"name": "logGroup",
|
|
6326
6327
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -6336,7 +6337,7 @@
|
|
|
6336
6337
|
"immutable": true,
|
|
6337
6338
|
"locationInModule": {
|
|
6338
6339
|
"filename": "src/providers/codebuild.ts",
|
|
6339
|
-
"line":
|
|
6340
|
+
"line": 219
|
|
6340
6341
|
},
|
|
6341
6342
|
"name": "project",
|
|
6342
6343
|
"type": {
|
|
@@ -6351,7 +6352,7 @@
|
|
|
6351
6352
|
"immutable": true,
|
|
6352
6353
|
"locationInModule": {
|
|
6353
6354
|
"filename": "src/providers/codebuild.ts",
|
|
6354
|
-
"line":
|
|
6355
|
+
"line": 245
|
|
6355
6356
|
},
|
|
6356
6357
|
"name": "retryableErrors",
|
|
6357
6358
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -6388,14 +6389,14 @@
|
|
|
6388
6389
|
"abstract": true,
|
|
6389
6390
|
"docs": {
|
|
6390
6391
|
"default": "{@link ComputeType#SMALL }",
|
|
6391
|
-
"remarks": "
|
|
6392
|
+
"remarks": "The compute type determines CPU, memory, and disk space:\n- SMALL: 2 vCPU, 3 GB RAM, 64 GB disk\n- MEDIUM: 4 vCPU, 7 GB RAM, 128 GB disk\n- LARGE: 8 vCPU, 15 GB RAM, 128 GB disk\n- X2_LARGE: 72 vCPU, 145 GB RAM, 256 GB disk (Linux) or 824 GB disk (Windows)\n\nUse a larger compute type when you need more disk space for building larger Docker images.\n\nFor more details, see https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html#environment.types",
|
|
6392
6393
|
"stability": "experimental",
|
|
6393
|
-
"summary": "The type of compute to use for this build."
|
|
6394
|
+
"summary": "The type of compute to use for this build. See the {@link ComputeType} enum for the possible values."
|
|
6394
6395
|
},
|
|
6395
6396
|
"immutable": true,
|
|
6396
6397
|
"locationInModule": {
|
|
6397
6398
|
"filename": "src/providers/codebuild.ts",
|
|
6398
|
-
"line":
|
|
6399
|
+
"line": 123
|
|
6399
6400
|
},
|
|
6400
6401
|
"name": "computeType",
|
|
6401
6402
|
"optional": true,
|
|
@@ -6414,7 +6415,7 @@
|
|
|
6414
6415
|
"immutable": true,
|
|
6415
6416
|
"locationInModule": {
|
|
6416
6417
|
"filename": "src/providers/codebuild.ts",
|
|
6417
|
-
"line":
|
|
6418
|
+
"line": 140
|
|
6418
6419
|
},
|
|
6419
6420
|
"name": "dockerInDocker",
|
|
6420
6421
|
"optional": true,
|
|
@@ -6574,7 +6575,7 @@
|
|
|
6574
6575
|
"immutable": true,
|
|
6575
6576
|
"locationInModule": {
|
|
6576
6577
|
"filename": "src/providers/codebuild.ts",
|
|
6577
|
-
"line":
|
|
6578
|
+
"line": 132
|
|
6578
6579
|
},
|
|
6579
6580
|
"name": "timeout",
|
|
6580
6581
|
"optional": true,
|
|
@@ -8059,7 +8060,7 @@
|
|
|
8059
8060
|
},
|
|
8060
8061
|
"locationInModule": {
|
|
8061
8062
|
"filename": "src/providers/ecs.ts",
|
|
8062
|
-
"line":
|
|
8063
|
+
"line": 397
|
|
8063
8064
|
},
|
|
8064
8065
|
"parameters": [
|
|
8065
8066
|
{
|
|
@@ -8139,7 +8140,7 @@
|
|
|
8139
8140
|
},
|
|
8140
8141
|
"locationInModule": {
|
|
8141
8142
|
"filename": "src/providers/ecs.ts",
|
|
8142
|
-
"line":
|
|
8143
|
+
"line": 621
|
|
8143
8144
|
},
|
|
8144
8145
|
"name": "getStepFunctionTask",
|
|
8145
8146
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -8168,7 +8169,7 @@
|
|
|
8168
8169
|
},
|
|
8169
8170
|
"locationInModule": {
|
|
8170
8171
|
"filename": "src/providers/ecs.ts",
|
|
8171
|
-
"line":
|
|
8172
|
+
"line": 688
|
|
8172
8173
|
},
|
|
8173
8174
|
"name": "grantStateMachine",
|
|
8174
8175
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -8237,7 +8238,7 @@
|
|
|
8237
8238
|
},
|
|
8238
8239
|
"locationInModule": {
|
|
8239
8240
|
"filename": "src/providers/ecs.ts",
|
|
8240
|
-
"line":
|
|
8241
|
+
"line": 691
|
|
8241
8242
|
},
|
|
8242
8243
|
"name": "status",
|
|
8243
8244
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -8258,6 +8259,22 @@
|
|
|
8258
8259
|
],
|
|
8259
8260
|
"name": "EcsRunnerProvider",
|
|
8260
8261
|
"properties": [
|
|
8262
|
+
{
|
|
8263
|
+
"docs": {
|
|
8264
|
+
"remarks": "Use capacityProvider.autoScalingGroup to access the auto scaling group. This can help set up custom scaling policies.",
|
|
8265
|
+
"stability": "experimental",
|
|
8266
|
+
"summary": "Capacity provider used to scale the cluster."
|
|
8267
|
+
},
|
|
8268
|
+
"immutable": true,
|
|
8269
|
+
"locationInModule": {
|
|
8270
|
+
"filename": "src/providers/ecs.ts",
|
|
8271
|
+
"line": 306
|
|
8272
|
+
},
|
|
8273
|
+
"name": "capacityProvider",
|
|
8274
|
+
"type": {
|
|
8275
|
+
"fqn": "aws-cdk-lib.aws_ecs.AsgCapacityProvider"
|
|
8276
|
+
}
|
|
8277
|
+
},
|
|
8261
8278
|
{
|
|
8262
8279
|
"docs": {
|
|
8263
8280
|
"stability": "experimental",
|
|
@@ -8266,7 +8283,7 @@
|
|
|
8266
8283
|
"immutable": true,
|
|
8267
8284
|
"locationInModule": {
|
|
8268
8285
|
"filename": "src/providers/ecs.ts",
|
|
8269
|
-
"line":
|
|
8286
|
+
"line": 346
|
|
8270
8287
|
},
|
|
8271
8288
|
"name": "connections",
|
|
8272
8289
|
"overrides": "aws-cdk-lib.aws_ec2.IConnectable",
|
|
@@ -8282,7 +8299,7 @@
|
|
|
8282
8299
|
"immutable": true,
|
|
8283
8300
|
"locationInModule": {
|
|
8284
8301
|
"filename": "src/providers/ecs.ts",
|
|
8285
|
-
"line":
|
|
8302
|
+
"line": 341
|
|
8286
8303
|
},
|
|
8287
8304
|
"name": "grantPrincipal",
|
|
8288
8305
|
"overrides": "aws-cdk-lib.aws_iam.IGrantable",
|
|
@@ -8298,7 +8315,7 @@
|
|
|
8298
8315
|
"immutable": true,
|
|
8299
8316
|
"locationInModule": {
|
|
8300
8317
|
"filename": "src/providers/ecs.ts",
|
|
8301
|
-
"line":
|
|
8318
|
+
"line": 321
|
|
8302
8319
|
},
|
|
8303
8320
|
"name": "labels",
|
|
8304
8321
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -8320,7 +8337,7 @@
|
|
|
8320
8337
|
"immutable": true,
|
|
8321
8338
|
"locationInModule": {
|
|
8322
8339
|
"filename": "src/providers/ecs.ts",
|
|
8323
|
-
"line":
|
|
8340
|
+
"line": 358
|
|
8324
8341
|
},
|
|
8325
8342
|
"name": "logGroup",
|
|
8326
8343
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -8336,7 +8353,7 @@
|
|
|
8336
8353
|
"immutable": true,
|
|
8337
8354
|
"locationInModule": {
|
|
8338
8355
|
"filename": "src/providers/ecs.ts",
|
|
8339
|
-
"line":
|
|
8356
|
+
"line": 390
|
|
8340
8357
|
},
|
|
8341
8358
|
"name": "retryableErrors",
|
|
8342
8359
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -8814,7 +8831,7 @@
|
|
|
8814
8831
|
},
|
|
8815
8832
|
"locationInModule": {
|
|
8816
8833
|
"filename": "src/providers/fargate.ts",
|
|
8817
|
-
"line":
|
|
8834
|
+
"line": 399
|
|
8818
8835
|
},
|
|
8819
8836
|
"parameters": [
|
|
8820
8837
|
{
|
|
@@ -8841,7 +8858,7 @@
|
|
|
8841
8858
|
"kind": "class",
|
|
8842
8859
|
"locationInModule": {
|
|
8843
8860
|
"filename": "src/providers/fargate.ts",
|
|
8844
|
-
"line":
|
|
8861
|
+
"line": 581
|
|
8845
8862
|
},
|
|
8846
8863
|
"name": "FargateRunner",
|
|
8847
8864
|
"symbolId": "src/providers/fargate:FargateRunner"
|
|
@@ -8861,7 +8878,7 @@
|
|
|
8861
8878
|
},
|
|
8862
8879
|
"locationInModule": {
|
|
8863
8880
|
"filename": "src/providers/fargate.ts",
|
|
8864
|
-
"line":
|
|
8881
|
+
"line": 399
|
|
8865
8882
|
},
|
|
8866
8883
|
"parameters": [
|
|
8867
8884
|
{
|
|
@@ -8941,7 +8958,7 @@
|
|
|
8941
8958
|
},
|
|
8942
8959
|
"locationInModule": {
|
|
8943
8960
|
"filename": "src/providers/fargate.ts",
|
|
8944
|
-
"line":
|
|
8961
|
+
"line": 488
|
|
8945
8962
|
},
|
|
8946
8963
|
"name": "getStepFunctionTask",
|
|
8947
8964
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -8970,7 +8987,7 @@
|
|
|
8970
8987
|
},
|
|
8971
8988
|
"locationInModule": {
|
|
8972
8989
|
"filename": "src/providers/fargate.ts",
|
|
8973
|
-
"line":
|
|
8990
|
+
"line": 555
|
|
8974
8991
|
},
|
|
8975
8992
|
"name": "grantStateMachine",
|
|
8976
8993
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -9039,7 +9056,7 @@
|
|
|
9039
9056
|
},
|
|
9040
9057
|
"locationInModule": {
|
|
9041
9058
|
"filename": "src/providers/fargate.ts",
|
|
9042
|
-
"line":
|
|
9059
|
+
"line": 558
|
|
9043
9060
|
},
|
|
9044
9061
|
"name": "status",
|
|
9045
9062
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -9100,13 +9117,14 @@
|
|
|
9100
9117
|
},
|
|
9101
9118
|
{
|
|
9102
9119
|
"docs": {
|
|
9103
|
-
"
|
|
9120
|
+
"deprecated": "This field is internal and should not be accessed directly.",
|
|
9121
|
+
"stability": "deprecated",
|
|
9104
9122
|
"summary": "Whether runner task will have a public IP."
|
|
9105
9123
|
},
|
|
9106
9124
|
"immutable": true,
|
|
9107
9125
|
"locationInModule": {
|
|
9108
9126
|
"filename": "src/providers/fargate.ts",
|
|
9109
|
-
"line":
|
|
9127
|
+
"line": 356
|
|
9110
9128
|
},
|
|
9111
9129
|
"name": "assignPublicIp",
|
|
9112
9130
|
"type": {
|
|
@@ -9136,7 +9154,7 @@
|
|
|
9136
9154
|
"immutable": true,
|
|
9137
9155
|
"locationInModule": {
|
|
9138
9156
|
"filename": "src/providers/fargate.ts",
|
|
9139
|
-
"line":
|
|
9157
|
+
"line": 366
|
|
9140
9158
|
},
|
|
9141
9159
|
"name": "connections",
|
|
9142
9160
|
"overrides": "aws-cdk-lib.aws_ec2.IConnectable",
|
|
@@ -9146,13 +9164,14 @@
|
|
|
9146
9164
|
},
|
|
9147
9165
|
{
|
|
9148
9166
|
"docs": {
|
|
9149
|
-
"
|
|
9167
|
+
"deprecated": "This field is internal and should not be accessed directly.",
|
|
9168
|
+
"stability": "deprecated",
|
|
9150
9169
|
"summary": "Container definition hosting the runner."
|
|
9151
9170
|
},
|
|
9152
9171
|
"immutable": true,
|
|
9153
9172
|
"locationInModule": {
|
|
9154
9173
|
"filename": "src/providers/fargate.ts",
|
|
9155
|
-
"line":
|
|
9174
|
+
"line": 330
|
|
9156
9175
|
},
|
|
9157
9176
|
"name": "container",
|
|
9158
9177
|
"type": {
|
|
@@ -9167,7 +9186,7 @@
|
|
|
9167
9186
|
"immutable": true,
|
|
9168
9187
|
"locationInModule": {
|
|
9169
9188
|
"filename": "src/providers/fargate.ts",
|
|
9170
|
-
"line":
|
|
9189
|
+
"line": 361
|
|
9171
9190
|
},
|
|
9172
9191
|
"name": "grantPrincipal",
|
|
9173
9192
|
"overrides": "aws-cdk-lib.aws_iam.IGrantable",
|
|
@@ -9177,14 +9196,15 @@
|
|
|
9177
9196
|
},
|
|
9178
9197
|
{
|
|
9179
9198
|
"docs": {
|
|
9199
|
+
"deprecated": "This field is internal and should not be accessed directly.",
|
|
9180
9200
|
"remarks": "The image is built by an image builder and is specific to Fargate tasks.",
|
|
9181
|
-
"stability": "
|
|
9201
|
+
"stability": "deprecated",
|
|
9182
9202
|
"summary": "Docker image loaded with GitHub Actions Runner and its prerequisites."
|
|
9183
9203
|
},
|
|
9184
9204
|
"immutable": true,
|
|
9185
9205
|
"locationInModule": {
|
|
9186
9206
|
"filename": "src/providers/fargate.ts",
|
|
9187
|
-
"line":
|
|
9207
|
+
"line": 380
|
|
9188
9208
|
},
|
|
9189
9209
|
"name": "image",
|
|
9190
9210
|
"type": {
|
|
@@ -9199,7 +9219,7 @@
|
|
|
9199
9219
|
"immutable": true,
|
|
9200
9220
|
"locationInModule": {
|
|
9201
9221
|
"filename": "src/providers/fargate.ts",
|
|
9202
|
-
"line":
|
|
9222
|
+
"line": 335
|
|
9203
9223
|
},
|
|
9204
9224
|
"name": "labels",
|
|
9205
9225
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -9221,7 +9241,7 @@
|
|
|
9221
9241
|
"immutable": true,
|
|
9222
9242
|
"locationInModule": {
|
|
9223
9243
|
"filename": "src/providers/fargate.ts",
|
|
9224
|
-
"line":
|
|
9244
|
+
"line": 387
|
|
9225
9245
|
},
|
|
9226
9246
|
"name": "logGroup",
|
|
9227
9247
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -9237,7 +9257,7 @@
|
|
|
9237
9257
|
"immutable": true,
|
|
9238
9258
|
"locationInModule": {
|
|
9239
9259
|
"filename": "src/providers/fargate.ts",
|
|
9240
|
-
"line":
|
|
9260
|
+
"line": 389
|
|
9241
9261
|
},
|
|
9242
9262
|
"name": "retryableErrors",
|
|
9243
9263
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -9252,13 +9272,14 @@
|
|
|
9252
9272
|
},
|
|
9253
9273
|
{
|
|
9254
9274
|
"docs": {
|
|
9255
|
-
"
|
|
9275
|
+
"deprecated": "This field is internal and should not be accessed directly.",
|
|
9276
|
+
"stability": "deprecated",
|
|
9256
9277
|
"summary": "Use spot pricing for Fargate tasks."
|
|
9257
9278
|
},
|
|
9258
9279
|
"immutable": true,
|
|
9259
9280
|
"locationInModule": {
|
|
9260
9281
|
"filename": "src/providers/fargate.ts",
|
|
9261
|
-
"line":
|
|
9282
|
+
"line": 373
|
|
9262
9283
|
},
|
|
9263
9284
|
"name": "spot",
|
|
9264
9285
|
"type": {
|
|
@@ -9267,13 +9288,14 @@
|
|
|
9267
9288
|
},
|
|
9268
9289
|
{
|
|
9269
9290
|
"docs": {
|
|
9270
|
-
"
|
|
9291
|
+
"deprecated": "This field is internal and should not be accessed directly.",
|
|
9292
|
+
"stability": "deprecated",
|
|
9271
9293
|
"summary": "Fargate task hosting the runner."
|
|
9272
9294
|
},
|
|
9273
9295
|
"immutable": true,
|
|
9274
9296
|
"locationInModule": {
|
|
9275
9297
|
"filename": "src/providers/fargate.ts",
|
|
9276
|
-
"line":
|
|
9298
|
+
"line": 323
|
|
9277
9299
|
},
|
|
9278
9300
|
"name": "task",
|
|
9279
9301
|
"type": {
|
|
@@ -9282,13 +9304,14 @@
|
|
|
9282
9304
|
},
|
|
9283
9305
|
{
|
|
9284
9306
|
"docs": {
|
|
9285
|
-
"
|
|
9307
|
+
"deprecated": "This field is internal and should not be accessed directly.",
|
|
9308
|
+
"stability": "deprecated",
|
|
9286
9309
|
"summary": "Subnets used for hosting the runner task."
|
|
9287
9310
|
},
|
|
9288
9311
|
"immutable": true,
|
|
9289
9312
|
"locationInModule": {
|
|
9290
9313
|
"filename": "src/providers/fargate.ts",
|
|
9291
|
-
"line":
|
|
9314
|
+
"line": 349
|
|
9292
9315
|
},
|
|
9293
9316
|
"name": "subnetSelection",
|
|
9294
9317
|
"optional": true,
|
|
@@ -9298,13 +9321,14 @@
|
|
|
9298
9321
|
},
|
|
9299
9322
|
{
|
|
9300
9323
|
"docs": {
|
|
9301
|
-
"
|
|
9324
|
+
"deprecated": "This field is internal and should not be accessed directly.",
|
|
9325
|
+
"stability": "deprecated",
|
|
9302
9326
|
"summary": "VPC used for hosting the runner task."
|
|
9303
9327
|
},
|
|
9304
9328
|
"immutable": true,
|
|
9305
9329
|
"locationInModule": {
|
|
9306
9330
|
"filename": "src/providers/fargate.ts",
|
|
9307
|
-
"line":
|
|
9331
|
+
"line": 342
|
|
9308
9332
|
},
|
|
9309
9333
|
"name": "vpc",
|
|
9310
9334
|
"optional": true,
|
|
@@ -11485,7 +11509,7 @@
|
|
|
11485
11509
|
},
|
|
11486
11510
|
"locationInModule": {
|
|
11487
11511
|
"filename": "src/providers/lambda.ts",
|
|
11488
|
-
"line":
|
|
11512
|
+
"line": 241
|
|
11489
11513
|
},
|
|
11490
11514
|
"parameters": [
|
|
11491
11515
|
{
|
|
@@ -11512,7 +11536,7 @@
|
|
|
11512
11536
|
"kind": "class",
|
|
11513
11537
|
"locationInModule": {
|
|
11514
11538
|
"filename": "src/providers/lambda.ts",
|
|
11515
|
-
"line":
|
|
11539
|
+
"line": 483
|
|
11516
11540
|
},
|
|
11517
11541
|
"name": "LambdaRunner",
|
|
11518
11542
|
"symbolId": "src/providers/lambda:LambdaRunner"
|
|
@@ -11532,7 +11556,7 @@
|
|
|
11532
11556
|
},
|
|
11533
11557
|
"locationInModule": {
|
|
11534
11558
|
"filename": "src/providers/lambda.ts",
|
|
11535
|
-
"line":
|
|
11559
|
+
"line": 241
|
|
11536
11560
|
},
|
|
11537
11561
|
"parameters": [
|
|
11538
11562
|
{
|
|
@@ -11612,7 +11636,7 @@
|
|
|
11612
11636
|
},
|
|
11613
11637
|
"locationInModule": {
|
|
11614
11638
|
"filename": "src/providers/lambda.ts",
|
|
11615
|
-
"line":
|
|
11639
|
+
"line": 335
|
|
11616
11640
|
},
|
|
11617
11641
|
"name": "getStepFunctionTask",
|
|
11618
11642
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -11641,7 +11665,7 @@
|
|
|
11641
11665
|
},
|
|
11642
11666
|
"locationInModule": {
|
|
11643
11667
|
"filename": "src/providers/lambda.ts",
|
|
11644
|
-
"line":
|
|
11668
|
+
"line": 399
|
|
11645
11669
|
},
|
|
11646
11670
|
"name": "grantStateMachine",
|
|
11647
11671
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -11710,7 +11734,7 @@
|
|
|
11710
11734
|
},
|
|
11711
11735
|
"locationInModule": {
|
|
11712
11736
|
"filename": "src/providers/lambda.ts",
|
|
11713
|
-
"line":
|
|
11737
|
+
"line": 402
|
|
11714
11738
|
},
|
|
11715
11739
|
"name": "status",
|
|
11716
11740
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -11777,7 +11801,7 @@
|
|
|
11777
11801
|
"immutable": true,
|
|
11778
11802
|
"locationInModule": {
|
|
11779
11803
|
"filename": "src/providers/lambda.ts",
|
|
11780
|
-
"line":
|
|
11804
|
+
"line": 324
|
|
11781
11805
|
},
|
|
11782
11806
|
"name": "connections",
|
|
11783
11807
|
"overrides": "aws-cdk-lib.aws_ec2.IConnectable",
|
|
@@ -11818,14 +11842,15 @@
|
|
|
11818
11842
|
},
|
|
11819
11843
|
{
|
|
11820
11844
|
"docs": {
|
|
11845
|
+
"deprecated": "This field is internal and should not be accessed directly.",
|
|
11821
11846
|
"remarks": "The image is built by an image builder and is specific to Lambda.",
|
|
11822
|
-
"stability": "
|
|
11847
|
+
"stability": "deprecated",
|
|
11823
11848
|
"summary": "Docker image loaded with GitHub Actions Runner and its prerequisites."
|
|
11824
11849
|
},
|
|
11825
11850
|
"immutable": true,
|
|
11826
11851
|
"locationInModule": {
|
|
11827
11852
|
"filename": "src/providers/lambda.ts",
|
|
11828
|
-
"line":
|
|
11853
|
+
"line": 219
|
|
11829
11854
|
},
|
|
11830
11855
|
"name": "image",
|
|
11831
11856
|
"type": {
|
|
@@ -11862,7 +11887,7 @@
|
|
|
11862
11887
|
"immutable": true,
|
|
11863
11888
|
"locationInModule": {
|
|
11864
11889
|
"filename": "src/providers/lambda.ts",
|
|
11865
|
-
"line":
|
|
11890
|
+
"line": 226
|
|
11866
11891
|
},
|
|
11867
11892
|
"name": "logGroup",
|
|
11868
11893
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -11878,7 +11903,7 @@
|
|
|
11878
11903
|
"immutable": true,
|
|
11879
11904
|
"locationInModule": {
|
|
11880
11905
|
"filename": "src/providers/lambda.ts",
|
|
11881
|
-
"line":
|
|
11906
|
+
"line": 228
|
|
11882
11907
|
},
|
|
11883
11908
|
"name": "retryableErrors",
|
|
11884
11909
|
"overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
|
|
@@ -15406,6 +15431,6 @@
|
|
|
15406
15431
|
"symbolId": "src/image-builders/aws-image-builder/deprecated/windows-components:WindowsComponents"
|
|
15407
15432
|
}
|
|
15408
15433
|
},
|
|
15409
|
-
"version": "0.14.
|
|
15410
|
-
"fingerprint": "
|
|
15434
|
+
"version": "0.14.20",
|
|
15435
|
+
"fingerprint": "jNhuwh6BSEpn806TlB8ApZ7QQE5V+Ljvf1mdWH43Ubw="
|
|
15411
15436
|
}
|