@cloudsnorkel/cdk-github-runners 0.14.19 → 0.14.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (58) hide show
  1. package/.jsii +125 -100
  2. package/API.md +73 -24
  3. package/README.md +3 -2
  4. package/assets/delete-failed-runner.lambda/index.js +3248 -11227
  5. package/assets/idle-runner-repear.lambda/index.js +3224 -11221
  6. package/assets/image-builders/aws-image-builder/delete-resources.lambda/index.js +12 -2
  7. package/assets/image-builders/aws-image-builder/filter-failed-builds.lambda/index.js +4 -1
  8. package/assets/image-builders/build-image.lambda/index.js +21 -4
  9. package/assets/providers/ami-root-device.lambda/index.js +45 -10
  10. package/assets/providers/update-lambda.lambda/index.js +6 -1
  11. package/assets/setup.lambda/index.js +1762 -4645
  12. package/assets/status.lambda/index.js +2412 -10615
  13. package/assets/token-retriever.lambda/index.js +3228 -11221
  14. package/assets/webhook-handler.lambda/index.js +3264 -11236
  15. package/assets/webhook-redelivery.lambda/index.js +3220 -11221
  16. package/lib/access.js +1 -1
  17. package/lib/delete-failed-runner.lambda.js +22 -4
  18. package/lib/idle-runner-repear.lambda.js +1 -1
  19. package/lib/image-builders/api.js +1 -1
  20. package/lib/image-builders/aws-image-builder/base-image.js +2 -2
  21. package/lib/image-builders/aws-image-builder/builder.js +3 -3
  22. package/lib/image-builders/aws-image-builder/delete-resources.lambda.js +6 -2
  23. package/lib/image-builders/aws-image-builder/deprecated/ami.js +1 -1
  24. package/lib/image-builders/aws-image-builder/deprecated/container.js +1 -1
  25. package/lib/image-builders/aws-image-builder/deprecated/linux-components.js +1 -1
  26. package/lib/image-builders/aws-image-builder/deprecated/windows-components.js +1 -1
  27. package/lib/image-builders/aws-image-builder/filter-failed-builds.lambda.js +5 -2
  28. package/lib/image-builders/build-image.lambda.js +15 -4
  29. package/lib/image-builders/codebuild-deprecated.js +1 -1
  30. package/lib/image-builders/codebuild.d.ts +10 -0
  31. package/lib/image-builders/codebuild.js +1 -1
  32. package/lib/image-builders/components.d.ts +12 -1
  33. package/lib/image-builders/components.js +48 -10
  34. package/lib/image-builders/static.js +1 -1
  35. package/lib/lambda-github.d.ts +14 -7
  36. package/lib/lambda-github.js +34 -8
  37. package/lib/lambda-helpers.js +8 -2
  38. package/lib/providers/ami-root-device.lambda.js +39 -10
  39. package/lib/providers/codebuild.d.ts +12 -0
  40. package/lib/providers/codebuild.js +3 -3
  41. package/lib/providers/common.js +3 -3
  42. package/lib/providers/composite.js +16 -31
  43. package/lib/providers/ec2.js +2 -2
  44. package/lib/providers/ecs.d.ts +3 -1
  45. package/lib/providers/ecs.js +2 -2
  46. package/lib/providers/fargate.d.ts +14 -0
  47. package/lib/providers/fargate.js +3 -3
  48. package/lib/providers/lambda.d.ts +2 -0
  49. package/lib/providers/lambda.js +3 -3
  50. package/lib/providers/update-lambda.lambda.js +7 -2
  51. package/lib/runner.js +1 -1
  52. package/lib/secrets.js +1 -1
  53. package/lib/setup.lambda.js +7 -4
  54. package/lib/status.lambda.js +17 -8
  55. package/lib/token-retriever.lambda.js +8 -2
  56. package/lib/webhook-handler.lambda.js +39 -12
  57. package/lib/webhook-redelivery.lambda.js +1 -1
  58. package/package.json +5 -5
package/.jsii CHANGED
@@ -3858,7 +3858,7 @@
3858
3858
  },
3859
3859
  "name": "@cloudsnorkel/cdk-github-runners",
3860
3860
  "readme": {
3861
- "markdown": "# GitHub Self-Hosted Runners CDK Constructs\n\n[![NPM](https://img.shields.io/npm/v/@cloudsnorkel/cdk-github-runners?label=npm&logo=npm)][7]\n[![PyPI](https://img.shields.io/pypi/v/cloudsnorkel.cdk-github-runners?label=pypi&logo=pypi)][6]\n[![Maven Central](https://img.shields.io/maven-central/v/com.cloudsnorkel/cdk.github.runners.svg?label=Maven%20Central&logo=apachemaven)][8]\n[![Go](https://img.shields.io/github/v/tag/CloudSnorkel/cdk-github-runners?color=red&label=go&logo=go)][11]\n[![Nuget](https://img.shields.io/nuget/v/CloudSnorkel.Cdk.Github.Runners?color=red&&logo=nuget)][12]\n[![Release](https://github.com/CloudSnorkel/cdk-github-runners/actions/workflows/release.yml/badge.svg)](https://github.com/CloudSnorkel/cdk-github-runners/actions/workflows/release.yml)\n[![License](https://img.shields.io/badge/license-Apache--2.0-blue)](https://github.com/CloudSnorkel/cdk-github-runners/blob/main/LICENSE)\n\nUse this CDK construct to create ephemeral [self-hosted GitHub runners][1] on-demand inside your AWS account.\n\n* 🧩 Easy to configure GitHub integration with a web-based interface\n* 🧠 Customizable runners with decent defaults\n* 🏃🏻 Multiple runner configurations controlled by labels\n* 🔐 Everything fully hosted in your account\n* 🔃 Automatically updated build environment with latest runner version\n\nSelf-hosted runners in AWS are useful when:\n\n* You need easy access to internal resources in your actions\n* You want to pre-install some software for your actions\n* You want to provide some basic AWS API access (but [aws-actions/configure-aws-credentials][2] has more security controls)\n* You are using GitHub Enterprise Server\n\nEphemeral (or on-demand) runners are the [recommended way by GitHub][14] for auto-scaling, and they make sure all jobs run with a clean image. Runners are started on-demand. You don't pay unless a job is running.\n\n## API\n\nThe best way to browse API documentation is on [Constructs Hub][13]. It is available in all supported programming languages.\n\n## Providers\n\nA runner provider creates compute resources on-demand and uses [actions/runner][5] to start a runner.\n\n| | EC2 | CodeBuild | Fargate | ECS | Lambda |\n|------------------|-------------------|----------------------------|----------------|----------------|---------------|\n| **Time limit** | Unlimited | 8 hours | Unlimited | Unlimited | 15 minutes |\n| **vCPUs** | Unlimited | 2, 4, 8, or 72 | 0.25 to 4 | Unlimited | 1 to 6 |\n| **RAM** | Unlimited | 3gb, 7gb, 15gb, or 145gb | 512mb to 30gb | Unlimited | 128mb to 10gb |\n| **Storage** | Unlimited | 50gb to 824gb | 20gb to 200gb | Unlimited | Up to 10gb |\n| **Architecture** | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 |\n| **sudo** | ✔ | ✔ | ✔ | ✔ | ❌ |\n| **Docker** | ✔ | ✔ (Linux only) | ❌ | ✔ | ❌ |\n| **Spot pricing** | ✔ | ❌ | ✔ | ✔ | ❌ |\n| **OS** | Linux, Windows | Linux, Windows | Linux, Windows | Linux, Windows | Linux |\n\nThe best provider to use mostly depends on your current infrastructure. When in doubt, CodeBuild is always a good choice. Execution history and logs are easy to view, and it has no restrictive limits unless you need to run for more than 8 hours.\n\n* EC2 is useful when you want runners to have complete access to the host\n* ECS is useful when you want to control the infrastructure, like leaving the runner host running for faster startups\n* Lambda is useful for short jobs that can work within time, size and readonly system constraints\n\nYou can also create your own provider by implementing `IRunnerProvider`.\n\n## Installation\n\n1. Install and use the appropriate package\n <details><summary>Python</summary>\n\n ### Install\n Available on [PyPI][6].\n ```bash\n pip install cloudsnorkel.cdk-github-runners\n ```\n ### Use\n ```python\n from aws_cdk import App, Stack\n from cloudsnorkel.cdk_github_runners import GitHubRunners\n\n app = App()\n stack = Stack(app, \"github-runners\")\n GitHubRunners(stack, \"runners\")\n\n app.synth()\n ```\n </details>\n <details><summary>TypeScript or JavaScript</summary>\n\n ### Install\n Available on [npm][7].\n ```bash\n npm i @cloudsnorkel/cdk-github-runners\n ```\n ### Use\n ```typescript\n import { App, Stack } from 'aws-cdk-lib';\n import { GitHubRunners } from '@cloudsnorkel/cdk-github-runners';\n\n const app = new App();\n const stack = new Stack(app, 'github-runners');\n new GitHubRunners(stack, 'runners');\n\n app.synth();\n ```\n </details>\n <details><summary>Java</summary>\n\n ### Install\n Available on [Maven][8].\n ```xml\n <dependency>\n <groupId>com.cloudsnorkel</groupId>\n <artifactId>cdk.github.runners</artifactId>\n </dependency>\n ```\n ### Use\n ```java\n import software.amazon.awscdk.App;\n import software.amazon.awscdk.Stack;\n import com.cloudsnorkel.cdk.github.runners.GitHubRunners;\n\n public class Example {\n public static void main(String[] args){\n App app = new App();\n Stack stack = new Stack(app, \"github-runners\");\n GitHubRunners.Builder.create(stack, \"runners\").build();\n\n app.synth();\n }\n }\n ```\n </details>\n <details><summary>Go</summary>\n\n ### Install\n Available on [GitHub][11].\n ```bash\n go get github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\n ```\n ### Use\n ```go\n package main\n\n import (\n \"github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\"\n \"github.com/aws/aws-cdk-go/awscdk/v2\"\n \"github.com/aws/jsii-runtime-go\"\n )\n\n func main() {\n app := awscdk.NewApp(nil)\n stack := awscdk.NewStack(app, jsii.String(\"github-runners\"), &awscdk.StackProps{})\n cloudsnorkelcdkgithubrunners.NewGitHubRunners(stack, jsii.String(\"runners\"), &cloudsnorkelcdkgithubrunners.GitHubRunnersProps{})\n\n app.Synth(nil)\n }\n ```\n </details>\n <details><summary>.NET</summary>\n\n ### Install\n Available on [Nuget][12].\n ```bash\n dotnet add package CloudSnorkel.Cdk.Github.Runners\n ```\n ### Use\n ```csharp\n using Amazon.CDK;\n using CloudSnorkel;\n\n namespace Example\n {\n sealed class Program\n {\n public static void Main(string[] args)\n {\n var app = new App();\n var stack = new Stack(app, \"github-runners\");\n new GitHubRunners(stack, \"runners\");\n app.Synth();\n }\n }\n }\n ```\n </details>\n2. Use `GitHubRunners` construct in your code (starting with default arguments is fine)\n3. Deploy your stack\n4. Look for the status command output similar to `aws --region us-east-1 lambda invoke --function-name status-XYZ123 status.json`\n ```\n ✅ github-runners-test\n\n ✨ Deployment time: 260.01s\n\n Outputs:\n github-runners-test.runnersstatuscommand4A30F0F5 = aws --region us-east-1 lambda invoke --function-name github-runners-test-runnersstatus1A5771C0-mvttg8oPQnQS status.json\n ```\n5. Execute the status command (you may need to specify `--profile` too) and open the resulting `status.json` file\n6. Open the URL in `github.setup.url` from `status.json` or [manually setup GitHub](SETUP_GITHUB.md) integration as an app or with personal access token\n7. Run status command again to confirm `github.auth.status` and `github.webhook.status` are OK\n8. Trigger a GitHub action that has a `self-hosted` label with `runs-on: [self-hosted, codebuild]` (or non-default labels you set in step 2)\n9. If the action is not successful, see [troubleshooting](#Troubleshooting)\n\n[![Demo](demo-thumbnail.jpg)](https://youtu.be/wlyv_3V8lIw)\n\n## Customizing\n\nThe default providers configured by `GitHubRunners` are useful for testing but probably not too much for actual production work. They run in the default VPC or no VPC and have no added IAM permissions. You would usually want to configure the providers yourself.\n\nFor example:\n\n```typescript\nlet vpc: ec2.Vpc;\nlet runnerSg: ec2.SecurityGroup;\nlet dbSg: ec2.SecurityGroup;\nlet bucket: s3.Bucket;\n\n// create a custom CodeBuild provider\nconst myProvider = new CodeBuildRunnerProvider(this, 'codebuild runner', {\n labels: ['my-codebuild'],\n vpc: vpc,\n securityGroups: [runnerSg],\n});\n// grant some permissions to the provider\nbucket.grantReadWrite(myProvider);\ndbSg.connections.allowFrom(runnerSg, ec2.Port.tcp(3306), 'allow runners to connect to MySQL database');\n\n// create the runner infrastructure\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nAnother way to customize runners is by modifying the image used to spin them up. The image contains the [runner][5], any required dependencies, and integration code with the provider. You may choose to customize this image by adding more packages, for example.\n\n```typescript\nconst myBuilder = FargateRunnerProvider.imageBuilder(this, 'image builder');\nmyBuilder.addComponent(\n RunnerImageComponent.custom({ commands: ['apt install -y nginx xz-utils'] }),\n);\n\nconst myProvider = new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['customized-fargate'],\n imageBuilder: myBuilder,\n});\n\n// create the runner infrastructure\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nYour workflow will then look like:\n\n```yaml\nname: self-hosted example\non: push\njobs:\n self-hosted:\n runs-on: [self-hosted, customized-fargate]\n steps:\n - run: echo hello world\n```\n\nWindows images can also be customized the same way.\n\n```typescript\nconst myWindowsBuilder = FargateRunnerProvider.imageBuilder(this, 'Windows image builder', {\n architecture: Architecture.X86_64,\n os: Os.WINDOWS,\n});\nmyWindowsBuilder.addComponent(\n RunnerImageComponent.custom({\n name: 'Ninja',\n commands: [\n 'Invoke-WebRequest -UseBasicParsing -Uri \"https://github.com/ninja-build/ninja/releases/download/v1.11.1/ninja-win.zip\" -OutFile ninja.zip',\n 'Expand-Archive ninja.zip -DestinationPath C:\\\\actions',\n 'del ninja.zip',\n ],\n }),\n);\n\nconst myProvider = new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['customized-windows-fargate'],\n imageBuilder: myWindowsBuilder,\n});\n\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nThe runner OS and architecture is determined by the image it is set to use. For example, to create a Fargate runner provider for ARM64 set the `architecture` property for the image builder to `Architecture.ARM64` in the image builder properties.\n\n```typescript\nnew GitHubRunners(this, 'runners', {\n providers: [\n new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['arm64', 'fargate'],\n imageBuilder: FargateRunnerProvider.imageBuilder(this, 'image builder', {\n architecture: Architecture.ARM64,\n os: Os.LINUX_UBUNTU,\n }),\n }),\n ],\n});\n```\n\n### Composite Providers\n\nComposite providers allow you to combine multiple runner providers with different strategies. There are two types:\n\n**Fallback Strategy**: Try providers in order until one succeeds. Useful for trying spot instances first, then falling back to on-demand if spot capacity is unavailable.\n\n```typescript\n// Try spot instances first, fall back to on-demand if spot is unavailable\nconst ecsFallback = CompositeProvider.fallback(this, 'ECS Fallback', [\n new EcsRunnerProvider(this, 'ECS Spot', {\n labels: ['ecs', 'linux', 'x64'],\n spot: true,\n // ... other config\n }),\n new EcsRunnerProvider(this, 'ECS On-Demand', {\n labels: ['ecs', 'linux', 'x64'],\n spot: false,\n // ... other config\n }),\n]);\n\nnew GitHubRunners(this, 'runners', {\n providers: [ecsFallback],\n});\n```\n\n**Weighted Distribution Strategy**: Randomly select a provider based on weights. Useful for distributing load across multiple availability zones or instance types.\n\n```typescript\n// Distribute 60% of traffic to AZ-1, 40% to AZ-2\nconst distributedProvider = CompositeProvider.distribute(this, 'Fargate Distribution', [\n {\n weight: 3, // 3/(3+2) = 60%\n provider: new FargateRunnerProvider(this, 'Fargate AZ-1', {\n labels: ['fargate', 'linux', 'x64'],\n subnetSelection: vpc.selectSubnets({\n availabilityZones: [vpc.availabilityZones[0]],\n }),\n // ... other config\n }),\n },\n {\n weight: 2, // 2/(3+2) = 40%\n provider: new FargateRunnerProvider(this, 'Fargate AZ-2', {\n labels: ['fargate', 'linux', 'x64'],\n subnetSelection: vpc.selectSubnets({\n availabilityZones: [vpc.availabilityZones[1]],\n }),\n // ... other config\n }),\n },\n]);\n\nnew GitHubRunners(this, 'runners', {\n providers: [distributedProvider],\n});\n```\n\n**Important**: All providers in a composite must have the exact same labels. This ensures any provisioned runner can match the labels requested by the GitHub workflow job.\n\n### Custom Provider Selection\n\nBy default, providers are selected based on label matching: the first provider that has all the labels requested by the job is selected. You can customize this behavior using a provider selector Lambda function to:\n\n* Filter out certain jobs (prevent runner provisioning)\n* Dynamically select a provider based on job characteristics (repository, branch, time of day, etc.)\n* Customize labels for the runner (add, remove, or modify labels dynamically)\n\nThe selector function receives the full GitHub webhook payload, a map of all available providers and their labels, and the default provider/labels that would have been selected. It returns the provider to use (or `undefined` to skip runner creation) and the labels to assign to the runner.\n\n**Example: Route jobs to different providers based on repository**\n\n```typescript\nimport { ComputeType } from 'aws-cdk-lib/aws-codebuild';\nimport { Function, Code, Runtime } from 'aws-cdk-lib/aws-lambda';\nimport { GitHubRunners, CodeBuildRunnerProvider } from '@cloudsnorkel/cdk-github-runners';\n\nconst defaultProvider = new CodeBuildRunnerProvider(this, 'default', {\n labels: ['custom-runner', 'default'],\n});\nconst productionProvider = new CodeBuildRunnerProvider(this, 'production', {\n labels: ['custom-runner', 'production'],\n computeType: ComputeType.LARGE,\n});\n\nconst providerSelector = new Function(this, 'provider-selector', {\n runtime: Runtime.NODEJS_LATEST,\n handler: 'index.handler',\n code: Code.fromInline(`\n exports.handler = async (event) => {\n const { payload, providers, defaultProvider, defaultLabels } = event;\n\n // Route production repos to dedicated provider\n if (payload.repository.name.includes('prod')) {\n return {\n provider: '${productionProvider.node.path}',\n labels: ['custom-runner', 'production', 'modified-via-selector'],\n };\n }\n\n // Filter out draft PRs\n if (payload.workflow_job.head_branch?.startsWith('draft/')) {\n return { provider: undefined }; // Skip runner provisioning\n }\n\n // Use default for everything else\n return {\n provider: defaultProvider,\n labels: defaultLabels,\n };\n };\n `),\n});\n\nnew GitHubRunners(this, 'runners', {\n providers: [defaultProvider, productionProvider],\n providerSelector: providerSelector,\n});\n```\n\n**Example: Add dynamic labels based on job metadata**\n\n```typescript\nconst providerSelector = new Function(this, 'provider-selector', {\n runtime: Runtime.NODEJS_LATEST,\n handler: 'index.handler',\n code: Code.fromInline(`\n exports.handler = async (event) => {\n const { payload, defaultProvider, defaultLabels } = event;\n\n // Add branch name as a label\n const branch = payload.workflow_job.head_branch || 'unknown';\n const labels = [...(defaultLabels || []), 'branch:' + branch];\n\n return {\n provider: defaultProvider,\n labels: labels,\n };\n };\n `),\n});\n```\n\n**Important considerations:**\n\n* ⚠️ **Label matching responsibility**: You are responsible for ensuring the selected provider's labels match what the job requires. If labels don't match, the runner will be provisioned but GitHub Actions won't assign the job to it.\n* ⚠️ **No guarantee of assignment**: Provider selection only determines which provider will provision a runner. GitHub Actions may still route the job to any available runner with matching labels. For reliable provider assignment, consider repo-level runner registration (the default).\n* ⚡ **Performance**: The selector runs synchronously during webhook processing. Keep it fast and efficient—the webhook has a 30-second timeout total.\n\n## Examples\n\nWe provide comprehensive examples in the [`examples/`](examples/) folder to help you get started quickly:\n\n### Getting Started\n- **[Simple CodeBuild](examples/typescript/simple-codebuild/)** - Basic setup with just a CodeBuild provider (also available in [Python](examples/python/simple-codebuild/))\n\n### Provider Configuration\n- **[Composite Provider](examples/typescript/composite-provider/)** - Fallback and weighted distribution strategies (also available in [Python](examples/python/composite-provider/))\n- **[Provider Selector](examples/typescript/provider-selector/)** - Custom provider selection with Lambda function (also available in [Python](examples/python/provider-selector/))\n- **[EC2 Windows Provider](examples/typescript/ec2-windows-provider/)** - EC2 configuration for Windows runners (also available in [Python](examples/python/ec2-windows-provider/))\n\n### Compute & Performance\n- **[Compute Options](examples/typescript/compute-options/)** - Configure CPU, memory, and instance types for different providers (also available in [Python](examples/python/compute-options/))\n- **[Spot Instances](examples/typescript/spot-instances/)** - Use spot instances for cost savings across EC2, Fargate, and ECS (also available in [Python](examples/python/spot-instances/))\n- **[Storage Options](examples/typescript/storage-options/)** - Custom EBS storage options for EC2 runners (also available in [Python](examples/python/storage-options/))\n- **[ECS Scaling](examples/typescript/ecs-scaling/)** - Custom autoscaling group scaling policies for ECS providers (also available in [Python](examples/python/ecs-scaling/))\n\n### Security & Access\n- **[IAM Permissions](examples/typescript/iam-permissions/)** - Grant AWS IAM permissions to runners (also available in [Python](examples/python/iam-permissions/))\n- **[Network Access](examples/typescript/network-access/)** - Configure network access with VPCs and security groups (also available in [Python](examples/python/network-access/))\n- **[Access Control](examples/typescript/access-control/)** - Configure access control for webhook and setup functions (also available in [Python](examples/python/access-control/))\n\n### Customization\n- **[Add Software](examples/typescript/add-software/)** - Add custom software to runner images (also available in [Python](examples/python/add-software/))\n\n### Enterprise & Monitoring\n- **[GHES](examples/typescript/ghes/)** - Configure runners for GitHub Enterprise Server (also available in [Python](examples/python/ghes/))\n- **[Monitoring](examples/typescript/monitoring/)** - Set up CloudWatch alarms and SNS notifications (also available in [Python](examples/python/monitoring/))\n\nEach example is self-contained with its own dependencies and README. Start with the simple examples and work your way up to more advanced configurations.\n\nAnother good and very full example is the [integration test](test/default.integ.ts).\n\nIf you have more to share, please open a PR adding examples to the `examples` folder.\n\n## Architecture\n\n![Architecture diagram](architecture.svg)\n\n## Troubleshooting\n\nRunners are started in response to a webhook coming in from GitHub. If there are any issues starting the runner like missing capacity or transient API issues, the provider will keep retrying for 24 hours. Configuration issue related errors like pointing to a missing AMI will not be retried. GitHub itself will cancel the job if it can't find a runner for 24 hours. If your jobs don't start, follow the steps below to examine all parts of this workflow.\n\n1. Always start with the status function, make sure no errors are reported, and confirm all status codes are OK\n2. Make sure `runs-on` in the workflow matches the expected labels set in the runner provider\n3. Diagnose relevant executions of the orchestrator step function by visiting the URL in `troubleshooting.stepFunctionUrl` from `status.json`\n 1. If the execution failed, check your runner provider configuration for errors\n 2. If the execution is still running for a long time, check the execution events to see why runner starting is being retried\n 3. If there are no relevant executions, move to the next step\n4. Confirm the webhook Lambda was called by visiting the URL in `troubleshooting.webhookHandlerUrl` from `status.json`\n 1. If it's not called or logs errors, confirm the webhook settings on the GitHub side\n 2. If you see too many errors, make sure you're only sending `workflow_job` events\n5. When using GitHub app, make sure there are active installations in `github.auth.app.installations`\n\nAll logs are saved in CloudWatch.\n* Log group names can be found in `status.json` for each provider, image builder, and other parts of the system\n* Some useful Logs Insights queries can be enabled with `GitHubRunners.createLogsInsightsQueries()`\n\nTo get `status.json`, check out the CloudFormation stack output for a command that generates it. The command looks like:\n\n```\naws --region us-east-1 lambda invoke --function-name status-XYZ123 status.json\n```\n\n## Monitoring\n\nThere are two important ways to monitor your runners:\n\n1. Make sure runners don't fail to start. When that happens, jobs may sit and wait. Use `GitHubRunners.metricFailed()` to get a metric for the number of failed runner starts. You should use this metric to trigger an alarm.\n2. Make sure runner images don't fail to build. Failed runner image builds mean you will get stuck with out-of-date software on your runners. It may lead to security vulnerabilities, or it may lead to slower runner start-ups as the runner software itself needs to be updated. Use `GitHubRunners.failedImageBuildsTopic()` to get SNS topic that gets notified of failed runner image builds. You should subscribe to this topic.\n\nOther useful metrics to track:\n\n1. Use `GitHubRunners.metricJobCompleted()` to get a metric for the number of completed jobs broken down by labels and job success.\n2. Use `GitHubRunners.metricTime()` to get a metric for the total time a runner is running. This includes the overhead of starting the runner.\n\n## Contributing\n\nIf you use and love this project, please consider contributing.\n\n1. 🪳 If you see something, say something. [Issues][16] help improve the quality of the project.\n * Include relevant logs and package versions for bugs.\n * When possible, describe the use-case behind feature requests.\n1. 🛠️ [Pull requests][17] are welcome.\n * Run `npm run build` before submitting to make sure all tests pass.\n * Allow edits from maintainers so small adjustments can be made easily.\n1. 💵 Consider [sponsoring][15] the project to show your support and optionally get your name listed below.\n\n## Other Options\n\n1. [philips-labs/terraform-aws-github-runner][3] if you're using Terraform\n2. [actions/actions-runner-controller][4] if you're using Kubernetes\n\n\n[1]: https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners\n[2]: https://github.com/marketplace/actions/configure-aws-credentials-action-for-github-actions\n[3]: https://github.com/philips-labs/terraform-aws-github-runner\n[4]: https://github.com/actions/actions-runner-controller\n[5]: https://github.com/actions/runner\n[6]: https://pypi.org/project/cloudsnorkel.cdk-github-runners\n[7]: https://www.npmjs.com/package/@cloudsnorkel/cdk-github-runners\n[8]: https://central.sonatype.com/artifact/com.cloudsnorkel/cdk.github.runners/\n[9]: https://docs.github.com/en/developers/apps/getting-started-with-apps/about-apps\n[10]: https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token\n[11]: https://pkg.go.dev/github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\n[12]: https://www.nuget.org/packages/CloudSnorkel.Cdk.Github.Runners/\n[13]: https://constructs.dev/packages/@cloudsnorkel/cdk-github-runners/\n[14]: https://docs.github.com/en/actions/hosting-your-own-runners/autoscaling-with-self-hosted-runners#using-ephemeral-runners-for-autoscaling\n[15]: https://github.com/sponsors/CloudSnorkel\n[16]: https://github.com/CloudSnorkel/cdk-github-runners/issues\n[17]: https://github.com/CloudSnorkel/cdk-github-runners/pulls\n"
3861
+ "markdown": "# GitHub Self-Hosted Runners CDK Constructs\n\n[![NPM](https://img.shields.io/npm/v/@cloudsnorkel/cdk-github-runners?label=npm&logo=npm)][7]\n[![PyPI](https://img.shields.io/pypi/v/cloudsnorkel.cdk-github-runners?label=pypi&logo=pypi)][6]\n[![Maven Central](https://img.shields.io/maven-central/v/com.cloudsnorkel/cdk.github.runners.svg?label=Maven%20Central&logo=apachemaven)][8]\n[![Go](https://img.shields.io/github/v/tag/CloudSnorkel/cdk-github-runners?color=red&label=go&logo=go)][11]\n[![Nuget](https://img.shields.io/nuget/v/CloudSnorkel.Cdk.Github.Runners?color=red&&logo=nuget)][12]\n[![Release](https://github.com/CloudSnorkel/cdk-github-runners/actions/workflows/release.yml/badge.svg)](https://github.com/CloudSnorkel/cdk-github-runners/actions/workflows/release.yml)\n[![License](https://img.shields.io/badge/license-Apache--2.0-blue)](https://github.com/CloudSnorkel/cdk-github-runners/blob/main/LICENSE)\n\nUse this CDK construct to create ephemeral [self-hosted GitHub runners][1] on-demand inside your AWS account.\n\n* 🧩 Easy to configure GitHub integration with a web-based interface\n* 🧠 Customizable runners with decent defaults\n* 🏃🏻 Multiple runner configurations controlled by labels\n* 🔐 Everything fully hosted in your account\n* 🔃 Automatically updated build environment with latest runner version\n\nSelf-hosted runners in AWS are useful when:\n\n* You need easy access to internal resources in your actions\n* You want to pre-install some software for your actions\n* You want to provide some basic AWS API access (but [aws-actions/configure-aws-credentials][2] has more security controls)\n* You are using GitHub Enterprise Server\n\nEphemeral (or on-demand) runners are the [recommended way by GitHub][14] for auto-scaling, and they make sure all jobs run with a clean image. Runners are started on-demand. You don't pay unless a job is running.\n\n## API\n\nThe best way to browse API documentation is on [Constructs Hub][13]. It is available in all supported programming languages.\n\n## Providers\n\nA runner provider creates compute resources on-demand and uses [actions/runner][5] to start a runner.\n\n| | EC2 | CodeBuild | Fargate | ECS | Lambda |\n|------------------|-------------------|----------------------------|----------------|----------------|---------------|\n| **Time limit** | Unlimited | 8 hours | Unlimited | Unlimited | 15 minutes |\n| **vCPUs** | Unlimited | 2, 4, 8, or 72 | 0.25 to 4 | Unlimited | 1 to 6 |\n| **RAM** | Unlimited | 3gb, 7gb, 15gb, or 145gb | 512mb to 30gb | Unlimited | 128mb to 10gb |\n| **Storage** | Unlimited | 50gb to 824gb | 20gb to 200gb | Unlimited | Up to 10gb |\n| **Architecture** | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 | x86_64, ARM64 |\n| **sudo** | ✔ | ✔ | ✔ | ✔ | ❌ |\n| **Docker** | ✔ | ✔ (Linux only) | ❌ | ✔ | ❌ |\n| **Spot pricing** | ✔ | ❌ | ✔ | ✔ | ❌ |\n| **OS** | Linux, Windows | Linux, Windows | Linux, Windows | Linux, Windows | Linux |\n\nThe best provider to use mostly depends on your current infrastructure. When in doubt, CodeBuild is always a good choice. Execution history and logs are easy to view, and it has no restrictive limits unless you need to run for more than 8 hours.\n\n* EC2 is useful when you want runners to have complete access to the host\n* ECS is useful when you want to control the infrastructure, like leaving the runner host running for faster startups\n* Lambda is useful for short jobs that can work within time, size and readonly system constraints\n\nYou can also create your own provider by implementing `IRunnerProvider`.\n\n## Installation\n\n1. Install and use the appropriate package\n <details><summary>Python</summary>\n\n ### Install\n Available on [PyPI][6].\n ```bash\n pip install cloudsnorkel.cdk-github-runners\n ```\n ### Use\n ```python\n from aws_cdk import App, Stack\n from cloudsnorkel.cdk_github_runners import GitHubRunners\n\n app = App()\n stack = Stack(app, \"github-runners\")\n GitHubRunners(stack, \"runners\")\n\n app.synth()\n ```\n </details>\n <details><summary>TypeScript or JavaScript</summary>\n\n ### Install\n Available on [npm][7].\n ```bash\n npm i @cloudsnorkel/cdk-github-runners\n ```\n ### Use\n ```typescript\n import { App, Stack } from 'aws-cdk-lib';\n import { GitHubRunners } from '@cloudsnorkel/cdk-github-runners';\n\n const app = new App();\n const stack = new Stack(app, 'github-runners');\n new GitHubRunners(stack, 'runners');\n\n app.synth();\n ```\n </details>\n <details><summary>Java</summary>\n\n ### Install\n Available on [Maven][8].\n ```xml\n <dependency>\n <groupId>com.cloudsnorkel</groupId>\n <artifactId>cdk.github.runners</artifactId>\n </dependency>\n ```\n ### Use\n ```java\n import software.amazon.awscdk.App;\n import software.amazon.awscdk.Stack;\n import com.cloudsnorkel.cdk.github.runners.GitHubRunners;\n\n public class Example {\n public static void main(String[] args){\n App app = new App();\n Stack stack = new Stack(app, \"github-runners\");\n GitHubRunners.Builder.create(stack, \"runners\").build();\n\n app.synth();\n }\n }\n ```\n </details>\n <details><summary>Go</summary>\n\n ### Install\n Available on [GitHub][11].\n ```bash\n go get github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\n ```\n ### Use\n ```go\n package main\n\n import (\n \"github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\"\n \"github.com/aws/aws-cdk-go/awscdk/v2\"\n \"github.com/aws/jsii-runtime-go\"\n )\n\n func main() {\n app := awscdk.NewApp(nil)\n stack := awscdk.NewStack(app, jsii.String(\"github-runners\"), &awscdk.StackProps{})\n cloudsnorkelcdkgithubrunners.NewGitHubRunners(stack, jsii.String(\"runners\"), &cloudsnorkelcdkgithubrunners.GitHubRunnersProps{})\n\n app.Synth(nil)\n }\n ```\n </details>\n <details><summary>.NET</summary>\n\n ### Install\n Available on [Nuget][12].\n ```bash\n dotnet add package CloudSnorkel.Cdk.Github.Runners\n ```\n ### Use\n ```csharp\n using Amazon.CDK;\n using CloudSnorkel;\n\n namespace Example\n {\n sealed class Program\n {\n public static void Main(string[] args)\n {\n var app = new App();\n var stack = new Stack(app, \"github-runners\");\n new GitHubRunners(stack, \"runners\");\n app.Synth();\n }\n }\n }\n ```\n </details>\n2. Use `GitHubRunners` construct in your code (starting with default arguments is fine)\n3. Deploy your stack\n4. Look for the status command output similar to `aws --region us-east-1 lambda invoke --function-name status-XYZ123 status.json`\n ```\n ✅ github-runners-test\n\n ✨ Deployment time: 260.01s\n\n Outputs:\n github-runners-test.runnersstatuscommand4A30F0F5 = aws --region us-east-1 lambda invoke --function-name github-runners-test-runnersstatus1A5771C0-mvttg8oPQnQS status.json\n ```\n5. Execute the status command (you may need to specify `--profile` too) and open the resulting `status.json` file\n6. Open the URL in `github.setup.url` from `status.json` or [manually setup GitHub](SETUP_GITHUB.md) integration as an app or with personal access token\n7. Run status command again to confirm `github.auth.status` and `github.webhook.status` are OK\n8. Trigger a GitHub action that has a `self-hosted` label with `runs-on: [self-hosted, codebuild]` (or non-default labels you set in step 2)\n9. If the action is not successful, see [troubleshooting](#Troubleshooting)\n\n[![Demo](demo-thumbnail.jpg)](https://youtu.be/wlyv_3V8lIw)\n\n## Customizing\n\nThe default providers configured by `GitHubRunners` are useful for testing but probably not too much for actual production work. They run in the default VPC or no VPC and have no added IAM permissions. You would usually want to configure the providers yourself.\n\nFor example:\n\n```typescript\nlet vpc: ec2.Vpc;\nlet runnerSg: ec2.SecurityGroup;\nlet dbSg: ec2.SecurityGroup;\nlet bucket: s3.Bucket;\n\n// create a custom CodeBuild provider\nconst myProvider = new CodeBuildRunnerProvider(this, 'codebuild runner', {\n labels: ['my-codebuild'],\n vpc: vpc,\n securityGroups: [runnerSg],\n});\n// grant some permissions to the provider\nbucket.grantReadWrite(myProvider);\ndbSg.connections.allowFrom(runnerSg, ec2.Port.tcp(3306), 'allow runners to connect to MySQL database');\n\n// create the runner infrastructure\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nAnother way to customize runners is by modifying the image used to spin them up. The image contains the [runner][5], any required dependencies, and integration code with the provider. You may choose to customize this image by adding more packages, for example.\n\n```typescript\nconst myBuilder = FargateRunnerProvider.imageBuilder(this, 'image builder');\nmyBuilder.addComponent(\n RunnerImageComponent.custom({ commands: ['apt install -y nginx xz-utils'] }),\n);\n\nconst myProvider = new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['customized-fargate'],\n imageBuilder: myBuilder,\n});\n\n// create the runner infrastructure\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nYour workflow will then look like:\n\n```yaml\nname: self-hosted example\non: push\njobs:\n self-hosted:\n runs-on: [self-hosted, customized-fargate]\n steps:\n - run: echo hello world\n```\n\nWindows images can also be customized the same way.\n\n```typescript\nconst myWindowsBuilder = FargateRunnerProvider.imageBuilder(this, 'Windows image builder', {\n architecture: Architecture.X86_64,\n os: Os.WINDOWS,\n});\nmyWindowsBuilder.addComponent(\n RunnerImageComponent.custom({\n name: 'Ninja',\n commands: [\n 'Invoke-WebRequest -UseBasicParsing -Uri \"https://github.com/ninja-build/ninja/releases/download/v1.11.1/ninja-win.zip\" -OutFile ninja.zip',\n 'Expand-Archive ninja.zip -DestinationPath C:\\\\actions',\n 'del ninja.zip',\n ],\n }),\n);\n\nconst myProvider = new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['customized-windows-fargate'],\n imageBuilder: myWindowsBuilder,\n});\n\nnew GitHubRunners(this, 'runners', {\n providers: [myProvider],\n});\n```\n\nThe runner OS and architecture is determined by the image it is set to use. For example, to create a Fargate runner provider for ARM64 set the `architecture` property for the image builder to `Architecture.ARM64` in the image builder properties.\n\n```typescript\nnew GitHubRunners(this, 'runners', {\n providers: [\n new FargateRunnerProvider(this, 'fargate runner', {\n labels: ['arm64', 'fargate'],\n imageBuilder: FargateRunnerProvider.imageBuilder(this, 'image builder', {\n architecture: Architecture.ARM64,\n os: Os.LINUX_UBUNTU,\n }),\n }),\n ],\n});\n```\n\n### Composite Providers\n\nComposite providers allow you to combine multiple runner providers with different strategies. There are two types:\n\n**Fallback Strategy**: Try providers in order until one succeeds. Useful for trying spot instances first, then falling back to on-demand if spot capacity is unavailable.\n\n```typescript\n// Try spot instances first, fall back to on-demand if spot is unavailable\nconst ecsFallback = CompositeProvider.fallback(this, 'ECS Fallback', [\n new EcsRunnerProvider(this, 'ECS Spot', {\n labels: ['ecs', 'linux', 'x64'],\n spot: true,\n // ... other config\n }),\n new EcsRunnerProvider(this, 'ECS On-Demand', {\n labels: ['ecs', 'linux', 'x64'],\n spot: false,\n // ... other config\n }),\n]);\n\nnew GitHubRunners(this, 'runners', {\n providers: [ecsFallback],\n});\n```\n\n**Weighted Distribution Strategy**: Randomly select a provider based on weights. Useful for distributing load across multiple availability zones or instance types.\n\n```typescript\n// Distribute 60% of traffic to AZ-1, 40% to AZ-2\nconst distributedProvider = CompositeProvider.distribute(this, 'Fargate Distribution', [\n {\n weight: 3, // 3/(3+2) = 60%\n provider: new FargateRunnerProvider(this, 'Fargate AZ-1', {\n labels: ['fargate', 'linux', 'x64'],\n subnetSelection: vpc.selectSubnets({\n availabilityZones: [vpc.availabilityZones[0]],\n }),\n // ... other config\n }),\n },\n {\n weight: 2, // 2/(3+2) = 40%\n provider: new FargateRunnerProvider(this, 'Fargate AZ-2', {\n labels: ['fargate', 'linux', 'x64'],\n subnetSelection: vpc.selectSubnets({\n availabilityZones: [vpc.availabilityZones[1]],\n }),\n // ... other config\n }),\n },\n]);\n\nnew GitHubRunners(this, 'runners', {\n providers: [distributedProvider],\n});\n```\n\n**Important**: All providers in a composite must have the exact same labels. This ensures any provisioned runner can match the labels requested by the GitHub workflow job.\n\n### Custom Provider Selection\n\nBy default, providers are selected based on label matching: the first provider that has all the labels requested by the job is selected. You can customize this behavior using a provider selector Lambda function to:\n\n* Filter out certain jobs (prevent runner provisioning)\n* Dynamically select a provider based on job characteristics (repository, branch, time of day, etc.)\n* Customize labels for the runner (add, remove, or modify labels dynamically)\n\nThe selector function receives the full GitHub webhook payload, a map of all available providers and their labels, and the default provider/labels that would have been selected. It returns the provider to use (or `undefined` to skip runner creation) and the labels to assign to the runner.\n\n**Example: Route jobs to different providers based on repository**\n\n```typescript\nimport { ComputeType } from 'aws-cdk-lib/aws-codebuild';\nimport { Function, Code, Runtime } from 'aws-cdk-lib/aws-lambda';\nimport { GitHubRunners, CodeBuildRunnerProvider } from '@cloudsnorkel/cdk-github-runners';\n\nconst defaultProvider = new CodeBuildRunnerProvider(this, 'default', {\n labels: ['custom-runner', 'default'],\n});\nconst productionProvider = new CodeBuildRunnerProvider(this, 'production', {\n labels: ['custom-runner', 'production'],\n computeType: ComputeType.LARGE,\n});\n\nconst providerSelector = new Function(this, 'provider-selector', {\n runtime: Runtime.NODEJS_LATEST,\n handler: 'index.handler',\n code: Code.fromInline(`\n exports.handler = async (event) => {\n const { payload, providers, defaultProvider, defaultLabels } = event;\n\n // Route production repos to dedicated provider\n if (payload.repository.name.includes('prod')) {\n return {\n provider: '${productionProvider.node.path}',\n labels: ['custom-runner', 'production', 'modified-via-selector'],\n };\n }\n\n // Filter out draft PRs\n if (payload.workflow_job.head_branch?.startsWith('draft/')) {\n return { provider: undefined }; // Skip runner provisioning\n }\n\n // Use default for everything else\n return {\n provider: defaultProvider,\n labels: defaultLabels,\n };\n };\n `),\n});\n\nnew GitHubRunners(this, 'runners', {\n providers: [defaultProvider, productionProvider],\n providerSelector: providerSelector,\n});\n```\n\n**Example: Add dynamic labels based on job metadata**\n\n```typescript\nconst providerSelector = new Function(this, 'provider-selector', {\n runtime: Runtime.NODEJS_LATEST,\n handler: 'index.handler',\n code: Code.fromInline(`\n exports.handler = async (event) => {\n const { payload, defaultProvider, defaultLabels } = event;\n\n // Add branch name as a label\n const branch = payload.workflow_job.head_branch || 'unknown';\n const labels = [...(defaultLabels || []), 'branch:' + branch];\n\n return {\n provider: defaultProvider,\n labels: labels,\n };\n };\n `),\n});\n```\n\n**Important considerations:**\n\n* ⚠️ **Label matching responsibility**: You are responsible for ensuring the selected provider's labels match what the job requires. If labels don't match, the runner will be provisioned but GitHub Actions won't assign the job to it.\n* ⚠️ **No guarantee of assignment**: Provider selection only determines which provider will provision a runner. GitHub Actions may still route the job to any available runner with matching labels. For reliable provider assignment, consider repo-level runner registration (the default).\n* ⚡ **Performance**: The selector runs synchronously during webhook processing. Keep it fast and efficient—the webhook has a 30-second timeout total.\n\n## Examples\n\nWe provide comprehensive examples in the [`examples/`](examples/) folder to help you get started quickly:\n\n### Getting Started\n- **[Simple CodeBuild](examples/typescript/simple-codebuild/)** - Basic setup with just a CodeBuild provider (also available in [Python](examples/python/simple-codebuild/))\n\n### Provider Configuration\n- **[Composite Provider](examples/typescript/composite-provider/)** - Fallback and weighted distribution strategies (also available in [Python](examples/python/composite-provider/))\n- **[Provider Selector](examples/typescript/provider-selector/)** - Custom provider selection with Lambda function (also available in [Python](examples/python/provider-selector/))\n- **[EC2 Windows Provider](examples/typescript/ec2-windows-provider/)** - EC2 configuration for Windows runners (also available in [Python](examples/python/ec2-windows-provider/))\n- **[Split Stacks](examples/typescript/split-stacks/)** - Split image builders and providers across multiple stacks (also available in [Python](examples/python/split-stacks/))\n\n### Compute & Performance\n- **[Compute Options](examples/typescript/compute-options/)** - Configure CPU, memory, and instance types for different providers (also available in [Python](examples/python/compute-options/))\n- **[Spot Instances](examples/typescript/spot-instances/)** - Use spot instances for cost savings across EC2, Fargate, and ECS (also available in [Python](examples/python/spot-instances/))\n- **[Storage Options](examples/typescript/storage-options/)** - Custom EBS storage options for EC2 runners (also available in [Python](examples/python/storage-options/))\n- **[ECS Scaling](examples/typescript/ecs-scaling/)** - Custom autoscaling group scaling policies for ECS providers (also available in [Python](examples/python/ecs-scaling/))\n\n### Security & Access\n- **[IAM Permissions](examples/typescript/iam-permissions/)** - Grant AWS IAM permissions to runners (also available in [Python](examples/python/iam-permissions/))\n- **[Network Access](examples/typescript/network-access/)** - Configure network access with VPCs and security groups (also available in [Python](examples/python/network-access/))\n- **[Access Control](examples/typescript/access-control/)** - Configure access control for webhook and setup functions (also available in [Python](examples/python/access-control/))\n\n### Customization\n- **[Add Software](examples/typescript/add-software/)** - Add custom software to runner images (also available in [Python](examples/python/add-software/))\n\n### Enterprise & Monitoring\n- **[GHES](examples/typescript/ghes/)** - Configure runners for GitHub Enterprise Server (also available in [Python](examples/python/ghes/))\n- **[Monitoring](examples/typescript/monitoring/)** - Set up CloudWatch alarms and SNS notifications (also available in [Python](examples/python/monitoring/))\n\nEach example is self-contained with its own dependencies and README. Start with the simple examples and work your way up to more advanced configurations.\n\nAnother good and very full example is the [integration test](test/default.integ.ts).\n\nIf you have more to share, please open a PR adding examples to the `examples` folder.\n\n## Architecture\n\n![Architecture diagram](architecture.svg)\n\n## Troubleshooting\n\nRunners are started in response to a webhook coming in from GitHub. If there are any issues starting the runner like missing capacity or transient API issues, the provider will keep retrying for 24 hours. Configuration issue related errors like pointing to a missing AMI will not be retried. GitHub itself will cancel the job if it can't find a runner for 24 hours. If your jobs don't start, follow the steps below to examine all parts of this workflow.\n\n1. Always start with the status function, make sure no errors are reported, and confirm all status codes are OK\n2. Make sure `runs-on` in the workflow matches the expected labels set in the runner provider\n3. Diagnose relevant executions of the orchestrator step function by visiting the URL in `troubleshooting.stepFunctionUrl` from `status.json`\n 1. If the execution failed, check your runner provider configuration for errors\n 2. If the execution is still running for a long time, check the execution events to see why runner starting is being retried\n 3. If there are no relevant executions, move to the next step\n4. Confirm the webhook Lambda was called by visiting the URL in `troubleshooting.webhookHandlerUrl` from `status.json`\n 1. If it's not called or logs errors, confirm the webhook settings on the GitHub side\n 2. If you see too many errors, make sure you're only sending `workflow_job` events\n5. When using GitHub app, make sure there are active installations in `github.auth.app.installations`\n\nAll logs are saved in CloudWatch.\n* Log group names can be found in `status.json` for each provider, image builder, and other parts of the system\n* Some useful Logs Insights queries can be enabled with `GitHubRunners.createLogsInsightsQueries()`\n\nTo get `status.json`, check out the CloudFormation stack output for a command that generates it. The command looks like:\n\n```\naws --region us-east-1 lambda invoke --function-name status-XYZ123 status.json\n```\n\n## Monitoring\n\nThere are two important ways to monitor your runners:\n\n1. Make sure runners don't fail to start. When that happens, jobs may sit and wait. Use `GitHubRunners.metricFailed()` to get a metric for the number of failed runner starts. You should use this metric to trigger an alarm.\n2. Make sure runner images don't fail to build. Failed runner image builds mean you will get stuck with out-of-date software on your runners. It may lead to security vulnerabilities, or it may lead to slower runner start-ups as the runner software itself needs to be updated. Use `GitHubRunners.failedImageBuildsTopic()` to get SNS topic that gets notified of failed runner image builds. You should subscribe to this topic.\n\nOther useful metrics to track:\n\n1. Use `GitHubRunners.metricJobCompleted()` to get a metric for the number of completed jobs broken down by labels and job success.\n2. Use `GitHubRunners.metricTime()` to get a metric for the total time a runner is running. This includes the overhead of starting the runner.\n\n## Contributing\n\nIf you use and love this project, please consider contributing.\n\n1. 🪳 If you see something, say something. [Issues][16] help improve the quality of the project.\n * Include relevant logs and package versions for bugs.\n * When possible, describe the use-case behind feature requests.\n1. 🛠️ [Pull requests][17] are welcome.\n * Run `npm run build` before submitting to make sure all tests pass.\n * Allow edits from maintainers so small adjustments can be made easily.\n1. 💵 Consider [sponsoring][15] the project to show your support and optionally get your name listed below.\n\n## Other Options\n\n1. [github-aws-runners/terraform-aws-github-runner][3] if you're using Terraform\n2. [actions/actions-runner-controller][4] if you're using Kubernetes\n\n\n[1]: https://docs.github.com/en/actions/hosting-your-own-runners/about-self-hosted-runners\n[2]: https://github.com/marketplace/actions/configure-aws-credentials-action-for-github-actions\n[3]: https://github.com/github-aws-runners/terraform-aws-github-runner\n[4]: https://github.com/actions/actions-runner-controller\n[5]: https://github.com/actions/runner\n[6]: https://pypi.org/project/cloudsnorkel.cdk-github-runners\n[7]: https://www.npmjs.com/package/@cloudsnorkel/cdk-github-runners\n[8]: https://central.sonatype.com/artifact/com.cloudsnorkel/cdk.github.runners/\n[9]: https://docs.github.com/en/developers/apps/getting-started-with-apps/about-apps\n[10]: https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token\n[11]: https://pkg.go.dev/github.com/CloudSnorkel/cdk-github-runners-go/cloudsnorkelcdkgithubrunners\n[12]: https://www.nuget.org/packages/CloudSnorkel.Cdk.Github.Runners/\n[13]: https://constructs.dev/packages/@cloudsnorkel/cdk-github-runners/\n[14]: https://docs.github.com/en/actions/hosting-your-own-runners/autoscaling-with-self-hosted-runners#using-ephemeral-runners-for-autoscaling\n[15]: https://github.com/sponsors/CloudSnorkel\n[16]: https://github.com/CloudSnorkel/cdk-github-runners/issues\n[17]: https://github.com/CloudSnorkel/cdk-github-runners/pulls\n"
3862
3862
  },
3863
3863
  "repository": {
3864
3864
  "type": "git",
@@ -5884,7 +5884,7 @@
5884
5884
  },
5885
5885
  "locationInModule": {
5886
5886
  "filename": "src/providers/codebuild.ts",
5887
- "line": 244
5887
+ "line": 256
5888
5888
  },
5889
5889
  "parameters": [
5890
5890
  {
@@ -5911,7 +5911,7 @@
5911
5911
  "kind": "class",
5912
5912
  "locationInModule": {
5913
5913
  "filename": "src/providers/codebuild.ts",
5914
- "line": 481
5914
+ "line": 493
5915
5915
  },
5916
5916
  "name": "CodeBuildRunner",
5917
5917
  "symbolId": "src/providers/codebuild:CodeBuildRunner"
@@ -5941,7 +5941,7 @@
5941
5941
  "immutable": true,
5942
5942
  "locationInModule": {
5943
5943
  "filename": "src/image-builders/codebuild.ts",
5944
- "line": 49
5944
+ "line": 59
5945
5945
  },
5946
5946
  "name": "buildImage",
5947
5947
  "optional": true,
@@ -5953,14 +5953,14 @@
5953
5953
  "abstract": true,
5954
5954
  "docs": {
5955
5955
  "default": "{@link ComputeType#SMALL }",
5956
- "remarks": "See the {@link ComputeType} enum for the possible values.",
5956
+ "remarks": "The compute type determines CPU, memory, and disk space:\n- SMALL: 2 vCPU, 3 GB RAM, 64 GB disk\n- MEDIUM: 4 vCPU, 7 GB RAM, 128 GB disk\n- LARGE: 8 vCPU, 15 GB RAM, 128 GB disk\n- X2_LARGE: 72 vCPU, 145 GB RAM, 256 GB disk (Linux) or 824 GB disk (Windows)\n\nUse a larger compute type when you need more disk space for building larger Docker images.\n\nFor more details, see https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html#environment.types",
5957
5957
  "stability": "experimental",
5958
- "summary": "The type of compute to use for this build."
5958
+ "summary": "The type of compute to use for this build. See the {@link ComputeType} enum for the possible values."
5959
5959
  },
5960
5960
  "immutable": true,
5961
5961
  "locationInModule": {
5962
5962
  "filename": "src/image-builders/codebuild.ts",
5963
- "line": 40
5963
+ "line": 50
5964
5964
  },
5965
5965
  "name": "computeType",
5966
5966
  "optional": true,
@@ -5979,7 +5979,7 @@
5979
5979
  "immutable": true,
5980
5980
  "locationInModule": {
5981
5981
  "filename": "src/image-builders/codebuild.ts",
5982
- "line": 58
5982
+ "line": 68
5983
5983
  },
5984
5984
  "name": "timeout",
5985
5985
  "optional": true,
@@ -6005,7 +6005,7 @@
6005
6005
  },
6006
6006
  "locationInModule": {
6007
6007
  "filename": "src/providers/codebuild.ts",
6008
- "line": 244
6008
+ "line": 256
6009
6009
  },
6010
6010
  "parameters": [
6011
6011
  {
@@ -6035,7 +6035,7 @@
6035
6035
  "kind": "class",
6036
6036
  "locationInModule": {
6037
6037
  "filename": "src/providers/codebuild.ts",
6038
- "line": 140
6038
+ "line": 150
6039
6039
  },
6040
6040
  "methods": [
6041
6041
  {
@@ -6046,7 +6046,7 @@
6046
6046
  },
6047
6047
  "locationInModule": {
6048
6048
  "filename": "src/providers/codebuild.ts",
6049
- "line": 189
6049
+ "line": 199
6050
6050
  },
6051
6051
  "name": "imageBuilder",
6052
6052
  "parameters": [
@@ -6085,7 +6085,7 @@
6085
6085
  },
6086
6086
  "locationInModule": {
6087
6087
  "filename": "src/providers/codebuild.ts",
6088
- "line": 394
6088
+ "line": 406
6089
6089
  },
6090
6090
  "name": "getStepFunctionTask",
6091
6091
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -6114,7 +6114,7 @@
6114
6114
  },
6115
6115
  "locationInModule": {
6116
6116
  "filename": "src/providers/codebuild.ts",
6117
- "line": 448
6117
+ "line": 460
6118
6118
  },
6119
6119
  "name": "grantStateMachine",
6120
6120
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -6183,7 +6183,7 @@
6183
6183
  },
6184
6184
  "locationInModule": {
6185
6185
  "filename": "src/providers/codebuild.ts",
6186
- "line": 451
6186
+ "line": 463
6187
6187
  },
6188
6188
  "name": "status",
6189
6189
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -6215,7 +6215,7 @@
6215
6215
  "immutable": true,
6216
6216
  "locationInModule": {
6217
6217
  "filename": "src/providers/codebuild.ts",
6218
- "line": 169
6218
+ "line": 179
6219
6219
  },
6220
6220
  "name": "LINUX_ARM64_DOCKERFILE_PATH",
6221
6221
  "static": true,
@@ -6234,7 +6234,7 @@
6234
6234
  "immutable": true,
6235
6235
  "locationInModule": {
6236
6236
  "filename": "src/providers/codebuild.ts",
6237
- "line": 154
6237
+ "line": 164
6238
6238
  },
6239
6239
  "name": "LINUX_X64_DOCKERFILE_PATH",
6240
6240
  "static": true,
@@ -6250,7 +6250,7 @@
6250
6250
  "immutable": true,
6251
6251
  "locationInModule": {
6252
6252
  "filename": "src/providers/codebuild.ts",
6253
- "line": 473
6253
+ "line": 485
6254
6254
  },
6255
6255
  "name": "connections",
6256
6256
  "overrides": "aws-cdk-lib.aws_ec2.IConnectable",
@@ -6266,7 +6266,7 @@
6266
6266
  "immutable": true,
6267
6267
  "locationInModule": {
6268
6268
  "filename": "src/providers/codebuild.ts",
6269
- "line": 219
6269
+ "line": 229
6270
6270
  },
6271
6271
  "name": "grantPrincipal",
6272
6272
  "overrides": "aws-cdk-lib.aws_iam.IGrantable",
@@ -6276,14 +6276,15 @@
6276
6276
  },
6277
6277
  {
6278
6278
  "docs": {
6279
+ "deprecated": "This field is internal and should not be accessed directly.",
6279
6280
  "remarks": "The image is built by an image builder and is specific to CodeBuild.",
6280
- "stability": "experimental",
6281
+ "stability": "deprecated",
6281
6282
  "summary": "Docker image loaded with GitHub Actions Runner and its prerequisites."
6282
6283
  },
6283
6284
  "immutable": true,
6284
6285
  "locationInModule": {
6285
6286
  "filename": "src/providers/codebuild.ts",
6286
- "line": 224
6287
+ "line": 236
6287
6288
  },
6288
6289
  "name": "image",
6289
6290
  "type": {
@@ -6298,7 +6299,7 @@
6298
6299
  "immutable": true,
6299
6300
  "locationInModule": {
6300
6301
  "filename": "src/providers/codebuild.ts",
6301
- "line": 214
6302
+ "line": 224
6302
6303
  },
6303
6304
  "name": "labels",
6304
6305
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -6320,7 +6321,7 @@
6320
6321
  "immutable": true,
6321
6322
  "locationInModule": {
6322
6323
  "filename": "src/providers/codebuild.ts",
6323
- "line": 231
6324
+ "line": 243
6324
6325
  },
6325
6326
  "name": "logGroup",
6326
6327
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -6336,7 +6337,7 @@
6336
6337
  "immutable": true,
6337
6338
  "locationInModule": {
6338
6339
  "filename": "src/providers/codebuild.ts",
6339
- "line": 209
6340
+ "line": 219
6340
6341
  },
6341
6342
  "name": "project",
6342
6343
  "type": {
@@ -6351,7 +6352,7 @@
6351
6352
  "immutable": true,
6352
6353
  "locationInModule": {
6353
6354
  "filename": "src/providers/codebuild.ts",
6354
- "line": 233
6355
+ "line": 245
6355
6356
  },
6356
6357
  "name": "retryableErrors",
6357
6358
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -6388,14 +6389,14 @@
6388
6389
  "abstract": true,
6389
6390
  "docs": {
6390
6391
  "default": "{@link ComputeType#SMALL }",
6391
- "remarks": "See the {@link ComputeType} enum for the possible values.",
6392
+ "remarks": "The compute type determines CPU, memory, and disk space:\n- SMALL: 2 vCPU, 3 GB RAM, 64 GB disk\n- MEDIUM: 4 vCPU, 7 GB RAM, 128 GB disk\n- LARGE: 8 vCPU, 15 GB RAM, 128 GB disk\n- X2_LARGE: 72 vCPU, 145 GB RAM, 256 GB disk (Linux) or 824 GB disk (Windows)\n\nUse a larger compute type when you need more disk space for building larger Docker images.\n\nFor more details, see https://docs.aws.amazon.com/codebuild/latest/userguide/build-env-ref-compute-types.html#environment.types",
6392
6393
  "stability": "experimental",
6393
- "summary": "The type of compute to use for this build."
6394
+ "summary": "The type of compute to use for this build. See the {@link ComputeType} enum for the possible values."
6394
6395
  },
6395
6396
  "immutable": true,
6396
6397
  "locationInModule": {
6397
6398
  "filename": "src/providers/codebuild.ts",
6398
- "line": 113
6399
+ "line": 123
6399
6400
  },
6400
6401
  "name": "computeType",
6401
6402
  "optional": true,
@@ -6414,7 +6415,7 @@
6414
6415
  "immutable": true,
6415
6416
  "locationInModule": {
6416
6417
  "filename": "src/providers/codebuild.ts",
6417
- "line": 130
6418
+ "line": 140
6418
6419
  },
6419
6420
  "name": "dockerInDocker",
6420
6421
  "optional": true,
@@ -6574,7 +6575,7 @@
6574
6575
  "immutable": true,
6575
6576
  "locationInModule": {
6576
6577
  "filename": "src/providers/codebuild.ts",
6577
- "line": 122
6578
+ "line": 132
6578
6579
  },
6579
6580
  "name": "timeout",
6580
6581
  "optional": true,
@@ -8059,7 +8060,7 @@
8059
8060
  },
8060
8061
  "locationInModule": {
8061
8062
  "filename": "src/providers/ecs.ts",
8062
- "line": 395
8063
+ "line": 397
8063
8064
  },
8064
8065
  "parameters": [
8065
8066
  {
@@ -8139,7 +8140,7 @@
8139
8140
  },
8140
8141
  "locationInModule": {
8141
8142
  "filename": "src/providers/ecs.ts",
8142
- "line": 619
8143
+ "line": 621
8143
8144
  },
8144
8145
  "name": "getStepFunctionTask",
8145
8146
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -8168,7 +8169,7 @@
8168
8169
  },
8169
8170
  "locationInModule": {
8170
8171
  "filename": "src/providers/ecs.ts",
8171
- "line": 686
8172
+ "line": 688
8172
8173
  },
8173
8174
  "name": "grantStateMachine",
8174
8175
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -8237,7 +8238,7 @@
8237
8238
  },
8238
8239
  "locationInModule": {
8239
8240
  "filename": "src/providers/ecs.ts",
8240
- "line": 689
8241
+ "line": 691
8241
8242
  },
8242
8243
  "name": "status",
8243
8244
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -8258,6 +8259,22 @@
8258
8259
  ],
8259
8260
  "name": "EcsRunnerProvider",
8260
8261
  "properties": [
8262
+ {
8263
+ "docs": {
8264
+ "remarks": "Use capacityProvider.autoScalingGroup to access the auto scaling group. This can help set up custom scaling policies.",
8265
+ "stability": "experimental",
8266
+ "summary": "Capacity provider used to scale the cluster."
8267
+ },
8268
+ "immutable": true,
8269
+ "locationInModule": {
8270
+ "filename": "src/providers/ecs.ts",
8271
+ "line": 306
8272
+ },
8273
+ "name": "capacityProvider",
8274
+ "type": {
8275
+ "fqn": "aws-cdk-lib.aws_ecs.AsgCapacityProvider"
8276
+ }
8277
+ },
8261
8278
  {
8262
8279
  "docs": {
8263
8280
  "stability": "experimental",
@@ -8266,7 +8283,7 @@
8266
8283
  "immutable": true,
8267
8284
  "locationInModule": {
8268
8285
  "filename": "src/providers/ecs.ts",
8269
- "line": 344
8286
+ "line": 346
8270
8287
  },
8271
8288
  "name": "connections",
8272
8289
  "overrides": "aws-cdk-lib.aws_ec2.IConnectable",
@@ -8282,7 +8299,7 @@
8282
8299
  "immutable": true,
8283
8300
  "locationInModule": {
8284
8301
  "filename": "src/providers/ecs.ts",
8285
- "line": 339
8302
+ "line": 341
8286
8303
  },
8287
8304
  "name": "grantPrincipal",
8288
8305
  "overrides": "aws-cdk-lib.aws_iam.IGrantable",
@@ -8298,7 +8315,7 @@
8298
8315
  "immutable": true,
8299
8316
  "locationInModule": {
8300
8317
  "filename": "src/providers/ecs.ts",
8301
- "line": 319
8318
+ "line": 321
8302
8319
  },
8303
8320
  "name": "labels",
8304
8321
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -8320,7 +8337,7 @@
8320
8337
  "immutable": true,
8321
8338
  "locationInModule": {
8322
8339
  "filename": "src/providers/ecs.ts",
8323
- "line": 356
8340
+ "line": 358
8324
8341
  },
8325
8342
  "name": "logGroup",
8326
8343
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -8336,7 +8353,7 @@
8336
8353
  "immutable": true,
8337
8354
  "locationInModule": {
8338
8355
  "filename": "src/providers/ecs.ts",
8339
- "line": 388
8356
+ "line": 390
8340
8357
  },
8341
8358
  "name": "retryableErrors",
8342
8359
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -8814,7 +8831,7 @@
8814
8831
  },
8815
8832
  "locationInModule": {
8816
8833
  "filename": "src/providers/fargate.ts",
8817
- "line": 385
8834
+ "line": 399
8818
8835
  },
8819
8836
  "parameters": [
8820
8837
  {
@@ -8841,7 +8858,7 @@
8841
8858
  "kind": "class",
8842
8859
  "locationInModule": {
8843
8860
  "filename": "src/providers/fargate.ts",
8844
- "line": 567
8861
+ "line": 581
8845
8862
  },
8846
8863
  "name": "FargateRunner",
8847
8864
  "symbolId": "src/providers/fargate:FargateRunner"
@@ -8861,7 +8878,7 @@
8861
8878
  },
8862
8879
  "locationInModule": {
8863
8880
  "filename": "src/providers/fargate.ts",
8864
- "line": 385
8881
+ "line": 399
8865
8882
  },
8866
8883
  "parameters": [
8867
8884
  {
@@ -8941,7 +8958,7 @@
8941
8958
  },
8942
8959
  "locationInModule": {
8943
8960
  "filename": "src/providers/fargate.ts",
8944
- "line": 474
8961
+ "line": 488
8945
8962
  },
8946
8963
  "name": "getStepFunctionTask",
8947
8964
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -8970,7 +8987,7 @@
8970
8987
  },
8971
8988
  "locationInModule": {
8972
8989
  "filename": "src/providers/fargate.ts",
8973
- "line": 541
8990
+ "line": 555
8974
8991
  },
8975
8992
  "name": "grantStateMachine",
8976
8993
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -9039,7 +9056,7 @@
9039
9056
  },
9040
9057
  "locationInModule": {
9041
9058
  "filename": "src/providers/fargate.ts",
9042
- "line": 544
9059
+ "line": 558
9043
9060
  },
9044
9061
  "name": "status",
9045
9062
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -9100,13 +9117,14 @@
9100
9117
  },
9101
9118
  {
9102
9119
  "docs": {
9103
- "stability": "experimental",
9120
+ "deprecated": "This field is internal and should not be accessed directly.",
9121
+ "stability": "deprecated",
9104
9122
  "summary": "Whether runner task will have a public IP."
9105
9123
  },
9106
9124
  "immutable": true,
9107
9125
  "locationInModule": {
9108
9126
  "filename": "src/providers/fargate.ts",
9109
- "line": 346
9127
+ "line": 356
9110
9128
  },
9111
9129
  "name": "assignPublicIp",
9112
9130
  "type": {
@@ -9136,7 +9154,7 @@
9136
9154
  "immutable": true,
9137
9155
  "locationInModule": {
9138
9156
  "filename": "src/providers/fargate.ts",
9139
- "line": 356
9157
+ "line": 366
9140
9158
  },
9141
9159
  "name": "connections",
9142
9160
  "overrides": "aws-cdk-lib.aws_ec2.IConnectable",
@@ -9146,13 +9164,14 @@
9146
9164
  },
9147
9165
  {
9148
9166
  "docs": {
9149
- "stability": "experimental",
9167
+ "deprecated": "This field is internal and should not be accessed directly.",
9168
+ "stability": "deprecated",
9150
9169
  "summary": "Container definition hosting the runner."
9151
9170
  },
9152
9171
  "immutable": true,
9153
9172
  "locationInModule": {
9154
9173
  "filename": "src/providers/fargate.ts",
9155
- "line": 326
9174
+ "line": 330
9156
9175
  },
9157
9176
  "name": "container",
9158
9177
  "type": {
@@ -9167,7 +9186,7 @@
9167
9186
  "immutable": true,
9168
9187
  "locationInModule": {
9169
9188
  "filename": "src/providers/fargate.ts",
9170
- "line": 351
9189
+ "line": 361
9171
9190
  },
9172
9191
  "name": "grantPrincipal",
9173
9192
  "overrides": "aws-cdk-lib.aws_iam.IGrantable",
@@ -9177,14 +9196,15 @@
9177
9196
  },
9178
9197
  {
9179
9198
  "docs": {
9199
+ "deprecated": "This field is internal and should not be accessed directly.",
9180
9200
  "remarks": "The image is built by an image builder and is specific to Fargate tasks.",
9181
- "stability": "experimental",
9201
+ "stability": "deprecated",
9182
9202
  "summary": "Docker image loaded with GitHub Actions Runner and its prerequisites."
9183
9203
  },
9184
9204
  "immutable": true,
9185
9205
  "locationInModule": {
9186
9206
  "filename": "src/providers/fargate.ts",
9187
- "line": 366
9207
+ "line": 380
9188
9208
  },
9189
9209
  "name": "image",
9190
9210
  "type": {
@@ -9199,7 +9219,7 @@
9199
9219
  "immutable": true,
9200
9220
  "locationInModule": {
9201
9221
  "filename": "src/providers/fargate.ts",
9202
- "line": 331
9222
+ "line": 335
9203
9223
  },
9204
9224
  "name": "labels",
9205
9225
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -9221,7 +9241,7 @@
9221
9241
  "immutable": true,
9222
9242
  "locationInModule": {
9223
9243
  "filename": "src/providers/fargate.ts",
9224
- "line": 373
9244
+ "line": 387
9225
9245
  },
9226
9246
  "name": "logGroup",
9227
9247
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -9237,7 +9257,7 @@
9237
9257
  "immutable": true,
9238
9258
  "locationInModule": {
9239
9259
  "filename": "src/providers/fargate.ts",
9240
- "line": 375
9260
+ "line": 389
9241
9261
  },
9242
9262
  "name": "retryableErrors",
9243
9263
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -9252,13 +9272,14 @@
9252
9272
  },
9253
9273
  {
9254
9274
  "docs": {
9255
- "stability": "experimental",
9275
+ "deprecated": "This field is internal and should not be accessed directly.",
9276
+ "stability": "deprecated",
9256
9277
  "summary": "Use spot pricing for Fargate tasks."
9257
9278
  },
9258
9279
  "immutable": true,
9259
9280
  "locationInModule": {
9260
9281
  "filename": "src/providers/fargate.ts",
9261
- "line": 361
9282
+ "line": 373
9262
9283
  },
9263
9284
  "name": "spot",
9264
9285
  "type": {
@@ -9267,13 +9288,14 @@
9267
9288
  },
9268
9289
  {
9269
9290
  "docs": {
9270
- "stability": "experimental",
9291
+ "deprecated": "This field is internal and should not be accessed directly.",
9292
+ "stability": "deprecated",
9271
9293
  "summary": "Fargate task hosting the runner."
9272
9294
  },
9273
9295
  "immutable": true,
9274
9296
  "locationInModule": {
9275
9297
  "filename": "src/providers/fargate.ts",
9276
- "line": 321
9298
+ "line": 323
9277
9299
  },
9278
9300
  "name": "task",
9279
9301
  "type": {
@@ -9282,13 +9304,14 @@
9282
9304
  },
9283
9305
  {
9284
9306
  "docs": {
9285
- "stability": "experimental",
9307
+ "deprecated": "This field is internal and should not be accessed directly.",
9308
+ "stability": "deprecated",
9286
9309
  "summary": "Subnets used for hosting the runner task."
9287
9310
  },
9288
9311
  "immutable": true,
9289
9312
  "locationInModule": {
9290
9313
  "filename": "src/providers/fargate.ts",
9291
- "line": 341
9314
+ "line": 349
9292
9315
  },
9293
9316
  "name": "subnetSelection",
9294
9317
  "optional": true,
@@ -9298,13 +9321,14 @@
9298
9321
  },
9299
9322
  {
9300
9323
  "docs": {
9301
- "stability": "experimental",
9324
+ "deprecated": "This field is internal and should not be accessed directly.",
9325
+ "stability": "deprecated",
9302
9326
  "summary": "VPC used for hosting the runner task."
9303
9327
  },
9304
9328
  "immutable": true,
9305
9329
  "locationInModule": {
9306
9330
  "filename": "src/providers/fargate.ts",
9307
- "line": 336
9331
+ "line": 342
9308
9332
  },
9309
9333
  "name": "vpc",
9310
9334
  "optional": true,
@@ -11485,7 +11509,7 @@
11485
11509
  },
11486
11510
  "locationInModule": {
11487
11511
  "filename": "src/providers/lambda.ts",
11488
- "line": 239
11512
+ "line": 241
11489
11513
  },
11490
11514
  "parameters": [
11491
11515
  {
@@ -11512,7 +11536,7 @@
11512
11536
  "kind": "class",
11513
11537
  "locationInModule": {
11514
11538
  "filename": "src/providers/lambda.ts",
11515
- "line": 481
11539
+ "line": 483
11516
11540
  },
11517
11541
  "name": "LambdaRunner",
11518
11542
  "symbolId": "src/providers/lambda:LambdaRunner"
@@ -11532,7 +11556,7 @@
11532
11556
  },
11533
11557
  "locationInModule": {
11534
11558
  "filename": "src/providers/lambda.ts",
11535
- "line": 239
11559
+ "line": 241
11536
11560
  },
11537
11561
  "parameters": [
11538
11562
  {
@@ -11612,7 +11636,7 @@
11612
11636
  },
11613
11637
  "locationInModule": {
11614
11638
  "filename": "src/providers/lambda.ts",
11615
- "line": 333
11639
+ "line": 335
11616
11640
  },
11617
11641
  "name": "getStepFunctionTask",
11618
11642
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -11641,7 +11665,7 @@
11641
11665
  },
11642
11666
  "locationInModule": {
11643
11667
  "filename": "src/providers/lambda.ts",
11644
- "line": 397
11668
+ "line": 399
11645
11669
  },
11646
11670
  "name": "grantStateMachine",
11647
11671
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -11710,7 +11734,7 @@
11710
11734
  },
11711
11735
  "locationInModule": {
11712
11736
  "filename": "src/providers/lambda.ts",
11713
- "line": 400
11737
+ "line": 402
11714
11738
  },
11715
11739
  "name": "status",
11716
11740
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -11777,7 +11801,7 @@
11777
11801
  "immutable": true,
11778
11802
  "locationInModule": {
11779
11803
  "filename": "src/providers/lambda.ts",
11780
- "line": 322
11804
+ "line": 324
11781
11805
  },
11782
11806
  "name": "connections",
11783
11807
  "overrides": "aws-cdk-lib.aws_ec2.IConnectable",
@@ -11818,14 +11842,15 @@
11818
11842
  },
11819
11843
  {
11820
11844
  "docs": {
11845
+ "deprecated": "This field is internal and should not be accessed directly.",
11821
11846
  "remarks": "The image is built by an image builder and is specific to Lambda.",
11822
- "stability": "experimental",
11847
+ "stability": "deprecated",
11823
11848
  "summary": "Docker image loaded with GitHub Actions Runner and its prerequisites."
11824
11849
  },
11825
11850
  "immutable": true,
11826
11851
  "locationInModule": {
11827
11852
  "filename": "src/providers/lambda.ts",
11828
- "line": 217
11853
+ "line": 219
11829
11854
  },
11830
11855
  "name": "image",
11831
11856
  "type": {
@@ -11862,7 +11887,7 @@
11862
11887
  "immutable": true,
11863
11888
  "locationInModule": {
11864
11889
  "filename": "src/providers/lambda.ts",
11865
- "line": 224
11890
+ "line": 226
11866
11891
  },
11867
11892
  "name": "logGroup",
11868
11893
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -11878,7 +11903,7 @@
11878
11903
  "immutable": true,
11879
11904
  "locationInModule": {
11880
11905
  "filename": "src/providers/lambda.ts",
11881
- "line": 226
11906
+ "line": 228
11882
11907
  },
11883
11908
  "name": "retryableErrors",
11884
11909
  "overrides": "@cloudsnorkel/cdk-github-runners.IRunnerProvider",
@@ -13909,7 +13934,7 @@
13909
13934
  "kind": "class",
13910
13935
  "locationInModule": {
13911
13936
  "filename": "src/image-builders/components.ts",
13912
- "line": 40
13937
+ "line": 42
13913
13938
  },
13914
13939
  "methods": [
13915
13940
  {
@@ -13919,7 +13944,7 @@
13919
13944
  },
13920
13945
  "locationInModule": {
13921
13946
  "filename": "src/image-builders/components.ts",
13922
- "line": 182
13947
+ "line": 184
13923
13948
  },
13924
13949
  "name": "awsCli",
13925
13950
  "returns": {
@@ -13936,7 +13961,7 @@
13936
13961
  },
13937
13962
  "locationInModule": {
13938
13963
  "filename": "src/image-builders/components.ts",
13939
- "line": 108
13964
+ "line": 110
13940
13965
  },
13941
13966
  "name": "cloudWatchAgent",
13942
13967
  "returns": {
@@ -13954,7 +13979,7 @@
13954
13979
  },
13955
13980
  "locationInModule": {
13956
13981
  "filename": "src/image-builders/components.ts",
13957
- "line": 50
13982
+ "line": 52
13958
13983
  },
13959
13984
  "name": "custom",
13960
13985
  "parameters": [
@@ -13980,7 +14005,7 @@
13980
14005
  },
13981
14006
  "locationInModule": {
13982
14007
  "filename": "src/image-builders/components.ts",
13983
- "line": 400
14008
+ "line": 402
13984
14009
  },
13985
14010
  "name": "docker",
13986
14011
  "returns": {
@@ -13998,7 +14023,7 @@
13998
14023
  },
13999
14024
  "locationInModule": {
14000
14025
  "filename": "src/image-builders/components.ts",
14001
- "line": 478
14026
+ "line": 480
14002
14027
  },
14003
14028
  "name": "dockerInDocker",
14004
14029
  "returns": {
@@ -14016,7 +14041,7 @@
14016
14041
  },
14017
14042
  "locationInModule": {
14018
14043
  "filename": "src/image-builders/components.ts",
14019
- "line": 595
14044
+ "line": 597
14020
14045
  },
14021
14046
  "name": "environmentVariables",
14022
14047
  "parameters": [
@@ -14047,7 +14072,7 @@
14047
14072
  },
14048
14073
  "locationInModule": {
14049
14074
  "filename": "src/image-builders/components.ts",
14050
- "line": 488
14075
+ "line": 490
14051
14076
  },
14052
14077
  "name": "extraCertificates",
14053
14078
  "parameters": [
@@ -14084,7 +14109,7 @@
14084
14109
  },
14085
14110
  "locationInModule": {
14086
14111
  "filename": "src/image-builders/components.ts",
14087
- "line": 261
14112
+ "line": 263
14088
14113
  },
14089
14114
  "name": "git",
14090
14115
  "returns": {
@@ -14101,7 +14126,7 @@
14101
14126
  },
14102
14127
  "locationInModule": {
14103
14128
  "filename": "src/image-builders/components.ts",
14104
- "line": 218
14129
+ "line": 220
14105
14130
  },
14106
14131
  "name": "githubCli",
14107
14132
  "returns": {
@@ -14119,7 +14144,7 @@
14119
14144
  },
14120
14145
  "locationInModule": {
14121
14146
  "filename": "src/image-builders/components.ts",
14122
- "line": 305
14147
+ "line": 307
14123
14148
  },
14124
14149
  "name": "githubRunner",
14125
14150
  "parameters": [
@@ -14148,7 +14173,7 @@
14148
14173
  },
14149
14174
  "locationInModule": {
14150
14175
  "filename": "src/image-builders/components.ts",
14151
- "line": 552
14176
+ "line": 554
14152
14177
  },
14153
14178
  "name": "lambdaEntrypoint",
14154
14179
  "returns": {
@@ -14165,7 +14190,7 @@
14165
14190
  },
14166
14191
  "locationInModule": {
14167
14192
  "filename": "src/image-builders/components.ts",
14168
- "line": 75
14193
+ "line": 77
14169
14194
  },
14170
14195
  "name": "requiredPackages",
14171
14196
  "returns": {
@@ -14182,7 +14207,7 @@
14182
14207
  },
14183
14208
  "locationInModule": {
14184
14209
  "filename": "src/image-builders/components.ts",
14185
- "line": 151
14210
+ "line": 153
14186
14211
  },
14187
14212
  "name": "runnerUser",
14188
14213
  "returns": {
@@ -14200,7 +14225,7 @@
14200
14225
  },
14201
14226
  "locationInModule": {
14202
14227
  "filename": "src/image-builders/components.ts",
14203
- "line": 632
14228
+ "line": 634
14204
14229
  },
14205
14230
  "name": "getAssets",
14206
14231
  "parameters": [
@@ -14237,7 +14262,7 @@
14237
14262
  },
14238
14263
  "locationInModule": {
14239
14264
  "filename": "src/image-builders/components.ts",
14240
- "line": 627
14265
+ "line": 629
14241
14266
  },
14242
14267
  "name": "getCommands",
14243
14268
  "parameters": [
@@ -14273,7 +14298,7 @@
14273
14298
  },
14274
14299
  "locationInModule": {
14275
14300
  "filename": "src/image-builders/components.ts",
14276
- "line": 641
14301
+ "line": 643
14277
14302
  },
14278
14303
  "name": "getDockerCommands",
14279
14304
  "parameters": [
@@ -14308,7 +14333,7 @@
14308
14333
  },
14309
14334
  "locationInModule": {
14310
14335
  "filename": "src/image-builders/components.ts",
14311
- "line": 648
14336
+ "line": 650
14312
14337
  },
14313
14338
  "name": "shouldReboot",
14314
14339
  "parameters": [
@@ -14344,7 +14369,7 @@
14344
14369
  "immutable": true,
14345
14370
  "locationInModule": {
14346
14371
  "filename": "src/image-builders/components.ts",
14347
- "line": 622
14372
+ "line": 624
14348
14373
  },
14349
14374
  "name": "name",
14350
14375
  "type": {
@@ -14364,7 +14389,7 @@
14364
14389
  "kind": "interface",
14365
14390
  "locationInModule": {
14366
14391
  "filename": "src/image-builders/components.ts",
14367
- "line": 9
14392
+ "line": 11
14368
14393
  },
14369
14394
  "name": "RunnerImageComponentCustomProps",
14370
14395
  "properties": [
@@ -14377,7 +14402,7 @@
14377
14402
  "immutable": true,
14378
14403
  "locationInModule": {
14379
14404
  "filename": "src/image-builders/components.ts",
14380
- "line": 25
14405
+ "line": 27
14381
14406
  },
14382
14407
  "name": "assets",
14383
14408
  "optional": true,
@@ -14399,7 +14424,7 @@
14399
14424
  "immutable": true,
14400
14425
  "locationInModule": {
14401
14426
  "filename": "src/image-builders/components.ts",
14402
- "line": 20
14427
+ "line": 22
14403
14428
  },
14404
14429
  "name": "commands",
14405
14430
  "optional": true,
@@ -14422,7 +14447,7 @@
14422
14447
  "immutable": true,
14423
14448
  "locationInModule": {
14424
14449
  "filename": "src/image-builders/components.ts",
14425
- "line": 34
14450
+ "line": 36
14426
14451
  },
14427
14452
  "name": "dockerCommands",
14428
14453
  "optional": true,
@@ -14445,7 +14470,7 @@
14445
14470
  "immutable": true,
14446
14471
  "locationInModule": {
14447
14472
  "filename": "src/image-builders/components.ts",
14448
- "line": 15
14473
+ "line": 17
14449
14474
  },
14450
14475
  "name": "name",
14451
14476
  "optional": true,
@@ -15406,6 +15431,6 @@
15406
15431
  "symbolId": "src/image-builders/aws-image-builder/deprecated/windows-components:WindowsComponents"
15407
15432
  }
15408
15433
  },
15409
- "version": "0.14.19",
15410
- "fingerprint": "QF6i7fJ2z4AGrNgldaspT8wEzuZH447E3ZPEjj7oNOs="
15434
+ "version": "0.14.21",
15435
+ "fingerprint": "2WzIvXgat3AOnVsbA/7Ybt3zV5R6H4ZljlJYEWj0qbU="
15411
15436
  }