terraform-cdk-serverless-github-actions-runner-controller 0.0.0 → 0.0.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,314 @@
1
+ {
2
+ "//": {
3
+ "metadata": {
4
+ "backend": "local",
5
+ "stackName": "elastic-container-service",
6
+ "version": "0.20.0"
7
+ },
8
+ "outputs": {
9
+ }
10
+ },
11
+ "data": {
12
+ "aws_caller_identity": {
13
+ "aws_Identity_FDC445BF": {
14
+ "//": {
15
+ "metadata": {
16
+ "path": "elastic-container-service/aws/Identity",
17
+ "uniqueId": "aws_Identity_FDC445BF"
18
+ }
19
+ }
20
+ }
21
+ },
22
+ "aws_region": {
23
+ "aws_Region_7477CA06": {
24
+ "//": {
25
+ "metadata": {
26
+ "path": "elastic-container-service/aws/Region",
27
+ "uniqueId": "aws_Region_7477CA06"
28
+ }
29
+ }
30
+ }
31
+ },
32
+ "aws_security_groups": {
33
+ "aws_SecurityGroups_BAABB08D": {
34
+ "//": {
35
+ "metadata": {
36
+ "path": "elastic-container-service/aws/SecurityGroups",
37
+ "uniqueId": "aws_SecurityGroups_BAABB08D"
38
+ }
39
+ }
40
+ }
41
+ },
42
+ "aws_subnets": {
43
+ "aws_Subnets_75E5377D": {
44
+ "//": {
45
+ "metadata": {
46
+ "path": "elastic-container-service/aws/Subnets",
47
+ "uniqueId": "aws_Subnets_75E5377D"
48
+ }
49
+ }
50
+ }
51
+ }
52
+ },
53
+ "resource": {
54
+ "aws_cloudwatch_log_group": {
55
+ "aws_AutoscalerLogGroup_BFE58053": {
56
+ "//": {
57
+ "metadata": {
58
+ "path": "elastic-container-service/aws/AutoscalerLogGroup",
59
+ "uniqueId": "aws_AutoscalerLogGroup_BFE58053"
60
+ }
61
+ },
62
+ "name": "/ecs/Autoscaler"
63
+ },
64
+ "aws_RunnerLogGroup_711756A6": {
65
+ "//": {
66
+ "metadata": {
67
+ "path": "elastic-container-service/aws/RunnerLogGroup",
68
+ "uniqueId": "aws_RunnerLogGroup_711756A6"
69
+ }
70
+ },
71
+ "name": "/ecs/GHA"
72
+ }
73
+ },
74
+ "aws_ecs_cluster": {
75
+ "aws_Cluster_BA268616": {
76
+ "//": {
77
+ "metadata": {
78
+ "path": "elastic-container-service/aws/Cluster",
79
+ "uniqueId": "aws_Cluster_BA268616"
80
+ }
81
+ },
82
+ "name": "gha-runner-cluster"
83
+ }
84
+ },
85
+ "aws_ecs_service": {
86
+ "aws_AutoscalerService_C7C3AA3C": {
87
+ "//": {
88
+ "metadata": {
89
+ "path": "elastic-container-service/aws/AutoscalerService",
90
+ "uniqueId": "aws_AutoscalerService_C7C3AA3C"
91
+ }
92
+ },
93
+ "cluster": "${aws_ecs_cluster.aws_Cluster_BA268616.arn}",
94
+ "desired_count": 1,
95
+ "launch_type": "FARGATE",
96
+ "lifecycle": {
97
+ "ignore_changes": [
98
+ "desired_count"
99
+ ]
100
+ },
101
+ "name": "autoscaler-service",
102
+ "network_configuration": {
103
+ "assign_public_ip": true,
104
+ "security_groups": "${data.aws_security_groups.aws_SecurityGroups_BAABB08D.ids}",
105
+ "subnets": "${data.aws_subnets.aws_Subnets_75E5377D.ids}"
106
+ },
107
+ "task_definition": "${aws_ecs_task_definition.aws_AutoscalerTaskDefinition_24A76F67.arn_without_revision}"
108
+ }
109
+ },
110
+ "aws_ecs_task_definition": {
111
+ "aws_AutoscalerTaskDefinition_24A76F67": {
112
+ "//": {
113
+ "metadata": {
114
+ "path": "elastic-container-service/aws/AutoscalerTaskDefinition",
115
+ "uniqueId": "aws_AutoscalerTaskDefinition_24A76F67"
116
+ }
117
+ },
118
+ "container_definitions": "${jsonencode([{\"name\" = \"autoscaler\", \"image\" = \"ghcr.io/hi-fi/gha-runners-on-managed-env:test\", \"essential\" = true, \"environment\" = [{\"name\" = \"PAT\", \"value\" = var.aws_PAT_4017AC3F}, {\"name\" = \"GITHUB_CONFIG_URL\", \"value\" = var.aws_github_config_url_BFDD14B2}, {\"name\" = \"TASK_DEFINITION_ARN\", \"value\" = aws_ecs_task_definition.aws_RunnerTaskDefinition_9C7563BE.arn}, {\"name\" = \"ECS_CLUSTER\", \"value\" = aws_ecs_cluster.aws_Cluster_BA268616.arn}, {\"name\" = \"ECS_SUBNETS\", \"value\" = join(\",\", data.aws_subnets.aws_Subnets_75E5377D.ids)}, {\"name\" = \"ECS_SECURITY_GROUPS\", \"value\" = join(\",\", data.aws_security_groups.aws_SecurityGroups_BAABB08D.ids)}, {\"name\" = \"SCALE_SET_NAME\", \"value\" = \"ecs-runner-set\"}], \"logConfiguration\" = {\"logDriver\" = \"awslogs\", \"options\" = {\"awslogs-group\" = aws_cloudwatch_log_group.aws_AutoscalerLogGroup_BFE58053.name, \"awslogs-region\" = data.aws_region.aws_Region_7477CA06.name, \"awslogs-stream-prefix\" = \"ecs\"}}}])}",
119
+ "cpu": "256",
120
+ "execution_role_arn": "${aws_iam_role.aws_TaskExecutionRole_FAB64402.arn}",
121
+ "family": "Autoscaler",
122
+ "memory": "512",
123
+ "network_mode": "awsvpc",
124
+ "requires_compatibilities": [
125
+ "FARGATE"
126
+ ],
127
+ "runtime_platform": {
128
+ "cpu_architecture": "X86_64",
129
+ "operating_system_family": "LINUX"
130
+ },
131
+ "task_role_arn": "${aws_iam_role.aws_AutoscalerRole_CEB26423.arn}"
132
+ },
133
+ "aws_RunnerTaskDefinition_9C7563BE": {
134
+ "//": {
135
+ "metadata": {
136
+ "path": "elastic-container-service/aws/RunnerTaskDefinition",
137
+ "uniqueId": "aws_RunnerTaskDefinition_9C7563BE"
138
+ }
139
+ },
140
+ "container_definitions": "${jsonencode([{\"name\" = \"runner\", \"image\" = \"ghcr.io/hi-fi/actions-runner:ecs\", \"command\" = [\"/bin/sh\", \"-c\", \"export EXECID=$(cat /proc/sys/kernel/random/uuid) && sudo mkdir -p /tmp/_work/$EXECID && sudo chown runner:runner /tmp/_work/$EXECID && ln -s /tmp/_work/$EXECID _work && sudo chown runner:runner /tmp/externals && /home/runner/run.sh ; sudo rm -r /tmp/_work/$EXECID\"], \"essential\" = true, \"environment\" = [{\"name\" = \"EFS_ID\", \"value\" = aws_efs_file_system.aws_efs_B3BBB350.id}, {\"name\" = \"EXTERNALS_EFS_ID\", \"value\" = aws_efs_file_system.aws_externalsEfs_C15353C9.id}, {\"name\" = \"ECS_CLUSTER_NAME\", \"value\" = aws_ecs_cluster.aws_Cluster_BA268616.name}, {\"name\" = \"ACTIONS_RUNNER_POD_NAME\", \"value\" = \"gha-pod\"}, {\"name\" = \"ACTIONS_RUNNER_REQUIRE_JOB_CONTAINER\", \"value\" = \"false\"}, {\"name\" = \"ECS_SUBNETS\", \"value\" = join(\",\", data.aws_subnets.aws_Subnets_75E5377D.ids)}, {\"name\" = \"ECS_SECURITY_GROUPS\", \"value\" = join(\",\", data.aws_security_groups.aws_SecurityGroups_BAABB08D.ids)}, {\"name\" = \"ECS_TASK_ROLE\", \"value\" = aws_iam_role.aws_RunnerRole_75263C23.arn}, {\"name\" = \"ECS_EXECUTION_ROLE\", \"value\" = aws_iam_role.aws_TaskExecutionRole_FAB64402.arn}], \"mountPoints\" = [{\"sourceVolume\" = \"work\", \"containerPath\" = \"/tmp/_work\"}, {\"sourceVolume\" = \"externals\", \"containerPath\" = \"/tmp/externals\"}], \"logConfiguration\" = {\"logDriver\" = \"awslogs\", \"options\" = {\"awslogs-group\" = aws_cloudwatch_log_group.aws_RunnerLogGroup_711756A6.name, \"awslogs-region\" = data.aws_region.aws_Region_7477CA06.name, \"awslogs-stream-prefix\" = \"ecs\"}}}])}",
141
+ "cpu": "1024",
142
+ "execution_role_arn": "${aws_iam_role.aws_TaskExecutionRole_FAB64402.arn}",
143
+ "family": "GHA",
144
+ "memory": "2048",
145
+ "network_mode": "awsvpc",
146
+ "requires_compatibilities": [
147
+ "FARGATE"
148
+ ],
149
+ "runtime_platform": {
150
+ "cpu_architecture": "X86_64",
151
+ "operating_system_family": "LINUX"
152
+ },
153
+ "task_role_arn": "${aws_iam_role.aws_RunnerRole_75263C23.arn}",
154
+ "volume": [
155
+ {
156
+ "efs_volume_configuration": {
157
+ "file_system_id": "${aws_efs_file_system.aws_efs_B3BBB350.id}"
158
+ },
159
+ "name": "work"
160
+ },
161
+ {
162
+ "efs_volume_configuration": {
163
+ "file_system_id": "${aws_efs_file_system.aws_externalsEfs_C15353C9.id}"
164
+ },
165
+ "name": "externals"
166
+ }
167
+ ]
168
+ }
169
+ },
170
+ "aws_efs_file_system": {
171
+ "aws_efs_B3BBB350": {
172
+ "//": {
173
+ "metadata": {
174
+ "path": "elastic-container-service/aws/efs",
175
+ "uniqueId": "aws_efs_B3BBB350"
176
+ }
177
+ },
178
+ "tags": {
179
+ "Name": "work"
180
+ },
181
+ "throughput_mode": "elastic"
182
+ },
183
+ "aws_externalsEfs_C15353C9": {
184
+ "//": {
185
+ "metadata": {
186
+ "path": "elastic-container-service/aws/externalsEfs",
187
+ "uniqueId": "aws_externalsEfs_C15353C9"
188
+ }
189
+ },
190
+ "tags": {
191
+ "Name": "externals"
192
+ },
193
+ "throughput_mode": "elastic"
194
+ }
195
+ },
196
+ "aws_efs_mount_target": {
197
+ "aws_EfsMountTarget_B2BDD3E5": {
198
+ "//": {
199
+ "metadata": {
200
+ "path": "elastic-container-service/aws/EfsMountTarget",
201
+ "uniqueId": "aws_EfsMountTarget_B2BDD3E5"
202
+ }
203
+ },
204
+ "file_system_id": "${aws_efs_file_system.aws_efs_B3BBB350.id}",
205
+ "for_each": "${toset(data.aws_subnets.aws_Subnets_75E5377D.ids)}",
206
+ "subnet_id": "${each.value}"
207
+ },
208
+ "aws_ExternalsEfsMountTarget_2D9AE418": {
209
+ "//": {
210
+ "metadata": {
211
+ "path": "elastic-container-service/aws/ExternalsEfsMountTarget",
212
+ "uniqueId": "aws_ExternalsEfsMountTarget_2D9AE418"
213
+ }
214
+ },
215
+ "file_system_id": "${aws_efs_file_system.aws_externalsEfs_C15353C9.id}",
216
+ "for_each": "${toset(data.aws_subnets.aws_Subnets_75E5377D.ids)}",
217
+ "subnet_id": "${each.value}"
218
+ }
219
+ },
220
+ "aws_iam_policy": {
221
+ "aws_AutoscalerPolicy_FF16A997": {
222
+ "//": {
223
+ "metadata": {
224
+ "path": "elastic-container-service/aws/AutoscalerPolicy",
225
+ "uniqueId": "aws_AutoscalerPolicy_FF16A997"
226
+ }
227
+ },
228
+ "policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Sid\" = \"StartandMonitorTask\", \"Effect\" = \"Allow\", \"Action\" = [\"ecs:RunTask\", \"ecs:DescribeTasks\", \"logs:GetLogEvents\", \"iam:PassRole\"], \"Resource\" = [\"${aws_ecs_task_definition.aws_RunnerTaskDefinition_9C7563BE.arn_without_revision}:*\", aws_iam_role.aws_TaskExecutionRole_FAB64402.arn, aws_iam_role.aws_RunnerRole_75263C23.arn, \"arn:aws:ecs:${data.aws_region.aws_Region_7477CA06.name}:${data.aws_caller_identity.aws_Identity_FDC445BF.account_id}:task/${aws_ecs_cluster.aws_Cluster_BA268616.name}/*\", \"${aws_cloudwatch_log_group.aws_RunnerLogGroup_711756A6.arn}:log-stream:*\"]}, {\"Sid\" = \"GetVpcInfo\", \"Effect\" = \"Allow\", \"Action\" = [\"ec2:DescribeSubnets\", \"ec2:DescribeSecurityGroups\"], \"Resource\" = \"*\"}]})}"
229
+ },
230
+ "aws_RunnerPolicy_7B21DB81": {
231
+ "//": {
232
+ "metadata": {
233
+ "path": "elastic-container-service/aws/RunnerPolicy",
234
+ "uniqueId": "aws_RunnerPolicy_7B21DB81"
235
+ }
236
+ },
237
+ "policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Sid\" = \"StartandMonitorTask\", \"Effect\" = \"Allow\", \"Action\" = [\"ecs:RunTask\", \"ecs:TagResource\", \"ecs:ListTaskDefinitions\", \"ecs:ListTasks\", \"ecs:StopTask\", \"ecs:RegisterTaskDefinition\", \"ecs:DescribeTaskDefinition\", \"ecs:DeregisterTaskDefinition\", \"ecs:DeleteTaskDefinitions\", \"ecs:ExecuteCommand\", \"ecs:DescribeTasks\", \"logs:GetLogEvents\", \"iam:PassRole\", \"logs:StartLiveTail\", \"logs:CreateLogStream\"], \"Resource\" = [\"arn:aws:ecs:${data.aws_region.aws_Region_7477CA06.name}:${data.aws_caller_identity.aws_Identity_FDC445BF.account_id}:task-definition/gha-pod-workflow:*\", aws_ecs_cluster.aws_Cluster_BA268616.arn, aws_iam_role.aws_TaskExecutionRole_FAB64402.arn, aws_iam_role.aws_RunnerRole_75263C23.arn, \"arn:aws:ecs:${data.aws_region.aws_Region_7477CA06.name}:${data.aws_caller_identity.aws_Identity_FDC445BF.account_id}:task/${aws_ecs_cluster.aws_Cluster_BA268616.name}/*\", \"*\"]}, {\"Sid\" = \"GetVpcInfo\", \"Effect\" = \"Allow\", \"Action\" = [\"ec2:DescribeSubnets\", \"ec2:DescribeSecurityGroups\"], \"Resource\" = \"*\"}, {\"Sid\" = \"ExecCommands\", \"Effect\" = \"Allow\", \"Action\" = [\"ssmmessages:CreateControlChannel\", \"ssmmessages:CreateDataChannel\", \"ssmmessages:OpenControlChannel\", \"ssmmessages:OpenDataChannel\"], \"Resource\" = \"*\"}]})}"
238
+ }
239
+ },
240
+ "aws_iam_role": {
241
+ "aws_AutoscalerRole_CEB26423": {
242
+ "//": {
243
+ "metadata": {
244
+ "path": "elastic-container-service/aws/AutoscalerRole",
245
+ "uniqueId": "aws_AutoscalerRole_CEB26423"
246
+ }
247
+ },
248
+ "assume_role_policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Effect\" = \"Allow\", \"Principal\" = {\"Service\" = \"ecs-tasks.amazonaws.com\"}, \"Action\" = \"sts:AssumeRole\"}]})}"
249
+ },
250
+ "aws_RunnerRole_75263C23": {
251
+ "//": {
252
+ "metadata": {
253
+ "path": "elastic-container-service/aws/RunnerRole",
254
+ "uniqueId": "aws_RunnerRole_75263C23"
255
+ }
256
+ },
257
+ "assume_role_policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Effect\" = \"Allow\", \"Principal\" = {\"Service\" = \"ecs-tasks.amazonaws.com\"}, \"Action\" = \"sts:AssumeRole\"}]})}"
258
+ },
259
+ "aws_TaskExecutionRole_FAB64402": {
260
+ "//": {
261
+ "metadata": {
262
+ "path": "elastic-container-service/aws/TaskExecutionRole",
263
+ "uniqueId": "aws_TaskExecutionRole_FAB64402"
264
+ }
265
+ },
266
+ "assume_role_policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Effect\" = \"Allow\", \"Principal\" = {\"Service\" = \"ecs-tasks.amazonaws.com\"}, \"Action\" = \"sts:AssumeRole\"}]})}",
267
+ "managed_policy_arns": [
268
+ "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
269
+ ]
270
+ }
271
+ },
272
+ "aws_iam_role_policy_attachment": {
273
+ "aws_AutoscalerPolicyAttachment_5402A0C0": {
274
+ "//": {
275
+ "metadata": {
276
+ "path": "elastic-container-service/aws/AutoscalerPolicyAttachment",
277
+ "uniqueId": "aws_AutoscalerPolicyAttachment_5402A0C0"
278
+ }
279
+ },
280
+ "policy_arn": "${aws_iam_policy.aws_AutoscalerPolicy_FF16A997.arn}",
281
+ "role": "${aws_iam_role.aws_AutoscalerRole_CEB26423.name}"
282
+ },
283
+ "aws_RunnerPolicyAttachment_A293771C": {
284
+ "//": {
285
+ "metadata": {
286
+ "path": "elastic-container-service/aws/RunnerPolicyAttachment",
287
+ "uniqueId": "aws_RunnerPolicyAttachment_A293771C"
288
+ }
289
+ },
290
+ "policy_arn": "${aws_iam_policy.aws_RunnerPolicy_7B21DB81.arn}",
291
+ "role": "${aws_iam_role.aws_RunnerRole_75263C23.name}"
292
+ }
293
+ }
294
+ },
295
+ "terraform": {
296
+ "required_providers": {
297
+ "aws": {
298
+ "source": "aws",
299
+ "version": "5.96.0"
300
+ }
301
+ }
302
+ },
303
+ "variable": {
304
+ "aws_PAT_4017AC3F": {
305
+ "description": "Github PAT with Actions:Read and Admin:Read+Write scopes",
306
+ "nullable": false,
307
+ "sensitive": true
308
+ },
309
+ "aws_github_config_url_BFDD14B2": {
310
+ "description": "Github URL where runners should register to. Format https://<GitHub host>/<your_enterprise/org/repo>",
311
+ "nullable": false
312
+ }
313
+ }
314
+ }
@@ -0,0 +1,62 @@
1
+ # Actions Runner Controller (ARC) on Google Cloud Run
2
+
3
+ > [!WARNING]
4
+ > This is currently PoC level thing for module publishing. Not ready for production or any use
5
+
6
+ ## Usage
7
+
8
+ ```hcl
9
+ module "arc_on_aca" {
10
+ source = "Hi-Fi/serverless-github-actions-runner-controller/cdk//modules/google-cloud-run"
11
+ }
12
+ ```
13
+ <!-- BEGIN_TF_DOCS -->
14
+ ## Requirements
15
+
16
+ | Name | Version |
17
+ |------|---------|
18
+ | <a name="requirement_google"></a> [google](#requirement\_google) | 6.32.0 |
19
+ | <a name="requirement_null"></a> [null](#requirement\_null) | 3.2.4 |
20
+
21
+ ## Providers
22
+
23
+ | Name | Version |
24
+ |------|---------|
25
+ | <a name="provider_google"></a> [google](#provider\_google) | 6.32.0 |
26
+ | <a name="provider_null"></a> [null](#provider\_null) | 3.2.4 |
27
+
28
+ ## Modules
29
+
30
+ No modules.
31
+
32
+ ## Resources
33
+
34
+ | Name | Type |
35
+ |------|------|
36
+ | [google_artifact_registry_repository.cr_registry_886F88F0](https://registry.terraform.io/providers/google/6.32.0/docs/resources/artifact_registry_repository) | resource |
37
+ | [google_cloud_run_service.cr_autoscalerService_A4FAA2B6](https://registry.terraform.io/providers/google/6.32.0/docs/resources/cloud_run_service) | resource |
38
+ | [google_cloud_run_v2_job.cr_ghaJob_3BDFC08A](https://registry.terraform.io/providers/google/6.32.0/docs/resources/cloud_run_v2_job) | resource |
39
+ | [google_project_iam_custom_role.cr_autoscalerRole_8A950337](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_custom_role) | resource |
40
+ | [google_project_iam_custom_role.cr_runnerRole_07508BC4](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_custom_role) | resource |
41
+ | [google_project_iam_member.cr_autoscalerRoleBindingRunServiceAgent_83C78179](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
42
+ | [google_project_iam_member.cr_autoscalerRoleBindingRun_76E1E813](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
43
+ | [google_project_iam_member.cr_autoscalerRoleBindingStorage_C1A676AA](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
44
+ | [google_project_iam_member.cr_runnerRoleBindingRunServiceAgent_88652FB8](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
45
+ | [google_project_iam_member.cr_runnerRoleBindingRunViewer_328C548F](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
46
+ | [google_project_iam_member.cr_runnerRoleBindingStorage_8D8C3B87](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
47
+ | [google_project_iam_member.cr_runnerRoleBinding_E20193A5](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
48
+ | [google_service_account.cr_autoscalerServiceAccount_37C5FFAD](https://registry.terraform.io/providers/google/6.32.0/docs/resources/service_account) | resource |
49
+ | [google_service_account.cr_jobServiceAccount_4D2CB679](https://registry.terraform.io/providers/google/6.32.0/docs/resources/service_account) | resource |
50
+ | [null_resource.cr_gcloud_3D7A726F](https://registry.terraform.io/providers/null/3.2.4/docs/resources/resource) | resource |
51
+
52
+ ## Inputs
53
+
54
+ | Name | Description | Type | Default | Required |
55
+ |------|-------------|------|---------|:--------:|
56
+ | <a name="input_cr_PAT_DD795492"></a> [cr\_PAT\_DD795492](#input\_cr\_PAT\_DD795492) | Github PAT with Actions:Read and Admin:Read+Write scopes | `any` | n/a | yes |
57
+ | <a name="input_cr_github_config_url_9957B21B"></a> [cr\_github\_config\_url\_9957B21B](#input\_cr\_github\_config\_url\_9957B21B) | Github URL where runners should register to. Format https://<GitHub host>/<your\_enterprise/org/repo> | `any` | n/a | yes |
58
+
59
+ ## Outputs
60
+
61
+ No outputs.
62
+ <!-- END_TF_DOCS -->