terraform-cdk-serverless-github-actions-runner-controller 0.0.0 → 0.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3647 -2
- package/API.md +212 -0
- package/lib/__tests__/index-test.js +16 -4
- package/lib/index.d.ts +2 -0
- package/lib/index.js +3 -1
- package/lib/lib/aws.d.ts +4 -0
- package/lib/lib/aws.js +395 -0
- package/lib/lib/azure.js +1 -1
- package/lib/lib/gcp.d.ts +4 -0
- package/lib/lib/gcp.js +251 -0
- package/lib/lib/variables.js +3 -1
- package/lib/tfModules.js +17 -1
- package/main.tf +26 -0
- package/modules/azure-container-apps/README.md +3 -3
- package/modules/azure-container-apps/cdk.tf.json +7 -7
- package/modules/elastic-container-service/README.md +66 -0
- package/modules/elastic-container-service/cdk.tf.json +314 -0
- package/modules/google-cloud-run/README.md +62 -0
- package/modules/google-cloud-run/cdk.tf.json +355 -0
- package/package.json +8 -1
- package/scripts/collect-variables.ts +188 -0
- package/variables.tf +27 -0
@@ -0,0 +1,314 @@
|
|
1
|
+
{
|
2
|
+
"//": {
|
3
|
+
"metadata": {
|
4
|
+
"backend": "local",
|
5
|
+
"stackName": "elastic-container-service",
|
6
|
+
"version": "0.20.0"
|
7
|
+
},
|
8
|
+
"outputs": {
|
9
|
+
}
|
10
|
+
},
|
11
|
+
"data": {
|
12
|
+
"aws_caller_identity": {
|
13
|
+
"aws_Identity_FDC445BF": {
|
14
|
+
"//": {
|
15
|
+
"metadata": {
|
16
|
+
"path": "elastic-container-service/aws/Identity",
|
17
|
+
"uniqueId": "aws_Identity_FDC445BF"
|
18
|
+
}
|
19
|
+
}
|
20
|
+
}
|
21
|
+
},
|
22
|
+
"aws_region": {
|
23
|
+
"aws_Region_7477CA06": {
|
24
|
+
"//": {
|
25
|
+
"metadata": {
|
26
|
+
"path": "elastic-container-service/aws/Region",
|
27
|
+
"uniqueId": "aws_Region_7477CA06"
|
28
|
+
}
|
29
|
+
}
|
30
|
+
}
|
31
|
+
},
|
32
|
+
"aws_security_groups": {
|
33
|
+
"aws_SecurityGroups_BAABB08D": {
|
34
|
+
"//": {
|
35
|
+
"metadata": {
|
36
|
+
"path": "elastic-container-service/aws/SecurityGroups",
|
37
|
+
"uniqueId": "aws_SecurityGroups_BAABB08D"
|
38
|
+
}
|
39
|
+
}
|
40
|
+
}
|
41
|
+
},
|
42
|
+
"aws_subnets": {
|
43
|
+
"aws_Subnets_75E5377D": {
|
44
|
+
"//": {
|
45
|
+
"metadata": {
|
46
|
+
"path": "elastic-container-service/aws/Subnets",
|
47
|
+
"uniqueId": "aws_Subnets_75E5377D"
|
48
|
+
}
|
49
|
+
}
|
50
|
+
}
|
51
|
+
}
|
52
|
+
},
|
53
|
+
"resource": {
|
54
|
+
"aws_cloudwatch_log_group": {
|
55
|
+
"aws_AutoscalerLogGroup_BFE58053": {
|
56
|
+
"//": {
|
57
|
+
"metadata": {
|
58
|
+
"path": "elastic-container-service/aws/AutoscalerLogGroup",
|
59
|
+
"uniqueId": "aws_AutoscalerLogGroup_BFE58053"
|
60
|
+
}
|
61
|
+
},
|
62
|
+
"name": "/ecs/Autoscaler"
|
63
|
+
},
|
64
|
+
"aws_RunnerLogGroup_711756A6": {
|
65
|
+
"//": {
|
66
|
+
"metadata": {
|
67
|
+
"path": "elastic-container-service/aws/RunnerLogGroup",
|
68
|
+
"uniqueId": "aws_RunnerLogGroup_711756A6"
|
69
|
+
}
|
70
|
+
},
|
71
|
+
"name": "/ecs/GHA"
|
72
|
+
}
|
73
|
+
},
|
74
|
+
"aws_ecs_cluster": {
|
75
|
+
"aws_Cluster_BA268616": {
|
76
|
+
"//": {
|
77
|
+
"metadata": {
|
78
|
+
"path": "elastic-container-service/aws/Cluster",
|
79
|
+
"uniqueId": "aws_Cluster_BA268616"
|
80
|
+
}
|
81
|
+
},
|
82
|
+
"name": "gha-runner-cluster"
|
83
|
+
}
|
84
|
+
},
|
85
|
+
"aws_ecs_service": {
|
86
|
+
"aws_AutoscalerService_C7C3AA3C": {
|
87
|
+
"//": {
|
88
|
+
"metadata": {
|
89
|
+
"path": "elastic-container-service/aws/AutoscalerService",
|
90
|
+
"uniqueId": "aws_AutoscalerService_C7C3AA3C"
|
91
|
+
}
|
92
|
+
},
|
93
|
+
"cluster": "${aws_ecs_cluster.aws_Cluster_BA268616.arn}",
|
94
|
+
"desired_count": 1,
|
95
|
+
"launch_type": "FARGATE",
|
96
|
+
"lifecycle": {
|
97
|
+
"ignore_changes": [
|
98
|
+
"desired_count"
|
99
|
+
]
|
100
|
+
},
|
101
|
+
"name": "autoscaler-service",
|
102
|
+
"network_configuration": {
|
103
|
+
"assign_public_ip": true,
|
104
|
+
"security_groups": "${data.aws_security_groups.aws_SecurityGroups_BAABB08D.ids}",
|
105
|
+
"subnets": "${data.aws_subnets.aws_Subnets_75E5377D.ids}"
|
106
|
+
},
|
107
|
+
"task_definition": "${aws_ecs_task_definition.aws_AutoscalerTaskDefinition_24A76F67.arn_without_revision}"
|
108
|
+
}
|
109
|
+
},
|
110
|
+
"aws_ecs_task_definition": {
|
111
|
+
"aws_AutoscalerTaskDefinition_24A76F67": {
|
112
|
+
"//": {
|
113
|
+
"metadata": {
|
114
|
+
"path": "elastic-container-service/aws/AutoscalerTaskDefinition",
|
115
|
+
"uniqueId": "aws_AutoscalerTaskDefinition_24A76F67"
|
116
|
+
}
|
117
|
+
},
|
118
|
+
"container_definitions": "${jsonencode([{\"name\" = \"autoscaler\", \"image\" = \"ghcr.io/hi-fi/gha-runners-on-managed-env:test\", \"essential\" = true, \"environment\" = [{\"name\" = \"PAT\", \"value\" = var.PAT}, {\"name\" = \"GITHUB_CONFIG_URL\", \"value\" = var.github_config_url}, {\"name\" = \"TASK_DEFINITION_ARN\", \"value\" = aws_ecs_task_definition.aws_RunnerTaskDefinition_9C7563BE.arn}, {\"name\" = \"ECS_CLUSTER\", \"value\" = aws_ecs_cluster.aws_Cluster_BA268616.arn}, {\"name\" = \"ECS_SUBNETS\", \"value\" = join(\",\", data.aws_subnets.aws_Subnets_75E5377D.ids)}, {\"name\" = \"ECS_SECURITY_GROUPS\", \"value\" = join(\",\", data.aws_security_groups.aws_SecurityGroups_BAABB08D.ids)}, {\"name\" = \"SCALE_SET_NAME\", \"value\" = \"ecs-runner-set\"}], \"logConfiguration\" = {\"logDriver\" = \"awslogs\", \"options\" = {\"awslogs-group\" = aws_cloudwatch_log_group.aws_AutoscalerLogGroup_BFE58053.name, \"awslogs-region\" = data.aws_region.aws_Region_7477CA06.name, \"awslogs-stream-prefix\" = \"ecs\"}}}])}",
|
119
|
+
"cpu": "256",
|
120
|
+
"execution_role_arn": "${aws_iam_role.aws_TaskExecutionRole_FAB64402.arn}",
|
121
|
+
"family": "Autoscaler",
|
122
|
+
"memory": "512",
|
123
|
+
"network_mode": "awsvpc",
|
124
|
+
"requires_compatibilities": [
|
125
|
+
"FARGATE"
|
126
|
+
],
|
127
|
+
"runtime_platform": {
|
128
|
+
"cpu_architecture": "X86_64",
|
129
|
+
"operating_system_family": "LINUX"
|
130
|
+
},
|
131
|
+
"task_role_arn": "${aws_iam_role.aws_AutoscalerRole_CEB26423.arn}"
|
132
|
+
},
|
133
|
+
"aws_RunnerTaskDefinition_9C7563BE": {
|
134
|
+
"//": {
|
135
|
+
"metadata": {
|
136
|
+
"path": "elastic-container-service/aws/RunnerTaskDefinition",
|
137
|
+
"uniqueId": "aws_RunnerTaskDefinition_9C7563BE"
|
138
|
+
}
|
139
|
+
},
|
140
|
+
"container_definitions": "${jsonencode([{\"name\" = \"runner\", \"image\" = \"ghcr.io/hi-fi/actions-runner:ecs\", \"command\" = [\"/bin/sh\", \"-c\", \"export EXECID=$(cat /proc/sys/kernel/random/uuid) && sudo mkdir -p /tmp/_work/$EXECID && sudo chown runner:runner /tmp/_work/$EXECID && ln -s /tmp/_work/$EXECID _work && sudo chown runner:runner /tmp/externals && /home/runner/run.sh ; sudo rm -r /tmp/_work/$EXECID\"], \"essential\" = true, \"environment\" = [{\"name\" = \"EFS_ID\", \"value\" = aws_efs_file_system.aws_efs_B3BBB350.id}, {\"name\" = \"EXTERNALS_EFS_ID\", \"value\" = aws_efs_file_system.aws_externalsEfs_C15353C9.id}, {\"name\" = \"ECS_CLUSTER_NAME\", \"value\" = aws_ecs_cluster.aws_Cluster_BA268616.name}, {\"name\" = \"ACTIONS_RUNNER_POD_NAME\", \"value\" = \"gha-pod\"}, {\"name\" = \"ACTIONS_RUNNER_REQUIRE_JOB_CONTAINER\", \"value\" = \"false\"}, {\"name\" = \"ECS_SUBNETS\", \"value\" = join(\",\", data.aws_subnets.aws_Subnets_75E5377D.ids)}, {\"name\" = \"ECS_SECURITY_GROUPS\", \"value\" = join(\",\", data.aws_security_groups.aws_SecurityGroups_BAABB08D.ids)}, {\"name\" = \"ECS_TASK_ROLE\", \"value\" = aws_iam_role.aws_RunnerRole_75263C23.arn}, {\"name\" = \"ECS_EXECUTION_ROLE\", \"value\" = aws_iam_role.aws_TaskExecutionRole_FAB64402.arn}], \"mountPoints\" = [{\"sourceVolume\" = \"work\", \"containerPath\" = \"/tmp/_work\"}, {\"sourceVolume\" = \"externals\", \"containerPath\" = \"/tmp/externals\"}], \"logConfiguration\" = {\"logDriver\" = \"awslogs\", \"options\" = {\"awslogs-group\" = aws_cloudwatch_log_group.aws_RunnerLogGroup_711756A6.name, \"awslogs-region\" = data.aws_region.aws_Region_7477CA06.name, \"awslogs-stream-prefix\" = \"ecs\"}}}])}",
|
141
|
+
"cpu": "1024",
|
142
|
+
"execution_role_arn": "${aws_iam_role.aws_TaskExecutionRole_FAB64402.arn}",
|
143
|
+
"family": "GHA",
|
144
|
+
"memory": "2048",
|
145
|
+
"network_mode": "awsvpc",
|
146
|
+
"requires_compatibilities": [
|
147
|
+
"FARGATE"
|
148
|
+
],
|
149
|
+
"runtime_platform": {
|
150
|
+
"cpu_architecture": "X86_64",
|
151
|
+
"operating_system_family": "LINUX"
|
152
|
+
},
|
153
|
+
"task_role_arn": "${aws_iam_role.aws_RunnerRole_75263C23.arn}",
|
154
|
+
"volume": [
|
155
|
+
{
|
156
|
+
"efs_volume_configuration": {
|
157
|
+
"file_system_id": "${aws_efs_file_system.aws_efs_B3BBB350.id}"
|
158
|
+
},
|
159
|
+
"name": "work"
|
160
|
+
},
|
161
|
+
{
|
162
|
+
"efs_volume_configuration": {
|
163
|
+
"file_system_id": "${aws_efs_file_system.aws_externalsEfs_C15353C9.id}"
|
164
|
+
},
|
165
|
+
"name": "externals"
|
166
|
+
}
|
167
|
+
]
|
168
|
+
}
|
169
|
+
},
|
170
|
+
"aws_efs_file_system": {
|
171
|
+
"aws_efs_B3BBB350": {
|
172
|
+
"//": {
|
173
|
+
"metadata": {
|
174
|
+
"path": "elastic-container-service/aws/efs",
|
175
|
+
"uniqueId": "aws_efs_B3BBB350"
|
176
|
+
}
|
177
|
+
},
|
178
|
+
"tags": {
|
179
|
+
"Name": "work"
|
180
|
+
},
|
181
|
+
"throughput_mode": "elastic"
|
182
|
+
},
|
183
|
+
"aws_externalsEfs_C15353C9": {
|
184
|
+
"//": {
|
185
|
+
"metadata": {
|
186
|
+
"path": "elastic-container-service/aws/externalsEfs",
|
187
|
+
"uniqueId": "aws_externalsEfs_C15353C9"
|
188
|
+
}
|
189
|
+
},
|
190
|
+
"tags": {
|
191
|
+
"Name": "externals"
|
192
|
+
},
|
193
|
+
"throughput_mode": "elastic"
|
194
|
+
}
|
195
|
+
},
|
196
|
+
"aws_efs_mount_target": {
|
197
|
+
"aws_EfsMountTarget_B2BDD3E5": {
|
198
|
+
"//": {
|
199
|
+
"metadata": {
|
200
|
+
"path": "elastic-container-service/aws/EfsMountTarget",
|
201
|
+
"uniqueId": "aws_EfsMountTarget_B2BDD3E5"
|
202
|
+
}
|
203
|
+
},
|
204
|
+
"file_system_id": "${aws_efs_file_system.aws_efs_B3BBB350.id}",
|
205
|
+
"for_each": "${toset(data.aws_subnets.aws_Subnets_75E5377D.ids)}",
|
206
|
+
"subnet_id": "${each.value}"
|
207
|
+
},
|
208
|
+
"aws_ExternalsEfsMountTarget_2D9AE418": {
|
209
|
+
"//": {
|
210
|
+
"metadata": {
|
211
|
+
"path": "elastic-container-service/aws/ExternalsEfsMountTarget",
|
212
|
+
"uniqueId": "aws_ExternalsEfsMountTarget_2D9AE418"
|
213
|
+
}
|
214
|
+
},
|
215
|
+
"file_system_id": "${aws_efs_file_system.aws_externalsEfs_C15353C9.id}",
|
216
|
+
"for_each": "${toset(data.aws_subnets.aws_Subnets_75E5377D.ids)}",
|
217
|
+
"subnet_id": "${each.value}"
|
218
|
+
}
|
219
|
+
},
|
220
|
+
"aws_iam_policy": {
|
221
|
+
"aws_AutoscalerPolicy_FF16A997": {
|
222
|
+
"//": {
|
223
|
+
"metadata": {
|
224
|
+
"path": "elastic-container-service/aws/AutoscalerPolicy",
|
225
|
+
"uniqueId": "aws_AutoscalerPolicy_FF16A997"
|
226
|
+
}
|
227
|
+
},
|
228
|
+
"policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Sid\" = \"StartandMonitorTask\", \"Effect\" = \"Allow\", \"Action\" = [\"ecs:RunTask\", \"ecs:DescribeTasks\", \"logs:GetLogEvents\", \"iam:PassRole\"], \"Resource\" = [\"${aws_ecs_task_definition.aws_RunnerTaskDefinition_9C7563BE.arn_without_revision}:*\", aws_iam_role.aws_TaskExecutionRole_FAB64402.arn, aws_iam_role.aws_RunnerRole_75263C23.arn, \"arn:aws:ecs:${data.aws_region.aws_Region_7477CA06.name}:${data.aws_caller_identity.aws_Identity_FDC445BF.account_id}:task/${aws_ecs_cluster.aws_Cluster_BA268616.name}/*\", \"${aws_cloudwatch_log_group.aws_RunnerLogGroup_711756A6.arn}:log-stream:*\"]}, {\"Sid\" = \"GetVpcInfo\", \"Effect\" = \"Allow\", \"Action\" = [\"ec2:DescribeSubnets\", \"ec2:DescribeSecurityGroups\"], \"Resource\" = \"*\"}]})}"
|
229
|
+
},
|
230
|
+
"aws_RunnerPolicy_7B21DB81": {
|
231
|
+
"//": {
|
232
|
+
"metadata": {
|
233
|
+
"path": "elastic-container-service/aws/RunnerPolicy",
|
234
|
+
"uniqueId": "aws_RunnerPolicy_7B21DB81"
|
235
|
+
}
|
236
|
+
},
|
237
|
+
"policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Sid\" = \"StartandMonitorTask\", \"Effect\" = \"Allow\", \"Action\" = [\"ecs:RunTask\", \"ecs:TagResource\", \"ecs:ListTaskDefinitions\", \"ecs:ListTasks\", \"ecs:StopTask\", \"ecs:RegisterTaskDefinition\", \"ecs:DescribeTaskDefinition\", \"ecs:DeregisterTaskDefinition\", \"ecs:DeleteTaskDefinitions\", \"ecs:ExecuteCommand\", \"ecs:DescribeTasks\", \"logs:GetLogEvents\", \"iam:PassRole\", \"logs:StartLiveTail\", \"logs:CreateLogStream\"], \"Resource\" = [\"arn:aws:ecs:${data.aws_region.aws_Region_7477CA06.name}:${data.aws_caller_identity.aws_Identity_FDC445BF.account_id}:task-definition/gha-pod-workflow:*\", aws_ecs_cluster.aws_Cluster_BA268616.arn, aws_iam_role.aws_TaskExecutionRole_FAB64402.arn, aws_iam_role.aws_RunnerRole_75263C23.arn, \"arn:aws:ecs:${data.aws_region.aws_Region_7477CA06.name}:${data.aws_caller_identity.aws_Identity_FDC445BF.account_id}:task/${aws_ecs_cluster.aws_Cluster_BA268616.name}/*\", \"*\"]}, {\"Sid\" = \"GetVpcInfo\", \"Effect\" = \"Allow\", \"Action\" = [\"ec2:DescribeSubnets\", \"ec2:DescribeSecurityGroups\"], \"Resource\" = \"*\"}, {\"Sid\" = \"ExecCommands\", \"Effect\" = \"Allow\", \"Action\" = [\"ssmmessages:CreateControlChannel\", \"ssmmessages:CreateDataChannel\", \"ssmmessages:OpenControlChannel\", \"ssmmessages:OpenDataChannel\"], \"Resource\" = \"*\"}]})}"
|
238
|
+
}
|
239
|
+
},
|
240
|
+
"aws_iam_role": {
|
241
|
+
"aws_AutoscalerRole_CEB26423": {
|
242
|
+
"//": {
|
243
|
+
"metadata": {
|
244
|
+
"path": "elastic-container-service/aws/AutoscalerRole",
|
245
|
+
"uniqueId": "aws_AutoscalerRole_CEB26423"
|
246
|
+
}
|
247
|
+
},
|
248
|
+
"assume_role_policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Effect\" = \"Allow\", \"Principal\" = {\"Service\" = \"ecs-tasks.amazonaws.com\"}, \"Action\" = \"sts:AssumeRole\"}]})}"
|
249
|
+
},
|
250
|
+
"aws_RunnerRole_75263C23": {
|
251
|
+
"//": {
|
252
|
+
"metadata": {
|
253
|
+
"path": "elastic-container-service/aws/RunnerRole",
|
254
|
+
"uniqueId": "aws_RunnerRole_75263C23"
|
255
|
+
}
|
256
|
+
},
|
257
|
+
"assume_role_policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Effect\" = \"Allow\", \"Principal\" = {\"Service\" = \"ecs-tasks.amazonaws.com\"}, \"Action\" = \"sts:AssumeRole\"}]})}"
|
258
|
+
},
|
259
|
+
"aws_TaskExecutionRole_FAB64402": {
|
260
|
+
"//": {
|
261
|
+
"metadata": {
|
262
|
+
"path": "elastic-container-service/aws/TaskExecutionRole",
|
263
|
+
"uniqueId": "aws_TaskExecutionRole_FAB64402"
|
264
|
+
}
|
265
|
+
},
|
266
|
+
"assume_role_policy": "${jsonencode({\"Version\" = \"2012-10-17\", \"Statement\" = [{\"Effect\" = \"Allow\", \"Principal\" = {\"Service\" = \"ecs-tasks.amazonaws.com\"}, \"Action\" = \"sts:AssumeRole\"}]})}",
|
267
|
+
"managed_policy_arns": [
|
268
|
+
"arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
|
269
|
+
]
|
270
|
+
}
|
271
|
+
},
|
272
|
+
"aws_iam_role_policy_attachment": {
|
273
|
+
"aws_AutoscalerPolicyAttachment_5402A0C0": {
|
274
|
+
"//": {
|
275
|
+
"metadata": {
|
276
|
+
"path": "elastic-container-service/aws/AutoscalerPolicyAttachment",
|
277
|
+
"uniqueId": "aws_AutoscalerPolicyAttachment_5402A0C0"
|
278
|
+
}
|
279
|
+
},
|
280
|
+
"policy_arn": "${aws_iam_policy.aws_AutoscalerPolicy_FF16A997.arn}",
|
281
|
+
"role": "${aws_iam_role.aws_AutoscalerRole_CEB26423.name}"
|
282
|
+
},
|
283
|
+
"aws_RunnerPolicyAttachment_A293771C": {
|
284
|
+
"//": {
|
285
|
+
"metadata": {
|
286
|
+
"path": "elastic-container-service/aws/RunnerPolicyAttachment",
|
287
|
+
"uniqueId": "aws_RunnerPolicyAttachment_A293771C"
|
288
|
+
}
|
289
|
+
},
|
290
|
+
"policy_arn": "${aws_iam_policy.aws_RunnerPolicy_7B21DB81.arn}",
|
291
|
+
"role": "${aws_iam_role.aws_RunnerRole_75263C23.name}"
|
292
|
+
}
|
293
|
+
}
|
294
|
+
},
|
295
|
+
"terraform": {
|
296
|
+
"required_providers": {
|
297
|
+
"aws": {
|
298
|
+
"source": "aws",
|
299
|
+
"version": "5.96.0"
|
300
|
+
}
|
301
|
+
}
|
302
|
+
},
|
303
|
+
"variable": {
|
304
|
+
"PAT": {
|
305
|
+
"description": "Github PAT with Actions:Read and Admin:Read+Write scopes",
|
306
|
+
"nullable": false,
|
307
|
+
"sensitive": true
|
308
|
+
},
|
309
|
+
"github_config_url": {
|
310
|
+
"description": "Github URL where runners should register to. Format https://<GitHub host>/<your_enterprise/org/repo>",
|
311
|
+
"nullable": false
|
312
|
+
}
|
313
|
+
}
|
314
|
+
}
|
@@ -0,0 +1,62 @@
|
|
1
|
+
# Actions Runner Controller (ARC) on Google Cloud Run
|
2
|
+
|
3
|
+
> [!WARNING]
|
4
|
+
> This is currently PoC level thing for module publishing. Not ready for production or any use
|
5
|
+
|
6
|
+
## Usage
|
7
|
+
|
8
|
+
```hcl
|
9
|
+
module "arc_on_aca" {
|
10
|
+
source = "Hi-Fi/serverless-github-actions-runner-controller/cdk//modules/google-cloud-run"
|
11
|
+
}
|
12
|
+
```
|
13
|
+
<!-- BEGIN_TF_DOCS -->
|
14
|
+
## Requirements
|
15
|
+
|
16
|
+
| Name | Version |
|
17
|
+
|------|---------|
|
18
|
+
| <a name="requirement_google"></a> [google](#requirement\_google) | 6.32.0 |
|
19
|
+
| <a name="requirement_null"></a> [null](#requirement\_null) | 3.2.4 |
|
20
|
+
|
21
|
+
## Providers
|
22
|
+
|
23
|
+
| Name | Version |
|
24
|
+
|------|---------|
|
25
|
+
| <a name="provider_google"></a> [google](#provider\_google) | 6.32.0 |
|
26
|
+
| <a name="provider_null"></a> [null](#provider\_null) | 3.2.4 |
|
27
|
+
|
28
|
+
## Modules
|
29
|
+
|
30
|
+
No modules.
|
31
|
+
|
32
|
+
## Resources
|
33
|
+
|
34
|
+
| Name | Type |
|
35
|
+
|------|------|
|
36
|
+
| [google_artifact_registry_repository.cr_registry_886F88F0](https://registry.terraform.io/providers/google/6.32.0/docs/resources/artifact_registry_repository) | resource |
|
37
|
+
| [google_cloud_run_service.cr_autoscalerService_A4FAA2B6](https://registry.terraform.io/providers/google/6.32.0/docs/resources/cloud_run_service) | resource |
|
38
|
+
| [google_cloud_run_v2_job.cr_ghaJob_3BDFC08A](https://registry.terraform.io/providers/google/6.32.0/docs/resources/cloud_run_v2_job) | resource |
|
39
|
+
| [google_project_iam_custom_role.cr_autoscalerRole_8A950337](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_custom_role) | resource |
|
40
|
+
| [google_project_iam_custom_role.cr_runnerRole_07508BC4](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_custom_role) | resource |
|
41
|
+
| [google_project_iam_member.cr_autoscalerRoleBindingRunServiceAgent_83C78179](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
|
42
|
+
| [google_project_iam_member.cr_autoscalerRoleBindingRun_76E1E813](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
|
43
|
+
| [google_project_iam_member.cr_autoscalerRoleBindingStorage_C1A676AA](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
|
44
|
+
| [google_project_iam_member.cr_runnerRoleBindingRunServiceAgent_88652FB8](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
|
45
|
+
| [google_project_iam_member.cr_runnerRoleBindingRunViewer_328C548F](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
|
46
|
+
| [google_project_iam_member.cr_runnerRoleBindingStorage_8D8C3B87](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
|
47
|
+
| [google_project_iam_member.cr_runnerRoleBinding_E20193A5](https://registry.terraform.io/providers/google/6.32.0/docs/resources/project_iam_member) | resource |
|
48
|
+
| [google_service_account.cr_autoscalerServiceAccount_37C5FFAD](https://registry.terraform.io/providers/google/6.32.0/docs/resources/service_account) | resource |
|
49
|
+
| [google_service_account.cr_jobServiceAccount_4D2CB679](https://registry.terraform.io/providers/google/6.32.0/docs/resources/service_account) | resource |
|
50
|
+
| [null_resource.cr_gcloud_3D7A726F](https://registry.terraform.io/providers/null/3.2.4/docs/resources/resource) | resource |
|
51
|
+
|
52
|
+
## Inputs
|
53
|
+
|
54
|
+
| Name | Description | Type | Default | Required |
|
55
|
+
|------|-------------|------|---------|:--------:|
|
56
|
+
| <a name="input_PAT"></a> [PAT](#input\_PAT) | Github PAT with Actions:Read and Admin:Read+Write scopes | `any` | n/a | yes |
|
57
|
+
| <a name="input_github_config_url"></a> [github\_config\_url](#input\_github\_config\_url) | Github URL where runners should register to. Format https://<GitHub host>/<your\_enterprise/org/repo> | `any` | n/a | yes |
|
58
|
+
|
59
|
+
## Outputs
|
60
|
+
|
61
|
+
No outputs.
|
62
|
+
<!-- END_TF_DOCS -->
|