cloudsnorkel.cdk-github-runners 0.13.0__py3-none-any.whl → 0.13.2__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cloudsnorkel.cdk-github-runners might be problematic. Click here for more details.

@@ -3461,6 +3461,7 @@ class LambdaRunnerProvider(
3461
3461
  builder_type: typing.Optional["RunnerImageBuilderType"] = None,
3462
3462
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
3463
3463
  components: typing.Optional[typing.Sequence["RunnerImageComponent"]] = None,
3464
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
3464
3465
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
3465
3466
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
3466
3467
  os: typing.Optional["Os"] = None,
@@ -3496,10 +3497,11 @@ class LambdaRunnerProvider(
3496
3497
  :param architecture: (experimental) Image architecture. Default: Architecture.X86_64
3497
3498
  :param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
3498
3499
  :param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
3499
- :param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
3500
+ :param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
3500
3501
  :param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
3501
3502
  :param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
3502
3503
  :param components: (experimental) Components to install on the image. Default: none
3504
+ :param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
3503
3505
  :param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
3504
3506
  :param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
3505
3507
  :param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
@@ -3524,6 +3526,7 @@ class LambdaRunnerProvider(
3524
3526
  builder_type=builder_type,
3525
3527
  code_build_options=code_build_options,
3526
3528
  components=components,
3529
+ docker_setup_commands=docker_setup_commands,
3527
3530
  log_removal_policy=log_removal_policy,
3528
3531
  log_retention=log_retention,
3529
3532
  os=os,
@@ -4531,6 +4534,7 @@ class RunnerImageAsset:
4531
4534
  "builder_type": "builderType",
4532
4535
  "code_build_options": "codeBuildOptions",
4533
4536
  "components": "components",
4537
+ "docker_setup_commands": "dockerSetupCommands",
4534
4538
  "log_removal_policy": "logRemovalPolicy",
4535
4539
  "log_retention": "logRetention",
4536
4540
  "os": "os",
@@ -4553,6 +4557,7 @@ class RunnerImageBuilderProps:
4553
4557
  builder_type: typing.Optional["RunnerImageBuilderType"] = None,
4554
4558
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
4555
4559
  components: typing.Optional[typing.Sequence["RunnerImageComponent"]] = None,
4560
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
4556
4561
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
4557
4562
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
4558
4563
  os: typing.Optional[Os] = None,
@@ -4567,10 +4572,11 @@ class RunnerImageBuilderProps:
4567
4572
  :param architecture: (experimental) Image architecture. Default: Architecture.X86_64
4568
4573
  :param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
4569
4574
  :param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
4570
- :param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
4575
+ :param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
4571
4576
  :param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
4572
4577
  :param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
4573
4578
  :param components: (experimental) Components to install on the image. Default: none
4579
+ :param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
4574
4580
  :param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
4575
4581
  :param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
4576
4582
  :param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
@@ -4598,6 +4604,7 @@ class RunnerImageBuilderProps:
4598
4604
  check_type(argname="argument builder_type", value=builder_type, expected_type=type_hints["builder_type"])
4599
4605
  check_type(argname="argument code_build_options", value=code_build_options, expected_type=type_hints["code_build_options"])
4600
4606
  check_type(argname="argument components", value=components, expected_type=type_hints["components"])
4607
+ check_type(argname="argument docker_setup_commands", value=docker_setup_commands, expected_type=type_hints["docker_setup_commands"])
4601
4608
  check_type(argname="argument log_removal_policy", value=log_removal_policy, expected_type=type_hints["log_removal_policy"])
4602
4609
  check_type(argname="argument log_retention", value=log_retention, expected_type=type_hints["log_retention"])
4603
4610
  check_type(argname="argument os", value=os, expected_type=type_hints["os"])
@@ -4622,6 +4629,8 @@ class RunnerImageBuilderProps:
4622
4629
  self._values["code_build_options"] = code_build_options
4623
4630
  if components is not None:
4624
4631
  self._values["components"] = components
4632
+ if docker_setup_commands is not None:
4633
+ self._values["docker_setup_commands"] = docker_setup_commands
4625
4634
  if log_removal_policy is not None:
4626
4635
  self._values["log_removal_policy"] = log_removal_policy
4627
4636
  if log_retention is not None:
@@ -4682,6 +4691,8 @@ class RunnerImageBuilderProps:
4682
4691
  def base_docker_image(self) -> typing.Optional[builtins.str]:
4683
4692
  '''(experimental) Base image from which Docker runner images will be built.
4684
4693
 
4694
+ When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}.
4695
+
4685
4696
  :default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
4686
4697
 
4687
4698
  :stability: experimental
@@ -4721,6 +4732,19 @@ class RunnerImageBuilderProps:
4721
4732
  result = self._values.get("components")
4722
4733
  return typing.cast(typing.Optional[typing.List["RunnerImageComponent"]], result)
4723
4734
 
4735
+ @builtins.property
4736
+ def docker_setup_commands(self) -> typing.Optional[typing.List[builtins.str]]:
4737
+ '''(experimental) Additional commands to run on the build host before starting the Docker runner image build.
4738
+
4739
+ Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images.
4740
+
4741
+ :default: []
4742
+
4743
+ :stability: experimental
4744
+ '''
4745
+ result = self._values.get("docker_setup_commands")
4746
+ return typing.cast(typing.Optional[typing.List[builtins.str]], result)
4747
+
4724
4748
  @builtins.property
4725
4749
  def log_removal_policy(self) -> typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy]:
4726
4750
  '''(experimental) Removal policy for logs of image builds.
@@ -4958,6 +4982,29 @@ class RunnerImageComponent(
4958
4982
  '''
4959
4983
  return typing.cast("RunnerImageComponent", jsii.sinvoke(cls, "dockerInDocker", []))
4960
4984
 
4985
+ @jsii.member(jsii_name="environmentVariables")
4986
+ @builtins.classmethod
4987
+ def environment_variables(
4988
+ cls,
4989
+ vars: typing.Mapping[builtins.str, builtins.str],
4990
+ ) -> "RunnerImageComponent":
4991
+ '''(experimental) A component to add environment variables for jobs the runner executes.
4992
+
4993
+ These variables only affect the jobs ran by the runner. They are not global. They do not affect other components.
4994
+
4995
+ It is not recommended to use this component to pass secrets. Instead, use GitHub Secrets or AWS Secrets Manager.
4996
+
4997
+ Must be used after the {@link githubRunner} component.
4998
+
4999
+ :param vars: -
5000
+
5001
+ :stability: experimental
5002
+ '''
5003
+ if __debug__:
5004
+ type_hints = typing.get_type_hints(_typecheckingstub__604cc9b160ccf839230b5f673dff20a8c9722aa81c88ef3ccadcdfcec778ec1a)
5005
+ check_type(argname="argument vars", value=vars, expected_type=type_hints["vars"])
5006
+ return typing.cast("RunnerImageComponent", jsii.sinvoke(cls, "environmentVariables", [vars]))
5007
+
4961
5008
  @jsii.member(jsii_name="extraCertificates")
4962
5009
  @builtins.classmethod
4963
5010
  def extra_certificates(
@@ -6452,6 +6499,7 @@ class CodeBuildRunnerProvider(
6452
6499
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
6453
6500
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
6454
6501
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
6502
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
6455
6503
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
6456
6504
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
6457
6505
  os: typing.Optional[Os] = None,
@@ -6485,10 +6533,11 @@ class CodeBuildRunnerProvider(
6485
6533
  :param architecture: (experimental) Image architecture. Default: Architecture.X86_64
6486
6534
  :param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
6487
6535
  :param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
6488
- :param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
6536
+ :param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
6489
6537
  :param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
6490
6538
  :param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
6491
6539
  :param components: (experimental) Components to install on the image. Default: none
6540
+ :param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
6492
6541
  :param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
6493
6542
  :param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
6494
6543
  :param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
@@ -6513,6 +6562,7 @@ class CodeBuildRunnerProvider(
6513
6562
  builder_type=builder_type,
6514
6563
  code_build_options=code_build_options,
6515
6564
  components=components,
6565
+ docker_setup_commands=docker_setup_commands,
6516
6566
  log_removal_policy=log_removal_policy,
6517
6567
  log_retention=log_retention,
6518
6568
  os=os,
@@ -7399,6 +7449,7 @@ class Ec2RunnerProvider(
7399
7449
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
7400
7450
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
7401
7451
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
7452
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
7402
7453
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
7403
7454
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
7404
7455
  os: typing.Optional[Os] = None,
@@ -7432,10 +7483,11 @@ class Ec2RunnerProvider(
7432
7483
  :param architecture: (experimental) Image architecture. Default: Architecture.X86_64
7433
7484
  :param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
7434
7485
  :param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
7435
- :param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
7486
+ :param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
7436
7487
  :param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
7437
7488
  :param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
7438
7489
  :param components: (experimental) Components to install on the image. Default: none
7490
+ :param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
7439
7491
  :param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
7440
7492
  :param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
7441
7493
  :param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
@@ -7460,6 +7512,7 @@ class Ec2RunnerProvider(
7460
7512
  builder_type=builder_type,
7461
7513
  code_build_options=code_build_options,
7462
7514
  components=components,
7515
+ docker_setup_commands=docker_setup_commands,
7463
7516
  log_removal_policy=log_removal_policy,
7464
7517
  log_retention=log_retention,
7465
7518
  os=os,
@@ -8026,6 +8079,7 @@ class EcsRunnerProvider(
8026
8079
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
8027
8080
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
8028
8081
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
8082
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
8029
8083
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
8030
8084
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
8031
8085
  os: typing.Optional[Os] = None,
@@ -8059,10 +8113,11 @@ class EcsRunnerProvider(
8059
8113
  :param architecture: (experimental) Image architecture. Default: Architecture.X86_64
8060
8114
  :param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
8061
8115
  :param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
8062
- :param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
8116
+ :param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
8063
8117
  :param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
8064
8118
  :param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
8065
8119
  :param components: (experimental) Components to install on the image. Default: none
8120
+ :param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
8066
8121
  :param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
8067
8122
  :param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
8068
8123
  :param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
@@ -8087,6 +8142,7 @@ class EcsRunnerProvider(
8087
8142
  builder_type=builder_type,
8088
8143
  code_build_options=code_build_options,
8089
8144
  components=components,
8145
+ docker_setup_commands=docker_setup_commands,
8090
8146
  log_removal_policy=log_removal_policy,
8091
8147
  log_retention=log_retention,
8092
8148
  os=os,
@@ -8743,6 +8799,7 @@ class FargateRunnerProvider(
8743
8799
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
8744
8800
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
8745
8801
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
8802
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
8746
8803
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
8747
8804
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
8748
8805
  os: typing.Optional[Os] = None,
@@ -8775,10 +8832,11 @@ class FargateRunnerProvider(
8775
8832
  :param architecture: (experimental) Image architecture. Default: Architecture.X86_64
8776
8833
  :param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
8777
8834
  :param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
8778
- :param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
8835
+ :param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
8779
8836
  :param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
8780
8837
  :param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
8781
8838
  :param components: (experimental) Components to install on the image. Default: none
8839
+ :param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
8782
8840
  :param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
8783
8841
  :param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
8784
8842
  :param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
@@ -8803,6 +8861,7 @@ class FargateRunnerProvider(
8803
8861
  builder_type=builder_type,
8804
8862
  code_build_options=code_build_options,
8805
8863
  components=components,
8864
+ docker_setup_commands=docker_setup_commands,
8806
8865
  log_removal_policy=log_removal_policy,
8807
8866
  log_retention=log_retention,
8808
8867
  os=os,
@@ -9872,6 +9931,7 @@ class RunnerImageBuilder(
9872
9931
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
9873
9932
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
9874
9933
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
9934
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
9875
9935
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
9876
9936
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
9877
9937
  os: typing.Optional[Os] = None,
@@ -9888,10 +9948,11 @@ class RunnerImageBuilder(
9888
9948
  :param architecture: (experimental) Image architecture. Default: Architecture.X86_64
9889
9949
  :param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
9890
9950
  :param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
9891
- :param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
9951
+ :param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
9892
9952
  :param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
9893
9953
  :param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
9894
9954
  :param components: (experimental) Components to install on the image. Default: none
9955
+ :param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
9895
9956
  :param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
9896
9957
  :param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
9897
9958
  :param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
@@ -9916,6 +9977,7 @@ class RunnerImageBuilder(
9916
9977
  builder_type=builder_type,
9917
9978
  code_build_options=code_build_options,
9918
9979
  components=components,
9980
+ docker_setup_commands=docker_setup_commands,
9919
9981
  log_removal_policy=log_removal_policy,
9920
9982
  log_retention=log_retention,
9921
9983
  os=os,
@@ -9943,6 +10005,7 @@ class RunnerImageBuilder(
9943
10005
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
9944
10006
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
9945
10007
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
10008
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
9946
10009
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
9947
10010
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
9948
10011
  os: typing.Optional[Os] = None,
@@ -9962,10 +10025,11 @@ class RunnerImageBuilder(
9962
10025
  :param architecture: (experimental) Image architecture. Default: Architecture.X86_64
9963
10026
  :param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
9964
10027
  :param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
9965
- :param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
10028
+ :param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
9966
10029
  :param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
9967
10030
  :param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
9968
10031
  :param components: (experimental) Components to install on the image. Default: none
10032
+ :param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
9969
10033
  :param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
9970
10034
  :param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
9971
10035
  :param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
@@ -9990,6 +10054,7 @@ class RunnerImageBuilder(
9990
10054
  builder_type=builder_type,
9991
10055
  code_build_options=code_build_options,
9992
10056
  components=components,
10057
+ docker_setup_commands=docker_setup_commands,
9993
10058
  log_removal_policy=log_removal_policy,
9994
10059
  log_retention=log_retention,
9995
10060
  os=os,
@@ -10685,6 +10750,7 @@ def _typecheckingstub__ce2bbc7a18f99610673c6eb5e5f04fb45ba63301ff0fbe52524601461
10685
10750
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
10686
10751
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
10687
10752
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
10753
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
10688
10754
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
10689
10755
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
10690
10756
  os: typing.Optional[Os] = None,
@@ -10855,6 +10921,7 @@ def _typecheckingstub__ab96b7f3871624e8430668114e7f5748ba5d253168db5b8f9a13955d0
10855
10921
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
10856
10922
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
10857
10923
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
10924
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
10858
10925
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
10859
10926
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
10860
10927
  os: typing.Optional[Os] = None,
@@ -10868,6 +10935,12 @@ def _typecheckingstub__ab96b7f3871624e8430668114e7f5748ba5d253168db5b8f9a13955d0
10868
10935
  """Type checking stubs"""
10869
10936
  pass
10870
10937
 
10938
+ def _typecheckingstub__604cc9b160ccf839230b5f673dff20a8c9722aa81c88ef3ccadcdfcec778ec1a(
10939
+ vars: typing.Mapping[builtins.str, builtins.str],
10940
+ ) -> None:
10941
+ """Type checking stubs"""
10942
+ pass
10943
+
10871
10944
  def _typecheckingstub__71019afd6f999efd03cc3106a7c28048b0a38c740207d3615ba7e0569bab5d3d(
10872
10945
  source: builtins.str,
10873
10946
  name: builtins.str,
@@ -11200,6 +11273,7 @@ def _typecheckingstub__5b74a56ca854b011edea7d259b730771e5a994081db1aa0bdbea8b3e2
11200
11273
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
11201
11274
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
11202
11275
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
11276
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
11203
11277
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
11204
11278
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
11205
11279
  os: typing.Optional[Os] = None,
@@ -11360,6 +11434,7 @@ def _typecheckingstub__c9910152a829b3b3a0a9e70ec31bd3ae8669b723ebb60627c6d08813b
11360
11434
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
11361
11435
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
11362
11436
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
11437
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
11363
11438
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
11364
11439
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
11365
11440
  os: typing.Optional[Os] = None,
@@ -11452,6 +11527,7 @@ def _typecheckingstub__7b459d87ca6935e6c04ff03be02ed821eef81dbc792be822f356697f6
11452
11527
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
11453
11528
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
11454
11529
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
11530
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
11455
11531
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
11456
11532
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
11457
11533
  os: typing.Optional[Os] = None,
@@ -11545,6 +11621,7 @@ def _typecheckingstub__9fd4f7f17e5e5c5b64ec7abfe1183d153e9472f7a1e9312e6d4b55f3f
11545
11621
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
11546
11622
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
11547
11623
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
11624
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
11548
11625
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
11549
11626
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
11550
11627
  os: typing.Optional[Os] = None,
@@ -11660,6 +11737,7 @@ def _typecheckingstub__963c9a4884bb9d7400672391dfb47486f969a1b8fe5616bba9cd493e8
11660
11737
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
11661
11738
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
11662
11739
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
11740
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
11663
11741
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
11664
11742
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
11665
11743
  os: typing.Optional[Os] = None,
@@ -11684,6 +11762,7 @@ def _typecheckingstub__c44d5704c54d7fdcf24ad39567c0e9f53f9837163bf8bf3b1b4e652e2
11684
11762
  builder_type: typing.Optional[RunnerImageBuilderType] = None,
11685
11763
  code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
11686
11764
  components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
11765
+ docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
11687
11766
  log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
11688
11767
  log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
11689
11768
  os: typing.Optional[Os] = None,
@@ -18,9 +18,9 @@ import constructs._jsii
18
18
 
19
19
  __jsii_assembly__ = jsii.JSIIAssembly.load(
20
20
  "@cloudsnorkel/cdk-github-runners",
21
- "0.13.0",
21
+ "0.13.2",
22
22
  __name__[0:-6],
23
- "cdk-github-runners@0.13.0.jsii.tgz",
23
+ "cdk-github-runners@0.13.2.jsii.tgz",
24
24
  )
25
25
 
26
26
  __all__ = [
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: cloudsnorkel.cdk-github-runners
3
- Version: 0.13.0
3
+ Version: 0.13.2
4
4
  Summary: CDK construct to create GitHub Actions self-hosted runners. A webhook listens to events and creates ephemeral runners on the fly.
5
5
  Home-page: https://github.com/CloudSnorkel/cdk-github-runners.git
6
6
  Author: Amir Szekely<amir@cloudsnorkel.com>
@@ -22,7 +22,7 @@ Description-Content-Type: text/markdown
22
22
  License-File: LICENSE
23
23
  Requires-Dist: aws-cdk-lib <3.0.0,>=2.123.0
24
24
  Requires-Dist: constructs <11.0.0,>=10.0.5
25
- Requires-Dist: jsii <2.0.0,>=1.97.0
25
+ Requires-Dist: jsii <2.0.0,>=1.98.0
26
26
  Requires-Dist: publication >=0.0.3
27
27
  Requires-Dist: typeguard ~=2.13.3
28
28
 
@@ -0,0 +1,9 @@
1
+ cloudsnorkel/cdk_github_runners/__init__.py,sha256=ujO9tqWBYZP7a3dgjsmy6QWYBY5bGMH5WLmRA9pDg8Q,602385
2
+ cloudsnorkel/cdk_github_runners/py.typed,sha256=AbpHGcgLb-kRsJGnwFEktk7uzpZOCcBY74-YBdrKVGs,1
3
+ cloudsnorkel/cdk_github_runners/_jsii/__init__.py,sha256=6bwtFt7YF0KT961c5jcC7ph8pSLQpcWkN_uXY2-YFuU,508
4
+ cloudsnorkel/cdk_github_runners/_jsii/cdk-github-runners@0.13.2.jsii.tgz,sha256=4fen_2Y_-duCg2qH2BlTTiFZW7JvY0uGCffOIwIOfXY,1457243
5
+ cloudsnorkel.cdk_github_runners-0.13.2.dist-info/LICENSE,sha256=z8d0m5b2O9McPEK1xHG_dWgUBT6EfBDz6wA0F7xSPTA,11358
6
+ cloudsnorkel.cdk_github_runners-0.13.2.dist-info/METADATA,sha256=HUJvKTDmG9T1bs_vO0KIKUQFs1O1PO_a23IF9epFQLY,15681
7
+ cloudsnorkel.cdk_github_runners-0.13.2.dist-info/WHEEL,sha256=GJ7t_kWBFywbagK5eo9IoUwLW6oyOeTKmQ-9iHFVNxQ,92
8
+ cloudsnorkel.cdk_github_runners-0.13.2.dist-info/top_level.txt,sha256=6vUrT-dcGOiRMT4Q6gEQPznoyS7nHOJ269MHpo4DEd8,13
9
+ cloudsnorkel.cdk_github_runners-0.13.2.dist-info/RECORD,,
@@ -1,9 +0,0 @@
1
- cloudsnorkel/cdk_github_runners/__init__.py,sha256=hlSVEo2vV-dPLeI73eresXb2rbENOId7Nbxl2CpARZI,594980
2
- cloudsnorkel/cdk_github_runners/py.typed,sha256=AbpHGcgLb-kRsJGnwFEktk7uzpZOCcBY74-YBdrKVGs,1
3
- cloudsnorkel/cdk_github_runners/_jsii/__init__.py,sha256=5AgrzEH4OveIPj6T393Rnak_0R3jIS6oeF_WBO2Scrw,508
4
- cloudsnorkel/cdk_github_runners/_jsii/cdk-github-runners@0.13.0.jsii.tgz,sha256=lOeeBc5TNFh6HPY6vf7ADrlgDn5KWIkCU6HoBzhDt5I,1449462
5
- cloudsnorkel.cdk_github_runners-0.13.0.dist-info/LICENSE,sha256=z8d0m5b2O9McPEK1xHG_dWgUBT6EfBDz6wA0F7xSPTA,11358
6
- cloudsnorkel.cdk_github_runners-0.13.0.dist-info/METADATA,sha256=JOS0u8IvgNNHH7k_XBAbk8wTfg7DfwrsiOK7oqo8exg,15681
7
- cloudsnorkel.cdk_github_runners-0.13.0.dist-info/WHEEL,sha256=GJ7t_kWBFywbagK5eo9IoUwLW6oyOeTKmQ-9iHFVNxQ,92
8
- cloudsnorkel.cdk_github_runners-0.13.0.dist-info/top_level.txt,sha256=6vUrT-dcGOiRMT4Q6gEQPznoyS7nHOJ269MHpo4DEd8,13
9
- cloudsnorkel.cdk_github_runners-0.13.0.dist-info/RECORD,,