cloudsnorkel.cdk-github-runners 0.13.1__tar.gz → 0.13.2__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cloudsnorkel.cdk-github-runners might be problematic. Click here for more details.
- {cloudsnorkel.cdk-github-runners-0.13.1/src/cloudsnorkel.cdk_github_runners.egg-info → cloudsnorkel.cdk-github-runners-0.13.2}/PKG-INFO +1 -1
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/setup.py +2 -2
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/src/cloudsnorkel/cdk_github_runners/__init__.py +87 -8
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/src/cloudsnorkel/cdk_github_runners/_jsii/__init__.py +2 -2
- cloudsnorkel.cdk-github-runners-0.13.2/src/cloudsnorkel/cdk_github_runners/_jsii/cdk-github-runners@0.13.2.jsii.tgz +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2/src/cloudsnorkel.cdk_github_runners.egg-info}/PKG-INFO +1 -1
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/src/cloudsnorkel.cdk_github_runners.egg-info/SOURCES.txt +1 -1
- cloudsnorkel.cdk-github-runners-0.13.1/src/cloudsnorkel/cdk_github_runners/_jsii/cdk-github-runners@0.13.1.jsii.tgz +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/LICENSE +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/MANIFEST.in +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/README.md +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/pyproject.toml +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/setup.cfg +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/src/cloudsnorkel/cdk_github_runners/py.typed +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/src/cloudsnorkel.cdk_github_runners.egg-info/dependency_links.txt +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/src/cloudsnorkel.cdk_github_runners.egg-info/requires.txt +0 -0
- {cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/src/cloudsnorkel.cdk_github_runners.egg-info/top_level.txt +0 -0
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: cloudsnorkel.cdk-github-runners
|
|
3
|
-
Version: 0.13.
|
|
3
|
+
Version: 0.13.2
|
|
4
4
|
Summary: CDK construct to create GitHub Actions self-hosted runners. A webhook listens to events and creates ephemeral runners on the fly.
|
|
5
5
|
Home-page: https://github.com/CloudSnorkel/cdk-github-runners.git
|
|
6
6
|
Author: Amir Szekely<amir@cloudsnorkel.com>
|
|
@@ -5,7 +5,7 @@ kwargs = json.loads(
|
|
|
5
5
|
"""
|
|
6
6
|
{
|
|
7
7
|
"name": "cloudsnorkel.cdk-github-runners",
|
|
8
|
-
"version": "0.13.
|
|
8
|
+
"version": "0.13.2",
|
|
9
9
|
"description": "CDK construct to create GitHub Actions self-hosted runners. A webhook listens to events and creates ephemeral runners on the fly.",
|
|
10
10
|
"license": "Apache-2.0",
|
|
11
11
|
"url": "https://github.com/CloudSnorkel/cdk-github-runners.git",
|
|
@@ -26,7 +26,7 @@ kwargs = json.loads(
|
|
|
26
26
|
],
|
|
27
27
|
"package_data": {
|
|
28
28
|
"cloudsnorkel.cdk_github_runners._jsii": [
|
|
29
|
-
"cdk-github-runners@0.13.
|
|
29
|
+
"cdk-github-runners@0.13.2.jsii.tgz"
|
|
30
30
|
],
|
|
31
31
|
"cloudsnorkel.cdk_github_runners": [
|
|
32
32
|
"py.typed"
|
|
@@ -3461,6 +3461,7 @@ class LambdaRunnerProvider(
|
|
|
3461
3461
|
builder_type: typing.Optional["RunnerImageBuilderType"] = None,
|
|
3462
3462
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
3463
3463
|
components: typing.Optional[typing.Sequence["RunnerImageComponent"]] = None,
|
|
3464
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
3464
3465
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
3465
3466
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
3466
3467
|
os: typing.Optional["Os"] = None,
|
|
@@ -3496,10 +3497,11 @@ class LambdaRunnerProvider(
|
|
|
3496
3497
|
:param architecture: (experimental) Image architecture. Default: Architecture.X86_64
|
|
3497
3498
|
:param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
|
|
3498
3499
|
:param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
|
|
3499
|
-
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
3500
|
+
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
3500
3501
|
:param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
|
|
3501
3502
|
:param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
|
|
3502
3503
|
:param components: (experimental) Components to install on the image. Default: none
|
|
3504
|
+
:param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
|
|
3503
3505
|
:param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
|
|
3504
3506
|
:param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
|
|
3505
3507
|
:param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
|
|
@@ -3524,6 +3526,7 @@ class LambdaRunnerProvider(
|
|
|
3524
3526
|
builder_type=builder_type,
|
|
3525
3527
|
code_build_options=code_build_options,
|
|
3526
3528
|
components=components,
|
|
3529
|
+
docker_setup_commands=docker_setup_commands,
|
|
3527
3530
|
log_removal_policy=log_removal_policy,
|
|
3528
3531
|
log_retention=log_retention,
|
|
3529
3532
|
os=os,
|
|
@@ -4531,6 +4534,7 @@ class RunnerImageAsset:
|
|
|
4531
4534
|
"builder_type": "builderType",
|
|
4532
4535
|
"code_build_options": "codeBuildOptions",
|
|
4533
4536
|
"components": "components",
|
|
4537
|
+
"docker_setup_commands": "dockerSetupCommands",
|
|
4534
4538
|
"log_removal_policy": "logRemovalPolicy",
|
|
4535
4539
|
"log_retention": "logRetention",
|
|
4536
4540
|
"os": "os",
|
|
@@ -4553,6 +4557,7 @@ class RunnerImageBuilderProps:
|
|
|
4553
4557
|
builder_type: typing.Optional["RunnerImageBuilderType"] = None,
|
|
4554
4558
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
4555
4559
|
components: typing.Optional[typing.Sequence["RunnerImageComponent"]] = None,
|
|
4560
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
4556
4561
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
4557
4562
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
4558
4563
|
os: typing.Optional[Os] = None,
|
|
@@ -4567,10 +4572,11 @@ class RunnerImageBuilderProps:
|
|
|
4567
4572
|
:param architecture: (experimental) Image architecture. Default: Architecture.X86_64
|
|
4568
4573
|
:param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
|
|
4569
4574
|
:param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
|
|
4570
|
-
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
4575
|
+
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
4571
4576
|
:param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
|
|
4572
4577
|
:param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
|
|
4573
4578
|
:param components: (experimental) Components to install on the image. Default: none
|
|
4579
|
+
:param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
|
|
4574
4580
|
:param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
|
|
4575
4581
|
:param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
|
|
4576
4582
|
:param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
|
|
@@ -4598,6 +4604,7 @@ class RunnerImageBuilderProps:
|
|
|
4598
4604
|
check_type(argname="argument builder_type", value=builder_type, expected_type=type_hints["builder_type"])
|
|
4599
4605
|
check_type(argname="argument code_build_options", value=code_build_options, expected_type=type_hints["code_build_options"])
|
|
4600
4606
|
check_type(argname="argument components", value=components, expected_type=type_hints["components"])
|
|
4607
|
+
check_type(argname="argument docker_setup_commands", value=docker_setup_commands, expected_type=type_hints["docker_setup_commands"])
|
|
4601
4608
|
check_type(argname="argument log_removal_policy", value=log_removal_policy, expected_type=type_hints["log_removal_policy"])
|
|
4602
4609
|
check_type(argname="argument log_retention", value=log_retention, expected_type=type_hints["log_retention"])
|
|
4603
4610
|
check_type(argname="argument os", value=os, expected_type=type_hints["os"])
|
|
@@ -4622,6 +4629,8 @@ class RunnerImageBuilderProps:
|
|
|
4622
4629
|
self._values["code_build_options"] = code_build_options
|
|
4623
4630
|
if components is not None:
|
|
4624
4631
|
self._values["components"] = components
|
|
4632
|
+
if docker_setup_commands is not None:
|
|
4633
|
+
self._values["docker_setup_commands"] = docker_setup_commands
|
|
4625
4634
|
if log_removal_policy is not None:
|
|
4626
4635
|
self._values["log_removal_policy"] = log_removal_policy
|
|
4627
4636
|
if log_retention is not None:
|
|
@@ -4682,6 +4691,8 @@ class RunnerImageBuilderProps:
|
|
|
4682
4691
|
def base_docker_image(self) -> typing.Optional[builtins.str]:
|
|
4683
4692
|
'''(experimental) Base image from which Docker runner images will be built.
|
|
4684
4693
|
|
|
4694
|
+
When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}.
|
|
4695
|
+
|
|
4685
4696
|
:default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
4686
4697
|
|
|
4687
4698
|
:stability: experimental
|
|
@@ -4721,6 +4732,19 @@ class RunnerImageBuilderProps:
|
|
|
4721
4732
|
result = self._values.get("components")
|
|
4722
4733
|
return typing.cast(typing.Optional[typing.List["RunnerImageComponent"]], result)
|
|
4723
4734
|
|
|
4735
|
+
@builtins.property
|
|
4736
|
+
def docker_setup_commands(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
4737
|
+
'''(experimental) Additional commands to run on the build host before starting the Docker runner image build.
|
|
4738
|
+
|
|
4739
|
+
Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images.
|
|
4740
|
+
|
|
4741
|
+
:default: []
|
|
4742
|
+
|
|
4743
|
+
:stability: experimental
|
|
4744
|
+
'''
|
|
4745
|
+
result = self._values.get("docker_setup_commands")
|
|
4746
|
+
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
4747
|
+
|
|
4724
4748
|
@builtins.property
|
|
4725
4749
|
def log_removal_policy(self) -> typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy]:
|
|
4726
4750
|
'''(experimental) Removal policy for logs of image builds.
|
|
@@ -4958,6 +4982,29 @@ class RunnerImageComponent(
|
|
|
4958
4982
|
'''
|
|
4959
4983
|
return typing.cast("RunnerImageComponent", jsii.sinvoke(cls, "dockerInDocker", []))
|
|
4960
4984
|
|
|
4985
|
+
@jsii.member(jsii_name="environmentVariables")
|
|
4986
|
+
@builtins.classmethod
|
|
4987
|
+
def environment_variables(
|
|
4988
|
+
cls,
|
|
4989
|
+
vars: typing.Mapping[builtins.str, builtins.str],
|
|
4990
|
+
) -> "RunnerImageComponent":
|
|
4991
|
+
'''(experimental) A component to add environment variables for jobs the runner executes.
|
|
4992
|
+
|
|
4993
|
+
These variables only affect the jobs ran by the runner. They are not global. They do not affect other components.
|
|
4994
|
+
|
|
4995
|
+
It is not recommended to use this component to pass secrets. Instead, use GitHub Secrets or AWS Secrets Manager.
|
|
4996
|
+
|
|
4997
|
+
Must be used after the {@link githubRunner} component.
|
|
4998
|
+
|
|
4999
|
+
:param vars: -
|
|
5000
|
+
|
|
5001
|
+
:stability: experimental
|
|
5002
|
+
'''
|
|
5003
|
+
if __debug__:
|
|
5004
|
+
type_hints = typing.get_type_hints(_typecheckingstub__604cc9b160ccf839230b5f673dff20a8c9722aa81c88ef3ccadcdfcec778ec1a)
|
|
5005
|
+
check_type(argname="argument vars", value=vars, expected_type=type_hints["vars"])
|
|
5006
|
+
return typing.cast("RunnerImageComponent", jsii.sinvoke(cls, "environmentVariables", [vars]))
|
|
5007
|
+
|
|
4961
5008
|
@jsii.member(jsii_name="extraCertificates")
|
|
4962
5009
|
@builtins.classmethod
|
|
4963
5010
|
def extra_certificates(
|
|
@@ -6452,6 +6499,7 @@ class CodeBuildRunnerProvider(
|
|
|
6452
6499
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
6453
6500
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
6454
6501
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
6502
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
6455
6503
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
6456
6504
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
6457
6505
|
os: typing.Optional[Os] = None,
|
|
@@ -6485,10 +6533,11 @@ class CodeBuildRunnerProvider(
|
|
|
6485
6533
|
:param architecture: (experimental) Image architecture. Default: Architecture.X86_64
|
|
6486
6534
|
:param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
|
|
6487
6535
|
:param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
|
|
6488
|
-
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
6536
|
+
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
6489
6537
|
:param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
|
|
6490
6538
|
:param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
|
|
6491
6539
|
:param components: (experimental) Components to install on the image. Default: none
|
|
6540
|
+
:param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
|
|
6492
6541
|
:param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
|
|
6493
6542
|
:param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
|
|
6494
6543
|
:param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
|
|
@@ -6513,6 +6562,7 @@ class CodeBuildRunnerProvider(
|
|
|
6513
6562
|
builder_type=builder_type,
|
|
6514
6563
|
code_build_options=code_build_options,
|
|
6515
6564
|
components=components,
|
|
6565
|
+
docker_setup_commands=docker_setup_commands,
|
|
6516
6566
|
log_removal_policy=log_removal_policy,
|
|
6517
6567
|
log_retention=log_retention,
|
|
6518
6568
|
os=os,
|
|
@@ -7399,6 +7449,7 @@ class Ec2RunnerProvider(
|
|
|
7399
7449
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
7400
7450
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
7401
7451
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
7452
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
7402
7453
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
7403
7454
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
7404
7455
|
os: typing.Optional[Os] = None,
|
|
@@ -7432,10 +7483,11 @@ class Ec2RunnerProvider(
|
|
|
7432
7483
|
:param architecture: (experimental) Image architecture. Default: Architecture.X86_64
|
|
7433
7484
|
:param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
|
|
7434
7485
|
:param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
|
|
7435
|
-
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
7486
|
+
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
7436
7487
|
:param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
|
|
7437
7488
|
:param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
|
|
7438
7489
|
:param components: (experimental) Components to install on the image. Default: none
|
|
7490
|
+
:param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
|
|
7439
7491
|
:param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
|
|
7440
7492
|
:param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
|
|
7441
7493
|
:param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
|
|
@@ -7460,6 +7512,7 @@ class Ec2RunnerProvider(
|
|
|
7460
7512
|
builder_type=builder_type,
|
|
7461
7513
|
code_build_options=code_build_options,
|
|
7462
7514
|
components=components,
|
|
7515
|
+
docker_setup_commands=docker_setup_commands,
|
|
7463
7516
|
log_removal_policy=log_removal_policy,
|
|
7464
7517
|
log_retention=log_retention,
|
|
7465
7518
|
os=os,
|
|
@@ -8026,6 +8079,7 @@ class EcsRunnerProvider(
|
|
|
8026
8079
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
8027
8080
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
8028
8081
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
8082
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
8029
8083
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
8030
8084
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
8031
8085
|
os: typing.Optional[Os] = None,
|
|
@@ -8059,10 +8113,11 @@ class EcsRunnerProvider(
|
|
|
8059
8113
|
:param architecture: (experimental) Image architecture. Default: Architecture.X86_64
|
|
8060
8114
|
:param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
|
|
8061
8115
|
:param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
|
|
8062
|
-
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
8116
|
+
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
8063
8117
|
:param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
|
|
8064
8118
|
:param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
|
|
8065
8119
|
:param components: (experimental) Components to install on the image. Default: none
|
|
8120
|
+
:param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
|
|
8066
8121
|
:param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
|
|
8067
8122
|
:param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
|
|
8068
8123
|
:param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
|
|
@@ -8087,6 +8142,7 @@ class EcsRunnerProvider(
|
|
|
8087
8142
|
builder_type=builder_type,
|
|
8088
8143
|
code_build_options=code_build_options,
|
|
8089
8144
|
components=components,
|
|
8145
|
+
docker_setup_commands=docker_setup_commands,
|
|
8090
8146
|
log_removal_policy=log_removal_policy,
|
|
8091
8147
|
log_retention=log_retention,
|
|
8092
8148
|
os=os,
|
|
@@ -8743,6 +8799,7 @@ class FargateRunnerProvider(
|
|
|
8743
8799
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
8744
8800
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
8745
8801
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
8802
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
8746
8803
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
8747
8804
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
8748
8805
|
os: typing.Optional[Os] = None,
|
|
@@ -8775,10 +8832,11 @@ class FargateRunnerProvider(
|
|
|
8775
8832
|
:param architecture: (experimental) Image architecture. Default: Architecture.X86_64
|
|
8776
8833
|
:param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
|
|
8777
8834
|
:param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
|
|
8778
|
-
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
8835
|
+
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
8779
8836
|
:param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
|
|
8780
8837
|
:param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
|
|
8781
8838
|
:param components: (experimental) Components to install on the image. Default: none
|
|
8839
|
+
:param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
|
|
8782
8840
|
:param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
|
|
8783
8841
|
:param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
|
|
8784
8842
|
:param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
|
|
@@ -8803,6 +8861,7 @@ class FargateRunnerProvider(
|
|
|
8803
8861
|
builder_type=builder_type,
|
|
8804
8862
|
code_build_options=code_build_options,
|
|
8805
8863
|
components=components,
|
|
8864
|
+
docker_setup_commands=docker_setup_commands,
|
|
8806
8865
|
log_removal_policy=log_removal_policy,
|
|
8807
8866
|
log_retention=log_retention,
|
|
8808
8867
|
os=os,
|
|
@@ -9872,6 +9931,7 @@ class RunnerImageBuilder(
|
|
|
9872
9931
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
9873
9932
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
9874
9933
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
9934
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
9875
9935
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
9876
9936
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
9877
9937
|
os: typing.Optional[Os] = None,
|
|
@@ -9888,10 +9948,11 @@ class RunnerImageBuilder(
|
|
|
9888
9948
|
:param architecture: (experimental) Image architecture. Default: Architecture.X86_64
|
|
9889
9949
|
:param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
|
|
9890
9950
|
:param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
|
|
9891
|
-
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
9951
|
+
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
9892
9952
|
:param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
|
|
9893
9953
|
:param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
|
|
9894
9954
|
:param components: (experimental) Components to install on the image. Default: none
|
|
9955
|
+
:param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
|
|
9895
9956
|
:param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
|
|
9896
9957
|
:param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
|
|
9897
9958
|
:param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
|
|
@@ -9916,6 +9977,7 @@ class RunnerImageBuilder(
|
|
|
9916
9977
|
builder_type=builder_type,
|
|
9917
9978
|
code_build_options=code_build_options,
|
|
9918
9979
|
components=components,
|
|
9980
|
+
docker_setup_commands=docker_setup_commands,
|
|
9919
9981
|
log_removal_policy=log_removal_policy,
|
|
9920
9982
|
log_retention=log_retention,
|
|
9921
9983
|
os=os,
|
|
@@ -9943,6 +10005,7 @@ class RunnerImageBuilder(
|
|
|
9943
10005
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
9944
10006
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
9945
10007
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
10008
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
9946
10009
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
9947
10010
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
9948
10011
|
os: typing.Optional[Os] = None,
|
|
@@ -9962,10 +10025,11 @@ class RunnerImageBuilder(
|
|
|
9962
10025
|
:param architecture: (experimental) Image architecture. Default: Architecture.X86_64
|
|
9963
10026
|
:param aws_image_builder_options: (experimental) Options specific to AWS Image Builder. Only used when builderType is RunnerImageBuilderType.AWS_IMAGE_BUILDER.
|
|
9964
10027
|
:param base_ami: (experimental) Base AMI from which runner AMIs will be built. This can be an actual AMI or an AWS Image Builder ARN that points to the latest AMI. For example ``arn:aws:imagebuilder:us-east-1:aws:image/ubuntu-server-22-lts-x86/x.x.x`` would always use the latest version of Ubuntu 22.04 in each build. If you want a specific version, you can replace ``x.x.x`` with that version. Default: latest Ubuntu 22.04 AMI for Os.LINUX_UBUNTU, latest Amazon Linux 2 AMI for Os.LINUX_AMAZON_2, latest Windows Server 2022 AMI for Os.WINDOWS
|
|
9965
|
-
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
10028
|
+
:param base_docker_image: (experimental) Base image from which Docker runner images will be built. When using private images from a different account or not on ECR, you may need to include additional setup commands with {@link dockerSetupCommands}. Default: public.ecr.aws/lts/ubuntu:22.04 for Os.LINUX_UBUNTU, public.ecr.aws/amazonlinux/amazonlinux:2 for Os.LINUX_AMAZON_2, mcr.microsoft.com/windows/servercore:ltsc2019-amd64 for Os.WINDOWS
|
|
9966
10029
|
:param builder_type: Default: CodeBuild for Linux Docker image, AWS Image Builder for Windows Docker image and any AMI
|
|
9967
10030
|
:param code_build_options: (experimental) Options specific to CodeBuild image builder. Only used when builderType is RunnerImageBuilderType.CODE_BUILD.
|
|
9968
10031
|
:param components: (experimental) Components to install on the image. Default: none
|
|
10032
|
+
:param docker_setup_commands: (experimental) Additional commands to run on the build host before starting the Docker runner image build. Use this to execute commands such as ``docker login`` or ``aws ecr get-login-password`` to pull private base images. Default: []
|
|
9969
10033
|
:param log_removal_policy: (experimental) Removal policy for logs of image builds. If deployment fails on the custom resource, try setting this to ``RemovalPolicy.RETAIN``. This way the CodeBuild logs can still be viewed, and you can see why the build failed. We try to not leave anything behind when removed. But sometimes a log staying behind is useful. Default: RemovalPolicy.DESTROY
|
|
9970
10034
|
:param log_retention: (experimental) The number of days log events are kept in CloudWatch Logs. When updating this property, unsetting it doesn't remove the log retention policy. To remove the retention policy, set the value to ``INFINITE``. Default: logs.RetentionDays.ONE_MONTH
|
|
9971
10035
|
:param os: (experimental) Image OS. Default: OS.LINUX_UBUNTU
|
|
@@ -9990,6 +10054,7 @@ class RunnerImageBuilder(
|
|
|
9990
10054
|
builder_type=builder_type,
|
|
9991
10055
|
code_build_options=code_build_options,
|
|
9992
10056
|
components=components,
|
|
10057
|
+
docker_setup_commands=docker_setup_commands,
|
|
9993
10058
|
log_removal_policy=log_removal_policy,
|
|
9994
10059
|
log_retention=log_retention,
|
|
9995
10060
|
os=os,
|
|
@@ -10685,6 +10750,7 @@ def _typecheckingstub__ce2bbc7a18f99610673c6eb5e5f04fb45ba63301ff0fbe52524601461
|
|
|
10685
10750
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
10686
10751
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
10687
10752
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
10753
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
10688
10754
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
10689
10755
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
10690
10756
|
os: typing.Optional[Os] = None,
|
|
@@ -10855,6 +10921,7 @@ def _typecheckingstub__ab96b7f3871624e8430668114e7f5748ba5d253168db5b8f9a13955d0
|
|
|
10855
10921
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
10856
10922
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
10857
10923
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
10924
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
10858
10925
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
10859
10926
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
10860
10927
|
os: typing.Optional[Os] = None,
|
|
@@ -10868,6 +10935,12 @@ def _typecheckingstub__ab96b7f3871624e8430668114e7f5748ba5d253168db5b8f9a13955d0
|
|
|
10868
10935
|
"""Type checking stubs"""
|
|
10869
10936
|
pass
|
|
10870
10937
|
|
|
10938
|
+
def _typecheckingstub__604cc9b160ccf839230b5f673dff20a8c9722aa81c88ef3ccadcdfcec778ec1a(
|
|
10939
|
+
vars: typing.Mapping[builtins.str, builtins.str],
|
|
10940
|
+
) -> None:
|
|
10941
|
+
"""Type checking stubs"""
|
|
10942
|
+
pass
|
|
10943
|
+
|
|
10871
10944
|
def _typecheckingstub__71019afd6f999efd03cc3106a7c28048b0a38c740207d3615ba7e0569bab5d3d(
|
|
10872
10945
|
source: builtins.str,
|
|
10873
10946
|
name: builtins.str,
|
|
@@ -11200,6 +11273,7 @@ def _typecheckingstub__5b74a56ca854b011edea7d259b730771e5a994081db1aa0bdbea8b3e2
|
|
|
11200
11273
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
11201
11274
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
11202
11275
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
11276
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
11203
11277
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
11204
11278
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
11205
11279
|
os: typing.Optional[Os] = None,
|
|
@@ -11360,6 +11434,7 @@ def _typecheckingstub__c9910152a829b3b3a0a9e70ec31bd3ae8669b723ebb60627c6d08813b
|
|
|
11360
11434
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
11361
11435
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
11362
11436
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
11437
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
11363
11438
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
11364
11439
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
11365
11440
|
os: typing.Optional[Os] = None,
|
|
@@ -11452,6 +11527,7 @@ def _typecheckingstub__7b459d87ca6935e6c04ff03be02ed821eef81dbc792be822f356697f6
|
|
|
11452
11527
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
11453
11528
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
11454
11529
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
11530
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
11455
11531
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
11456
11532
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
11457
11533
|
os: typing.Optional[Os] = None,
|
|
@@ -11545,6 +11621,7 @@ def _typecheckingstub__9fd4f7f17e5e5c5b64ec7abfe1183d153e9472f7a1e9312e6d4b55f3f
|
|
|
11545
11621
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
11546
11622
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
11547
11623
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
11624
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
11548
11625
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
11549
11626
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
11550
11627
|
os: typing.Optional[Os] = None,
|
|
@@ -11660,6 +11737,7 @@ def _typecheckingstub__963c9a4884bb9d7400672391dfb47486f969a1b8fe5616bba9cd493e8
|
|
|
11660
11737
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
11661
11738
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
11662
11739
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
11740
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
11663
11741
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
11664
11742
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
11665
11743
|
os: typing.Optional[Os] = None,
|
|
@@ -11684,6 +11762,7 @@ def _typecheckingstub__c44d5704c54d7fdcf24ad39567c0e9f53f9837163bf8bf3b1b4e652e2
|
|
|
11684
11762
|
builder_type: typing.Optional[RunnerImageBuilderType] = None,
|
|
11685
11763
|
code_build_options: typing.Optional[typing.Union[CodeBuildRunnerImageBuilderProps, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
11686
11764
|
components: typing.Optional[typing.Sequence[RunnerImageComponent]] = None,
|
|
11765
|
+
docker_setup_commands: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
11687
11766
|
log_removal_policy: typing.Optional[_aws_cdk_ceddda9d.RemovalPolicy] = None,
|
|
11688
11767
|
log_retention: typing.Optional[_aws_cdk_aws_logs_ceddda9d.RetentionDays] = None,
|
|
11689
11768
|
os: typing.Optional[Os] = None,
|
|
@@ -18,9 +18,9 @@ import constructs._jsii
|
|
|
18
18
|
|
|
19
19
|
__jsii_assembly__ = jsii.JSIIAssembly.load(
|
|
20
20
|
"@cloudsnorkel/cdk-github-runners",
|
|
21
|
-
"0.13.
|
|
21
|
+
"0.13.2",
|
|
22
22
|
__name__[0:-6],
|
|
23
|
-
"cdk-github-runners@0.13.
|
|
23
|
+
"cdk-github-runners@0.13.2.jsii.tgz",
|
|
24
24
|
)
|
|
25
25
|
|
|
26
26
|
__all__ = [
|
|
Binary file
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.1
|
|
2
2
|
Name: cloudsnorkel.cdk-github-runners
|
|
3
|
-
Version: 0.13.
|
|
3
|
+
Version: 0.13.2
|
|
4
4
|
Summary: CDK construct to create GitHub Actions self-hosted runners. A webhook listens to events and creates ephemeral runners on the fly.
|
|
5
5
|
Home-page: https://github.com/CloudSnorkel/cdk-github-runners.git
|
|
6
6
|
Author: Amir Szekely<amir@cloudsnorkel.com>
|
|
@@ -11,4 +11,4 @@ src/cloudsnorkel.cdk_github_runners.egg-info/top_level.txt
|
|
|
11
11
|
src/cloudsnorkel/cdk_github_runners/__init__.py
|
|
12
12
|
src/cloudsnorkel/cdk_github_runners/py.typed
|
|
13
13
|
src/cloudsnorkel/cdk_github_runners/_jsii/__init__.py
|
|
14
|
-
src/cloudsnorkel/cdk_github_runners/_jsii/cdk-github-runners@0.13.
|
|
14
|
+
src/cloudsnorkel/cdk_github_runners/_jsii/cdk-github-runners@0.13.2.jsii.tgz
|
|
Binary file
|
|
File without changes
|
{cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/MANIFEST.in
RENAMED
|
File without changes
|
|
File without changes
|
{cloudsnorkel.cdk-github-runners-0.13.1 → cloudsnorkel.cdk-github-runners-0.13.2}/pyproject.toml
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|