github-runners
cloudandthings/github-runners/aws
Deploy GitHub Action runners in your AWS Account. Uses AWS CodeBuild to manage ephemeral runners, so you don't have to.
terraform-aws-github-runners Deploy GitHub Action runners in your AWS Account using serverless AWS CodeBuild. ---  !Terraform Version    Overview This Terraform module simplifies deployment of self-hosted GitHub Action runners using AWS CodeBuild. Unlike traditional approaches that require managing EC2 instances, this solution is serverless. Key Benefits - Simple - Quick setup with minimal configuratio
| Name | Type | Description | Default |
|---|---|---|---|
| name | string | Created resources will be named with this. | required |
| source_location | string | Your source code repo location, for example https://github.com/my/repo.git, or ` | required |
| source_organization | string | Your GitHub organization name for organization-level webhook creation. | null |
| cloudwatch_logs_group_name | string | Name of the log group used by the CodeBuild project. If not specified then a def | null |
| s3_logs_bucket_name | string | Name of the S3 bucket to store logs in. If not specified then logging to S3 will | null |
| vpc_id | string | The VPC ID for AWS CodeBuild to launch ephemeral instances in. | null |
| ingress_with_cidr_blocks | list(object({ from_port | List of ingress rules to add to the default security group with CIDR blocks | [] |
| iam_role_name | string | Name of the IAM role to be used. If not specified then a role will be created | null |
| environment_compute_type | string | Information about the compute resources the build project will use. Valid value | "BUILD_GENERAL1_SMALL" |
| cloudwatch_log_group_retention_in_days | number | Number of days to retain log events | 14 |
| s3_logs_bucket_prefix | string | Prefix to use for the logs in the S3 bucket | "" |
| security_group_ids | list(string) | The list of Security Group IDs for AWS CodeBuild to launch ephemeral EC2 instanc | [] |
| iam_role_permissions_boundary | string | ARN of the policy that is used to set the permissions boundary for the IAM servi | null |
| ecr_repository_name | string | Name of the ECR repository to create or use. If not specified and `create_ecr_re | null |
| privileged_mode | bool | Whether to enable running the Docker daemon inside a Docker container. Set to tr | false |
| tags | map(string) | A map of tags to assign to the resources created by this module. If configured w | {} |
| subnet_ids | list(string) | The list of Subnet IDs for AWS CodeBuild to launch ephemeral EC2 instances in. | [] |
| security_group_name | string | Name to use on created Security Group. Defaults to `name` | null |
| kms_key_id | string | The AWS KMS key to be used | null |
| build_timeout | number | Number of minutes, from 5 to 2160 (36 hours), for AWS CodeBuild to wait until ti | 5 |
| iam_role_tags | map(string) | A map of tags to assign specifically to the IAM role. These tags will be merged | {} |
| github_secretsmanager_secret_arn | string | The Secret ARN containing the credentials to use for the region-wide CodeBuild S | null |
codebuild_role_name — Name of the CodeBuild role, to be used when running GitHub Actionsecr_repository_name — Name of the ECR repository, to be used when to push custom docker images for the CodeBuild projectaws_security_group_id — ID of the security group created for the CodeBuild projectenvironment_image — Docker image used for this CodeBuild projectcloudwatch_log_group_name — Name of the CloudWatch log group for the CodeBuild projectcodebuild_project_name — Name of the CodeBuild project, to be used when running GitHub Actionscodebuild_project_arn — ARN of the CodeBuild project, to be used when running GitHub ActionsA batteries included cloud-init config to quickly and easily deploy a single Doc
Terraform module to create VPC resource on AWS.
Terraform module to create default S3 bucket with logging and encryption type sp
This terraform module is used to create ECR on AWS.