From a42abd9cf9054fe021fbb77f40eaef8c5d401801 Mon Sep 17 00:00:00 2001 From: "dependabot[bot]" <49699333+dependabot[bot]@users.noreply.github.com> Date: Mon, 22 Jan 2024 07:33:53 +0000 Subject: [PATCH 1/2] chore(deps): bump actions/cache from 3 to 4 Bumps [actions/cache](https://github.com/actions/cache) from 3 to 4. - [Release notes](https://github.com/actions/cache/releases) - [Changelog](https://github.com/actions/cache/blob/main/RELEASES.md) - [Commits](https://github.com/actions/cache/compare/v3...v4) --- updated-dependencies: - dependency-name: actions/cache dependency-type: direct:production update-type: version-update:semver-major ... Signed-off-by: dependabot[bot] --- .github/workflows/test-and-release.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/test-and-release.yml b/.github/workflows/test-and-release.yml index 7cb534c..f62c83f 100644 --- a/.github/workflows/test-and-release.yml +++ b/.github/workflows/test-and-release.yml @@ -64,7 +64,7 @@ jobs: git-commit-message: "docs(terraform): update README.md" - name: Cache Docs if: ${{ github.event_name == 'push' }} - uses: actions/cache@v3 + uses: actions/cache@v4 with: path: | README.md @@ -152,7 +152,7 @@ jobs: uses: actions/checkout@v4 - name: Restore Cached Docs if: ${{ github.event_name == 'push' }} - uses: actions/cache@v3 + uses: actions/cache@v4 with: path: README.md key: ${{ runner.os }}-docs-${{ github.sha }} From 37edf1f6211e125dfe61d9cb81f52de37dced35c Mon Sep 17 00:00:00 2001 From: "github-actions[bot]" Date: Mon, 22 Jan 2024 07:34:22 +0000 Subject: [PATCH 2/2] docs(terraform): update README.md --- README.md | 62 ++++++++++++++++++++--------------------- examples/full/README.md | 22 +++++++-------- 2 files changed, 42 insertions(+), 42 deletions(-) diff --git a/README.md b/README.md index 043a20c..7720ba4 100644 --- a/README.md +++ b/README.md @@ -13,7 +13,7 @@ To create runner deployments see the [actions runner module](https://registry.te ```hcl # setup actions-runner-controller -module "actions-runner-controller" { +module "actions_runner_controller" { source = "../.." namespace = "github-actions-runner-controller" create_namespace = true @@ -35,51 +35,51 @@ module "actions-runner-controller" { ## Requirements -| Name | Version | -| ---------------------------------------------------------------------------- | --------- | -| [terraform](#requirement\_terraform) | >= 0.13 | -| [helm](#requirement\_helm) | >= 2.11.0 | +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 0.13 | +| [helm](#requirement\_helm) | >= 2.11.0 | | [kubernetes](#requirement\_kubernetes) | >= 2.23.0 | ## Providers -| Name | Version | -| ---------------------------------------------------------------------- | --------- | -| [helm](#provider\_helm) | >= 2.11.0 | +| Name | Version | +|------|---------| +| [helm](#provider\_helm) | >= 2.11.0 | | [kubernetes](#provider\_kubernetes) | >= 2.23.0 | ## Resources -| Name | Type | -| ------------------------------------------------------------------------------------------------------------------------- | -------- | -| [helm_release.this](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource | +| Name | Type | +|------|------| +| [helm_release.this](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource | | [kubernetes_namespace.this](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/namespace) | resource | -| [kubernetes_secret.this](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/secret) | resource | +| [kubernetes_secret.this](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/secret) | resource | ## Inputs -| Name | Description | Type | Default | Required | -| --------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------- | -------- | ------------------------------------ | :------: | -| [github\_app\_id](#input\_github\_app\_id) | GitHub App ID | `string` | n/a | yes | -| [github\_app\_install\_id](#input\_github\_app\_install\_id) | GitHub App Install ID | `string` | n/a | yes | -| [github\_app\_private\_key](#input\_github\_app\_private\_key) | GitHub App Private Key | `string` | n/a | yes | -| [allow\_granting\_container\_mode\_permissions](#input\_allow\_granting\_container\_mode\_permissions) | If true, the runner controller will be allowed to grant container mode permissions | `bool` | `false` | no | -| [atomic](#input\_atomic) | If true, installation process purges chart on fail. If false, installation process deletes resources created by chart, but not purge them | `bool` | `true` | no | -| [create\_namespace](#input\_create\_namespace) | If true, the namespace will be created | `bool` | `true` | no | -| [helm\_chart\_version](#input\_helm\_chart\_version) | The version of the helm chart to deploy | `string` | `"0.23.5"` | no | -| [helm\_deployment\_name](#input\_helm\_deployment\_name) | The name of the helm deployment | `string` | `"actions-runner-controller"` | no | -| [kubernetes\_secret\_name](#input\_kubernetes\_secret\_name) | The name of the secret to create | `string` | `"github-auth-secret"` | no | -| [namespace](#input\_namespace) | The namespace to deploy the runner controller into | `string` | `"github-actions-runner-controller"` | no | -| [replicas](#input\_replicas) | The number of replicas for the runner controller | `number` | `3` | no | -| [timeout](#input\_timeout) | Time in seconds to wait for helm deployment operation (like Jobs for hooks) | `number` | `600` | no | +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [github\_app\_id](#input\_github\_app\_id) | GitHub App ID | `string` | n/a | yes | +| [github\_app\_install\_id](#input\_github\_app\_install\_id) | GitHub App Install ID | `string` | n/a | yes | +| [github\_app\_private\_key](#input\_github\_app\_private\_key) | GitHub App Private Key | `string` | n/a | yes | +| [allow\_granting\_container\_mode\_permissions](#input\_allow\_granting\_container\_mode\_permissions) | If true, the runner controller will be allowed to grant container mode permissions | `bool` | `false` | no | +| [atomic](#input\_atomic) | If true, installation process purges chart on fail. If false, installation process deletes resources created by chart, but not purge them | `bool` | `true` | no | +| [create\_namespace](#input\_create\_namespace) | If true, the namespace will be created | `bool` | `true` | no | +| [helm\_chart\_version](#input\_helm\_chart\_version) | The version of the helm chart to deploy | `string` | `"0.23.5"` | no | +| [helm\_deployment\_name](#input\_helm\_deployment\_name) | The name of the helm deployment | `string` | `"actions-runner-controller"` | no | +| [kubernetes\_secret\_name](#input\_kubernetes\_secret\_name) | The name of the secret to create | `string` | `"github-auth-secret"` | no | +| [namespace](#input\_namespace) | The namespace to deploy the runner controller into | `string` | `"github-actions-runner-controller"` | no | +| [replicas](#input\_replicas) | The number of replicas for the runner controller | `number` | `3` | no | +| [timeout](#input\_timeout) | Time in seconds to wait for helm deployment operation (like Jobs for hooks) | `number` | `600` | no | ## Outputs -| Name | Description | -| ---------------------------------------------------------------------------------------------------- | ------------------------------------------------- | -| [helm\_deployment\_name](#output\_helm\_deployment\_name) | The name of the helm deployment | -| [namespace](#output\_namespace) | The namespace runner controller was deployed into | -| [secret\_name](#output\_secret\_name) | The name of the secret created | +| Name | Description | +|------|-------------| +| [helm\_deployment\_name](#output\_helm\_deployment\_name) | The name of the helm deployment | +| [namespace](#output\_namespace) | The namespace runner controller was deployed into | +| [secret\_name](#output\_secret\_name) | The name of the secret created | \ No newline at end of file diff --git a/examples/full/README.md b/examples/full/README.md index 644b76b..0b49250 100644 --- a/examples/full/README.md +++ b/examples/full/README.md @@ -20,7 +20,7 @@ resource "helm_release" "cert_manager" { repository = "https://charts.jetstack.io" chart = "cert-manager" version = "v1.12.3" - namespace = kubernetes_namespace.cert_manager.metadata.0.name + namespace = kubernetes_namespace.cert_manager.metadata[0].name atomic = true timeout = 600 set { @@ -34,7 +34,7 @@ resource "helm_release" "cert_manager" { ```hcl # setup actions-runner-controller -module "actions-runner-controller" { +module "actions_runner_controller" { source = "../.." namespace = "github-actions-runner-controller" create_namespace = true @@ -61,24 +61,24 @@ module "actions-runner-controller" { resource "kubernetes_service_account" "runner" { metadata { name = "test-runner" - namespace = module.actions-runner-controller.namespace + namespace = module.actions_runner_controller.namespace } secret { - name = kubernetes_secret.runner.metadata.0.name + name = kubernetes_secret.runner.metadata[0].name } } resource "kubernetes_secret" "runner" { metadata { name = "test-runner" - namespace = module.actions-runner-controller.namespace + namespace = module.actions_runner_controller.namespace } } resource "kubernetes_role" "runner" { metadata { name = "test-runner" - namespace = module.actions-runner-controller.namespace + namespace = module.actions_runner_controller.namespace } rule { @@ -111,7 +111,7 @@ resource "kubernetes_role" "runner" { resource "kubernetes_role_binding" "runner" { metadata { name = "test-runner" - namespace = module.actions-runner-controller.namespace + namespace = module.actions_runner_controller.namespace } role_ref { api_group = "rbac.authorization.k8s.io" @@ -121,7 +121,7 @@ resource "kubernetes_role_binding" "runner" { subject { kind = "ServiceAccount" name = "test-runner" - namespace = module.actions-runner-controller.namespace + namespace = module.actions_runner_controller.namespace } } @@ -131,7 +131,7 @@ resource "kubectl_manifest" "runner" { kind = "RunnerDeployment" metadata = { name = "test-runner" - namespace = module.actions-runner-controller.namespace + namespace = module.actions_runner_controller.namespace } spec = { replicas = 2 @@ -139,7 +139,7 @@ resource "kubectl_manifest" "runner" { spec = { repository = "infinite-automations/terraform-helm-github-actions-runner-controller" labels = var.labels - serviceAccountName = kubernetes_service_account.runner.metadata.0.name + serviceAccountName = kubernetes_service_account.runner.metadata[0].name containerMode = "kubernetes" workVolumeClaimTemplate = { storageClassName = "standard" @@ -157,7 +157,7 @@ resource "kubectl_manifest" "runner" { } }) depends_on = [ - module.actions-runner-controller, + module.actions_runner_controller, kubernetes_service_account.runner ] }