Skip to content
This repository was archived by the owner on Jan 16, 2025. It is now read-only.

Commit 68a2014

Browse files
authored
feat: Support Node16 for AWS Lambda (#2073)
1 parent e2f9a27 commit 68a2014

26 files changed

+264
-219
lines changed

Diff for: .github/workflows/lambda-runner-binaries-syncer.yml

+5-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,11 @@ on:
1111
jobs:
1212
build:
1313
runs-on: ubuntu-latest
14-
container: node:14
14+
strategy:
15+
matrix:
16+
node: [14, 16]
17+
container:
18+
image: node:${{ matrix.node }}
1519
defaults:
1620
run:
1721
working-directory: modules/runner-binaries-syncer/lambdas/runner-binaries-syncer

Diff for: .github/workflows/lambda-runners.yml

+5-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,11 @@ on:
1111
jobs:
1212
build:
1313
runs-on: ubuntu-latest
14-
container: node:14
14+
strategy:
15+
matrix:
16+
node: [14, 16]
17+
container:
18+
image: node:${{ matrix.node }}
1519
defaults:
1620
run:
1721
working-directory: modules/runners/lambdas/runners

Diff for: .github/workflows/lambda-webhook.yml

+5-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,11 @@ on:
1111
jobs:
1212
build:
1313
runs-on: ubuntu-latest
14-
container: node:14
14+
strategy:
15+
matrix:
16+
node: [14, 16]
17+
container:
18+
image: node:${{ matrix.node }}
1519
defaults:
1620
run:
1721
working-directory: modules/webhook/lambdas/webhook

Diff for: README.md

+3-1
Original file line numberDiff line numberDiff line change
@@ -411,7 +411,7 @@ In case the setup does not work as intended follow the trace of events:
411411
| <a name="input_enable_runner_detailed_monitoring"></a> [enable\_runner\_detailed\_monitoring](#input\_enable\_runner\_detailed\_monitoring) | Should detailed monitoring be enabled for the runner. Set this to true if you want to use detailed monitoring. See https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-cloudwatch-new.html for details. | `bool` | `false` | no |
412412
| <a name="input_enable_ssm_on_runners"></a> [enable\_ssm\_on\_runners](#input\_enable\_ssm\_on\_runners) | Enable to allow access the runner instances for debugging purposes via SSM. Note that this adds additional permissions to the runner instances. | `bool` | `false` | no |
413413
| <a name="input_enabled_userdata"></a> [enabled\_userdata](#input\_enabled\_userdata) | Should the userdata script be enabled for the runner. Set this to false if you are using your own prebuilt AMI. | `bool` | `true` | no |
414-
| <a name="input_environment"></a> [environment](#input\_environment) | A name that identifies the environment, used as prefix and for tagging. | `string` | n/a | yes |
414+
| <a name="input_environment"></a> [environment](#input\_environment) | A name that identifies the environment, used as prefix and for tagging. | `string` | `null` | no |
415415
| <a name="input_fifo_build_queue"></a> [fifo\_build\_queue](#input\_fifo\_build\_queue) | Enable a FIFO queue to remain the order of events received by the webhook. Suggest to set to true for repo level runners. | `bool` | `false` | no |
416416
| <a name="input_ghes_ssl_verify"></a> [ghes\_ssl\_verify](#input\_ghes\_ssl\_verify) | GitHub Enterprise SSL verification. Set to 'false' when custom certificate (chains) is used for GitHub Enterprise Server (insecure). | `bool` | `true` | no |
417417
| <a name="input_ghes_url"></a> [ghes\_url](#input\_ghes\_url) | GitHub Enterprise Server URL. Example: https://github.internal.co - DO NOT SET IF USING PUBLIC GITHUB | `string` | `null` | no |
@@ -427,6 +427,7 @@ In case the setup does not work as intended follow the trace of events:
427427
| <a name="input_key_name"></a> [key\_name](#input\_key\_name) | Key pair name | `string` | `null` | no |
428428
| <a name="input_kms_key_arn"></a> [kms\_key\_arn](#input\_kms\_key\_arn) | Optional CMK Key ARN to be used for Parameter Store. This key must be in the current account. | `string` | `null` | no |
429429
| <a name="input_lambda_principals"></a> [lambda\_principals](#input\_lambda\_principals) | (Optional) add extra principals to the role created for execution of the lambda, e.g. for local testing. | <pre>list(object({<br> type = string<br> identifiers = list(string)<br> }))</pre> | `[]` | no |
430+
| <a name="input_lambda_runtime"></a> [lambda\_runtime](#input\_lambda\_runtime) | AWS Lambda runtime. | `string` | `"nodejs14.x"` | no |
430431
| <a name="input_lambda_s3_bucket"></a> [lambda\_s3\_bucket](#input\_lambda\_s3\_bucket) | S3 bucket from which to specify lambda functions. This is an alternative to providing local files directly. | `any` | `null` | no |
431432
| <a name="input_lambda_security_group_ids"></a> [lambda\_security\_group\_ids](#input\_lambda\_security\_group\_ids) | List of security group IDs associated with the Lambda function. | `list(string)` | `[]` | no |
432433
| <a name="input_lambda_subnet_ids"></a> [lambda\_subnet\_ids](#input\_lambda\_subnet\_ids) | List of subnets in which the action runners will be launched, the subnets needs to be subnets in the `vpc_id`. | `list(string)` | `[]` | no |
@@ -440,6 +441,7 @@ In case the setup does not work as intended follow the trace of events:
440441
| <a name="input_pool_lambda_reserved_concurrent_executions"></a> [pool\_lambda\_reserved\_concurrent\_executions](#input\_pool\_lambda\_reserved\_concurrent\_executions) | Amount of reserved concurrent executions for the scale-up lambda function. A value of 0 disables lambda from being triggered and -1 removes any concurrency limitations. | `number` | `1` | no |
441442
| <a name="input_pool_lambda_timeout"></a> [pool\_lambda\_timeout](#input\_pool\_lambda\_timeout) | Time out for the pool lambda lambda in seconds. | `number` | `60` | no |
442443
| <a name="input_pool_runner_owner"></a> [pool\_runner\_owner](#input\_pool\_runner\_owner) | The pool will deploy runners to the GitHub org ID, set this value to the org to which you want the runners deployed. Repo level is not supported. | `string` | `null` | no |
444+
| <a name="input_prefix"></a> [prefix](#input\_prefix) | The prefix used for naming resources | `string` | `"github-actions"` | no |
443445
| <a name="input_redrive_build_queue"></a> [redrive\_build\_queue](#input\_redrive\_build\_queue) | Set options to attach (optional) a dead letter queue to the build queue, the queue between the webhook and the scale up lambda. You have the following options. 1. Disable by setting, `enalbed' to false. 2. Enable by setting `enabled` to `true`, `maxReceiveCount` to a number of max retries.` | <pre>object({<br> enabled = bool<br> maxReceiveCount = number<br> })</pre> | <pre>{<br> "enabled": false,<br> "maxReceiveCount": null<br>}</pre> | no |
444446
| <a name="input_repository_white_list"></a> [repository\_white\_list](#input\_repository\_white\_list) | List of repositories allowed to use the github app | `list(string)` | `[]` | no |
445447
| <a name="input_role_path"></a> [role\_path](#input\_role\_path) | The path that will be added to role path for created roles, if not set the environment name will be used. | `string` | `null` | no |

Diff for: examples/arm64/.terraform.lock.hcl

+40-41
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

Diff for: examples/default/.terraform.lock.hcl

+39-40
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)