You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
🤖 I have created a release *beep* *boop*
---
##
[6.2.0](6.1.2...6.2.0)
(2023-03-22)
### Features
* show `config.toml` and user data in Terraform plan
([#754](#754))
([5b5c335](5b5c335))
---
This PR was generated with [Release
Please](https://github.com/googleapis/release-please). See
[documentation](https://github.com/googleapis/release-please#release-please).
---------
Signed-off-by: Niek Palm <dev.npalm@gmail.com>
Co-authored-by: cattle-ops-releaser[bot] <126345536+cattle-ops-releaser[bot]@users.noreply.github.com>
Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
* show `config.toml` and user data in Terraform plan ([#754](https://github.com/cattle-ops/terraform-aws-gitlab-runner/issues/754)) ([5b5c335](https://github.com/cattle-ops/terraform-aws-gitlab-runner/commit/5b5c3354d56971786e9afe50e493fa2bde1bdbb4))
|[aws_ami.docker-machine](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ami)| data source |
493
497
|[aws_ami.runner](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ami)| data source |
494
498
|[aws_availability_zone.runners](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/availability_zone)| data source |
@@ -544,7 +548,7 @@ Made with [contributors-img](https://contrib.rocks).
544
548
| <aname="input_enable_manage_gitlab_token"></a> [enable\_manage\_gitlab\_token](#input\_enable\_manage\_gitlab\_token)| (Deprecated) Boolean to enable the management of the GitLab token in SSM. If `true` the token will be stored in SSM, which means the SSM property is a terraform managed resource. If `false` the Gitlab token will be stored in the SSM by the user-data script during creation of the the instance. However the SSM parameter is not managed by terraform and will remain in SSM after a `terraform destroy`. |`bool`|`null`| no |
545
549
| <aname="input_enable_ping"></a> [enable\_ping](#input\_enable\_ping)| Allow ICMP Ping to the ec2 instances. |`bool`|`false`| no |
546
550
| <aname="input_enable_runner_ssm_access"></a> [enable\_runner\_ssm\_access](#input\_enable\_runner\_ssm\_access)| Add IAM policies to the runner agent instance to connect via the Session Manager. |`bool`|`false`| no |
547
-
| <aname="input_enable_runner_user_data_trace_log"></a> [enable\_runner\_user\_data\_trace\_log](#input\_enable\_runner\_user\_data\_trace\_log)| Enable bash xtrace for the user data script that creates the EC2 instance for the runner agent. Be aware this could log sensitive data such as you GitLab runner token. |`bool`|`true`| no |
551
+
| <aname="input_enable_runner_user_data_trace_log"></a> [enable\_runner\_user\_data\_trace\_log](#input\_enable\_runner\_user\_data\_trace\_log)| Enable bash trace for the user data script that creates the EC2 instance for the runner agent. Be aware this could log sensitive data such as you GitLab runner token. |`bool`|`true`| no |
548
552
| <aname="input_enable_schedule"></a> [enable\_schedule](#input\_enable\_schedule)| Flag used to enable/disable auto scaling group schedule for the runner instance. |`bool`|`false`| no |
549
553
| <aname="input_environment"></a> [environment](#input\_environment)| A name that identifies the environment, used as prefix and for tagging. |`string`| n/a | yes |
550
554
| <aname="input_extra_security_group_ids_runner_agent"></a> [extra\_security\_group\_ids\_runner\_agent](#input\_extra\_security\_group\_ids\_runner\_agent)| Optional IDs of extra security groups to apply to the runner agent. This will not apply to the runners spun up when using the docker+machine executor, which is the default. |`list(string)`|`[]`| no |
@@ -625,6 +629,7 @@ Made with [contributors-img](https://contrib.rocks).
625
629
| <aname="input_secure_parameter_store_runner_sentry_dsn"></a> [secure\_parameter\_store\_runner\_sentry\_dsn](#input\_secure\_parameter\_store\_runner\_sentry\_dsn)| The Sentry DSN name used to store the Sentry DSN in Secure Parameter Store |`string`|`"sentry-dsn"`| no |
626
630
| <aname="input_secure_parameter_store_runner_token_key"></a> [secure\_parameter\_store\_runner\_token\_key](#input\_secure\_parameter\_store\_runner\_token\_key)| The key name used store the Gitlab runner token in Secure Parameter Store |`string`|`"runner-token"`| no |
627
631
| <aname="input_sentry_dsn"></a> [sentry\_dsn](#input\_sentry\_dsn)| Sentry DSN of the project for the runner to use (uses legacy DSN format) |`string`|`"__SENTRY_DSN_REPLACED_BY_USER_DATA__"`| no |
632
+
| <aname="input_show_user_data_in_plan"></a> [show\_user\_data\_in\_plan](#input\_show\_user\_data\_in\_plan)| When enabled, shows the diff for agent configuration files in Terraform plan: `config.toml` and user data script |`bool`|`false`| no |
628
633
| <aname="input_subnet_id"></a> [subnet\_id](#input\_subnet\_id)| Subnet id used for the runner and executors. Must belong to the VPC specified above. |`string`|`""`| no |
629
634
| <aname="input_subnet_id_runners"></a> [subnet\_id\_runners](#input\_subnet\_id\_runners)| Deprecated! Use subnet\_id instead. List of subnets used for hosting the gitlab-runners. |`string`|`""`| no |
630
635
| <aname="input_subnet_ids_gitlab_runner"></a> [subnet\_ids\_gitlab\_runner](#input\_subnet\_ids\_gitlab\_runner)| Deprecated! Use subnet\_id instead. Subnet used for hosting the GitLab runner. |`list(string)`|`[]`| no |
Copy file name to clipboardExpand all lines: modules/terminate-agent-hook/README.md
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -152,7 +152,7 @@ No modules.
152
152
| <aname="input_cloudwatch_logging_retention_in_days"></a> [cloudwatch\_logging\_retention\_in\_days](#input\_cloudwatch\_logging\_retention\_in\_days)| The number of days to retain logs in CloudWatch. |`number`|`30`| no |
153
153
| <aname="input_enable_xray_tracing"></a> [enable\_xray\_tracing](#input\_enable\_xray\_tracing)| Enables X-Ray for debugging and analysis |`bool`|`false`| no |
154
154
| <aname="input_environment"></a> [environment](#input\_environment)| A name that identifies the environment, used as a name prefix and for tagging. |`string`| n/a | yes |
155
-
| <aname="input_kms_key_id"></a> [kms\_key\_id](#input\_kms\_key\_id)| KMS key id to encrypted the CloudWatch logs. Ensure CloudWatch has access to the provided KMS key. |`string`| n/a | yes |
155
+
| <aname="input_kms_key_id"></a> [kms\_key\_id](#input\_kms\_key\_id)| KMS key id to encrypt the resources, e.g. logs, lambda environment variables, ... |`string`| n/a | yes |
156
156
| <aname="input_name"></a> [name](#input\_name)| The name of the Lambda function to create. The 'environment' will be prefixed to this. |`string`| n/a | yes |
157
157
| <aname="input_name_docker_machine_runners"></a> [name\_docker\_machine\_runners](#input\_name\_docker\_machine\_runners)| The `Name` tag of EC2 instances created by the runner agent. |`string`| n/a | yes |
158
158
| <aname="input_name_iam_objects"></a> [name\_iam\_objects](#input\_name\_iam\_objects)| The name to use for IAM resources - roles and policies. |`string`|`""`| no |
0 commit comments