Skip to content

Commit 0ae51a3

Browse files
committed
Fix modules linting errors
1 parent ed33cf5 commit 0ae51a3

File tree

6 files changed

+10
-9
lines changed

6 files changed

+10
-9
lines changed

modules/runner-binaries-syncer/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ No modules.
7171
| [aws_lambda_permission.on_deploy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource |
7272
| [aws_lambda_permission.syncer](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/lambda_permission) | resource |
7373
| [aws_s3_bucket.action_dist](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket) | resource |
74-
| [aws_s3_bucket_lifecycle_configuration.bucket-config](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_lifecycle_configuration) | resource |
74+
| [aws_s3_bucket_lifecycle_configuration.bucket_config](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_lifecycle_configuration) | resource |
7575
| [aws_s3_bucket_logging.action_dist_logging](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_logging) | resource |
7676
| [aws_s3_bucket_notification.on_deploy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_notification) | resource |
7777
| [aws_s3_bucket_ownership_controls.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_ownership_controls) | resource |

modules/runner-binaries-syncer/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ resource "aws_s3_bucket_ownership_controls" "this" {
1515
}
1616
}
1717

18-
resource "aws_s3_bucket_lifecycle_configuration" "bucket-config" {
18+
resource "aws_s3_bucket_lifecycle_configuration" "bucket_config" {
1919
bucket = aws_s3_bucket.action_dist.id
2020

2121
rule {

modules/runners/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ yarn run dist
6161

6262
| Name | Version |
6363
|------|---------|
64-
| <a name="provider_aws"></a> [aws](#provider\_aws) | ~> 4.0 |
64+
| <a name="provider_aws"></a> [aws](#provider\_aws) | 4.65.0 |
6565

6666
## Modules
6767

@@ -138,7 +138,7 @@ yarn run dist
138138
| <a name="input_enable_ephemeral_runners"></a> [enable\_ephemeral\_runners](#input\_enable\_ephemeral\_runners) | Enable ephemeral runners, runners will only be used once. | `bool` | `false` | no |
139139
| <a name="input_enable_job_queued_check"></a> [enable\_job\_queued\_check](#input\_enable\_job\_queued\_check) | Only scale if the job event received by the scale up lambda is is in the state queued. By default enabled for non ephemeral runners and disabled for ephemeral. Set this variable to overwrite the default behavior. | `bool` | `null` | no |
140140
| <a name="input_enable_managed_runner_security_group"></a> [enable\_managed\_runner\_security\_group](#input\_enable\_managed\_runner\_security\_group) | Enabling the default managed security group creation. Unmanaged security groups can be specified via `runner_additional_security_group_ids`. | `bool` | `true` | no |
141-
| <a name="input_enable_organization_runners"></a> [enable\_organization\_runners](#input\_enable\_organization\_runners) | n/a | `bool` | n/a | yes |
141+
| <a name="input_enable_organization_runners"></a> [enable\_organization\_runners](#input\_enable\_organization\_runners) | Register runners to organization, instead of repo level | `bool` | n/a | yes |
142142
| <a name="input_enable_runner_binaries_syncer"></a> [enable\_runner\_binaries\_syncer](#input\_enable\_runner\_binaries\_syncer) | Option to disable the lambda to sync GitHub runner distribution, useful when using a pre-build AMI. | `bool` | `true` | no |
143143
| <a name="input_enable_runner_detailed_monitoring"></a> [enable\_runner\_detailed\_monitoring](#input\_enable\_runner\_detailed\_monitoring) | Enable detailed monitoring for runners | `bool` | `false` | no |
144144
| <a name="input_enable_ssm_on_runners"></a> [enable\_ssm\_on\_runners](#input\_enable\_ssm\_on\_runners) | Enable to allow access to the runner instances for debugging purposes via SSM. Note that this adds additional permissions to the runner instances. | `bool` | n/a | yes |

modules/runners/policies-runner.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -63,4 +63,4 @@ resource "aws_iam_role_policy" "ec2" {
6363
policy = templatefile("${path.module}/policies/instance-ec2.json", {})
6464
}
6565

66-
// see also logging.tf for logging and metrics policies
66+
# see also logging.tf for logging and metrics policies

modules/runners/variables.tf

+2-1
Original file line numberDiff line numberDiff line change
@@ -180,7 +180,8 @@ variable "sqs_build_queue" {
180180
}
181181

182182
variable "enable_organization_runners" {
183-
type = bool
183+
description = "Register runners to organization, instead of repo level"
184+
type = bool
184185
}
185186

186187
variable "github_app_parameters" {

modules/webhook/main.tf

+3-3
Original file line numberDiff line numberDiff line change
@@ -19,9 +19,9 @@ resource "aws_apigatewayv2_route" "webhook" {
1919
resource "aws_apigatewayv2_stage" "webhook" {
2020
lifecycle {
2121
ignore_changes = [
22-
// see bug https://github.com/terraform-providers/terraform-provider-aws/issues/12893
22+
# see bug https://github.com/terraform-providers/terraform-provider-aws/issues/12893
2323
default_route_settings,
24-
// not terraform managed
24+
# not terraform managed
2525
deployment_id
2626
]
2727
}
@@ -42,7 +42,7 @@ resource "aws_apigatewayv2_stage" "webhook" {
4242
resource "aws_apigatewayv2_integration" "webhook" {
4343
lifecycle {
4444
ignore_changes = [
45-
// not terraform managed
45+
# not terraform managed
4646
passthrough_behavior
4747
]
4848
}

0 commit comments

Comments
 (0)