-
Notifications
You must be signed in to change notification settings - Fork 629
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add public IP association to github runner #3547
feat: Add public IP association to github runner #3547
Conversation
…s-to-public-subnet
…s-to-public-subnet
@imishchuk-carbon thx looks good. Tested with ip4 did you also check the change with ip6 / dualstack? |
Hey @npalm |
In case you have time would be nice. I think the current module is not taking care of ipv6. So assume it is not working. In case you have time to run a quick check that would be nice. If not please can you update the variable description with only tested with ipv4? |
Hey @npalm
That being said, I've renamed variable to explicitly state that it is for |
🤖 I have created a release *beep* *boop* --- ## [4.7.0](v4.6.0...v4.7.0) (2023-10-26) ### Features * Add public IP association to github runner ([#3547](#3547)) ([1a25b2c](1a25b2c)) ### Bug Fixes * add tags to aws resources ([#3549](#3549)) ([c747139](c747139)) * restrict runner security group to only ingress ([#3564](#3564)) ([e63fdc5](e63fdc5)) --- This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please). Co-authored-by: forest-releaser[bot] <80285352+forest-releaser[bot]@users.noreply.github.com>
### Description * Add option to associate public IP with runner (disabled by default) Fixes [3528](#3528) Suggested changes have been used in our env for over a month and it works as expected. ### Checklists **Development and testing:** - [x] All tests related to the changed code pass in development - [x] Pull request is ready for review --------- Co-authored-by: Niek Palm <npalm@users.noreply.github.com>
Thanks @npalm |
@npalm @imishchuk-carbon I know this is already pushed to main, but I'm wondering about a couple of things. Shouldn't this code be as simple as:
where This is important because some tools rely on the existence of this property to work properly. For example, if you have a SCP to forbid EC2 instances with an associated public IP, the runners will not be created because you might have three scenarios:
For this reason, this property should be always specified, whether it's Additionally, why do you need to assign the security groups within |
Hello @ay0o
No, see commit which tried this approach. Once you define
Setting it to
Do you have an example
And that means that if PublicIP association is explicitly requested - action will be denied, otherwise instance will be deployed without public IP. Unless, I am missing something? I guess this functionality could be implemented by fully removing |
@imishchuk-carbon you can forget about my message. There was some misunderstanding with the AWS documentation, because it led to think that |
Description
Fixes 3528
Suggested changes have been used in our env for over a month and it works as expected.
Checklists
Development and testing: