diff --git a/.github/workflows/test-and-release.yml b/.github/workflows/test-and-release.yml
index 7cb534c..9acdfd4 100644
--- a/.github/workflows/test-and-release.yml
+++ b/.github/workflows/test-and-release.yml
@@ -81,7 +81,7 @@ jobs:
- name: Checkout
uses: actions/checkout@v4
- name: Create k8s Kind Cluster
- uses: helm/kind-action@v1.8.0
+ uses: helm/kind-action@v1.9.0
with:
wait: "120s"
- name: Create Runners
diff --git a/README.md b/README.md
index 043a20c..7720ba4 100644
--- a/README.md
+++ b/README.md
@@ -13,7 +13,7 @@ To create runner deployments see the [actions runner module](https://registry.te
```hcl
# setup actions-runner-controller
-module "actions-runner-controller" {
+module "actions_runner_controller" {
source = "../.."
namespace = "github-actions-runner-controller"
create_namespace = true
@@ -35,51 +35,51 @@ module "actions-runner-controller" {
## Requirements
-| Name | Version |
-| ---------------------------------------------------------------------------- | --------- |
-| [terraform](#requirement\_terraform) | >= 0.13 |
-| [helm](#requirement\_helm) | >= 2.11.0 |
+| Name | Version |
+|------|---------|
+| [terraform](#requirement\_terraform) | >= 0.13 |
+| [helm](#requirement\_helm) | >= 2.11.0 |
| [kubernetes](#requirement\_kubernetes) | >= 2.23.0 |
## Providers
-| Name | Version |
-| ---------------------------------------------------------------------- | --------- |
-| [helm](#provider\_helm) | >= 2.11.0 |
+| Name | Version |
+|------|---------|
+| [helm](#provider\_helm) | >= 2.11.0 |
| [kubernetes](#provider\_kubernetes) | >= 2.23.0 |
## Resources
-| Name | Type |
-| ------------------------------------------------------------------------------------------------------------------------- | -------- |
-| [helm_release.this](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource |
+| Name | Type |
+|------|------|
+| [helm_release.this](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource |
| [kubernetes_namespace.this](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/namespace) | resource |
-| [kubernetes_secret.this](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/secret) | resource |
+| [kubernetes_secret.this](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/secret) | resource |
## Inputs
-| Name | Description | Type | Default | Required |
-| --------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------- | -------- | ------------------------------------ | :------: |
-| [github\_app\_id](#input\_github\_app\_id) | GitHub App ID | `string` | n/a | yes |
-| [github\_app\_install\_id](#input\_github\_app\_install\_id) | GitHub App Install ID | `string` | n/a | yes |
-| [github\_app\_private\_key](#input\_github\_app\_private\_key) | GitHub App Private Key | `string` | n/a | yes |
-| [allow\_granting\_container\_mode\_permissions](#input\_allow\_granting\_container\_mode\_permissions) | If true, the runner controller will be allowed to grant container mode permissions | `bool` | `false` | no |
-| [atomic](#input\_atomic) | If true, installation process purges chart on fail. If false, installation process deletes resources created by chart, but not purge them | `bool` | `true` | no |
-| [create\_namespace](#input\_create\_namespace) | If true, the namespace will be created | `bool` | `true` | no |
-| [helm\_chart\_version](#input\_helm\_chart\_version) | The version of the helm chart to deploy | `string` | `"0.23.5"` | no |
-| [helm\_deployment\_name](#input\_helm\_deployment\_name) | The name of the helm deployment | `string` | `"actions-runner-controller"` | no |
-| [kubernetes\_secret\_name](#input\_kubernetes\_secret\_name) | The name of the secret to create | `string` | `"github-auth-secret"` | no |
-| [namespace](#input\_namespace) | The namespace to deploy the runner controller into | `string` | `"github-actions-runner-controller"` | no |
-| [replicas](#input\_replicas) | The number of replicas for the runner controller | `number` | `3` | no |
-| [timeout](#input\_timeout) | Time in seconds to wait for helm deployment operation (like Jobs for hooks) | `number` | `600` | no |
+| Name | Description | Type | Default | Required |
+|------|-------------|------|---------|:--------:|
+| [github\_app\_id](#input\_github\_app\_id) | GitHub App ID | `string` | n/a | yes |
+| [github\_app\_install\_id](#input\_github\_app\_install\_id) | GitHub App Install ID | `string` | n/a | yes |
+| [github\_app\_private\_key](#input\_github\_app\_private\_key) | GitHub App Private Key | `string` | n/a | yes |
+| [allow\_granting\_container\_mode\_permissions](#input\_allow\_granting\_container\_mode\_permissions) | If true, the runner controller will be allowed to grant container mode permissions | `bool` | `false` | no |
+| [atomic](#input\_atomic) | If true, installation process purges chart on fail. If false, installation process deletes resources created by chart, but not purge them | `bool` | `true` | no |
+| [create\_namespace](#input\_create\_namespace) | If true, the namespace will be created | `bool` | `true` | no |
+| [helm\_chart\_version](#input\_helm\_chart\_version) | The version of the helm chart to deploy | `string` | `"0.23.5"` | no |
+| [helm\_deployment\_name](#input\_helm\_deployment\_name) | The name of the helm deployment | `string` | `"actions-runner-controller"` | no |
+| [kubernetes\_secret\_name](#input\_kubernetes\_secret\_name) | The name of the secret to create | `string` | `"github-auth-secret"` | no |
+| [namespace](#input\_namespace) | The namespace to deploy the runner controller into | `string` | `"github-actions-runner-controller"` | no |
+| [replicas](#input\_replicas) | The number of replicas for the runner controller | `number` | `3` | no |
+| [timeout](#input\_timeout) | Time in seconds to wait for helm deployment operation (like Jobs for hooks) | `number` | `600` | no |
## Outputs
-| Name | Description |
-| ---------------------------------------------------------------------------------------------------- | ------------------------------------------------- |
-| [helm\_deployment\_name](#output\_helm\_deployment\_name) | The name of the helm deployment |
-| [namespace](#output\_namespace) | The namespace runner controller was deployed into |
-| [secret\_name](#output\_secret\_name) | The name of the secret created |
+| Name | Description |
+|------|-------------|
+| [helm\_deployment\_name](#output\_helm\_deployment\_name) | The name of the helm deployment |
+| [namespace](#output\_namespace) | The namespace runner controller was deployed into |
+| [secret\_name](#output\_secret\_name) | The name of the secret created |
\ No newline at end of file
diff --git a/examples/full/README.md b/examples/full/README.md
index 644b76b..0b49250 100644
--- a/examples/full/README.md
+++ b/examples/full/README.md
@@ -20,7 +20,7 @@ resource "helm_release" "cert_manager" {
repository = "https://charts.jetstack.io"
chart = "cert-manager"
version = "v1.12.3"
- namespace = kubernetes_namespace.cert_manager.metadata.0.name
+ namespace = kubernetes_namespace.cert_manager.metadata[0].name
atomic = true
timeout = 600
set {
@@ -34,7 +34,7 @@ resource "helm_release" "cert_manager" {
```hcl
# setup actions-runner-controller
-module "actions-runner-controller" {
+module "actions_runner_controller" {
source = "../.."
namespace = "github-actions-runner-controller"
create_namespace = true
@@ -61,24 +61,24 @@ module "actions-runner-controller" {
resource "kubernetes_service_account" "runner" {
metadata {
name = "test-runner"
- namespace = module.actions-runner-controller.namespace
+ namespace = module.actions_runner_controller.namespace
}
secret {
- name = kubernetes_secret.runner.metadata.0.name
+ name = kubernetes_secret.runner.metadata[0].name
}
}
resource "kubernetes_secret" "runner" {
metadata {
name = "test-runner"
- namespace = module.actions-runner-controller.namespace
+ namespace = module.actions_runner_controller.namespace
}
}
resource "kubernetes_role" "runner" {
metadata {
name = "test-runner"
- namespace = module.actions-runner-controller.namespace
+ namespace = module.actions_runner_controller.namespace
}
rule {
@@ -111,7 +111,7 @@ resource "kubernetes_role" "runner" {
resource "kubernetes_role_binding" "runner" {
metadata {
name = "test-runner"
- namespace = module.actions-runner-controller.namespace
+ namespace = module.actions_runner_controller.namespace
}
role_ref {
api_group = "rbac.authorization.k8s.io"
@@ -121,7 +121,7 @@ resource "kubernetes_role_binding" "runner" {
subject {
kind = "ServiceAccount"
name = "test-runner"
- namespace = module.actions-runner-controller.namespace
+ namespace = module.actions_runner_controller.namespace
}
}
@@ -131,7 +131,7 @@ resource "kubectl_manifest" "runner" {
kind = "RunnerDeployment"
metadata = {
name = "test-runner"
- namespace = module.actions-runner-controller.namespace
+ namespace = module.actions_runner_controller.namespace
}
spec = {
replicas = 2
@@ -139,7 +139,7 @@ resource "kubectl_manifest" "runner" {
spec = {
repository = "infinite-automations/terraform-helm-github-actions-runner-controller"
labels = var.labels
- serviceAccountName = kubernetes_service_account.runner.metadata.0.name
+ serviceAccountName = kubernetes_service_account.runner.metadata[0].name
containerMode = "kubernetes"
workVolumeClaimTemplate = {
storageClassName = "standard"
@@ -157,7 +157,7 @@ resource "kubectl_manifest" "runner" {
}
})
depends_on = [
- module.actions-runner-controller,
+ module.actions_runner_controller,
kubernetes_service_account.runner
]
}