From d50f33ce04a9242d6c707587c5157d7a33808d2d Mon Sep 17 00:00:00 2001 From: Matthias Kay Date: Thu, 12 Oct 2023 09:29:43 +0200 Subject: [PATCH] docs: remove multi-region example (#1007) ## Description The multi region example is removed as it doesn't show any new feature but the deployment into several regions which is AWS standard and known by the users. I added a remark to the default example that multi region deployment is possible. Just to keep it in mind. --- .github/workflows/ci.yml | 1 - examples/README.md | 1 - examples/runner-default/README.md | 3 + .../runner-multi-region/.terraform-version | 1 - .../runner-multi-region/.terraform.lock.hcl | 125 -------------- examples/runner-multi-region/README.md | 125 -------------- examples/runner-multi-region/locals.tf | 6 - examples/runner-multi-region/main.tf | 155 ------------------ examples/runner-multi-region/providers.tf | 16 -- examples/runner-multi-region/variables.tf | 34 ---- examples/runner-multi-region/versions.tf | 27 --- 11 files changed, 3 insertions(+), 491 deletions(-) delete mode 100644 examples/runner-multi-region/.terraform-version delete mode 100644 examples/runner-multi-region/.terraform.lock.hcl delete mode 100644 examples/runner-multi-region/README.md delete mode 100644 examples/runner-multi-region/locals.tf delete mode 100644 examples/runner-multi-region/main.tf delete mode 100644 examples/runner-multi-region/providers.tf delete mode 100644 examples/runner-multi-region/variables.tf delete mode 100644 examples/runner-multi-region/versions.tf diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index 03531c533..69efb9b58 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -36,7 +36,6 @@ jobs: [ "runner-default", "runner-docker", - "runner-multi-region", "runner-pre-registered", "runner-public", "runner-certificates" diff --git a/examples/README.md b/examples/README.md index 30d3beba8..62bb22fd9 100644 --- a/examples/README.md +++ b/examples/README.md @@ -5,5 +5,4 @@ Please see the readme in per example for more details: - [runner-default](runner-default/) The default setup, private subnet, auto register, runner on spot instances. - [runner-public](runner-public/) Runner in a public subnet, auto register, runner on spot instances. - [runner-docker](runner-docker/) Runners run on the same instance as the agent. -- [runner-multi-region](runner-multi-region/) Runners in multiple regions. - [runner-pre-registered](runner-pre-registered) Runner needs to be preregistered, old setup DEPRECATED. diff --git a/examples/runner-default/README.md b/examples/runner-default/README.md index 51d22c3c1..37f50c913 100644 --- a/examples/runner-default/README.md +++ b/examples/runner-default/README.md @@ -13,6 +13,9 @@ This examples shows: - Additional security groups that are allowed access to the runner agent - Use of `runners.docker.services` to configure docker registry mirror (commented out - uncomment to apply) +Multi region deployment is, of course, possible. Just instantiate the module multiple times with different AWS providers. In case +you use the cache, make sure to have one cache per region. + ![runners-default](https://github.com/cattle-ops/terraform-aws-gitlab-runner/raw/main/assets/images/runner-default.png) ## Prerequisite diff --git a/examples/runner-multi-region/.terraform-version b/examples/runner-multi-region/.terraform-version deleted file mode 100644 index 589268e6f..000000000 --- a/examples/runner-multi-region/.terraform-version +++ /dev/null @@ -1 +0,0 @@ -1.3.0 \ No newline at end of file diff --git a/examples/runner-multi-region/.terraform.lock.hcl b/examples/runner-multi-region/.terraform.lock.hcl deleted file mode 100644 index d1274ec9e..000000000 --- a/examples/runner-multi-region/.terraform.lock.hcl +++ /dev/null @@ -1,125 +0,0 @@ -# This file is maintained automatically by "terraform init". -# Manual edits may be lost in future updates. - -provider "registry.terraform.io/hashicorp/archive" { - version = "2.4.0" - hashes = [ - "h1:R/tcBtwBplwtaHRfLxk+LvOwx1KaoWHUlA6jvV5rys8=", - "zh:18e408596dd53048f7fc8229098d0e3ad940b92036a24287eff63e2caec72594", - "zh:392d4216ecd1a1fd933d23f4486b642a8480f934c13e2cae3c13b6b6a7e34a7b", - "zh:655dd1fa5ca753a4ace21d0de3792d96fff429445717f2ce31c125d19c38f3ff", - "zh:70dae36c176aa2b258331ad366a471176417a94dd3b4985a911b8be9ff842b00", - "zh:78d5eefdd9e494defcb3c68d282b8f96630502cac21d1ea161f53cfe9bb483b3", - "zh:7d8c8e3925f1e21daf73f85983894fbe8868e326910e6df3720265bc657b9c9c", - "zh:a032ec0f0aee27a789726e348e8ad20778c3a1c9190ef25e7cff602c8d175f44", - "zh:b8e50de62ba185745b0fe9713755079ad0e9f7ac8638d204de6762cc36870410", - "zh:c8ad0c7697a3d444df21ff97f3473a8604c8639be64afe3f31b8ec7ad7571e18", - "zh:df736c5a2a7c3a82c5493665f659437a22f0baf8c2d157e45f4dd7ca40e739fc", - "zh:e8ffbf578a0977074f6d08aa8734e36c726e53dc79894cfc4f25fadc4f45f1df", - "zh:efea57ff23b141551f92b2699024d356c7ffd1a4ad62931da7ed7a386aef7f1f", - ] -} - -provider "registry.terraform.io/hashicorp/aws" { - version = "5.20.1" - constraints = "5.20.1" - hashes = [ - "h1:8fm4qyHhF6vQ6m4MkgOavcxN7DACfnXsvO+ASwgg4as=", - "h1:8qCC4XR9vtxvh+7bJmT/VG1BKjRbuQRR+l2mOhyiSPg=", - "h1:AGsYKj28ruqnJZYC0GQQubHX6Y/RD09BHHLbz52s9Rc=", - "h1:Bfis9dFT/Dq3tYB2X+Q3qR+x7TNwPsedANP7rLtOsvQ=", - "h1:CvAnvW3yMUiUtgbrW+XtMQoQ+V0IAsECjrUGVIPxGDM=", - "h1:IISRp8p1MdMhn/btHGDCAyTRJfGVwTN7VW0I1+M/zIE=", - "h1:Rvt7N/u29bgFKY3hnCBjM1nmjxjq3E2KuMeuep9BXKE=", - "h1:Tq7AHSP7CHgbwIywJ8yQ+LF965z+byLlJw2pqVhK89A=", - "h1:Usk+SaGwa0YO9idCISr5eSX//3rFCQb7j+Uvjf3Glag=", - "h1:biFG6mIzioqB3+ZVCzFjyb6aSXEe0M47to/ACINc0Cg=", - "h1:d1covDkGetcsYOMP6RYhsT87xvpCdD5+Pr3wTTGfzjs=", - "h1:eZ2FWMpMaBPVzbgFcoD+R8ekatsiDsO/lL9PFnY2Ou4=", - "h1:g4XG3vsiN3e/9naSqGLJT7WVzW6WOAQZ675ovUrjLtw=", - "h1:pfTJoT1WfYxOisX/eJUDma7XW4zmbQmM3/UYDb0YR+A=", - ] -} - -provider "registry.terraform.io/hashicorp/local" { - version = "2.4.0" - constraints = ">= 2.4.0, 2.4.0" - hashes = [ - "h1:7RnIbO3CFakblTJs7o0mUiY44dc9xGYsLhSNFSNS1Ds=", - "h1:R97FTYETo88sT2VHfMgkPU3lzCsZLunPftjSI5vfKe8=", - "zh:53604cd29cb92538668fe09565c739358dc53ca56f9f11312b9d7de81e48fab9", - "zh:66a46e9c508716a1c98efbf793092f03d50049fa4a83cd6b2251e9a06aca2acf", - "zh:70a6f6a852dd83768d0778ce9817d81d4b3f073fab8fa570bff92dcb0824f732", - "zh:78d5eefdd9e494defcb3c68d282b8f96630502cac21d1ea161f53cfe9bb483b3", - "zh:82a803f2f484c8b766e2e9c32343e9c89b91997b9f8d2697f9f3837f62926b35", - "zh:9708a4e40d6cc4b8afd1352e5186e6e1502f6ae599867c120967aebe9d90ed04", - "zh:973f65ce0d67c585f4ec250c1e634c9b22d9c4288b484ee2a871d7fa1e317406", - "zh:c8fa0f98f9316e4cfef082aa9b785ba16e36ff754d6aba8b456dab9500e671c6", - "zh:cfa5342a5f5188b20db246c73ac823918c189468e1382cb3c48a9c0c08fc5bf7", - "zh:e0e2b477c7e899c63b06b38cd8684a893d834d6d0b5e9b033cedc06dd7ffe9e2", - "zh:f62d7d05ea1ee566f732505200ab38d94315a4add27947a60afa29860822d3fc", - "zh:fa7ce69dde358e172bd719014ad637634bbdabc49363104f4fca759b4b73f2ce", - ] -} - -provider "registry.terraform.io/hashicorp/null" { - version = "3.2.1" - constraints = "3.2.1" - hashes = [ - "h1:FbGfc+muBsC17Ohy5g806iuI1hQc4SIexpYCrQHQd8w=", - "h1:vUW21lLLsKlxtBf0QF7LKJreKxs0CM7YXGzqW1N/ODY=", - "h1:ydA0/SNRVB1o95btfshvYsmxA+jZFRZcvKzZSB+4S1M=", - "zh:58ed64389620cc7b82f01332e27723856422820cfd302e304b5f6c3436fb9840", - "zh:62a5cc82c3b2ddef7ef3a6f2fedb7b9b3deff4ab7b414938b08e51d6e8be87cb", - "zh:63cff4de03af983175a7e37e52d4bd89d990be256b16b5c7f919aff5ad485aa5", - "zh:74cb22c6700e48486b7cabefa10b33b801dfcab56f1a6ac9b6624531f3d36ea3", - "zh:78d5eefdd9e494defcb3c68d282b8f96630502cac21d1ea161f53cfe9bb483b3", - "zh:79e553aff77f1cfa9012a2218b8238dd672ea5e1b2924775ac9ac24d2a75c238", - "zh:a1e06ddda0b5ac48f7e7c7d59e1ab5a4073bbcf876c73c0299e4610ed53859dc", - "zh:c37a97090f1a82222925d45d84483b2aa702ef7ab66532af6cbcfb567818b970", - "zh:e4453fbebf90c53ca3323a92e7ca0f9961427d2f0ce0d2b65523cc04d5d999c2", - "zh:e80a746921946d8b6761e77305b752ad188da60688cfd2059322875d363be5f5", - "zh:fbdb892d9822ed0e4cb60f2fedbdbb556e4da0d88d3b942ae963ed6ff091e48f", - "zh:fca01a623d90d0cad0843102f9b8b9fe0d3ff8244593bd817f126582b52dd694", - ] -} - -provider "registry.terraform.io/hashicorp/random" { - version = "3.5.1" - constraints = "3.5.1" - hashes = [ - "h1:0ULxM8/DscMzfiDWg1yclBf/39U44wQmlx745BfYZ80=", - "h1:3hjTP5tQBspPcFAJlfafnWrNrKnr7J4Cp0qB9jbqf30=", - "h1:6FVyQ/aG6tawPam6B+oFjgdidKd83uG9n7dOSQ66HBA=", - "h1:6ePAACdONiMGe1j5pwUc0gpDFt82y/ka0zRimMg/geM=", - "h1:BD3Y4CcrGHb9sx+Bl5V8M2PSyw23mykzXSwj+/6FhHA=", - "h1:HGeb7Tajn7HZwX0MhrdyL57LoCSz5GMcI2wbHs12D4U=", - "h1:IL9mSatmwov+e0+++YX2V6uel+dV6bn+fC/cnGDK3Ck=", - "h1:JiENkIxSWc32/2Dtd1n4CWY3ow/PHvAeGhdgcOLpWZM=", - "h1:MROYZuKGTuaTNf2FgbwCgSVpteQW25ubnb+Xfok2jvk=", - "h1:VSnd9ZIPyfKHOObuQCaKfnjIHRtR7qTw19Rz8tJxm+k=", - "h1:sZ7MTSD4FLekNN2wSNFGpM+5slfvpm5A/NLVZiB7CO0=", - ] -} - -provider "registry.terraform.io/hashicorp/tls" { - version = "4.0.4" - constraints = "4.0.4" - hashes = [ - "h1:GZcFizg5ZT2VrpwvxGBHQ/hO9r6g0vYdQqx3bFD3anY=", - "h1:pe9vq86dZZKCm+8k1RhzARwENslF3SXb9ErHbQfgjXU=", - "h1:rKKMyIEBZwR+8j6Tx3PwqBrStuH+J+pxcbCR5XN8WAw=", - "zh:23671ed83e1fcf79745534841e10291bbf34046b27d6e68a5d0aab77206f4a55", - "zh:45292421211ffd9e8e3eb3655677700e3c5047f71d8f7650d2ce30242335f848", - "zh:59fedb519f4433c0fdb1d58b27c210b27415fddd0cd73c5312530b4309c088be", - "zh:5a8eec2409a9ff7cd0758a9d818c74bcba92a240e6c5e54b99df68fff312bbd5", - "zh:5e6a4b39f3171f53292ab88058a59e64825f2b842760a4869e64dc1dc093d1fe", - "zh:810547d0bf9311d21c81cc306126d3547e7bd3f194fc295836acf164b9f8424e", - "zh:824a5f3617624243bed0259d7dd37d76017097dc3193dac669be342b90b2ab48", - "zh:9361ccc7048be5dcbc2fafe2d8216939765b3160bd52734f7a9fd917a39ecbd8", - "zh:aa02ea625aaf672e649296bce7580f62d724268189fe9ad7c1b36bb0fa12fa60", - "zh:c71b4cd40d6ec7815dfeefd57d88bc592c0c42f5e5858dcc88245d371b4b8b1e", - "zh:dabcd52f36b43d250a3d71ad7abfa07b5622c69068d989e60b79b2bb4f220316", - "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - ] -} diff --git a/examples/runner-multi-region/README.md b/examples/runner-multi-region/README.md deleted file mode 100644 index 594faf416..000000000 --- a/examples/runner-multi-region/README.md +++ /dev/null @@ -1,125 +0,0 @@ -# Example - Spot Runner - Multi-region - -In this scenario, we create multiple runner agents similarly to the _runner-public_ example but in different regions. -Runners can be created with different configuration by instantiating the module multiple times. Runners will scale -automatically based on configuration. The S3 cache can be shared cross runners by managing the cache outside the module. - -![runners-cache](https://github.com/cattle-ops/terraform-aws-gitlab-runner/raw/main/assets/images/runner-cache.png) - -This examples shows: - - - Multi-region deployment. - - Usages of public subnets. - - Usages of multiple runner instances sharing a common cache. - - Overrides for tag naming. - - Registration via GitLab token. - - Auto scaling using `docker+machine` executor. - -Note that global AWS resources like IAM policies and S3 buckets must be unique across regions. -To duplicate the Gitlab runner deployment to multiple regions, we therefore have to use the name overrides for the IAM -resources (_overrides.name_iam_objects_) respectively for the S3 cache bucket (_cache_bucket_prefix_) in the modules -_runner_main_region_ and _runner_alternate_region_. - -```hcl -# examples/runner-multi-region/main.tf -# ... - -module "runner_main_region" { - # ... - - security_group_prefix = "my-security-group" - iam_object_prefix = local.name_iam_objects_main_region # <-- - - runner_instance = { - agent_instance_prefix = "my-runner-agent" - } - - runner_worker_cache = { - include_account_id = false - bucket_prefix = local.cache_bucket_prefix_main_region # <-- - } - - runner_worker_docker_machine_instance = { - name_prefix = "my-runners-dm" - } - - # ... -} - -# ... - -module "runner_alternate_region" { - # ... - - security_group_prefix = "my-security-group" - iam_object_prefix = local.name_iam_objects_alternate_region # <-- - - runner_instance = { - agent_instance_prefix = "my-runner-agent" - } - - runner_worker_cache = { - include_account_id = false - bucket_prefix = local.cache_bucket_prefix_alternate_region # <-- - } - - runner_worker_docker_machine_instance = { - name_prefix = "my-runners-dm" - } - - # ... -} -``` - - - - - - -## Requirements - -| Name | Version | -|------|---------| -| [terraform](#requirement\_terraform) | >= 1 | -| [aws](#requirement\_aws) | 4.49.0 | -| [local](#requirement\_local) | 2.4.0 | -| [null](#requirement\_null) | 3.2.1 | -| [random](#requirement\_random) | 3.4.3 | -| [tls](#requirement\_tls) | 4.0.4 | - -## Providers - -| Name | Version | -|------|---------| -| [aws](#provider\_aws) | 4.49.0 | - -## Modules - -| Name | Source | Version | -|------|--------|---------| -| [runner\_alternate\_region](#module\_runner\_alternate\_region) | ../../ | n/a | -| [runner\_main\_region](#module\_runner\_main\_region) | ../../ | n/a | -| [vpc\_alternate\_region](#module\_vpc\_alternate\_region) | terraform-aws-modules/vpc/aws | 2.70 | -| [vpc\_main\_region](#module\_vpc\_main\_region) | terraform-aws-modules/vpc/aws | 2.70 | - -## Resources - -| Name | Type | -|------|------| -| [aws_availability_zones.available_main_region](https://registry.terraform.io/providers/hashicorp/aws/4.49.0/docs/data-sources/availability_zones) | data source | - -## Inputs - -| Name | Description | Type | Default | Required | -|------|-------------|------|---------|:--------:| -| [aws\_alternate\_region](#input\_aws\_alternate\_region) | Alternate AWS region to deploy to. | `string` | `"eu-central-1"` | no | -| [aws\_main\_region](#input\_aws\_main\_region) | Main AWS region to deploy to. | `string` | `"eu-west-1"` | no | -| [environment](#input\_environment) | A name that identifies the environment, will used as prefix and for tagging. | `string` | `"runner-public"` | no | -| [gitlab\_url](#input\_gitlab\_url) | URL of the gitlab instance to connect to. | `string` | `"https://gitlab.com"` | no | -| [registration\_token](#input\_registration\_token) | Registration token for the runner. | `string` | n/a | yes | -| [runner\_name](#input\_runner\_name) | Name of the runner, will be used in the runner config.toml | `string` | `"public-auto"` | no | - -## Outputs - -No outputs. - diff --git a/examples/runner-multi-region/locals.tf b/examples/runner-multi-region/locals.tf deleted file mode 100644 index 0463ed165..000000000 --- a/examples/runner-multi-region/locals.tf +++ /dev/null @@ -1,6 +0,0 @@ -locals { - name_iam_objects_main_region = "${var.aws_main_region}-my-runner-iam-objects" - cache_bucket_prefix_main_region = "${var.aws_main_region}-my-runner-cache-bucket" - name_iam_objects_alternate_region = "${var.aws_alternate_region}-my-runner-iam-objects" - cache_bucket_prefix_alternate_region = "${var.aws_alternate_region}-my-runner-cache-bucket" -} \ No newline at end of file diff --git a/examples/runner-multi-region/main.tf b/examples/runner-multi-region/main.tf deleted file mode 100644 index add12892e..000000000 --- a/examples/runner-multi-region/main.tf +++ /dev/null @@ -1,155 +0,0 @@ -data "aws_availability_zones" "available_main_region" { - state = "available" -} - -# VPC Flow logs are not needed here -# kics-scan ignore-line -module "vpc_main_region" { - source = "terraform-aws-modules/vpc/aws" - version = "5.1.2" - - name = "vpc-${var.environment}" - cidr = "10.1.0.0/16" - - azs = [data.aws_availability_zones.available_main_region.names[0]] - private_subnets = ["10.0.1.0/24"] - public_subnets = ["10.0.101.0/24"] - map_public_ip_on_launch = false - - enable_nat_gateway = true - single_nat_gateway = true - - - tags = { - Environment = var.environment - } -} - -module "runner_main_region" { - source = "../../" - - vpc_id = module.vpc_main_region.vpc_id - subnet_id = element(module.vpc_main_region.public_subnets, 0) - environment = var.environment - - security_group_prefix = "my-security-group" - iam_object_prefix = local.name_iam_objects_main_region - - runner_instance = { - name = var.runner_name - name_prefix = "my-runner-agent" - } - - runner_gitlab = { - url = var.gitlab_url - } - - runner_gitlab_registration_config = { - registration_token = var.registration_token - tag_list = "docker_spot_runner" - description = "runner public - auto" - locked_to_project = "false" - run_untagged = "false" - maximum_timeout = "3600" - } - - runner_worker = { - environment_variables = ["KEY=Value", "FOO=bar"] - } - - runner_worker_cache = { - shared = "true" - bucket_prefix = local.cache_bucket_prefix_main_region - include_account_id = false - } - - runner_worker_docker_options = { - privileged = "false" - volumes = ["/cache", "/var/run/docker.sock:/var/run/docker.sock"] - } - - runner_worker_docker_machine_instance = { - private_address_only = false - name_prefix = "my-runners-dm" - } -} - -# VPC Flow logs are not needed here -# kics-scan ignore-line -module "vpc_alternate_region" { - source = "terraform-aws-modules/vpc/aws" - version = "5.1.2" - - name = "vpc-${var.environment}" - cidr = "10.1.0.0/16" - - # Have to construct the zone names here because the data source always uses the main region - azs = ["${var.aws_alternate_region}a", "${var.aws_alternate_region}b", "${var.aws_alternate_region}c"] - private_subnets = ["10.0.1.0/24"] - public_subnets = ["10.0.101.0/24"] - map_public_ip_on_launch = false - - enable_nat_gateway = true - single_nat_gateway = true - - tags = { - Environment = var.environment - } - - providers = { - aws = aws.alternate_region - } -} - -module "runner_alternate_region" { - source = "../../" - - vpc_id = module.vpc_alternate_region.vpc_id - subnet_id = element(module.vpc_alternate_region.public_subnets, 0) - environment = var.environment - - security_group_prefix = "my-security-group" - iam_object_prefix = local.name_iam_objects_alternate_region # <-- - - runner_gitlab = { - url = var.gitlab_url - } - - runner_gitlab_registration_config = { - registration_token = var.registration_token - tag_list = "docker_spot_runner" - description = "runner public - auto" - locked_to_project = "true" - run_untagged = "false" - maximum_timeout = "3600" - access_level = "ref_protected" - } - - runner_instance = { - name = var.runner_name - name_prefix = "my-runner-agent" - } - - runner_worker = { - environment_variables = ["KEY=Value", "FOO=bar"] - } - - runner_worker_cache = { - shared = "true" - bucket_prefix = local.cache_bucket_prefix_alternate_region - } - - runner_worker_docker_options = { - privileged = "false" - volumes = ["/var/run/docker.sock:/var/run/docker.sock"] - } - - runner_worker_docker_machine_instance = { - private_address_only = false - name_prefix = "my-runners-dm" - } - - providers = { - aws = aws.alternate_region - } -} diff --git a/examples/runner-multi-region/providers.tf b/examples/runner-multi-region/providers.tf deleted file mode 100644 index 893c223db..000000000 --- a/examples/runner-multi-region/providers.tf +++ /dev/null @@ -1,16 +0,0 @@ -provider "aws" { - region = var.aws_main_region -} - -provider "aws" { - region = var.aws_alternate_region - alias = "alternate_region" -} - -provider "local" {} - -provider "null" {} - -provider "tls" {} - -provider "random" {} diff --git a/examples/runner-multi-region/variables.tf b/examples/runner-multi-region/variables.tf deleted file mode 100644 index 0eee66ea3..000000000 --- a/examples/runner-multi-region/variables.tf +++ /dev/null @@ -1,34 +0,0 @@ -variable "aws_main_region" { - description = "Main AWS region to deploy to." - type = string - default = "eu-west-1" -} - -variable "aws_alternate_region" { - description = "Alternate AWS region to deploy to." - type = string - default = "eu-central-1" -} - -variable "environment" { - description = "A name that identifies the environment, will used as prefix and for tagging." - default = "runner-public" - type = string -} - -variable "runner_name" { - description = "Name of the runner, will be used in the runner config.toml" - type = string - default = "public-auto" -} - -variable "gitlab_url" { - description = "URL of the gitlab instance to connect to." - type = string - default = "https://gitlab.com" -} - -variable "registration_token" { - description = "Registration token for the runner." - type = string -} diff --git a/examples/runner-multi-region/versions.tf b/examples/runner-multi-region/versions.tf deleted file mode 100644 index 451ec2e4f..000000000 --- a/examples/runner-multi-region/versions.tf +++ /dev/null @@ -1,27 +0,0 @@ - -terraform { - required_version = ">= 1.3" - - required_providers { - aws = { - source = "hashicorp/aws" - version = "5.20.1" - } - local = { - source = "hashicorp/local" - version = "2.4.0" - } - null = { - source = "hashicorp/null" - version = "3.2.1" - } - tls = { - source = "hashicorp/tls" - version = "4.0.4" - } - random = { - source = "hashicorp/random" - version = "3.5.1" - } - } -}