changed-files
runner-images
Our great sponsors
changed-files | runner-images | |
---|---|---|
6 | 48 | |
1,465 | 8,852 | |
6.1% | 3.5% | |
9.8 | 9.8 | |
2 days ago | 2 days ago | |
TypeScript | PowerShell | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
changed-files
-
Why it is Important to Update Linters and How to Do it Right
We need to add two additional steps. The first one is to retrieve all new files, and the second one is to run the enhanced config only on the new files. In this example the third-party GitHub Action called changed-files is used to obtain the new files. In the GitHub Marketplace for Actions, there is a considerable number of similar actions with similar functionality. You can choose the one that suits you best, as the functionality is more or less the same for all of them.
-
Attempting a larger bug fix II - Execution
I determined this after dozens of attempts working with the other GitHub Action, tj-actions/changed-files which feeds a list of modified files to clang-format-lint.
-
Yarn workspaces/monorepo and CI/CD
GitHub actions has actions that do similar, I’ve used this one before with great success: https://github.com/tj-actions/changed-files
-
Turborepo + GitHub Actions
You could also clean up your changed files job by using this (https://github.com/tj-actions/changed-files) or something similar. That would at least make it easier to understand what it's supposed to be doing. You can use it to get the directories containing any changed package.json files. Then use that output as as a matrix input.
- GitHub Actions Pitfalls
runner-images
-
We Executed a Critical Supply Chain Attack on PyTorch
Oh, you'll like this one then. Until 3 months ago GitHub's Runner images was pulling a package directly from Aliyun's CDN. This was executed during image testing (version check). So anyone with the ability to modify Aliyun's CDN in China could have carried out a pretty nasty attack. https://github.com/actions/runner-images/commit/6a9890362738...
Now it's just anyone with write access to Aliyun's repository. :) (p.s. GitHub doesn't consider this a security issue).
Whoa, there's a lot of stuff in there [1] that gets installed straight from vendors, without pinning content checksums to a value known-good to Github.
I get it, they want to have the latest versions instead of depending on how long Ubuntu (or, worse, Debian) package maintainers take to package stuff into their mainline repositories... but this attack surface is nuts.
[1] https://github.com/actions/runner-images/tree/main/images/ub...
-
Terraform module for scalable GitHub action runners on AWS
I had a similar experience with ARC (actions-runner-controller).
One of the machines in the fleet failed to sync its clock via NTP. Once a job X got scheduled to it, the runner pod failed authentication due to incorrect clock time, and then the whole ARC system started to behave incorrectly: job X was stuck without runners, until another workflow job Y was created, and then X got run but Y became stuck. There were also other wierd behaviors like this so I eventually rebuilt everything based on VMs and stopped using ARC.
Using VMs also allowed me to support the use of the official runner images [0], which is good for compatibility.
I feel more people would benefit from managed "self-hosted" runners, so I started DimeRun [1] to provide cheaper GHA runners for people who don't have the time/willingness to troubleshoot low-level infra issues.
-
macOS Containers v0.0.1
Reminds me: Still waiting for native ARM support on GitHub Actions https://github.com/actions/runner-images/issues/5631
-
failed apt install intel-media-va-driver
seems it's also recommended for actions. https://github.com/actions/runner-images/issues/2924
-
Github Action would not work for ipv6 only server
https://github.com/actions/runner-images/issues/668 Things like that make make me think "enterprise" in "IT" is actually a excuse to be slow ... and thats the kind of stuff people think they need to go from "on-premise" to "cloud" instead of fixing their stuff.
-
Imaging ADO build agent with python dependencies installed
Repo with how microsoft does it for the microsoft hosted agents: https://github.com/actions/runner-images
- Can I publish and release a .NET Service with an installation executable on GitHub?
-
MS hosted agents as my own
I am not sure what you mean, this source code for image runner that is building VMs with all required applications. This VMs are used with github actions or in Azure DevOPS as Microsoft hosted images. Also creating VMs with this code complex no an easy task. We have created heavy modified pipeline based on this https://github.com/actions/runner-images/tree/main/images.CI/linux-and-win/azure-pipelines and are building new image every month but this is very complex a complicated task. But I don't work with AKS or docker to help you with your question.
I was wondering how to use MS repo Here were are definitions of MS hosted agents. The case is I would like to use it as my own agents on AKS cluster. Does anyone tried to do this and be able to create docker image base on this repo? Any help would be appreciated.
What are some alternatives?
jellyscrub - Smooth mouse-over video scrubbing previews for Jellyfin.
paths-filter - Conditionally run actions based on files modified by PR, feature branch or pushed commits
actionlint - :octocat: Static checker for GitHub Actions workflow files
json-tidy - Pretty prints JSON from stdin, files, or URLs
Image-Optimizer-Action - A Github Action to optimize / compress images in your repository
combine-prs-workflow - Combine/group together PRs (for example from Dependabot and similar services)
pretty - Efficient JSON beautifier and compactor for Go
runner - The Runner for GitHub Actions :rocket:
just - 🤖 Just a command runner
template.github.semver - Template for Projects that use Github Actions and Hooks to enforce Semantic Versioning
Mono - Mono open source ECMA CLI, C# and .NET implementation.