Newer
Older

Blane Staskiewicz
committed
 
Greg Miernicki
committed
* <https://gitlab.com/gitlab-org/gitlab-runner>
## Learn More
* [Application Overview](docs/overview.md)
* [Other Documentation](docs/)
## Pre-Requisites
* Kubernetes Cluster deployed
* Kubernetes config installed in `~/.kube/config`
* Helm installed
Install Helm
https://helm.sh/docs/intro/install/
## Deployment
* Clone down the repository
* cd into directory
```bash
helm install gitlab-runner chart/
```
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| image.registry | string | `"registry1.dso.mil"` | |
| image.image | string | `"ironbank/gitlab/gitlab-runner/gitlab-runner"` | |
| image.tag | string | `"v15.11.0"` | |
| imagePullPolicy | string | `"IfNotPresent"` | |
| gitlabUrl | string | `"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181"` | |
| terminationGracePeriodSeconds | int | `3600` | |
| concurrent | int | `50` | |
| checkInterval | int | `30` | |
| sessionServer.enabled | bool | `false` | |
| rbac.create | bool | `true` | |
| rbac.rules | list | `[]` | |
| rbac.clusterWideAccess | bool | `false` | |
| rbac.podSecurityPolicy.enabled | bool | `false` | |
| rbac.podSecurityPolicy.resourceNames[0] | string | `"gitlab-runner"` | |
| metrics.serviceMonitor.enabled | bool | `false` | |
| service.enabled | bool | `true` | |
| service.type | string | `"ClusterIP"` | |
| runners.job.registry | string | `"registry1.dso.mil"` | |
| runners.job.repository | string | `"ironbank/redhat/ubi/ubi8"` | |

bigbang bot
committed
| runners.job.tag | string | `"8.7"` | |
| runners.helper.registry | string | `"registry1.dso.mil"` | |
| runners.helper.repository | string | `"ironbank/gitlab/gitlab-runner/gitlab-runner-helper"` | |
| runners.config | string | `"[[runners]]\n clone_url = \"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181\"\n cache_dir = \"/tmp/gitlab-runner/cache\"\n [runners.kubernetes]\n namespace = \"{{.Release.Namespace}}\"\n image = \"{{ printf \"%s/%s:%s\" .Values.runners.job.registry .Values.runners.job.repository .Values.runners.job.tag }}\"\n helper_image = \"{{ printf \"%s/%s:%s\" .Values.runners.helper.registry .Values.runners.helper.repository .Values.runners.helper.tag }}\"\n image_pull_secrets = [\"private-registry\"]\n [runners.kubernetes.pod_labels]\n \"job_id\" = \"${CI_JOB_ID}\"\n \"job_name\" = \"${CI_JOB_NAME}\"\n \"pipeline_id\" = \"${CI_PIPELINE_ID}\"\n"` | |
| runners.locked | bool | `false` | |
| runners.runUntagged | bool | `true` | |
| runners.protected | bool | `true` | |
| runners.secret | string | `"gitlab-gitlab-runner-secret"` | |
| runners.cache | object | `{}` | |
| runners.builds | object | `{}` | |
| runners.services | object | `{}` | |
| runners.helpers | object | `{}` | |
Greg Miernicki
committed
| securityContext.allowPrivilegeEscalation | bool | `false` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| securityContext.runAsNonRoot | bool | `true` | |
| securityContext.privileged | bool | `false` | |
| securityContext.capabilities.drop[0] | string | `"ALL"` | |
| podSecurityContext.runAsUser | int | `1001` | |
Greg Miernicki
committed
| podSecurityContext.fsGroup | int | `65533` | |
| containerSecurityContext.capabilities.drop[0] | string | `"ALL"` | |
| resources.limits.memory | string | `"256Mi"` | |
| resources.limits.cpu | string | `"200m"` | |
| resources.requests.memory | string | `"256Mi"` | |
| resources.requests.cpu | string | `"200m"` | |
| affinity | object | `{}` | |
| nodeSelector | object | `{}` | |
| tolerations | list | `[]` | |
| hostAliases | list | `[]` | |
| podAnnotations | object | `{}` | |
| podLabels | object | `{}` | |
Greg Miernicki
committed
| priorityClassName | string | `""` | |
| secrets | list | `[]` | |
| configMaps | object | `{}` | |
Greg Miernicki
committed
| volumeMounts | list | `[]` | |
| volumes | list | `[]` | |
| istio.enabled | bool | `false` | |
| istio.injection | string | `"disabled"` | |
| istio.mtls | object | `{"mode":"STRICT"}` | Default peer authentication |
| istio.mtls.mode | string | `"STRICT"` | STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic |
| monitoring.enabled | bool | `false` | |
| networkPolicies.controlPlaneCidr | string | `"0.0.0.0/0"` | |
| networkPolicies.additionalPolicies | list | `[]` | |
| bbtests.enabled | bool | `false` | |
| bbtests.cypress.artifacts | bool | `true` | |
| bbtests.cypress.envs.cypress_baseUrl | string | `"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181"` | |
| bbtests.cypress.envs.cypress_gitlab_first_name | string | `"testrunner"` | |
| bbtests.cypress.envs.cypress_gitlab_last_name | string | `"userrunner"` | |
| bbtests.cypress.envs.cypress_gitlab_username | string | `"gitlabrunner_user"` | |
| bbtests.cypress.envs.cypress_gitlab_password | string | `"Runner_PaSsw0rd123"` | |
| bbtests.cypress.envs.cypress_gitlab_email | string | `"gitlab@bigbang.dev"` | |
| bbtests.cypress.envs.cypress_gitlab_project | string | `"runner-hello-world"` | |
| bbtests.cypress.secretEnvs[0].name | string | `"cypress_adminpassword"` | |
| bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.name | string | `"gitlab-gitlab-initial-root-password"` | |
| bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.key | string | `"password"` | |
## Contributing
Please see the [contributing guide](./CONTRIBUTING.md) if you are interested in contributing.