Newer
Older
<!-- Warning: Do not manually edit this file. See notes on gluon + helm-docs at the end of this file for more information. -->
  
Greg Miernicki
committed
* <https://gitlab.com/gitlab-org/gitlab-runner>
## Upstream Release Notes

Daniel Pritchett
committed
- [Find our upstream chart's CHANGELOG here](https://gitlab.com/gitlab-org/charts/gitlab-runner/-/blob/v0.67.1/CHANGELOG.md)
- [and our upstream application release notes here](https://gitlab.com/gitlab-org/charts/gitlab-runner/-/blob/v0.67.1/CHANGELOG.md?ref_type=tags#v0671-2024-07-26)

Daniel Pritchett
committed
- [Application Overview](docs/overview.md)
- [Other Documentation](docs/)
- Kubernetes Cluster deployed
- Kubernetes config installed in `~/.kube/config`
- Helm installed
https://helm.sh/docs/intro/install/
- Clone down the repository
- cd into directory
```bash
helm install gitlab-runner chart/
```
## Values
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| image.registry | string | `"registry1.dso.mil"` | |
| image.image | string | `"ironbank/gitlab/gitlab-runner/gitlab-runner"` | |
| livenessProbe | object | `{}` | |
| readinessProbe | object | `{}` | |
| gitlabUrl | string | `"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181"` | |
| unregisterRunners | bool | `true` | |
| terminationGracePeriodSeconds | int | `3600` | |
| concurrent | int | `50` | |
| shutdown_timeout | int | `0` | |
| sessionServer.enabled | bool | `false` | |
| sessionServer.serviceType | string | `"LoadBalancer"` | |
| rbac.rules | list | `[]` | |
| rbac.clusterWideAccess | bool | `false` | |
| rbac.podSecurityPolicy.enabled | bool | `false` | |
| rbac.podSecurityPolicy.resourceNames[0] | string | `"gitlab-runner"` | |
| rbac.imagePullSecrets | list | `[]` | |
| serviceAccount.name | string | `""` | |
| serviceAccount.annotations | object | `{}` | |
| serviceAccount.imagePullSecrets | list | `[]` | |
| metrics.serviceMonitor.enabled | bool | `false` | |
| service.enabled | bool | `true` | |
| service.type | string | `"ClusterIP"` | |
| runners.job.registry | string | `"registry1.dso.mil"` | |
| runners.job.repository | string | `"ironbank/redhat/ubi/ubi9"` | |
| runners.helper.registry | string | `"registry1.dso.mil"` | |
| runners.helper.repository | string | `"ironbank/gitlab/gitlab-runner/gitlab-runner-helper"` | |
| runners.helper.tag | string | `"v17.3.1"` | |
| runners.config | string | `"[[runners]]\n clone_url = \"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181\"\n cache_dir = \"/tmp/gitlab-runner/cache\"\n [runners.kubernetes]\n pull_policy = \"always\"\n namespace = \"{{.Release.Namespace}}\"\n image = \"{{ printf \"%s/%s:%s\" .Values.runners.job.registry .Values.runners.job.repository .Values.runners.job.tag }}\"\n helper_image = \"{{ printf \"%s/%s:%s\" .Values.runners.helper.registry .Values.runners.helper.repository .Values.runners.helper.tag }}\"\n image_pull_secrets = [\"private-registry\"]\n [runners.kubernetes.pod_security_context]\n run_as_non_root = true\n run_as_user = 1001\n [runners.kubernetes.helper_container_security_context]\n run_as_non_root = true\n run_as_user = 1001\n [runners.kubernetes.pod_labels]\n \"job_id\" = \"${CI_JOB_ID}\"\n \"job_name\" = \"${CI_JOB_NAME}\"\n \"pipeline_id\" = \"${CI_PIPELINE_ID}\"\n \"app\" = \"gitlab-runner\"\n"` | |
| runners.configPath | string | `""` | |
| runners.locked | bool | `true` | |
| runners.secret | string | `"gitlab-gitlab-runner-secret"` | |
| runners.cache | object | `{}` | |
| runners.builds | object | `{}` | |
| runners.services | object | `{}` | |
| runners.helpers | object | `{}` | |
| topologySpreadConstraints | object | `{}` | |
Greg Miernicki
committed
| securityContext.allowPrivilegeEscalation | bool | `false` | |
| securityContext.readOnlyRootFilesystem | bool | `false` | |
| securityContext.runAsNonRoot | bool | `true` | |
| securityContext.runAsUser | int | `1001` | |
| securityContext.runAsGroup | int | `1001` | |
Greg Miernicki
committed
| securityContext.privileged | bool | `false` | |
| securityContext.capabilities.drop[0] | string | `"ALL"` | |
| strategy | object | `{}` | |
| podSecurityContext.runAsUser | int | `1001` | |
| podSecurityContext.runAsNonRoot | bool | `true` | |
Greg Miernicki
committed
| podSecurityContext.fsGroup | int | `65533` | |
| containerSecurityContext.runAsNonRoot | bool | `true` | |
| capabilities.drop[0] | string | `"ALL"` | |
| resources.limits.memory | string | `"256Mi"` | |
| resources.limits.cpu | string | `"200m"` | |
| resources.requests.memory | string | `"256Mi"` | |
| resources.requests.cpu | string | `"200m"` | |
| affinity | object | `{}` | |
| nodeSelector | object | `{}` | |
| tolerations | list | `[]` | |
| extraEnv | object | `{}` | |
| extraEnvFrom | object | `{}` | |
| deploymentAnnotations | object | `{}` | |
| deploymentLabels | object | `{}` | |
| deploymentLifecycle | object | `{}` | |
| podAnnotations | object | `{}` | |
| podLabels | object | `{}` | |
Greg Miernicki
committed
| priorityClassName | string | `""` | |
| secrets | list | `[]` | |
| configMaps | object | `{}` | |
Greg Miernicki
committed
| volumeMounts | list | `[]` | |
| volumes | list | `[]` | |
| extraObjects | list | `[]` | |
| istio.enabled | bool | `false` | |
| istio.injection | string | `"disabled"` | |
| istio.hardened.enabled | bool | `false` | |
| istio.hardened.outboundTrafficPolicyMode | string | `"REGISTRY_ONLY"` | |
| istio.hardened.customServiceEntries | list | `[]` | |
| istio.hardened.customAuthorizationPolicies | list | `[]` | |
| istio.hardened.gitlab.enabled | bool | `true` | |
| istio.hardened.gitlab.namespaces[0] | string | `"gitlab"` | |
| istio.hardened.monitoring.enabled | bool | `true` | |
| istio.hardened.monitoring.namespaces[0] | string | `"monitoring"` | |
| istio.hardened.monitoring.principals[0] | string | `"cluster.local/ns/monitoring/sa/monitoring-grafana"` | |
| istio.hardened.monitoring.principals[1] | string | `"cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-alertmanager"` | |
| istio.hardened.monitoring.principals[2] | string | `"cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-operator"` | |
| istio.hardened.monitoring.principals[3] | string | `"cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-prometheus"` | |
| istio.hardened.monitoring.principals[4] | string | `"cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-state-metrics"` | |
| istio.hardened.monitoring.principals[5] | string | `"cluster.local/ns/monitoring/sa/monitoring-monitoring-prometheus-node-exporter"` | |
| istio.mtls | object | `{"mode":"STRICT"}` | Default peer authentication |
| istio.mtls.mode | string | `"STRICT"` | STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic |
| monitoring.enabled | bool | `false` | |
| networkPolicies.controlPlaneCidr | string | `"0.0.0.0/0"` | |
| networkPolicies.kubeAPIPort | string | `""` | Kube API Port, defaults to 443 and 6443 within the template but can be set to custom port The port where the Kubernetes API server listens for secure connections. |
| networkPolicies.additionalPolicies | list | `[]` | |
| autoRegister.selectorLabels | object | `{}` | |
| bbtests.enabled | bool | `false` | |
| bbtests.cypress.artifacts | bool | `true` | |
| bbtests.cypress.envs.cypress_url | string | `"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181"` | |
| bbtests.cypress.envs.cypress_gitlab_project | string | `"runner-hello-world"` | |
| bbtests.cypress.secretEnvs[0].name | string | `"cypress_adminpassword"` | |
| bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.name | string | `"gitlab-gitlab-initial-root-password"` | |
| bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.key | string | `"password"` | |
| openshift | bool | `false` | |
## Contributing
Please see the [contributing guide](./CONTRIBUTING.md) if you are interested in contributing.
---
_This file is programatically generated using `helm-docs` and some BigBang-specific templates. The `gluon` repository has [instructions for regenerating package READMEs](https://repo1.dso.mil/big-bang/product/packages/gluon/-/blob/master/docs/bb-package-readme.md)._