apiVersion: v1
data:
check-live: "#!/bin/bash\nif /usr/bin/pgrep -f .*register-the-runner; then\n exit\
\ 0\nelif /usr/bin/pgrep gitlab.*runner; then\n exit 0\nelse\n exit 1\nfi\n"
config.template.toml: "[[runners]]\n environment = [\"DOCKER_HOST=tcp://docker:2376\"\
, \"DOCKER_TLS_CERTDIR=/certs\", \"DOCKER_TLS_VERIFY=1\", \"DOCKER_CERT_PATH=$DOCKER_TLS_CERTDIR/client\"\
]\n pre_build_script = \"\"\"\n if command -v docker &> /dev/null\n then\n\
\ echo \"docker command found\"\n until docker info; do sleep 1; done\n\
\ fi\n \"\"\"\n [runners.kubernetes]\n image = \"alpine:latest\"\n privileged\
\ = true\n helper_memory_limit = \"1Gi\"\n [[runners.kubernetes.volumes.empty_dir]]\n\
\ name = \"docker-certs\"\n mount_path = \"/certs/client\"\n medium =\
\ \"Memory\""
config.toml: 'concurrent = 10
check_interval = 5
log_level = "info"
'
entrypoint: "#!/bin/bash\nset -e\n\nmkdir -p /home/gitlab-runner/.gitlab-runner/\n\
\ncp /configmaps/config.toml /home/gitlab-runner/.gitlab-runner/\n\n# Set up environment\
\ variables for cache\nif [[ -f /secrets/accesskey && -f /secrets/secretkey ]];\
\ then\n export CACHE_S3_ACCESS_KEY=$(cat /secrets/accesskey)\n export CACHE_S3_SECRET_KEY=$(cat\
\ /secrets/secretkey)\nfi\n\nif [[ -f /secrets/gcs-applicaton-credentials-file\
\ ]]; then\n export GOOGLE_APPLICATION_CREDENTIALS=\"/secrets/gcs-applicaton-credentials-file\"\
\nelif [[ -f /secrets/gcs-application-credentials-file ]]; then\n export GOOGLE_APPLICATION_CREDENTIALS=\"\
/secrets/gcs-application-credentials-file\"\nelse\n if [[ -f /secrets/gcs-access-id\
\ && -f /secrets/gcs-private-key ]]; then\n export CACHE_GCS_ACCESS_ID=$(cat\
\ /secrets/gcs-access-id)\n # echo -e used to make private key multiline (in\
\ google json auth key private key is oneline with \\n)\n export CACHE_GCS_PRIVATE_KEY=$(echo\
\ -e $(cat /secrets/gcs-private-key))\n fi\nfi\n\nif [[ -f /secrets/azure-account-name\
\ && -f /secrets/azure-account-key ]]; then\n export CACHE_AZURE_ACCOUNT_NAME=$(cat\
\ /secrets/azure-account-name)\n export CACHE_AZURE_ACCOUNT_KEY=$(cat /secrets/azure-account-key)\n\
fi\n\nif [[ -f /secrets/runner-registration-token ]]; then\n export REGISTRATION_TOKEN=$(cat\
\ /secrets/runner-registration-token)\nfi\n\nif [[ -f /secrets/runner-token ]];\
\ then\n export CI_SERVER_TOKEN=$(cat /secrets/runner-token)\nfi\n\n# Validate\
\ this also at runtime in case the user has set a custom secret\nif [[ ! -z \"\
$CI_SERVER_TOKEN\" && \"1\" -ne \"1\" ]]; then\n echo \"Using a runner token\
\ with more than 1 replica is not supported.\"\n exit 1\nfi\n\n# Register the\
\ runner\nif ! sh /configmaps/register-the-runner; then\n exit 1\nfi\n\n# Run\
\ pre-entrypoint-script\nif ! bash /configmaps/pre-entrypoint-script; then\n \
\ exit 1\nfi\n\n# Start the runner\nexec /entrypoint run --user=gitlab-runner\
\ \\\n --working-directory=/home/gitlab-runner\n"
pre-entrypoint-script: ''
register-the-runner: "#!/bin/bash\nMAX_REGISTER_ATTEMPTS=30\n\nfor i in $(seq 1\
\ \"${MAX_REGISTER_ATTEMPTS}\"); do\n echo \"Registration attempt ${i} of ${MAX_REGISTER_ATTEMPTS}\"\
\n /entrypoint register \\\n --template-config /configmaps/config.template.toml\
\ \\\n --non-interactive\n\n retval=$?\n\n if [ ${retval} = 0 ]; then\n \
\ break\n elif [ ${i} = ${MAX_REGISTER_ATTEMPTS} ]; then\n exit 1\n fi\n\
\n sleep 5\ndone\n\nexit 0\n"
kind: ConfigMap
metadata:
annotations:
kubectl.kubernetes.io/last-applied-configuration: '{"apiVersion":"v1","data":{"check-live":"#!/bin/bash\nif
/usr/bin/pgrep -f .*register-the-runner; then\n exit 0\nelif /usr/bin/pgrep
gitlab.*runner; then\n exit 0\nelse\n exit 1\nfi\n","config.template.toml":"[[runners]]\n environment
= [\"DOCKER_HOST=tcp://docker:2376\", \"DOCKER_TLS_CERTDIR=/certs\", \"DOCKER_TLS_VERIFY=1\",
\"DOCKER_CERT_PATH=$DOCKER_TLS_CERTDIR/client\"]\n pre_build_script = \"\"\"\n if
command -v docker \u0026\u003e /dev/null\n then\n echo \"docker command
found\"\n until docker info; do sleep 1; done\n fi\n \"\"\"\n [runners.kubernetes]\n image
= \"alpine:latest\"\n privileged = true\n helper_memory_limit = \"1Gi\"\n [[runners.kubernetes.volumes.empty_dir]]\n name
= \"docker-certs\"\n mount_path = \"/certs/client\"\n medium = \"Memory\"","config.toml":"concurrent
= 10\ncheck_interval = 5\nlog_level = \"info\"\n","entrypoint":"#!/bin/bash\nset
-e\n\nmkdir -p /home/gitlab-runner/.gitlab-runner/\n\ncp /configmaps/config.toml
/home/gitlab-runner/.gitlab-runner/\n\n# Set up environment variables for cache\nif
[[ -f /secrets/accesskey \u0026\u0026 -f /secrets/secretkey ]]; then\n export
CACHE_S3_ACCESS_KEY=$(cat /secrets/accesskey)\n export CACHE_S3_SECRET_KEY=$(cat
/secrets/secretkey)\nfi\n\nif [[ -f /secrets/gcs-applicaton-credentials-file
]]; then\n export GOOGLE_APPLICATION_CREDENTIALS=\"/secrets/gcs-applicaton-credentials-file\"\nelif
[[ -f /secrets/gcs-application-credentials-file ]]; then\n export GOOGLE_APPLICATION_CREDENTIALS=\"/secrets/gcs-application-credentials-file\"\nelse\n if
[[ -f /secrets/gcs-access-id \u0026\u0026 -f /secrets/gcs-private-key ]]; then\n export
CACHE_GCS_ACCESS_ID=$(cat /secrets/gcs-access-id)\n # echo -e used to make
private key multiline (in google json auth key private key is oneline with \\n)\n export
CACHE_GCS_PRIVATE_KEY=$(echo -e $(cat /secrets/gcs-private-key))\n fi\nfi\n\nif
[[ -f /secrets/azure-account-name \u0026\u0026 -f /secrets/azure-account-key
]]; then\n export CACHE_AZURE_ACCOUNT_NAME=$(cat /secrets/azure-account-name)\n export
CACHE_AZURE_ACCOUNT_KEY=$(cat /secrets/azure-account-key)\nfi\n\nif [[ -f /secrets/runner-registration-token
]]; then\n export REGISTRATION_TOKEN=$(cat /secrets/runner-registration-token)\nfi\n\nif
[[ -f /secrets/runner-token ]]; then\n export CI_SERVER_TOKEN=$(cat /secrets/runner-token)\nfi\n\n#
Validate this also at runtime in case the user has set a custom secret\nif [[
! -z \"$CI_SERVER_TOKEN\" \u0026\u0026 \"1\" -ne \"1\" ]]; then\n echo \"Using
a runner token with more than 1 replica is not supported.\"\n exit 1\nfi\n\n#
Register the runner\nif ! sh /configmaps/register-the-runner; then\n exit 1\nfi\n\n#
Run pre-entrypoint-script\nif ! bash /configmaps/pre-entrypoint-script; then\n exit
1\nfi\n\n# Start the runner\nexec /entrypoint run --user=gitlab-runner \\\n --working-directory=/home/gitlab-runner\n","pre-entrypoint-script":"","register-the-runner":"#!/bin/bash\nMAX_REGISTER_ATTEMPTS=30\n\nfor
i in $(seq 1 \"${MAX_REGISTER_ATTEMPTS}\"); do\n echo \"Registration attempt
${i} of ${MAX_REGISTER_ATTEMPTS}\"\n /entrypoint register \\\n --template-config
/configmaps/config.template.toml \\\n --non-interactive\n\n retval=$?\n\n if
[ ${retval} = 0 ]; then\n break\n elif [ ${i} = ${MAX_REGISTER_ATTEMPTS}
]; then\n exit 1\n fi\n\n sleep 5\ndone\n\nexit 0\n"},"kind":"ConfigMap","metadata":{"annotations":{},"labels":{"app":"gitlab-com-gitlab-runner-gitlab-runner","app.kubernetes.io/instance":"gitlab-com-gitlab-runner","chart":"gitlab-runner-0.47.0","heritage":"Helm","release":"gitlab-com-gitlab-runner"},"name":"gitlab-com-gitlab-runner-gitlab-runner","namespace":"gitlab-runner-gitlab-com"}}
'
creationTimestamp: '2021-08-30T18:59:24Z'
labels:
app: gitlab-com-gitlab-runner-gitlab-runner
app.kubernetes.io/instance: gitlab-com-gitlab-runner
chart: gitlab-runner-0.47.0
heritage: Helm
release: gitlab-com-gitlab-runner
managedFields:
- apiVersion: v1
fieldsType: FieldsV1
fieldsV1:
f:data:
.: {}
f:check-live: {}
f:config.template.toml: {}
f:config.toml: {}
f:entrypoint: {}
f:pre-entrypoint-script: {}
f:register-the-runner: {}
f:metadata:
f:annotations:
.: {}
f:kubectl.kubernetes.io/last-applied-configuration: {}
f:labels:
.: {}
f:app: {}
f:app.kubernetes.io/instance: {}
f:chart: {}
f:heritage: {}
f:release: {}
manager: argocd-application-controller
operation: Update
time: '2022-11-24T17:11:56Z'
name: gitlab-com-gitlab-runner-gitlab-runner
namespace: gitlab-runner-gitlab-com
resourceVersion: '1032362171'
uid: 857451d8-fe80-4e43-a410-093fada5f6a7