Dockerfile
to create a Docker container base image for gitlab-ci-multi-runner. Use this image to build your CI runner images.
If you find this image useful here's how you can help:
- Send a pull request with your awesome features and bug fixes
- Help users resolve their issues.
- Support the development of this image with a donation
Before reporting your issue please try updating Docker to the latest version and check if it resolves the issue. Refer to the Docker installation guide for instructions.
SELinux users should try disabling SELinux using the command setenforce 0
to see if it resolves the issue.
If the above recommendations do not help then report your issue along with the following information:
- Output of the
docker version
anddocker info
commands - The
docker run
command ordocker-compose.yml
used to start the image. Mask out the sensitive bits. - Please state if you are using Boot2Docker, VirtualBox, etc.
Automated builds of the image are available on Dockerhub and is the recommended method of installation.
Note: Builds are also available on Quay.io
docker pull sameersbn/gitlab-ci-multi-runner:1.8.0
Alternatively you can build the image yourself.
docker build -t sameersbn/gitlab-ci-multi-runner github.com/sameersbn/docker-gitlab-ci-multi-runner
Before a runner can process your CI jobs, it needs to be authorized to access the the GitLab CI server. The CI_SERVER_URL
, RUNNER_TOKEN
, RUNNER_DESCRIPTION
and RUNNER_EXECUTOR
environment variables are used to register the runner on GitLab CI.
docker run --name gitlab-ci-multi-runner -d --restart=always \
--volume /srv/docker/gitlab-runner:/home/gitlab_ci_multi_runner/data \
--env='CI_SERVER_URL=http://git.example.com/ci' --env='RUNNER_TOKEN=xxxxxxxxx' \
--env='RUNNER_DESCRIPTION=myrunner' --env='RUNNER_EXECUTOR=shell' \
sameersbn/gitlab-ci-multi-runner:1.8.0
Alternatively, you can use the sample docker-compose.yml file to start the container using Docker Compose
Update the values of CI_SERVER_URL
, RUNNER_TOKEN
and RUNNER_DESCRIPTION
in the above command. If these enviroment variables are not specified, you will be prompted to enter these details interactively on first run.
You can use the docker executor by using RUNNER_EXECUTOR=docker
. You must provide a docker image to use in RUNNER_DOCKER_IMAGE
(e.g. docker:latest)
If RUNNER_DOCKER_MODE
is set to socket
, the docker socket is shared between the runner and the build container. If it is not, you must use docker in docker service in your .gitlabci.yml definitions.
See https://docs.gitlab.com/ce/ci/docker/using_docker_build.html for more info.
You can customize the launch command by specifying arguments to gitlab-ci-multi-runner
on the docker run
command. For example the following command prints the help menu of gitlab-ci-multi-runner
command:
docker run --name gitlab-ci-multi-runner -it --rm \
--volume /srv/docker/gitlab-runner:/home/gitlab_ci_multi_runner/data \
sameersbn/gitlab-ci-multi-runner:1.8.0 --help
For the image to preserve its state across container shutdown and startup you should mount a volume at /home/gitlab_ci_multi_runner/data
.
The Quickstart command already mounts a volume for persistence.
SELinux users should update the security context of the host mountpoint so that it plays nicely with Docker:
mkdir -p /srv/docker/gitlab-runner
chcon -Rt svirt_sandbox_file_t /srv/docker/gitlab-runner
At first run the image automatically generates SSH deploy keys which are installed at /home/gitlab_ci_multi_runner/data/.ssh
of the persistent data store. You can replace these keys with your own if you wish to do so.
You can use these keys to allow the runner to gain access to your private git repositories over the SSH protocol.
NOTE
- The deploy keys are generated without a passphrase.
- If your CI jobs clone repositories over SSH, you will need to build the ssh known hosts file which can be done in the build steps using, for example,
ssh-keyscan github.com | sort -u - ~/.ssh/known_hosts -o ~/.ssh/known_hosts
.
If your GitLab server is using self-signed SSL certificates then you should make sure the GitLab server's SSL certificate is trusted on the runner for the git clone operations to work.
The runner is configured to look for trusted SSL certificates at /home/gitlab_ci_multi_runner/data/certs/ca.crt
. This path can be changed using the CA_CERTIFICATES_PATH
enviroment variable.
Create a file named ca.crt
in a certs
folder at the root of your persistent data volume. The ca.crt
file should contain the root certificates of all the servers you want to trust.
With respect to GitLab, append the contents of the gitlab.crt
file to ca.crt
. For more information on the gitlab.crt
file please refer the README of the docker-gitlab container.
Similarly you should also trust the SSL certificate of the GitLab CI server by appending the contents of the gitlab-ci.crt
file to ca.crt
.
To upgrade to newer releases:
- Download the updated Docker image:
docker pull sameersbn/gitlab-ci-multi-runner:1.8.0
- Stop the currently running image:
docker stop gitlab-ci-multi-runner
- Remove the stopped container
docker rm -v gitlab-ci-multi-runner
- Start the updated image
docker run -name gitlab-ci-multi-runner -d \
[OPTIONS] \
sameersbn/gitlab-ci-multi-runner:1.8.0
For debugging and maintenance purposes you may want access the containers shell. If you are using Docker version 1.3.0
or higher you can access a running containers shell by starting bash
using docker exec
:
docker exec -it gitlab-ci-multi-runner bash
- docker-gitlab-ci-multi-runner-ruby to run ruby builds