gitlab-runner values.yaml
💣
image💣
Type: string
nil
registry💣
Type: string
"registry1.dso.mil"
repository💣
Type: string
"ironbank/gitlab/gitlab-runner/gitlab-runner"
tag💣
Type: string
"v15.10.0"
imagePullPolicy💣
Type: string
"IfNotPresent"
gitlabUrl💣
Type: string
"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181"
terminationGracePeriodSeconds💣
Type: int
3600
concurrent💣
Type: int
50
checkInterval💣
Type: int
30
sessionServer.enabled💣
Type: bool
false
rbac.create💣
Type: bool
true
rbac.rules💣
Type: list
[]
Default value (formatted)
[]
rbac.clusterWideAccess💣
Type: bool
false
rbac.podSecurityPolicy.enabled💣
Type: bool
false
rbac.podSecurityPolicy.resourceNames[0]💣
Type: string
"gitlab-runner"
metrics.enabled💣
Type: bool
false
metrics.portName💣
Type: string
"tcp-metrics"
metrics.port💣
Type: int
9252
metrics.serviceMonitor.enabled💣
Type: bool
false
service.enabled💣
Type: bool
true
service.type💣
Type: string
"ClusterIP"
runners.job.registry💣
Type: string
"registry1.dso.mil"
runners.job.repository💣
Type: string
"ironbank/redhat/ubi/ubi8"
runners.job.tag💣
Type: string
"8.7"
runners.helper.registry💣
Type: string
"registry1.dso.mil"
runners.helper.repository💣
Type: string
"ironbank/gitlab/gitlab-runner/gitlab-runner-helper"
runners.helper.tag💣
Type: string
"v15.10.0"
runners.config💣
Type: string
"[[runners]]\n clone_url = \"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181\"\n cache_dir = \"/tmp/gitlab-runner/cache\"\n [runners.kubernetes]\n namespace = \"{{.Release.Namespace}}\"\n image = \"{{ printf \"%s/%s:%s\" .Values.runners.job.registry .Values.runners.job.repository .Values.runners.job.tag }}\"\n helper_image = \"{{ printf \"%s/%s:%s\" .Values.runners.helper.registry .Values.runners.helper.repository .Values.runners.helper.tag }}\"\n image_pull_secrets = [\"private-registry\"]\n [runners.kubernetes.pod_labels]\n \"job_id\" = \"${CI_JOB_ID}\"\n \"job_name\" = \"${CI_JOB_NAME}\"\n \"pipeline_id\" = \"${CI_PIPELINE_ID}\"\n"
Default value (formatted)
[[runners]]
clone_url = \"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181\"
cache_dir = \"/tmp/gitlab-runner/cache\"
[runners.kubernetes]
namespace = \"{{.Release.Namespace}}\"
image = \"{{ printf \"%s/%s:%s\" .Values.runners.job.registry .Values.runners.job.repository .Values.runners.job.tag }}\"
helper_image = \"{{ printf \"%s/%s:%s\" .Values.runners.helper.registry .Values.runners.helper.repository .Values.runners.helper.tag }}\"
image_pull_secrets = [\"private-registry\"]
[runners.kubernetes.pod_labels]
\"job_id\" = \"${CI_JOB_ID}\"
\"job_name\" = \"${CI_JOB_NAME}\"
\"pipeline_id\" = \"${CI_PIPELINE_ID}\"
runners.locked💣
Type: bool
false
runners.runUntagged💣
Type: bool
true
runners.protected💣
Type: bool
true
runners.secret💣
Type: string
"gitlab-gitlab-runner-secret"
runners.cache💣
Type: object
{}
Default value (formatted)
{}
runners.builds💣
Type: object
{}
Default value (formatted)
{}
runners.services💣
Type: object
{}
Default value (formatted)
{}
runners.helpers💣
Type: object
{}
Default value (formatted)
{}
securityContext.allowPrivilegeEscalation💣
Type: bool
false
securityContext.readOnlyRootFilesystem💣
Type: bool
false
securityContext.runAsNonRoot💣
Type: bool
true
securityContext.privileged💣
Type: bool
false
securityContext.capabilities.drop[0]💣
Type: string
"ALL"
podSecurityContext.runAsUser💣
Type: int
1001
podSecurityContext.fsGroup💣
Type: int
65533
containerSecurityContext.capabilities.drop[0]💣
Type: string
"ALL"
resources.limits.memory💣
Type: string
"256Mi"
resources.limits.cpu💣
Type: string
"200m"
resources.requests.memory💣
Type: string
"256Mi"
resources.requests.cpu💣
Type: string
"200m"
affinity💣
Type: object
{}
Default value (formatted)
{}
nodeSelector💣
Type: object
{}
Default value (formatted)
{}
tolerations💣
Type: list
[]
Default value (formatted)
[]
hostAliases💣
Type: list
[]
Default value (formatted)
[]
podAnnotations💣
Type: object
{}
Default value (formatted)
{}
podLabels💣
Type: object
{}
Default value (formatted)
{}
priorityClassName💣
Type: string
""
secrets💣
Type: list
[]
Default value (formatted)
[]
configMaps💣
Type: object
{}
Default value (formatted)
{}
volumeMounts💣
Type: list
[]
Default value (formatted)
[]
volumes💣
Type: list
[]
Default value (formatted)
[]
istio.enabled💣
Type: bool
false
istio.injection💣
Type: string
"disabled"
istio.mtls💣
Type: object
{"mode":"STRICT"}
Default value (formatted)
{
"mode": "STRICT"
}
Description: Default peer authentication
istio.mtls.mode💣
Type: string
"STRICT"
Description: STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
monitoring.enabled💣
Type: bool
false
networkPolicies.enabled💣
Type: bool
false
networkPolicies.controlPlaneCidr💣
Type: string
"0.0.0.0/0"
networkPolicies.additionalPolicies💣
Type: list
[]
Default value (formatted)
[]
autoRegister.enabled💣
Type: bool
false
bbtests.enabled💣
Type: bool
false
bbtests.cypress.artifacts💣
Type: bool
true
bbtests.cypress.envs.cypress_baseUrl💣
Type: string
"http://gitlab-webservice-default.gitlab.svc.cluster.local:8181"
bbtests.cypress.envs.cypress_gitlab_first_name💣
Type: string
"testrunner"
bbtests.cypress.envs.cypress_gitlab_last_name💣
Type: string
"userrunner"
bbtests.cypress.envs.cypress_gitlab_username💣
Type: string
"gitlabrunner_user"
bbtests.cypress.envs.cypress_gitlab_password💣
Type: string
"Runner_PaSsw0rd123"
bbtests.cypress.envs.cypress_gitlab_email💣
Type: string
"gitlab@bigbang.dev"
bbtests.cypress.envs.cypress_gitlab_project💣
Type: string
"runner-hello-world"
bbtests.cypress.secretEnvs[0].name💣
Type: string
"cypress_adminpassword"
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.name💣
Type: string
"gitlab-gitlab-initial-root-password"
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.key💣
Type: string
"password"