You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
chore: replace references pointing to npalm/ by cattle-ops/ (#798)
## Description
This PR removes all references pointing at `npalm/` resources with
`cattle-ops/` as the repository was moved some time ago and everything
should point to the new destination.
If a KMS key is set via `kms_key_id`, make sure that you also give proper access to the key. Otherwise, you might
138
140
get errors, e.g. the build cache can't be decrypted or logging via CloudWatch is not possible. For a CloudWatch
139
-
example checkout [kms-policy.json](https://github.com/npalm/terraform-aws-gitlab-runner/blob/main/policies/kms-policy.json)
141
+
example checkout [kms-policy.json](https://github.com/cattle-ops/terraform-aws-gitlab-runner/blob/main/policies/kms-policy.json)
140
142
141
143
### GitLab runner token configuration
142
144
@@ -233,8 +235,8 @@ policy on the bucket.
233
235
234
236
Creation of the bucket can be disabled and managed outside this module. A good use case is for sharing the cache across multiple
235
237
runners. For this purpose the cache is implemented as a sub module. For more details see the
236
-
[cache module](https://github.com/npalm/terraform-aws-gitlab-runner/tree/main/modules/cache). An example implementation of this use
237
-
case can be found in the [runner-public](https://github.com/npalm/terraform-aws-gitlab-runner/tree/main/examples/runner-public)
238
+
[cache module](https://github.com/cattle-ops/terraform-aws-gitlab-runner/tree/main/modules/cache). An example implementation of
239
+
this use case can be found in the [runner-public](https://github.com/cattle-ops/terraform-aws-gitlab-runner/tree/main/examples/runner-public)
238
240
example.
239
241
240
242
In case you enable the access logging for the S3 cache bucket, you have to add the following statement to your S3 logging bucket
@@ -286,12 +288,12 @@ AMI. Setting the filter to `amzn2-ami-hvm-2.0.20200207.1-x86_64-ebs` will allow
286
288
287
289
### Scenario: Basic usage
288
290
289
-
Below is a basic examples of usages of the module. Regarding the dependencies such as a VPC, have a look at the [default example](https://github.com/npalm/terraform-aws-gitlab-runner/tree/main/examples/runner-default).
291
+
Below is a basic examples of usages of the module. Regarding the dependencies such as a VPC, have a look at the [default example](https://github.com/cattle-ops/terraform-aws-gitlab-runner/tree/main/examples/runner-default).
Copy file name to clipboardExpand all lines: examples/runner-certificates/README.md
+81-71
Original file line number
Diff line number
Diff line change
@@ -2,21 +2,27 @@
2
2
3
3
In this scenario the runner agent is running on a single EC2 node.
4
4
5
-
The example is intended to show how the runner can be configured for self-hosted Gitlab environments with certificates signed by a custom CA.
5
+
The example is intended to show how the runner can be configured for self-hosted Gitlab environments with certificates
6
+
signed by a custom CA.
6
7
7
-
> This currently only works with the `docker` executor. Support for the `docker+machine` executor is not yet implemented. Contributions are welcome.
8
+
> This currently only works with the `docker` executor. Support for the `docker+machine` executor is not yet
9
+
> implemented. Contributions are welcome.
8
10
9
11
## Prerequisites
10
12
11
-
The terraform version is managed using [tfenv](https://github.com/Zordrak/tfenv). If you are not using `tfenv` please check `.terraform-version` for the tested version.
13
+
The terraform version is managed using [tfenv](https://github.com/Zordrak/tfenv). If you are not using `tfenv` please
14
+
check `.terraform-version` for the tested version.
12
15
13
16
Before configuring certificates, it is important to review the [Gitlab documentation](https://docs.gitlab.com/runner/configuration/tls-self-signed.html).
14
17
15
18
In particular, note the following docker images are involved:
16
19
17
-
> - The **Runner helper image**, which is used to handle Git, artifacts, and cache operations. In this scenario, the user only needs to make a certificate file available at a specific location (for example, /etc/gitlab-runner/certs/ca.crt), and the Docker container will automatically install it for the user.
18
-
19
-
> - The **user image**, which is used to run the user script. In this scenario, the user must take ownership regarding how to install a certificate, since this is highly dependent on the image itself, and the Runner has no way of knowing how to install a certificate in each possible scenario.
20
+
- The **Runner helper image**, which is used to handle Git, artifacts, and cache operations. In this scenario, the
21
+
user only needs to make a certificate file available at a specific location (for example
22
+
/etc/gitlab-runner/certs/ca.crt), and the Docker container will automatically install it for the user.
23
+
- The **user image**, which is used to run the user script. In this scenario, the user must take ownership regarding
24
+
how to install a certificate, since this is highly dependent on the image itself, and the Runner has no way of
25
+
knowing how to install a certificate in each possible scenario.
20
26
21
27
### Certificates for the runner-helper image
22
28
@@ -49,72 +55,76 @@ For **user images**, you must:
49
55
50
56
1. Mount the certificates from the EC2 host into all user images.
51
57
52
-
The runner module can be configured to do this step. Configure the module like so:
53
-
54
-
```terraform
55
-
module {
56
-
# ...
58
+
The runner module can be configured to do this step. Configure the module like so:
59
+
60
+
```terraform
61
+
module {
62
+
# ...
63
+
64
+
# Mount EC2 host certs in docker so all user docker images can reference them.
0 commit comments