Getting started

GitLab CI registration token

To register a Runner with your GitLab CI instance, you need to provide a registration token. It can be found on the https://<host>/admin/runners page of your GitLab installation.

The registration token is generated randomly on each GitLab startup, and unfortunately cannot be accessed using an API. Therefore, the easiest way to provide it to the role is to store it in an environment variable. The debops.gitlab_runner checks the value of the $GITLAB_RUNNER_TOKEN system variable and uses the token found there.

The registration token is required to perform changes on the GitLab server itself, ie. registration and removal of Runners. It's not required for the role to manage the Runners on the host - the Runner tokens are saved in local Ansible facts and reused if necessary.

An example way to run debops so that the role registers the Runners in GitLab CI:

GITLAB_RUNNER_TOKEN=<random-token> debops run service/gitlab_runner

To change the environment variable that holds the registration token, or save the token in Ansible inventory, you can use the gitlab_runner__token variable.

In case that you don't want to expose the registration token via the Ansible inventory directly, you can store it it in the ansible/secret/credentials/ directory managed by the debops.secret role in a predetermined location.

To create the path and file to store the GitLab Token execute this commands in the root of the DebOps project directory with the relevant GitLab domain:

mkdir -pv ansible/secret/credentials/code.example.org/gitlab/runner
editor ansible/secret/credentials/code.example.org/gitlab/runner/token

In the editor, paste the GitLab registration token and save the file. Then add the gitlab_runner__token variable to your inventory.

gitlab_runner__token: '{{ lookup("password", secret
                        + "/credentials/" + gitlab_runner__api_fqdn
                        + "/gitlab/runner/token chars=ascii_letters,numbers") }}'

This allows the token to be safely stored outside of the inventory but accessible at runtime.

Initial configuration

By default, debops.gitlab_runner will configure a single Runner instance which uses a shell executor. If a Docker installation is detected via Ansible local facts, the role will disable the shell executor and configure two Docker executors - one unprivileged, and one privileged. The executors will have a set of tags that identify them, shell executors will have additional tags that describe the host's architecture, OS release, etc.

If the debops.lxc role has been used to configure LXC support on the host, the debops.gitlab_runner will install the vagrant-lxc package and configure sudo support for it. Using a shell executor you can start and stop Vagrant Boxes using LXC containers and execute commands inside them.

If the debops.libvirtd role has been used to configure libvirt support on the host, the debops.gitlab_runner will install the vagrant-libvirt package and configure sudo support for it. Using a shell executor you can start and stop Vagrant Boxes using libvirt and execute commands inside them.

The Runner instances can be configured with variables specified as the keys of the dictionary that holds the specific Runner configuration. If any required keys are not specified, the value of the global variable will be used instead.

Some of the variables will be added together (Docker volumes, for example), so that you can define a list of global values included in all of the Runner instances.

Environment variables

You can use gitlab_runner__environment default variable to specify a custom set of environment variables to configure in a GitLab Runner instance. You can use the global variable, or set the environment at the instance level by specifying it as item.environment variable.

The environment variables can be specified in a different ways:

  • a single variable as a string:

    gitlab_runner__environment: 'VARIABLE=value'
    
  • a list of environment variables:

    gitlab_runner__environment:
      - 'VARIABLE1=value1'
      - 'VARIABLE2=value2'
    
  • a YAML dictionary with variable names as keys and their values as values:

    gitlab_runner__environment:
      VARIABLE1: 'value1'
      VARIABLE2: 'value2'
    

Different specifications cannot be mixed together.

Example inventory

To install GitLab Runner service on a host, it needs to be added to the [debops_service_gitlab_runner] inventory host group:

[debops_service_gitlab_runner]
hostname

Example playbook

Here's an example playbook that can be used to enable and manage the GitLab Runner service on a set of hosts:

---

- name: Manage GitLab Runner service
  collections: [ 'debops.debops', 'debops.roles01',
                 'debops.roles02', 'debops.roles03' ]
  hosts: [ 'debops_service_gitlab_runner' ]
  become: True

  environment: '{{ inventory__environment | d({})
                   | combine(inventory__group_environment | d({}))
                   | combine(inventory__host_environment  | d({})) }}'

  roles:

    - role: keyring
      tags: [ 'role::keyring', 'skip::keyring', 'role::gitlab_runner' ]
      keyring__dependent_apt_keys:
        - '{{ gitlab_runner__keyring__dependent_apt_keys }}'

    - role: gitlab_runner
      tags: [ 'role::gitlab_runner', 'skip::gitlab_runner' ]