In GitLab CI, Runners run the code defined in .gitlab-ci.yml
.
They are isolated (virtual) machines that pick up jobs through the coordinator
API of GitLab CI.
A Runner can be specific to a certain project or serve any project in GitLab CI. A Runner that serves all projects is called a shared Runner.
Ideally, the GitLab Runner should not be installed on the same machine as GitLab. Read the requirements documentation for more information.
After installing the Runner, you can either register it as shared or specific. You can only register a shared Runner if you have admin access to the GitLab instance. The main differences between a shared and a specific Runner are:
A Runner that is specific only runs for the specified project(s). A shared Runner can run jobs for every project that has enabled the option Allow shared Runners under Settings ➔ Pipelines.
Projects with high demand of CI activity can also benefit from using specific Runners. By having dedicated Runners you are guaranteed that the Runner is not being held up by another project's jobs.
You can set up a specific Runner to be used by multiple projects. The difference with a shared Runner is that you have to enable each project explicitly for the Runner to be able to run its jobs.
Specific Runners do not get shared with forked projects automatically. A fork does copy the CI settings (jobs, allow shared, etc) of the cloned repository.
You can only register a shared Runner if you are an admin of the GitLab instance.
Grab the shared-Runner token on the admin/runners
page
Shared Runners are enabled by default as of GitLab 8.2, but can be disabled with the Disable shared Runners button which is present under each project's Settings ➔ Pipelines page. Previous versions of GitLab defaulted shared Runners to disabled.
Registering a specific can be done in two ways:
To create a specific Runner without having admin rights to the GitLab instance, visit the project you want to make the Runner work for in GitLab:
If you are an admin on your GitLab instance, you can turn any shared Runner into a specific one, but not the other way around. Keep in mind that this is a one way transition.
/admin/runners
)
and find your RunnerFrom now on, the shared Runner will be specific to those projects.
You can configure a Runner to assign it exclusively to a project. When a Runner is locked this way, it can no longer be enabled for other projects. This setting can be enabled the first time you register a Runner and can be changed afterwards under each Runner's settings.
To lock/unlock a Runner:
Shared Runners abide to a process queue we call fair usage. The fair usage algorithm tries to assign jobs to shared Runners from projects that have the lowest number of jobs currently running on shared Runners.
Example 1
We have following jobs in queue:
With the fair usage algorithm jobs are assigned in following order:
Example 2
We have following jobs in queue:
With the fair usage algorithm jobs are assigned in following order:
If you are planning to use shared Runners, there are several things you should keep in mind.
You must setup a Runner to be able to run all the different types of jobs that it may encounter on the projects it's shared over. This would be problematic for large amounts of projects, if it wasn't for tags.
By tagging a Runner for the types of jobs it can handle, you can make sure shared Runners will only run the jobs they are equipped to run.
For instance, at GitLab we have Runners tagged with "rails" if they contain the appropriate dependencies to run Rails test suites.
You can configure a Runner to prevent it from picking jobs with tags when the Runner does not have tags assigned. This setting can be enabled the first time you register a Runner and can be changed afterwards under each Runner's settings.
To make a Runner pick tagged/untagged jobs:
If you can run a job on a Runner, you can get access to any code it runs and get the token of the Runner. With shared Runners, this means that anyone that runs jobs on the Runner, can access anyone else's code that runs on the Runner.
In addition, because you can get access to the Runner token, it is possible to create a clone of a Runner and submit false jobs, for example.
The above is easily avoided by restricting the usage of shared Runners on large public GitLab instances and controlling access to your GitLab instance.
Whenever a project is forked, it copies the settings of the jobs that relate to it. This means that if you have shared Runners setup for a project and someone forks that project, the shared Runners will also serve jobs of this project.
Mentioned briefly earlier, but the following things of Runners can be exploited. We're always looking for contributions that can mitigate these Security Considerations.
Вы можете оставить комментарий после Вход в систему
Неприемлемый контент может быть отображен здесь и не будет показан на странице. Вы можете проверить и изменить его с помощью соответствующей функции редактирования.
Если вы подтверждаете, что содержание не содержит непристойной лексики/перенаправления на рекламу/насилия/вульгарной порнографии/нарушений/пиратства/ложного/незначительного или незаконного контента, связанного с национальными законами и предписаниями, вы можете нажать «Отправить» для подачи апелляции, и мы обработаем ее как можно скорее.
Опубликовать ( 0 )