Release 0.5.0
The upcoming release contains number of security features and bug fixes:
The 0.5.0 simplifies installation procedure and makes the runner more secure: by protecting runner's config and not requiring the docker group ownership in order to use built-in docker executor. The runner contains alias gitlab-runner
and replaces old omnibus-gitlab-runner. For new installations the gitlab-runner
user is created instead of gitlab_ci_multi_runner
.
The upcoming version is available as Bleeding Edge: https://gitlab.com/gitlab-org/gitlab-ci-multi-runner/blob/master/docs/install/bleeding-edge.md
The documentation doesn't yet reflect recent changes.
I'll be happy if you could test and post review if it doesn't break existing setups.
TL;DR
- The runner service when installed from deb/rpm is run by
root
. The service stores config in/etc/gitlab-runner/config.toml
which is owned by root and has permission 0600. - The deb/rpm installer creates
gitlab-runner
user or usesgitlab_ci_multi_runner
if found (backward compatibility). - The deb/rpm installer imports
~gitlab_ci_multi_runner/config.toml
. - The deb/rpm installer includes
gitlab-runner
alias forgitlab-ci-multi-runner
. - The runner
run
command accepts--user
that is used to specify the user for executing shell scripts. The shell scripts are run withsu --shell /bin/bash --login
- The
gitlab-ci-multi-runner install/uninstall/start/stop/restart
works only for root on Linux. - When
gitlab-ci-multi-runner register/run/verify
is executed by normal user (non-root) the configuration is stored in$HOME/.gitlab-runner/config.toml
: this changes behaviour forlinux
anddarwin
, previously the config was stored in current directory. - The repository contains alpine-based runner image with minimal footprint.
- The runner contains tests that allows to verify installation and upgrade on: centos:6/7, debian:wheezy/jessie, ubuntu:precise/trusty/utopic
- The runner includes support for upcoming docker CI features
- Colorised build log.