mirror of
https://code.forgejo.org/forgejo/runner.git
synced 2024-11-24 13:49:08 +03:00
294912488c
Starting with Forgejo runner 3.0.0 images are different in two ways that matter to k8s because they: * are all rootless * do not rely on tini
729 B
729 B
Kubernetes Docker in Docker Deployment
Registers Kubernetes pod runners using offline registration, allowing the scaling of runners as needed.
NOTE: Docker in Docker (dind) requires elevated privileges on Kubernetes. The current way to achieve this is to set the pod SecurityContext
to privileged
. Keep in mind that this is a potential security issue that has the potential for a malicious application to break out of the container context.
dind-docker.yaml
creates a deployment and secret for Kubernetes to act as a runner. The Docker credentials are re-generated each time the pod connects and does not need to be persisted.