From 2cd27dfae912ba7795c2b6c7731af1386f6adfa6 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Gabriel=20N=C3=BCtzi?= Date: Tue, 2 Apr 2024 18:40:01 +0200 Subject: [PATCH] doc: Format `README.md` --- README.md | 262 +++++++++++++++++++++++++++--------------------------- 1 file changed, 132 insertions(+), 130 deletions(-) diff --git a/README.md b/README.md index 839eb09..e057f84 100644 --- a/README.md +++ b/README.md @@ -1,79 +1,84 @@ +# Podmand-In-Podman Gitlab Runner + +This project provides a Gitlab Runner which runs inside a container launched +with `podman`. The Gitlab Runner itself uses an independent `podman` instance +inside to launch jobs. + ## Overview -This container image is built daily from this `Containerfile`, and -made available as: +This container image is built daily from this `Containerfile`, and made +available as: -* `registry.gitlab.com/qontainers/pipglr:latest` +- `registry.gitlab.com/qontainers/pipglr:latest` -or- -* `registry.gitlab.com/qontainers/pipglr:` +- `registry.gitlab.com/qontainers/pipglr:` -It's purpose is to provide an easy method to execute a GitLab runner, -to service CI/CD jobs for groups and/or repositories on -[gitlab.com](https://gitlab.com). It comes pre-configured to utilize -the gitlab-runner app to execute within a rootless podman container, -nested inside a rootless podman container. +It's purpose is to provide an easy method to execute a GitLab runner, to service +CI/CD jobs for groups and/or repositories on [gitlab.com](https://gitlab.com). +It comes pre-configured to utilize the gitlab-runner app to execute within a +rootless podman container, nested inside a rootless podman container. -This is intended to provide additional layers of security for the host, -when running potentially arbitrary CI/CD code. Though, the ultimate -responsibility still rests with the end-user to review the setup and -configuration relative to their own security situation/environment. +This is intended to provide additional layers of security for the host, when +running potentially arbitrary CI/CD code. Though, the ultimate responsibility +still rests with the end-user to review the setup and configuration relative to +their own security situation/environment. -**Note**: While this can run entirely under a regular user, it will require -root access for the first two setup steps (below). +**Note**: While this can run entirely under a regular user, it will require root +access for the first two setup steps (below). ### Operation -This image leverages the podman `runlabel` feature heavily. Several -labels are set on the image to support easy registration and execution -of the runner container. While it's possible to use the container -with your own command-line, it's highly recommended to base them -off of one of the labels. See the examples below for more information. +This image leverages the podman `runlabel` feature heavily. Several labels are +set on the image to support easy registration and execution of the runner +container. While it's possible to use the container with your own command-line, +it's highly recommended to base them off of one of the labels. See the examples +below for more information. -***Note:*** Some older versions of podman don't support the -`container runlabel` sub-command. If this is the case, you may simulate -it with the following, substituting `