Gitlab runner problem with maven cache

I want to save the .m2 content in filesystem outside the container to avoid download the artifacts in each job.
I am running my runners in kubernetes, this is my configuration

apiVersion: v1
data:
REGISTER_NON_INTERACTIVE: “true”
REGISTER_LOCKED: “false”
GITLAB_CI_TOKEN: “XXXXXXX”
CI_SERVER_URL: “XXXXXXXX”
METRICS_SERVER: “0.0.0.0:9100”
RUNNER_REQUEST_CONCURRENCY: “4”
RUNNER_EXECUTOR: “kubernetes”
KUBERNETES_NAMESPACE: “production”
KUBERNETES_PRIVILEGED: “true”
KUBERNETES_MEMORY_LIMIT: “1Gi”
KUBERNETES_PULL_POLICY: “if-not-present”
KUBERNETES_TERMINATIONGRACEPERIODSECONDS: “10”
KUBERNETES_POLL_INTERVAL: “5”
KUBERNETES_POLL_TIMEOUT: “360”
kind: ConfigMap
metadata:
labels:
app: gitlab-ci-runner
name: gitlab-ci-runner-cm
namespace: production

apiVersion: v1
data:
run.sh: |
#!/bin/bash
unregister() {
kill %1
echo “Unregistering runner {RUNNER_NAME} ..." /usr/bin/gitlab-ci-multi-runner unregister -t "(/usr/bin/gitlab-ci-multi-runner list 2>&1 | tail -n1 | awk '{print 4}' | cut -d'=' -f2)" -n {RUNNER_NAME}
exit ? } trap 'unregister' EXIT HUP INT QUIT PIPE TERM echo "Registering runner {RUNNER_NAME} …”
echo “more /etc/resolv.conf”
echo “ping 10.97.68.121”
echo “touch /builds/project-0/.m2/chupamela”
/usr/bin/gitlab-ci-multi-runner register -r {GITLAB_CI_TOKEN} sed -i 's/^concurrent.*/concurrent = '"{RUNNER_REQUEST_CONCURRENCY}"’/’ /home/gitlab-runner/.gitlab-runner/config.toml
more /home/gitlab-runner/.gitlab-runner/config.toml
echo “namespace = “production”” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “priviliged = “true”” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “[[runners.kubernetes.volumes.host_path]]” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “name = “docker”” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “path = “/var/run/docker.sock”” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “mount_path = “/var/run/docker.sock”” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “dns_search = [“XXXXXXX”]” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “extra_hosts = [“XXXXXXX”]” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “dns = [“XXXXXXX”]” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “read_only = false” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “[[runners.kubernetes.volumes.host_path]]” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “name = “mvn-cache”” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo "path = “.m2"” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo "mount_path = “/home/user/.m2"” >> /home/gitlab-runner/.gitlab-runner/config.toml
echo “read_only = false” >> /home/gitlab-runner/.gitlab-runner/config.toml

echo "Starting runner ${RUNNER_NAME} ..."
/usr/bin/gitlab-ci-multi-runner run -n ${RUNNER_NAME} &
wait

kind: ConfigMap
metadata:
labels:
app: gitlab-ci-runner
name: gitlab-ci-runner-toml
namespace: production

apiVersion: apps/v1beta1
kind: StatefulSet
metadata:
name: gitlab-ci-runner
namespace: production
labels:
app: gitlab-ci-runner
spec:
updateStrategy:
type: RollingUpdate
replicas: 1
serviceName: gitlab-ci-runner
template:
metadata:
labels:
app: gitlab-ci-runner
spec:
volumes:
- configMap:
name: gitlab-ci-runner-toml
name: runner-scripts
- name: gitlab-ci-runner-scripts
projected:
sources:
- configMap:
name: gitlab-ci-runner-toml
items:
- key: run.sh
path: run.sh
mode: 0755
serviceAccountName: gitlab-ci
securityContext:
runAsNonRoot: true
runAsUser: 999
supplementalGroups: [999]
containers:
- image: gitlab/gitlab-runner:v10.4.0
name: gitlab-ci-runner
command:
- /scripts/run.sh
envFrom:
- configMapRef:
name: gitlab-ci-runner-cm
env:
- name: RUNNER_NAME
valueFrom:
fieldRef:
fieldPath: metadata.name
ports:
- containerPort: 9100
name: http-metrics
protocol: TCP
volumeMounts:
- name: gitlab-ci-runner-scripts
mountPath: “/scripts”
readOnly: true
resources:
requests:
cpu: 10m
restartPolicy: Always
hostAliases:
- ip : “XXXXXX”
hostnames:
- “XXXXXX”
- “XXXXXXX”


apiVersion: v1
kind: ServiceAccount
metadata:
name: gitlab-ci
namespace: production

kind: Role
apiVersion: rbac.authorization.k8s.io/v1
metadata:
namespace: production
name: gitlab-ci
rules:

  • apiGroups: [""]
    resources: [""]
    verbs: ["
    "]

kind: RoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: gitlab-ci
namespace: production
subjects:

  • kind: ServiceAccount
    name: gitlab-ci
    namespace: production
    roleRef:
    kind: Role
    name: gitlab-ci
    apiGroup: rbac.authorization.k8s.io