debian-mirror-gitlab/doc/ci/docker/using_kaniko.md

103 lines
4.3 KiB
Markdown
Raw Normal View History

2019-09-04 21:01:54 +05:30
---
type: howto
---
2018-11-18 11:00:15 +05:30
# Building images with kaniko and GitLab CI/CD
2020-04-22 19:07:51 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/issues/45512) in GitLab 11.2. Requires GitLab Runner 11.2 and above.
2018-11-18 11:00:15 +05:30
[kaniko](https://github.com/GoogleContainerTools/kaniko) is a tool to build
container images from a Dockerfile, inside a container or Kubernetes cluster.
kaniko solves two problems with using the
2019-10-12 21:52:04 +05:30
[docker-in-docker
build](using_docker_build.md#use-docker-in-docker-workflow-with-docker-executor) method:
2018-11-18 11:00:15 +05:30
2019-09-04 21:01:54 +05:30
- Docker-in-docker requires [privileged mode](https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilities)
in order to function, which is a significant security concern.
- Docker-in-docker generally incurs a performance penalty and can be quite slow.
2018-11-18 11:00:15 +05:30
## Requirements
In order to utilize kaniko with GitLab, a [GitLab Runner](https://docs.gitlab.com/runner/)
2019-09-04 21:01:54 +05:30
using one of the following executors is required:
- [Kubernetes](https://docs.gitlab.com/runner/executors/kubernetes.html).
- [Docker](https://docs.gitlab.com/runner/executors/docker.html).
- [Docker Machine](https://docs.gitlab.com/runner/executors/docker_machine.html).
2018-11-18 11:00:15 +05:30
## Building a Docker image with kaniko
When building an image with kaniko and GitLab CI/CD, you should be aware of a
few important details:
- The kaniko debug image is recommended (`gcr.io/kaniko-project/executor:debug`)
because it has a shell, and a shell is required for an image to be used with
GitLab CI/CD.
- The entrypoint will need to be [overridden](using_docker_images.md#overriding-the-entrypoint-of-an-image),
otherwise the build script will not run.
- A Docker `config.json` file needs to be created with the authentication
information for the desired container registry.
2019-09-04 21:01:54 +05:30
In the following example, kaniko is used to:
1. Build a Docker image.
2019-12-04 20:38:33 +05:30
1. Then push it to [GitLab Container Registry](../../user/packages/container_registry/index.md).
2018-11-18 11:00:15 +05:30
The job will run only when a tag is pushed. A `config.json` file is created under
2018-12-13 13:39:08 +05:30
`/kaniko/.docker` with the needed GitLab Container Registry credentials taken from the
2019-03-02 22:35:43 +05:30
[environment variables](../variables/README.md#predefined-environment-variables)
2019-09-04 21:01:54 +05:30
GitLab CI/CD provides.
In the last step, kaniko uses the `Dockerfile` under the
2018-11-18 11:00:15 +05:30
root directory of the project, builds the Docker image and pushes it to the
project's Container Registry while tagging it with the Git tag:
```yaml
build:
stage: build
image:
name: gcr.io/kaniko-project/executor:debug
entrypoint: [""]
script:
2018-12-13 13:39:08 +05:30
- echo "{\"auths\":{\"$CI_REGISTRY\":{\"username\":\"$CI_REGISTRY_USER\",\"password\":\"$CI_REGISTRY_PASSWORD\"}}}" > /kaniko/.docker/config.json
2018-11-18 11:00:15 +05:30
- /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination $CI_REGISTRY_IMAGE:$CI_COMMIT_TAG
only:
- tags
```
2019-02-15 15:39:39 +05:30
## Using a registry with a custom certificate
When trying to push to a Docker registry that uses a certificate that is signed
by a custom CA, you might get the following error:
2020-03-13 15:44:24 +05:30
```shell
2019-02-15 15:39:39 +05:30
$ /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --no-push
INFO[0000] Downloading base image registry.gitlab.example.com/group/docker-image
error building image: getting stage builder for stage 0: Get https://registry.gitlab.example.com/v2/: x509: certificate signed by unknown authority
```
This can be solved by adding your CA's certificate to the kaniko certificate
store:
```yaml
before_script:
- echo "{\"auths\":{\"$CI_REGISTRY\":{\"username\":\"$CI_REGISTRY_USER\",\"password\":\"$CI_REGISTRY_PASSWORD\"}}}" > /kaniko/.docker/config.json
- |
echo "-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----" >> /kaniko/ssl/certs/ca-certificates.crt
```
2019-09-04 21:01:54 +05:30
<!-- ## Troubleshooting
Include any troubleshooting steps that you can foresee. If you know beforehand what issues
one might have when setting this up, or when something is changed, or on upgrading, it's
important to describe those, too. Think of things that may go wrong and include them here.
This is important to minimize requests for support, and to avoid doc comments with
questions that you know someone might ask.
Each scenario can be a third-level heading, e.g. `### Getting error message X`.
If you have none to add when creating a doc, leave this section in place
but commented out to help encourage others to add to it in the future. -->