2019-09-04 21:01:54 +05:30
|
|
|
---
|
|
|
|
type: howto
|
|
|
|
---
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
# Building images with kaniko and GitLab CI/CD
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/issues/45512) in GitLab 11.2.
|
2018-11-18 11:00:15 +05:30
|
|
|
Requires GitLab Runner 11.2 and above.
|
|
|
|
|
|
|
|
[kaniko](https://github.com/GoogleContainerTools/kaniko) is a tool to build
|
|
|
|
container images from a Dockerfile, inside a container or Kubernetes cluster.
|
|
|
|
|
|
|
|
kaniko solves two problems with using the
|
2019-10-12 21:52:04 +05:30
|
|
|
[docker-in-docker
|
|
|
|
build](using_docker_build.md#use-docker-in-docker-workflow-with-docker-executor) method:
|
2018-11-18 11:00:15 +05:30
|
|
|
|
2019-09-04 21:01:54 +05:30
|
|
|
- Docker-in-docker requires [privileged mode](https://docs.docker.com/engine/reference/run/#runtime-privilege-and-linux-capabilities)
|
|
|
|
in order to function, which is a significant security concern.
|
|
|
|
- Docker-in-docker generally incurs a performance penalty and can be quite slow.
|
2018-11-18 11:00:15 +05:30
|
|
|
|
|
|
|
## Requirements
|
|
|
|
|
|
|
|
In order to utilize kaniko with GitLab, a [GitLab Runner](https://docs.gitlab.com/runner/)
|
2019-09-04 21:01:54 +05:30
|
|
|
using one of the following executors is required:
|
|
|
|
|
|
|
|
- [Kubernetes](https://docs.gitlab.com/runner/executors/kubernetes.html).
|
|
|
|
- [Docker](https://docs.gitlab.com/runner/executors/docker.html).
|
|
|
|
- [Docker Machine](https://docs.gitlab.com/runner/executors/docker_machine.html).
|
2018-11-18 11:00:15 +05:30
|
|
|
|
|
|
|
## Building a Docker image with kaniko
|
|
|
|
|
|
|
|
When building an image with kaniko and GitLab CI/CD, you should be aware of a
|
|
|
|
few important details:
|
|
|
|
|
|
|
|
- The kaniko debug image is recommended (`gcr.io/kaniko-project/executor:debug`)
|
|
|
|
because it has a shell, and a shell is required for an image to be used with
|
|
|
|
GitLab CI/CD.
|
|
|
|
- The entrypoint will need to be [overridden](using_docker_images.md#overriding-the-entrypoint-of-an-image),
|
|
|
|
otherwise the build script will not run.
|
|
|
|
- A Docker `config.json` file needs to be created with the authentication
|
|
|
|
information for the desired container registry.
|
|
|
|
|
2019-09-04 21:01:54 +05:30
|
|
|
In the following example, kaniko is used to:
|
|
|
|
|
|
|
|
1. Build a Docker image.
|
2019-12-04 20:38:33 +05:30
|
|
|
1. Then push it to [GitLab Container Registry](../../user/packages/container_registry/index.md).
|
2018-11-18 11:00:15 +05:30
|
|
|
|
|
|
|
The job will run only when a tag is pushed. A `config.json` file is created under
|
2018-12-13 13:39:08 +05:30
|
|
|
`/kaniko/.docker` with the needed GitLab Container Registry credentials taken from the
|
2019-03-02 22:35:43 +05:30
|
|
|
[environment variables](../variables/README.md#predefined-environment-variables)
|
2019-09-04 21:01:54 +05:30
|
|
|
GitLab CI/CD provides.
|
|
|
|
|
|
|
|
In the last step, kaniko uses the `Dockerfile` under the
|
2018-11-18 11:00:15 +05:30
|
|
|
root directory of the project, builds the Docker image and pushes it to the
|
|
|
|
project's Container Registry while tagging it with the Git tag:
|
|
|
|
|
|
|
|
```yaml
|
|
|
|
build:
|
|
|
|
stage: build
|
|
|
|
image:
|
|
|
|
name: gcr.io/kaniko-project/executor:debug
|
|
|
|
entrypoint: [""]
|
|
|
|
script:
|
2018-12-13 13:39:08 +05:30
|
|
|
- echo "{\"auths\":{\"$CI_REGISTRY\":{\"username\":\"$CI_REGISTRY_USER\",\"password\":\"$CI_REGISTRY_PASSWORD\"}}}" > /kaniko/.docker/config.json
|
2018-11-18 11:00:15 +05:30
|
|
|
- /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --destination $CI_REGISTRY_IMAGE:$CI_COMMIT_TAG
|
|
|
|
only:
|
|
|
|
- tags
|
|
|
|
```
|
2019-02-15 15:39:39 +05:30
|
|
|
|
|
|
|
## Using a registry with a custom certificate
|
|
|
|
|
|
|
|
When trying to push to a Docker registry that uses a certificate that is signed
|
|
|
|
by a custom CA, you might get the following error:
|
|
|
|
|
2020-03-13 15:44:24 +05:30
|
|
|
```shell
|
2019-02-15 15:39:39 +05:30
|
|
|
$ /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --no-push
|
|
|
|
INFO[0000] Downloading base image registry.gitlab.example.com/group/docker-image
|
|
|
|
error building image: getting stage builder for stage 0: Get https://registry.gitlab.example.com/v2/: x509: certificate signed by unknown authority
|
|
|
|
```
|
|
|
|
|
|
|
|
This can be solved by adding your CA's certificate to the kaniko certificate
|
|
|
|
store:
|
|
|
|
|
|
|
|
```yaml
|
|
|
|
before_script:
|
|
|
|
- echo "{\"auths\":{\"$CI_REGISTRY\":{\"username\":\"$CI_REGISTRY_USER\",\"password\":\"$CI_REGISTRY_PASSWORD\"}}}" > /kaniko/.docker/config.json
|
|
|
|
- |
|
|
|
|
echo "-----BEGIN CERTIFICATE-----
|
|
|
|
...
|
|
|
|
-----END CERTIFICATE-----" >> /kaniko/ssl/certs/ca-certificates.crt
|
|
|
|
```
|
2019-09-04 21:01:54 +05:30
|
|
|
|
|
|
|
<!-- ## Troubleshooting
|
|
|
|
|
|
|
|
Include any troubleshooting steps that you can foresee. If you know beforehand what issues
|
|
|
|
one might have when setting this up, or when something is changed, or on upgrading, it's
|
|
|
|
important to describe those, too. Think of things that may go wrong and include them here.
|
|
|
|
This is important to minimize requests for support, and to avoid doc comments with
|
|
|
|
questions that you know someone might ask.
|
|
|
|
|
|
|
|
Each scenario can be a third-level heading, e.g. `### Getting error message X`.
|
|
|
|
If you have none to add when creating a doc, leave this section in place
|
|
|
|
but commented out to help encourage others to add to it in the future. -->
|