10 Commits
0.2.0 ... 0.3.3

Author SHA1 Message Date
3da5de27d7 Allow skip-tls-verify option for testing 2019-08-05 15:42:35 +02:00
4340afa523 Add Ability To Skip Push
This adds the ability to build the image without pushing it by omitting
the `tags` and `repo` options.
2019-07-10 08:40:51 +02:00
71121bfd13 gcr: use json_key to keep compatibility with docker plugin 2019-06-02 13:35:16 +02:00
71dd35e3ec add support for gcr registries 2019-06-01 15:01:35 +02:00
9d134a40f2 update kaniko and example to use caching 2019-06-01 14:09:24 +02:00
d652653cbe fix parentheses when parsing multiple arguments 2019-05-21 13:47:56 +02:00
ad1fd17aa5 Fix handling of long username/password
Apparently the busybox implementation of `base64` will line-wrap long output strings.
This meant that long username+password combinations could produce base64 that
contained spurious "\n" characters, which then led to:
```
2019/05/06 00:47:39 Unable to parse "/kaniko/.docker/config.json": invalid character '\n' in string literal
```

Fixed by just removing the newlines in base64 output.  A "better" solution would use a different base64
implementation that avoided line-wrapping in the first place.
2019-05-06 09:16:50 +02:00
4346dd607c fix user name in dockerfile 2019-01-09 09:39:14 +01:00
3cd65aba50 add support for dockerfile build target 2019-01-09 09:39:14 +01:00
0eb7c2716d change how to handle the cache setting 2019-01-09 09:39:14 +01:00
3 changed files with 66 additions and 19 deletions

View File

@ -1,7 +1,7 @@
FROM gcr.io/kaniko-project/executor:debug-v0.7.0 FROM gcr.io/kaniko-project/executor:debug-v0.9.0
ENV HOME /root ENV HOME /root
ENV USER /root ENV USER root
ENV SSL_CERT_DIR=/kaniko/ssl/certs ENV SSL_CERT_DIR=/kaniko/ssl/certs
ENV DOCKER_CONFIG /kaniko/.docker/ ENV DOCKER_CONFIG /kaniko/.docker/
ENV DOCKER_CREDENTIAL_GCR_CONFIG /kaniko/.config/gcloud/docker_credential_gcr_config.json ENV DOCKER_CREDENTIAL_GCR_CONFIG /kaniko/.config/gcloud/docker_credential_gcr_config.json

View File

@ -2,7 +2,7 @@
A thin shim-wrapper around the official [Google Kaniko](https://cloud.google.com/blog/products/gcp/introducing-kaniko-build-container-images-in-kubernetes-and-google-container-builder-even-without-root-access) Docker image to make it behave like the [Drone Docker plugin](http://plugins.drone.io/drone-plugins/drone-docker/). A thin shim-wrapper around the official [Google Kaniko](https://cloud.google.com/blog/products/gcp/introducing-kaniko-build-container-images-in-kubernetes-and-google-container-builder-even-without-root-access) Docker image to make it behave like the [Drone Docker plugin](http://plugins.drone.io/drone-plugins/drone-docker/).
Example .drone.yml for Drone 1.0 Example .drone.yml for Drone 1.0 (pushing to Docker Hub):
```yaml ```yaml
kind: pipeline kind: pipeline
@ -12,10 +12,11 @@ steps:
- name: publish - name: publish
image: banzaicloud/drone-kaniko image: banzaicloud/drone-kaniko
settings: settings:
registry: registry.example.com registry: registry.example.com # if not provided index.docker.io is supposed
repo: registry.example.com/example-project repo: registry.example.com/example-project
tags: ${DRONE_COMMIT_SHA} tags: ${DRONE_COMMIT_SHA}
cache: true cache: true
skip_tls_verify: false # set to true for testing registries ONLY with self-signed certs
build_args: build_args:
- COMMIT_SHA=${DRONE_COMMIT_SHA} - COMMIT_SHA=${DRONE_COMMIT_SHA}
- COMMIT_AUTHOR_EMAIL=${DRONE_COMMIT_AUTHOR_EMAIL} - COMMIT_AUTHOR_EMAIL=${DRONE_COMMIT_AUTHOR_EMAIL}
@ -25,6 +26,24 @@ steps:
from_secret: docker-password from_secret: docker-password
``` ```
Pushing to GCR:
```yaml
kind: pipeline
name: default
steps:
- name: publish
image: banzaicloud/drone-kaniko
settings:
registry: gcr.io
repo: example.com/example-project
tags: ${DRONE_COMMIT_SHA}
cache: true
json_key:
from_secret: google-application-credentials
```
## Test that it can build ## Test that it can build
```bash ```bash
@ -54,12 +73,18 @@ docker build -t banzaicloud/drone-kaniko .
Warm up the alpine image to the cache: Warm up the alpine image to the cache:
```bash ```bash
docker run -v $PWD:/cache gcr.io/kaniko-project/warmer:latest --image=alpine:3.8 docker run -v $PWD:/cache gcr.io/kaniko-project/warmer:latest --verbosity=debug --image=alpine:3.8
``` ```
Run the builder on the host network to be able to access the registry: Run the builder (on the host network to be able to access the registry, if any specified) with mounting the local disk cache, this example pushes to Docker Hub:
```bash ```bash
docker run --net=host -it --rm -w /src -v $PWD:/cache -v $PWD:/src -e DOCKER_USERNAME=${DOCKER_USERNAME} -e DOCKER_PASSWORD=${DOCKER_PASSWORD} -e PLUGIN_REPO=banzaicloud/drone-kaniko-test -e PLUGIN_TAGS=test -e PLUGIN_DOCKERFILE=Dockerfile.test banzaicloud/drone-kaniko docker run --net=host -it --rm -w /src -v $PWD:/cache -v $PWD:/src -e PLUGIN_USERNAME=${DOCKER_USERNAME} -e PLUGIN_PASSWORD=${DOCKER_PASSWORD} -e PLUGIN_REPO=banzaicloud/drone-kaniko-test -e PLUGIN_TAGS=test -e PLUGIN_DOCKERFILE=Dockerfile.test -e PLUGIN_CACHE=true banzaicloud/drone-kaniko
```
The very same example just pushing to GCR instead of Docker Hub:
```bash
docker run --net=host -it --rm -w /src -v $PWD:/cache -v $PWD:/src -e PLUGIN_REGISTRY=gcr.io -e PLUGIN_REPO=paas-dev1/drone-kaniko-test -e PLUGIN_TAGS=test -e PLUGIN_DOCKERFILE=Dockerfile.test -e PLUGIN_CACHE=true -e PLUGIN_JSON_KEY="$(<$HOME/google-application-credentials.json)" banzaicloud/drone-kaniko
``` ```

View File

@ -4,11 +4,12 @@ set -euo pipefail
export PATH=$PATH:/kaniko/ export PATH=$PATH:/kaniko/
DOCKER_AUTH=`echo -n "${PLUGIN_USERNAME}:${PLUGIN_PASSWORD}" | base64` REGISTRY=${PLUGIN_REGISTRY:-index.docker.io}
REGISTRY=${PLUGIN_REGISTRY:-https://index.docker.io/v1/} if [ "${PLUGIN_USERNAME:-}" ] || [ "${PLUGIN_PASSWORD:-}" ]; then
DOCKER_AUTH=`echo -n "${PLUGIN_USERNAME}:${PLUGIN_PASSWORD}" | base64 | tr -d "\n"`
cat > /kaniko/.docker/config.json <<DOCKERJSON cat > /kaniko/.docker/config.json <<DOCKERJSON
{ {
"auths": { "auths": {
"${REGISTRY}": { "${REGISTRY}": {
@ -17,28 +18,49 @@ cat > /kaniko/.docker/config.json <<DOCKERJSON
} }
} }
DOCKERJSON DOCKERJSON
fi
if [ "${PLUGIN_JSON_KEY:-}" ];then
echo "${PLUGIN_JSON_KEY}" > /kaniko/gcr.json
export GOOGLE_APPLICATION_CREDENTIALS=/kaniko/gcr.json
fi
DOCKERFILE=${PLUGIN_DOCKERFILE:-Dockerfile} DOCKERFILE=${PLUGIN_DOCKERFILE:-Dockerfile}
CONTEXT=${PLUGIN_CONTEXT:-$PWD} CONTEXT=${PLUGIN_CONTEXT:-$PWD}
LOG=${PLUGIN_LOG:-info} LOG=${PLUGIN_LOG:-info}
case "${PLUGIN_CACHE:-}" in EXTRA_OPTS=""
true) CACHE="true" ;;
*) CACHE="false" ;;
esac
if [[ -n "${PLUGIN_BUILD_ARGS:-}" ]]; then if [[ -n "${PLUGIN_TARGET:-}" ]]; then
TARGET="--target=${PLUGIN_TARGET}"
fi
if [[ "${PLUGIN_SKIP_TLS_VERIFY:-}" == "true" ]]; then
EXTRA_OPTS="--skip-tls-verify=true"
fi
if [[ "${PLUGIN_CACHE:-}" == "true" ]]; then
CACHE="--cache=true"
fi
if [ -n "${PLUGIN_BUILD_ARGS:-}" ]; then
BUILD_ARGS=$(echo "${PLUGIN_BUILD_ARGS}" | tr ',' '\n' | while read build_arg; do echo "--build-arg=${build_arg}"; done) BUILD_ARGS=$(echo "${PLUGIN_BUILD_ARGS}" | tr ',' '\n' | while read build_arg; do echo "--build-arg=${build_arg}"; done)
fi fi
if [[ -n "${PLUGIN_TAGS:-}" ]]; then if [ -n "${PLUGIN_TAGS:-}" ]; then
DESTINATIONS=$(echo "${PLUGIN_TAGS}" | tr ',' '\n' | while read tag; do echo "--destination=${PLUGIN_REPO}:${tag} "; done) DESTINATIONS=$(echo "${PLUGIN_TAGS}" | tr ',' '\n' | while read tag; do echo "--destination=${REGISTRY}/${PLUGIN_REPO}:${tag} "; done)
else elif [ -n "${PLUGIN_REPO:-}" ]; then
DESTINATIONS="--destination=${PLUGIN_REPO}:latest" DESTINATIONS="--destination=${PLUGIN_REPO}:latest"
else
DESTINATIONS="--no-push"
# Cache is not valid with --no-push
CACHE=""
fi fi
/kaniko/executor -v ${LOG} \ /kaniko/executor -v ${LOG} \
--context=${CONTEXT} \ --context=${CONTEXT} \
--dockerfile=${DOCKERFILE} \ --dockerfile=${DOCKERFILE} \
--cache=${CACHE} \ ${EXTRA_OPTS} \
${DESTINATIONS} \ ${DESTINATIONS} \
${CACHE:-} \
${TARGET:-} \
${BUILD_ARGS:-} ${BUILD_ARGS:-}