- Prerequisites
- Authentication with registries
- Build and push an image
- Build a multi-arch image
- Use a registry with a custom certificate
- Video walkthrough of a working example
- Troubleshooting
Use kaniko to build Docker images
{{< details >}}
- Tier: Free, Premium, Ultimate
- Offering: GitLab.com, GitLab Self-Managed, GitLab Dedicated
{{< /details >}}
kaniko is a tool to build container images from a Dockerfile, inside a container or Kubernetes cluster.
kaniko solves two problems with using the Docker-in-Docker build method:
- Docker-in-Docker requires privileged mode to function, which is a significant security concern.
- Docker-in-Docker generally incurs a performance penalty and can be slow.
Prerequisites
To use kaniko with GitLab, a runner with one of the following executors is required:
Authentication with registries
Authentication is required when building and pushing images with kaniko:
- For the GitLab container registry, authentication happens automatically without any manual configuration.
- For pulling images through the GitLab dependency proxy, additional configuration is required.
For more information on how authentication works, see access an image from a private container registry.
For more information on authentication with other registries, see pushing to different registries.
Authenticate with the container registry
When pushing to the GitLab container registry, authentication happens automatically without requiring any manual configuration:
- GitLab CI/CD generates authentication credentials from the
CI_REGISTRY
,CI_REGISTRY_USER
, andCI_REGISTRY_PASSWORD
predefined CI/CD variables. -
These credentials are stored in the
DOCKER_AUTH_CONFIG
environment variable as a JSON object that contains base64-encoded authentication strings:{ "auths": { "registry.example.com:5000": { "auth": "bXlfdXNlcm5hbWU6bXlfcGFzc3dvcmQ=" } } }
- The contents of the
DOCKER_AUTH_CONFIG
variable is automatically copied from the$HOME/.docker/config.json
file before kaniko runs. - kaniko automatically detects and uses this file for authentication with the registry.
- If the
DOCKER_AUTH_CONFIG
variable is empty or misconfigured, authentication fails. See debug authentication issues for troubleshooting steps.
{{< alert type=”note” >}}
The configuration file is hidden when inspecting the container because GitLab CI/CD manages it internally. Manually creating or modifying this file might cause authentication issues.
{{< /alert >}}
Authenticate with the dependency proxy
If you need to pull images through the dependency proxy,
you must add the corresponding CI/CD variables for authentication to the config.json
file:
build:
script:
# Create a config.json with authentication for both the GitLab container registry and dependency proxy
- |
echo "{
\"auths\": {
\"${CI_REGISTRY}\": {
\"auth\": \"$(printf "%s:%s" "${CI_REGISTRY_USER}" "${CI_REGISTRY_PASSWORD}" | base64 | tr -d '\n')\"
},
\"$(echo -n $CI_DEPENDENCY_PROXY_SERVER | awk -F[:] '{print $1}')\": {
\"auth\": \"$(printf "%s:%s" ${CI_DEPENDENCY_PROXY_USER} "${CI_DEPENDENCY_PROXY_PASSWORD}" | base64 | tr -d '\n')\"
}
}
}" > /kaniko/.docker/config.json
This configuration strips the port, for example :443
, from CI_DEPENDENCY_PROXY_SERVER
so you don’t have to include it when referencing images.
For more information, see authenticate within CI/CD.
Build and push an image
When building an image with kaniko and GitLab CI/CD, you should be aware of a few important details:
- The kaniko debug image is recommended (
gcr.io/kaniko-project/executor:debug
) because it has a shell, and a shell is required for an image to be used with GitLab CI/CD. - The entrypoint needs to be overridden, otherwise the build script doesn’t run.
In the following example, kaniko is used to:
- Build a Docker image.
- Push it to GitLab container registry.
The job runs only when a tag is pushed.
In the last step, kaniko uses the Dockerfile
under the
root directory of the project, builds the Docker image and pushes it to the
project’s container registry while tagging it with the Git tag:
build:
stage: build
image:
name: gcr.io/kaniko-project/executor:v1.23.2-debug
entrypoint: [""]
script:
- /kaniko/executor
--context "${CI_PROJECT_DIR}"
--dockerfile "${CI_PROJECT_DIR}/Dockerfile"
--destination "${CI_REGISTRY_IMAGE}:${CI_COMMIT_TAG}"
rules:
- if: $CI_COMMIT_TAG
Build an image behind a proxy
If you use a custom GitLab Runner behind an http(s) proxy, kaniko needs to be set up accordingly. This means:
- Passing the
http_proxy
environment variables as build arguments so the Dockerfile instructions can use the proxy when building the image.
The previous example can be extended as follows:
build:
stage: build
variables:
http_proxy: <your-proxy>
https_proxy: <your-proxy>
no_proxy: <your-no-proxy>
image:
name: gcr.io/kaniko-project/executor:v1.23.2-debug
entrypoint: [""]
script:
- /kaniko/executor
--context "${CI_PROJECT_DIR}"
--build-arg http_proxy=$http_proxy
--build-arg https_proxy=$https_proxy
--build-arg no_proxy=$no_proxy
--dockerfile "${CI_PROJECT_DIR}/Dockerfile"
--destination "${CI_REGISTRY_IMAGE}:${CI_COMMIT_TAG}"
rules:
- if: $CI_COMMIT_TAG
Build a multi-arch image
You can build multi-arch images
inside a container by using manifest-tool
.
For a detailed guide on how to build a multi-arch image, see Building a multi-arch container image in unprivileged containers.
Use a registry with a custom certificate
When trying to push to a Docker registry that uses a certificate that is signed by a custom CA, you might get the following error:
$ /kaniko/executor --context $CI_PROJECT_DIR --dockerfile $CI_PROJECT_DIR/Dockerfile --no-push
INFO[0000] Downloading base image registry.gitlab.example.com/group/docker-image
error building image: getting stage builder for stage 0: Get https://registry.gitlab.example.com/v2/: x509: certificate signed by unknown authority
This can be solved by adding your CA’s certificate to the kaniko certificate store:
before_script:
- |
echo "-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----" >> /kaniko/ssl/certs/ca-certificates.crt
Video walkthrough of a working example
The Least Privilege Container Builds with Kaniko on GitLab video is a walkthrough of the Kaniko Docker Build Guided Exploration project pipeline. It was tested on:
The example can be copied to your own group or instance for testing. More details on what other GitLab CI patterns are demonstrated are available at the project page.
Troubleshooting
Debug authentication issues
To debug authentication issues with kaniko:
-
Enable debug logging by adding
CI_DEBUG_TRACE: "true"
to your job variables.{{< alert type=”warning” >}}
Debug logging exposes sensitive information including authentication tokens in your job logs. Enable it temporarily and only when needed for troubleshooting.
{{< /alert >}}
In the debug logs, examine the
DOCKER_AUTH_CONFIG
variable. - To isolate authentication issues, configure credentials per job.
- If you’re using Docker-in-Docker, see authenticate with registry in Docker-in-Docker.
403 error: “error checking push permissions”
If you receive this error, it might be due to an outside proxy. Setting the http_proxy
and https_proxy
environment variables
can fix the problem.
Error: kaniko should only be run inside of a container
There is a known incompatibility introduced by Docker Engine 20.10
When the host uses Docker Engine 20.10 or newer, then the gcr.io/kaniko-project/executor:debug
image in a version
older than v1.9.0 does not work as expected.
When you try to build the image, Kaniko fails with:
kaniko should only be run inside of a container, run with the --force flag if you are sure you want to continue
To resolve this issue, update the gcr.io/kaniko-project/executor:debug
container to version at least v1.9.0,
for example gcr.io/kaniko-project/executor:v1.23.2-debug
.
The opposite configuration (gcr.io/kaniko-project/executor:v1.23.2-debug
image and Docker Engine
on the host in version 19.06.x or older) works without problems. For the best strategy, you should
frequently test and update job environment versions to the newest. This brings new features, improved
security and - for this specific case - makes the upgrade on underlying Docker Engine on the runner’s
host transparent for the job.