Logo Questions Linux Laravel Mysql Ubuntu Git Menu
 

Jenkins + Docker: How to control docker user when using Image.inside command

Dear Stackoverflow Community,

I am trying to setup a Jenkins CI pipeline using docker images as containers for my build processes. I am defining a Jenkinsfile to have a build pipeline as code. I am doing something like this:

node {   docker.withRegistry('http://my.registry.com', 'docker-credentials') {            def buildimage = docker.image('buildimage:latest');       buildimage.pull();       buildimage.inside("")       {         stage('Checkout sources') {           git url: '...', credentialsId: '...'         }          stage('Run Build and Publish') {             sh "..."         }       }   } } 

Unfortunately I am stumbling upon a weird behavior of the Docker pipeline plugin. In the build output I can see that the Image.inside(...) command triggers the container with a

docker run -t -d -u 1000:1000 ... 

This makes my build fail, because the user defined in the Dockerfile does not have the UID 1000 ... another user is actually taken. I even tried specifying which user should be used within the Jenkinsfile

node {   docker.withRegistry('http://my.registry.com', 'docker-credentials') {            def buildimage = docker.image('buildimage:latest');       buildimage.pull();       buildimage.inside("-u otheruser:othergroup")       {         stage('Checkout sources') {           git url: '...', credentialsId: '...'         }          stage('Run Build and Publish') {             sh "..."         }       }   } } 

but this leads to a duplicate -u switch in the resulting docker run command

docker run -t -d -u 1000:1000 -u otheruser:othergroup ... 

and obviously only the first -u is applied because my build still fails. I also did debugging using whoami to validate my assumptions.

So my questions: how can I change this behavior? Is there a switch where I can turn the -u 1000:1000 off? Is this even a bug? I actually like to work with the Docker plugin because it simplifies the usage of an own docker registry with credentials maintained in Jenkins. However, is there another simple way to get to my goal if the Docker Plugin is not usable?

Thank you in advance for your time

like image 734
RoK Avatar asked Mar 06 '17 16:03

RoK


People also ask

How do I allow Jenkins user to run Docker?

Compose Configuration (Linux or macOS) Add a group docker if it does not exist, and add jenkins user to the docker group, e.g. groupadd docker && usermode -aG docker 'jenkins' . Adjust permissions on the docker. sock file so that jenkins user can access it, e.g. chmod 777 /var/run/docker.

Can we run commands while building Docker images?

You can now drop into your Docker image and start interactively running commands! You can keep running these steps, commenting out your Dockerfile, dropping into a shell, and figuring out problematic commands, until your Docker images builds perfectly.

How do Docker and Jenkins work together?

Jenkins builds a new docker image and pushes it to the Docker registry. Jenkins notifies Kubernetes of the new image available for deployment. Kubernetes pulls the new docker image from the docker registry. Kubernetes deploys and manages the docker instance/container.


2 Answers

I found you can actually change user by adding args like following. Although -u 1000:1000 will still be there in the docker run, you will an additional -u [your user] after 1000:1000. Docker will acutally use latest -u parameter

agent {   docker {     image 'your image'     args '-u root --privileged'   } } 
like image 144
Steven Shi Avatar answered Oct 05 '22 21:10

Steven Shi


As you can see here or here is hardcoded the fact of append the uid and gid of the user that is running Jenkins (in your case, the Jenkins user created inside the oficial docker image).

You can change the user that runs the processes inside your Jenkins image passing the --user (or -u) argument to the docker run command. Maybe this can minimize your problems.

Edited

how can I change this behavior? Is there a switch where I can turn the -u 1000:1000 off?

You can't change this behaviour in the actual version because the whoami is hardcoded.

Is this even a bug?

In this pull request seems that they are working on it.

However, is there another simple way to get to my goal if the Docker Plugin is not usable?

The new pipeline plugin version that comes with Jenkins also use the docker-workflow-plugin to run the containers. I don't know another plugin to run that in a simple way. To workaround this, you can run your Jenkins as root but is a very ugly solution.

like image 43
z0beat Avatar answered Oct 05 '22 23:10

z0beat