Skip to content

Latest commit

 

History

History
127 lines (90 loc) · 6.51 KB

pull.md

File metadata and controls

127 lines (90 loc) · 6.51 KB

A repository rule to pull image layers using Bazel's downloader.

Typical usage in WORKSPACE.bazel:

load("@rules_oci//oci:pull.bzl", "oci_pull")

# A single-arch base image
oci_pull(
    name = "distroless_java",
    digest = "sha256:161a1d97d592b3f1919801578c3a47c8e932071168a96267698f4b669c24c76d",
    image = "gcr.io/distroless/java17",
    platforms = ["linux/amd64"],  # Optional
)

# A multi-arch base image
oci_pull(
    name = "distroless_static",
    digest = "sha256:c3c3d0230d487c0ad3a0d87ad03ee02ea2ff0b3dcce91ca06a1019e07de05f12",
    image = "gcr.io/distroless/static",
    platforms = [
        "linux/amd64",
        "linux/arm64",
    ],
)

Now you can refer to these as a base layer in BUILD.bazel. The target is named the same as the external repo, so you can use a short label syntax:

oci_image(
    name = "app",
    base = "@distroless_static",
    ...
)

Configuration

Docker specifies a standard location where registry credentials are stored: <https://docs.docker.com/engine/reference/commandline/cli/#configuration-files>

We search for this file in several locations, following the logic at https://github.com/google/go-containerregistry/tree/main/pkg/authn#tldr-for-consumers-of-this-package.

Set --repo_env=DOCKER_CONFIG=/some/other/directory to cause oci_pull to look for config.json in this directory instead.

Finally, some less-common use cases are afforded with environment variables XDG_RUNTIME_DIR and REGISTRY_AUTH_FILE. See the implementation of _get_auth_file_path in /oci/private/auth_config_locator.bzl for the complete reference.

Authentication using credential helpers

By default oci_pull try to mimic docker pull authentication mechanism to allow users simply use docker login for authentication.

However, this doesn't always work due to some limitations of Bazel where response headers can't be read, which prevents us from performing WWW-Authenticate challenges, as we don't know which endpoint to hit to complete the challenge. To workaround this we keep a map of known registries that require us to perform www-auth challenge to acquire a temporary token for authentication.

Fortunately, Bazel supports running external programs to authenticate http requests using the --credential_helper command line flag. When the credential helper flag passed, Bazel will call the external program before sending the request to allow additional headers to be set.

An example of this

.bazelrc

common --credential_helper=public.ecr.aws=%workspace%/tools/auth.sh

tools/auth.sh

input=$(cat)
uri=$(jq -r ".uri" &lt;&lt;&lt; $input)
host="$(echo $uri | awk -F[/:] '{print $4}')"
curl -fsSL https://$host/token | jq '{headers:{"Authorization": [("Bearer " + .token)]}}'

This tells bazel to run %workspace%/tools/auth.sh for any request sent to public.ecr.aws and add additional headers that may have been printed to stdout by the external program.

For more information about the credential helpers checkout the documentation.

See the examples/credential_helper directory for an example of how this work.

oci_pull

oci_pull(name, image, repository, registry, platforms, digest, tag, reproducible, is_bzlmod, config,
         config_path)

Repository macro to fetch image manifest data from a remote docker registry.

To use the resulting image, you can use the @wkspc shorthand label, for example if name = "distroless_base", then you can just use base = "@distroless_base" in rules like oci_image.

> This shorthand syntax is broken on the command-line prior to Bazel 6.2. > See bazelbuild/bazel#4385

PARAMETERS

Name Description Default Value
name repository with this name is created none
image the remote image, such as gcr.io/bazel-public/bazel. A tag can be suffixed with a colon, like debian:latest, and a digest can be suffixed with an at-sign, like debian@sha256:e822570981e13a6ef1efcf31870726fbd62e72d9abfdcf405a9d8f566e8d7028.

Exactly one of image or {registry,repository} should be set.
None
repository the image path beneath the registry, such as distroless/static. When set, registry must be set as well. None
registry the remote registry domain, such as gcr.io or docker.io. When set, repository must be set as well. None
platforms a list of the platforms the image supports. Mandatory for multi-architecture images. Optional for single-architecture images, which expect a one-element list. This creates a separate external repository for each platform, avoiding fetching layers, and an alias that validates the presence of an image matching the target platform's cpu. None
digest the digest string, starting with "sha256:", "sha512:", etc. If omitted, instructions for pinning are provided. None
tag a tag to choose an image from the registry. Exactly one of tag and digest must be set. Since tags are mutable, this is not reproducible, so a warning is printed. None
reproducible Set to False to silence the warning about reproducibility when using tag. True
is_bzlmod whether the oci_pull is being called from a module extension False
config Label to a .docker/config.json file. None
config_path Deprecated. use config attribute or DOCKER_CONFIG environment variable. None