Docker:从一个私人的GitHub仓库获取

我试图运行一个容器,将暴露一个包,我有一个私人的GitHub回购一个golang服务。

由于我正在使用GCE,我的初始图像是谷歌/ debian:wheezy。

安装所有必需的依赖和工具后,我正在运行

RUN go get github.com/<my_org>/<my_package> 

该包是私人回购。

我已经添加了我的GitHub SSH密钥,以允许从私人回购克隆到泊坞窗文件:

 ADD priv/id_rsa /root/.ssh/id_rsa ADD priv/id_rsa.pub /root/.ssh/id_rsa.pub 

不过,在尝试克隆repo时,在获取过程中出现错误:

 # cd .; git clone https://github.com/<my_org>/<my_package> /gopath/src/github.com/<my_org>/<my_package> Cloning into '/gopath/src/github.com/<my_org>/<my_package>'... fatal: could not read Username for 'https://github.com': No such device or address package github.com/<my_org>/<my_package>: exit status 128 

为了debugging这个问题,从Dockerfile中运行:

 RUN ssh-keyscan -t rsa github.com 2>&1 >> /root/.ssh/known_hosts 

这告诉我有一些问题。 它看起来像validation私钥是好的,但奇怪的是在公钥上。 这是完整的ssh-keyscan结果:

 OpenSSH_6.0p1 Debian-4+deb7u2, OpenSSL 1.0.1e 11 Feb 2013 Pseudo-terminal will not be allocated because stdin is not a terminal. debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 19: Applying options for * debug1: Connecting to github.com [192.30.252.129] port 22. debug1: Connection established. debug1: permanently_set_uid: 0/0 debug1: identity file /root/.ssh/id_rsa type 1 debug1: Checking blacklist file /usr/share/ssh/blacklist.RSA-2048 debug1: Checking blacklist file /etc/ssh/blacklist.RSA-2048 debug1: identity file /root/.ssh/id_rsa-cert type -1 debug1: identity file /root/.ssh/id_dsa type -1 debug1: identity file /root/.ssh/id_dsa-cert type -1 debug1: identity file /root/.ssh/id_ecdsa type -1 debug1: identity file /root/.ssh/id_ecdsa-cert type -1 debug1: Remote protocol version 2.0, remote software version libssh-0.6.0 debug1: no match: libssh-0.6.0 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_6.0p1 Debian-4+deb7u2 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-ctr hmac-sha1 none debug1: kex: client->server aes128-ctr hmac-sha1 none debug1: sending SSH2_MSG_KEX_ECDH_INIT debug1: expecting SSH2_MSG_KEX_ECDH_REPLY debug1: Server host key: RSA 16:27:ac:a5:76:28:2d:36:63:1b:56:4d:eb:df:a6:48 debug1: Host 'github.com' is known and matches the RSA host key. debug1: Found key in /root/.ssh/known_hosts:1 Warning: Permanently added the RSA host key for IP address '192.30.252.129' to the list of known hosts. debug1: ssh_rsa_verify: signature correct debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: Roaming not allowed by server debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received debug1: Authentications that can continue: publickey debug1: Next authentication method: publickey debug1: Offering RSA public key: /root/.ssh/id_rsa debug1: Server accepts key: pkalg ssh-rsa blen 279 debug1: key_parse_private_pem: PEM_read_PrivateKey failed debug1: read PEM private key done: type <unknown> debug1: read_passphrase: can't open /dev/tty: No such device or address debug1: Trying private key: /root/.ssh/id_dsa debug1: Trying private key: /root/.ssh/id_ecdsa debug1: No more authentication methods to try. Permission denied (publickey). 

我已经在priv / public keys上尝试了chmod 600和chmod 700,这没有帮助。

任何线索? 有没有人成功运行去获取从docker的debian私人回购?

在经过一些黑客攻击之后,我想到了这一点。 这不是一个理想的解决scheme,因为它涉及安装SSH,并在容器中构build私钥。 这个例子是基于官方的Docker golang镜像 (Debian Wheezy):

你的例子的主要区别是,你需要一个git config命令来强制ssh而不是默认的https。

 FROM golang RUN apt-get update && apt-get install -y ca-certificates git-core ssh ADD keys/my_key_rsa /root/.ssh/id_rsa RUN chmod 700 /root/.ssh/id_rsa RUN echo "Host github.com\n\tStrictHostKeyChecking no\n" >> /root/.ssh/config RUN git config --global url.ssh://git@github.com/.insteadOf https://github.com/ ADD . /go/src/github.com/myaccount/myprivaterepo RUN go get github.com/myaccount/myprivaterepo RUN go install github.com/myaccount/myprivaterepo 

go get是试图使用https,完全忽略SSH。

你将不得不设置~/.netrc

 ADD priv/.netrc /root/.netrc 

netrc看起来像:

 machine github.com login github-username password github-password 

参考:

在OneOfOne的~/.netrc答案详细说明,这就是我正在做的与Jenkins在Linux上:

 FROM golang:1.6 ARG GITHUB_USER=$GITHUB_USER ARG GITHUB_PASS=$GITHUB_PASS # Copy local package files to the container's workspace. ADD . /go/src/github.com/my-org/my-project WORKDIR /go/src/github.com/my-org/my-project/ # Build application inside the container. RUN echo "machine github.com\n\tlogin $GITHUB_USER\n\tpassword $GITHUB_PASS" >> ~/.netrc && \ go get github.com/tools/godep && \ go get github.com/onsi/ginkgo/ginkgo && \ godep restore && \ ginkgo -r --randomizeAllSpecs --randomizeSuites --failOnPending && \ godep go install && \ rm -f ~/.netrc ENTRYPOINT /go/bin/my-project EXPOSE 8080 

docker build命令是:

 docker build \ --build-arg GITHUB_USER=xxxxx \ --build-arg GITHUB_PASS=yyyyy \ -t my-project . 

两个ARG指令映射--build-arg s,因此docker可以在Dockerfile中使用它们。

RUN的第一行和最后一行创build并删除~/.netrc

在Jenkins中,我在构build命令中使用了git pull中相同的声明。

在此策略中,docker构build过程中密码不会被回显,也不会保存在泊坞窗图像的任何图层上。 另外请注意,在构build过程中将银杏testing结果打印到控制台。