How to add Docker H...
 
Share:
Notifications
Clear all

How to add Docker Hub Authentication to GitLab Pipeline


Brandon Lee
Posts: 537
Admin
Topic starter
(@brandon-lee)
Member
Joined: 15 years ago

With the recent changes at Docker regarding the new limits placed on pulls from the official Docker registry, it is a great idea to add authentication to your pipelines as the new limits will likely hinder even very low traffic CI/CD solutions. What are those limits?

Starting April 1, Docker will enforce the following pull rate limits according to the GitLab KB here: Prepare now: Docker Hub rate limits will impact GitLab CI/CD

User type Pull rate limit per hour Number of public repositories Number of private repositories
Business, Team, Pro (authenticated) Unlimited (fair use) Unlimited Unlimited
Personal (authenticated) 200 per 6-hour window Unlimited Up to 1
Unauthenticated users 100 per 6-hour window per IPv4 address or IPv6 /64 subnet Not applicable Not applicable

To avoid this, you need to add authentication to your CI/CD pipelines, no matter which solution you are using. However, how do we do this with GitLab?

We can add the authentication using a specialย DOCKER_AUTH_CONFIG parameter in yourย config.toml. This is the configuration file for your runner and the contents get created when you pair a runner with your GitLab instance using theย gitlab-runner register command.

Generating the Docker Hub authentication token

First, we need to sign up for Docker Hub and generate a personal token. You can do this after you have a free Docker account, navigate toย Account Settings > Personal access tokens.

After you click to generate new token, you will see this screen. You can add a description, choose or just leave None for the expiration date, and set the permissions for the token. For what we are trying to accomplish pulling images from the online public repo, you can just leave it set toย Public Repo Read-only.

Once we have the token file, we need to create a BASE64 version of our authentication information that combines our username and the token together. On a Linux machine, you can do this using the command,ย note, below is not literal, you will replaceย dockeruser and the tokentexttokentexttokentextย with your real token that you create in the Personal access tokens area above.

echo -n "dockeruser:tokentexttokentexttokentext" | base64

When you run this command from a Linux terminal, you will get the BASE64 encoded token that we can use in the next step.

ย 

Updating the config.toml file

in the special config.toml file, we can use the environment parameter to configure the authentication like in the below example. Note the following:

concurrent = 1
check_interval = 0
connection_max_age = "15m0s"
shutdown_timeout = 0

[session_server]
  session_timeout = 1800

[[runners]]
  name = "my-runner"
  url = "https://gitlab.example.com"
  id = 0
  token = "REDACTED_TOKEN"
  token_obtained_at = 2024-10-21T00:31:49Z
  token_expires_at = 0001-01-01T00:00:00Z
  executor = "docker"
  environment = [
    "DOCKER_AUTH_CONFIG={\"auths\":{\"https://index.docker.io/v1\":{\"auth\":\"REDACTED_DOCKER_AUTH\"}}}",
    "GIT_HTTP_USERNAME=root",
    "GIT_HTTP_PASSWORD=REDACTED_GIT_PASSWORD"
  ]
  clone_url = "https://gitlab.example.com"
  [runners.custom_build_dir]
  [runners.cache]
    MaxUploadedArchiveSize = 0
    [runners.cache.s3]
    [runners.cache.gcs]
    [runners.cache.azure]
  [runners.docker]
    tls_verify = false
    image = "rocker/verse:latest"
    dns = ["10.1.1.1"]
    privileged = false
    disable_entrypoint_overwrite = false
    oom_kill_disable = false
    disable_cache = false
    volumes = ["/cache"]
    extra_hosts = ["gitlab.example.com:10.1.1.2"]
    shm_size = 0
    network_mtu = 0

ย 

Confirming your pipeline is authenticating to Docker Hub

Now that we have everything in place, we just need to run the pipeline once again and make sure it shows that it is now authenticating using the specialย $DOCKER_AUTH_CONFIG parameter.