Jib is a Gradle plugin for building Docker and OCI images for your Java applications.
For the Maven plugin, see the jib-maven-plugin project.
For information about the project, see the Jib project README.
Make sure you are using Gradle version 4.6 or later.
In your Gradle Java project, add the plugin to your build.gradle
:
plugins {
id 'com.google.cloud.tools.jib' version '1.0.2'
}
See the Gradle Plugin Portal for more details.
You can containerize your application easily with one command:
gradle jib --image=<MY IMAGE>
This builds and pushes a container image for your application to a container registry. If you encounter authentication issues, see Authentication Methods.
To build to a Docker daemon, use:
gradle jibDockerBuild
If you would like to set up Jib as part of your Gradle build, follow the guide below.
Configure the plugin by setting the image to push to:
Using Google Container Registry (GCR)...
Make sure you have the docker-credential-gcr
command line tool. Jib automatically uses docker-credential-gcr
for obtaining credentials. See Authentication Methods for other ways of authenticating.
For example, to build the image gcr.io/my-gcp-project/my-app
, the configuration would be:
jib.to.image = 'gcr.io/my-gcp-project/my-app'
Make sure you have the docker-credential-ecr-login
command line tool. Jib automatically uses docker-credential-ecr-login
for obtaining credentials. See Authentication Methods for other ways of authenticating.
For example, to build the image aws_account_id.dkr.ecr.region.amazonaws.com/my-app
, the configuration would be:
jib.to.image = 'aws_account_id.dkr.ecr.region.amazonaws.com/my-app'
Using Docker Hub Registry...
Make sure you have a docker-credential-helper set up. For example, on macOS, the credential helper would be docker-credential-osxkeychain
. See Authentication Methods for other ways of authenticating.
For example, to build the image my-docker-id/my-app
, the configuration would be:
jib.to.image = 'my-docker-id/my-app'
Using Azure Container Registry (ACR)...
Make sure you have a ACR Docker Credential Helper
installed and set up. For example, on Windows, the credential helper would be docker-credential-acr-windows
. See Authentication Methods for other ways of authenticating.
For example, to build the image my_acr_name.azurecr.io/my-app
, the configuration would be:
jib.to.image = 'my_acr_name.azurecr.io/my-app'
Build your container image with:
gradle jib
Subsequent builds are much faster than the initial build.
Having trouble? Let us know by submitting an issue, contacting us on Gitter, or posting to the Jib users forum.
Jib can also build your image directly to a Docker daemon. This uses the docker
command line tool and requires that you have docker
available on your PATH
.
gradle jibDockerBuild
If you are using minikube
's remote Docker daemon, make sure you set up the correct environment variables to point to the remote daemon:
eval $(minikube docker-env)
gradle jibDockerBuild
Alternatively, you can set environment variables in the Jib configuration. See dockerClient
for more configuration options.
You can build and save your image to disk as a tarball with:
gradle jibBuildTar
This builds and saves your image to build/jib-image.tar
, which you can load into docker with:
docker load --input build/jib-image.tar
You can also have jib
run with each build by attaching it to the build
task:
tasks.build.dependsOn tasks.jib
Then, gradle build
will build and containerize your application.
As part of an image build, Jib also writes out the image digest to
build/jib-image.digest
, as well as the image ID to build/jib-image.id
The plugin provides the jib
extension for configuration with the following options for customizing the image build:
Field | Type | Default | Description |
---|---|---|---|
to |
to |
Required | Configures the target image to build your application to. |
from |
from |
See from |
Configures the base image to build your application on top of. |
container |
container |
See container |
Configures the container that is run from your built image. |
extraDirectory |
extraDirectory / File |
(project-dir)/src/main/jib |
Configures the directory used to add arbitrary files to the image. |
allowInsecureRegistries |
boolean |
false |
If set to true, Jib ignores HTTPS certificate errors and may fall back to HTTP as a last resort. Leaving this parameter set to false is strongly recommended, since HTTP communication is unencrypted and visible to others on the network, and insecure HTTPS is no better than plain HTTP. If accessing a registry with a self-signed certificate, adding the certificate to your Java runtime's trusted keys may be an alternative to enabling this option. |
from
is a closure with the following properties:
Property | Type | Default | Description |
---|---|---|---|
image |
String |
gcr.io/distroless/java |
The image reference for the base image. |
auth |
auth |
None | Specify credentials directly (alternative to credHelper ). |
credHelper |
String |
None | Specifies a credential helper that can authenticate pulling the base image. This parameter can either be configured as an absolute path to the credential helper executable or as a credential helper suffix (following docker-credential- ). |
to
is a closure with the following properties:
Property | Type | Default | Description |
---|---|---|---|
image |
String |
Required | The image reference for the target image. This can also be specified via the --image command line option. |
auth |
auth |
None | Specify credentials directly (alternative to credHelper ). |
credHelper |
String |
None | Specifies a credential helper that can authenticate pushing the target image. This parameter can either be configured as an absolute path to the credential helper executable or as a credential helper suffix (following docker-credential- ). |
tags |
List<String> |
None | Additional tags to push to. |
auth
is a closure with the following properties (see Using Specific Credentials):
Property | Type |
---|---|
username |
String |
password |
String |
container
is a closure with the following properties:
Property | Type | Default | Description |
---|---|---|---|
appRoot |
String |
/app |
The root directory on the container where the app's contents are placed. Particularly useful for WAR-packaging projects to work with different Servlet engine base images by designating where to put exploded WAR contents; see WAR usage as an example. |
args |
List<String> |
None | Additional program arguments appended to the command to start the container (similar to Docker's CMD instruction in relation with ENTRYPOINT). In the default case where you do not set a custom entrypoint , this parameter is effectively the arguments to the main method of your Java application. |
entrypoint |
List<String> |
None | The command to start the container with (similar to Docker's ENTRYPOINT instruction). If set, then jvmFlags and mainClass are ignored. You may also set jib.container.entrypoint = 'INHERIT' to indicate that the entrypoint and args should be inherited from the base image.* |
environment |
Map<String, String> |
None | Key-value pairs for setting environment variables on the container (similar to Docker's ENV instruction). |
format |
String |
Docker |
Use OCI to build an OCI container image. |
jvmFlags |
List<String> |
None | Additional flags to pass into the JVM when running your application. |
labels |
Map<String, String> |
None | Key-value pairs for applying image metadata (similar to Docker's LABEL instruction). |
mainClass |
String |
Inferred** | The main class to launch your application from. |
ports |
List<String> |
None | Ports that the container exposes at runtime (similar to Docker's EXPOSE instruction). |
useCurrentTimestamp |
boolean |
false |
By default, Jib wipes all timestamps to guarantee reproducibility. If this parameter is set to true , Jib will set the image's creation timestamp to the time of the build, which sacrifices reproducibility for easily being able to tell when your image was created. |
user |
String |
None | The user and group to run the container as. The value can be a username or UID along with an optional groupname or GID. The following are all valid: user , uid , user:group , uid:gid , uid:group , user:gid . |
volumes |
List<String> |
None | Specifies a list of mount points on the container. |
workingDirectory |
String |
None | The working directory in the container. |
extraDirectory
is an object with the following properties (see Adding Arbitrary Files to the Image):
Property | Type |
---|---|
path |
File |
permissions |
Map<String, String> |
(jibDockerBuild
only) dockerClient
is an object that can be configured directly on the jibDockerBuild
task, and has the following properties:
Property | Type | Default | Description |
---|---|---|---|
executable |
File |
docker |
Sets the path to the Docker executable that is called to load the image into the Docker daemon. |
environment |
Map<String, String> |
None | Sets environment variables used by the Docker executable. |
Each of these parameters is configurable via commandline using system properties. Jib's system properties follow the same naming convention as the configuration parameters, with each level separated by dots (i.e. -Djib.parameterName[.nestedParameter.[...]]=value
). Some examples are below:
gradle jib \
-Djib.to.image=myregistry/myimage:latest \
-Djib.to.auth.username=$USERNAME \
-Djib.to.auth.password=$PASSWORD
gradle jibDockerBuild \
-Djib.dockerClient.executable=/path/to/docker \
-Djib.container.environment=key1="value1",key2="value2" \
-Djib.container.args=arg1,arg2,arg3
The following table contains additional system properties that are not available as build configuration parameters:
Property | Type | Default | Description |
---|---|---|---|
jib.httpTimeout |
int |
20000 |
HTTP connection/read timeout for registry interactions, in milliseconds. Use a value of 0 for an infinite timeout. |
jib.useOnlyProjectCache |
boolean |
false |
If set to true, Jib does not share a cache between different Maven projects. |
jib.baseImageCache |
File |
[user cache home]/google-cloud-tools-java/jib |
Sets the directory to use for caching base image layers. This cache can (and should) be shared between multiple images. |
jib.applicationCache |
File |
[project dir]/target/jib-cache |
Sets the directory to use for caching application layers. This cache can be shared between multiple images. |
jib.console |
String |
None | If set to plain , Jib will print plaintext log messages rather than display a progress bar during the build. |
* If you configure args
while entrypoint
is set to 'INHERIT'
, the configured args
value will take precedence over the CMD propagated from the base image.
** Uses the main class defined in the jar
task or tries to find a valid main class.
In this configuration, the image:
- Is built from a base of
openjdk:alpine
(pulled from Docker Hub) - Is pushed to
localhost:5000/my-image:built-with-jib
,localhost:5000/my-image:tag2
, andlocalhost:5000/my-image:latest
- Runs by calling
java -Xms512m -Xdebug -Xmy:flag=jib-rules -cp app/libs/*:app/resources:app/classes mypackage.MyApp some args
- Exposes port 1000 for tcp (default), and ports 2000, 2001, 2002, and 2003 for udp
- Has two labels (key1:value1 and key2:value2)
- Is built as OCI format
jib {
from {
image = 'openjdk:alpine'
}
to {
image = 'localhost:5000/my-image/built-with-jib'
credHelper = 'osxkeychain'
tags = ['tag2', 'latest']
}
container {
jvmFlags = ['-Xms512m', '-Xdebug', '-Xmy:flag=jib-rules']
mainClass = 'mypackage.MyApp'
args = ['some', 'args']
ports = ['1000', '2000-2003/udp']
labels = [key1:'value1', key2:'value2']
format = 'OCI'
}
}
* Note: this is an incubating feature and may change in the future.
You can add arbitrary, non-classpath files to the image by placing them in a src/main/jib
directory. This will copy all files within the jib
folder to the image's root directory, maintaining the same structure (e.g. if you have a text file at src/main/jib/dir/hello.txt
, then your image will contain /dir/hello.txt
after being built with Jib).
You can configure a different directory by using the jib.extraDirectory
parameter in your build.gradle
:
jib {
// Copies files from 'src/main/custom-extra-dir' instead of 'src/main/jib'
extraDirectory = file('src/main/custom-extra-dir')
}
Alternatively, the jib.extraDirectory
parameter can be used as a closure to set a custom extra directory, as well as the extra files' permissions on the container:
jib {
extraDirectory {
path = file('src/main/custom-extra-dir') // Copies files from 'src/main/custom-extra-dir'
permissions = [
'/path/on/container/to/fileA': '755', // Read/write/execute for owner, read/execute for group/other
'/path/to/another/file': '644' // Read/write for owner, read-only for group/other
]
}
}
Pushing/pulling from private registries require authorization credentials. These can be retrieved using Docker credential helpers. If you do not define credentials explicitly, Jib will try to use credentials defined in your Docker config or infer common credential helpers.
Docker credential helpers are CLI tools that handle authentication with various registries.
Some common credential helpers include:
- Google Container Registry:
docker-credential-gcr
- AWS Elastic Container Registry:
docker-credential-ecr-login
- Docker Hub Registry:
docker-credential-*
- Azure Container Registry:
docker-credential-acr-*
Configure credential helpers to use by specifying them as a credHelper
for their respective image in the jib
extension.
Example configuration:
jib {
from {
image = 'aws_account_id.dkr.ecr.region.amazonaws.com/my-base-image'
credHelper = 'ecr-login'
}
to {
image = 'gcr.io/my-gcp-project/my-app'
credHelper = 'gcr'
}
}
You can specify credentials directly in the extension for the from
and/or to
images.
jib {
from {
image = 'aws_account_id.dkr.ecr.region.amazonaws.com/my-base-image'
auth {
username = USERNAME // Defined in 'gradle.properties'.
password = PASSWORD
}
}
to {
image = 'gcr.io/my-gcp-project/my-app'
auth {
username = 'oauth2accesstoken'
password = 'gcloud auth print-access-token'.execute().text.trim()
}
}
}
These credentials can be stored in gradle.properties
, retrieved from a command (like gcloud auth print-access-token
), or read in from a file.
For example, you can use a key file for authentication (for GCR, see Using a JSON key file):
jib {
to {
image = 'gcr.io/my-gcp-project/my-app'
auth {
username = '_json_key'
password = file('keyfile.json').text
}
}
}
Jib also containerizes WAR projects. If the Gradle project uses the WAR Plugin, Jib will by default use the distroless Jetty as a base image to deploy the project WAR. No extra configuration is necessary other than using the WAR Plugin to make Jib build WAR images.
Note that Jib will work slightly differently for WAR projects from JAR projects:
container.mainClass
andcontainer.jvmFlags
are ignored.- The WAR will be exploded into
/jetty/webapps/ROOT
, which is the expected WAR location for the distroless Jetty base image.
To use a different Servlet engine base image, you can customize container.appRoot
, container.entrypoint
, and container.args
. If you do not set entrypoint
or args
, Jib will inherit the ENTRYPOINT
and CMD
of the base image, so in many cases, you may not need to configure them. However, you will most likely have to set container.appRoot
to a proper location depending on the base image. Here is an example of using a Tomcat image:
jib {
from.image = 'tomcat:8.5-jre8-alpine'
// For demonstration only: this directory in the base image contains a Tomcat default
// app (welcome page), so you may first want to delete this directory in the base image.
container.appRoot = '/usr/local/tomcat/webapps/ROOT'
}
See the Jib project FAQ.
See Milestones for planned features. Get involved with the community for the latest updates.
See the Jib project README.