We recently forked the Docker plugin to add some extra labels that are useful for us when tracking code changes across our Ci/CD pipeline. When changing one of our builds to use the new image, authentication is failing when it was previously working with plugins/docker. I’ve added our new image to the Secret as allowed but we’re still seeing the authentication failure.
Is there anything else I need to do to allow Secrets to be passed into custom plugin images?
+ /usr/local/bin/dockerd -g /var/lib/docker
time="2017-10-30T15:36:52Z" level=warning msg="the \"-g / --graph\" flag is deprecated. Please use \"--data-root\" instead"
time="2017-10-30T15:36:52.789894493Z" level=warning msg="could not change group /var/run/docker.sock to docker: group docker not found"
time="2017-10-30T15:36:52.792888816Z" level=info msg="libcontainerd: new containerd process, pid: 18"
Error starting daemon: error initializing graphdriver: operation not permitted
time="2017-10-30T15:37:08Z" level=fatal msg="Error authenticating: exit status 1"
Also what is your full yaml file? Are you running your custom docker plugin in privileged mode so that the docker daemon can start? Or did you add your custom plugin to the server whitelist (below) so that it automatically starts in privileged mode?
To calrify, myrepo/myimage is plugins/docker with my self signed CA.
You can alternatively define a global volume that mounts your self-signed CA into the build containers. This might be a better option, as it would allow you to use the default images.
You might also be able to set insecure: true in the yaml to disable tls verification. This is not ideal, but may be an option if you are running behind the firewall.