Convert Figma logo to code with AI

docker logobuild-push-action

GitHub Action to build and push Docker images with Buildx

5,081
693
5,081
55

Top Related Projects

GitHub Action to extract metadata (tags, labels) from Git reference and GitHub events for Docker

A GitHub Action for installing and configuring the gcloud CLI.

Quick Overview

The docker/build-push-action is a GitHub Action that enables building and pushing Docker images as part of GitHub Actions workflows. It simplifies the process of creating and publishing Docker images directly from your GitHub repository, making it easier to integrate Docker-based deployments into your CI/CD pipeline.

Pros

  • Easy integration with GitHub Actions workflows
  • Supports multi-platform builds (e.g., linux/amd64, linux/arm64)
  • Automatic Docker BuildKit builder instance with caching mechanisms
  • Seamless integration with Docker Hub and other container registries

Cons

  • Limited to GitHub Actions environment
  • May require additional setup for complex build scenarios
  • Potential learning curve for users new to GitHub Actions or Docker
  • Dependency on external services (e.g., Docker Hub) for image storage

Getting Started

To use the docker/build-push-action in your GitHub Actions workflow, add the following step to your workflow file:

- name: Build and push Docker image
  uses: docker/build-push-action@v4
  with:
    context: .
    push: true
    tags: user/app:latest

This example builds a Docker image from the current directory and pushes it to Docker Hub with the tag user/app:latest. Make sure to set up authentication for your container registry before pushing.

For more advanced usage, including multi-platform builds and custom cache configuration, refer to the project's README and documentation on GitHub.

Competitor Comparisons

GitHub Action to extract metadata (tags, labels) from Git reference and GitHub events for Docker

Pros of metadata-action

  • Focuses specifically on generating metadata for Docker images
  • Provides more granular control over image tags and labels
  • Can be used independently of the build and push process

Cons of metadata-action

  • Requires additional configuration and setup compared to build-push-action
  • Limited to metadata generation, doesn't handle building or pushing images
  • May introduce complexity for simple workflows

Code Comparison

metadata-action:

- uses: docker/metadata-action@v4
  with:
    images: name/app
    tags: |
      type=semver,pattern={{version}}
      type=sha

build-push-action:

- uses: docker/build-push-action@v4
  with:
    context: .
    push: true
    tags: name/app:latest

Summary

metadata-action offers more flexibility and control over Docker image metadata, making it ideal for complex tagging strategies. However, it requires additional setup and is limited to metadata generation. build-push-action provides a more streamlined approach for building and pushing images, but with less granular control over metadata. The choice between the two depends on the specific requirements of your Docker workflow and the level of control needed over image metadata.

A GitHub Action for installing and configuring the gcloud CLI.

Pros of setup-gcloud

  • Specifically designed for Google Cloud Platform (GCP) integration
  • Provides easy authentication and configuration for GCP services
  • Offers a wide range of GCP-specific actions and commands

Cons of setup-gcloud

  • Limited to GCP ecosystem, not suitable for other cloud providers
  • Requires more setup steps for non-GCP container registries
  • Less focused on Docker-specific operations

Code Comparison

setup-gcloud:

- uses: google-github-actions/setup-gcloud@v0
  with:
    project_id: ${{ secrets.GCP_PROJECT_ID }}
    service_account_key: ${{ secrets.GCP_SA_KEY }}
    export_default_credentials: true

build-push-action:

- uses: docker/build-push-action@v2
  with:
    context: .
    push: true
    tags: user/app:latest

The setup-gcloud action focuses on setting up GCP credentials and environment, while build-push-action is specifically designed for building and pushing Docker images. setup-gcloud is more versatile for GCP-related tasks but requires additional steps for Docker operations. build-push-action provides a more streamlined experience for Docker-specific workflows but lacks native GCP integration.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

GitHub release GitHub marketplace CI workflow Test workflow Codecov

About

GitHub Action to build and push Docker images with Buildx with full support of the features provided by Moby BuildKit builder toolkit. This includes multi-platform build, secrets, remote cache, etc. and different builder deployment/namespacing options.

Screenshot


Usage

In the examples below we are also using 3 other actions:

  • setup-buildx action will create and boot a builder using by default the docker-container driver. This is not required but recommended using it to be able to build multi-platform images, export cache, etc.
  • setup-qemu action can be useful if you want to add emulation support with QEMU to be able to build against more platforms.
  • login action will take care to log in against a Docker registry.

Git context

By default, this action uses the Git context, so you don't need to use the actions/checkout action to check out the repository as this will be done directly by BuildKit.

The git reference will be based on the event that triggered your workflow and will result in the following context: https://github.com/<owner>/<repo>.git#<ref>.

name: ci

on:
  push:

jobs:
  docker:
    runs-on: ubuntu-latest
    steps:
      -
        name: Login to Docker Hub
        uses: docker/login-action@v3
        with:
          username: ${{ vars.DOCKERHUB_USERNAME }}
          password: ${{ secrets.DOCKERHUB_TOKEN }}
      -
        name: Set up QEMU
        uses: docker/setup-qemu-action@v3
      -
        name: Set up Docker Buildx
        uses: docker/setup-buildx-action@v3
      -
        name: Build and push
        uses: docker/build-push-action@v6
        with:
          push: true
          tags: user/app:latest

Be careful because any file mutation in the steps that precede the build step will be ignored, including processing of the .dockerignore file since the context is based on the Git reference. However, you can use the Path context using the context input alongside the actions/checkout action to remove this restriction.

Default Git context can also be provided using the Handlebars template expression {{defaultContext}}. Here we can use it to provide a subdirectory to the default Git context:

      -
        name: Build and push
        uses: docker/build-push-action@v6
        with:
          context: "{{defaultContext}}:mysubdir"
          push: true
          tags: user/app:latest

Building from the current repository automatically uses the GitHub Token, so it does not need to be passed. If you want to authenticate against another private repository, you have to use a secret named GIT_AUTH_TOKEN to be able to authenticate against it with Buildx:

      -
        name: Build and push
        uses: docker/build-push-action@v6
        with:
          push: true
          tags: user/app:latest
          secrets: |
            GIT_AUTH_TOKEN=${{ secrets.MYTOKEN }}

Path context

name: ci

on:
  push:

jobs:
  docker:
    runs-on: ubuntu-latest
    steps:
      -
        name: Checkout
        uses: actions/checkout@v4
      -
        name: Login to Docker Hub
        uses: docker/login-action@v3
        with:
          username: ${{ vars.DOCKERHUB_USERNAME }}
          password: ${{ secrets.DOCKERHUB_TOKEN }}
      -
        name: Set up QEMU
        uses: docker/setup-qemu-action@v3
      -
        name: Set up Docker Buildx
        uses: docker/setup-buildx-action@v3
      -
        name: Build and push
        uses: docker/build-push-action@v6
        with:
          context: .
          push: true
          tags: user/app:latest

Examples

Summaries

This action generates a job summary that provides a detailed overview of the build execution. The summary shows an overview of all the steps executed during the build, including the build inputs and eventual errors.

build-push-action job summary

The summary also includes a link for downloading the build record with additional details about the build, including build stats, logs, outputs, and more. The build record can be imported to Docker Desktop for inspecting the build in greater detail.

[!WARNING]

If you're using the actions/download-artifact action in your workflow, you need to ignore the build record artifacts if name and pattern inputs are not specified (defaults to download all artifacts of the workflow), otherwise the action will fail:

- uses: actions/download-artifact@v4
  with:
    pattern: "!*.dockerbuild"

More info: https://github.com/actions/toolkit/pull/1874

Summaries are enabled by default, but can be disabled with the DOCKER_BUILD_SUMMARY environment variable.

For more information about summaries, refer to the documentation.

Customizing

inputs

The following inputs can be used as step.with keys:

List type is a newline-delimited string

cache-from: |
  user/app:cache
  type=local,src=path/to/dir

CSV type is a comma-delimited string

tags: name/app:latest,name/app:1.0.0
NameTypeDescription
add-hostsList/CSVList of customs host-to-IP mapping (e.g., docker:10.180.0.1)
allowList/CSVList of extra privileged entitlement (e.g., network.host,security.insecure)
annotationsListList of annotation to set to the image
attestsListList of attestation parameters (e.g., type=sbom,generator=image)
builderStringBuilder instance (see setup-buildx action)
build-argsListList of build-time variables
build-contextsListList of additional build contexts (e.g., name=path)
cache-fromListList of external cache sources (e.g., type=local,src=path/to/dir)
cache-toListList of cache export destinations (e.g., type=local,dest=path/to/dir)
callStringSet method for evaluating build (e.g., check)
cgroup-parentStringOptional parent cgroup for the container used in the build
contextStringBuild's context is the set of files located in the specified PATH or URL (default Git context)
fileStringPath to the Dockerfile. (default {context}/Dockerfile)
labelsListList of metadata for an image
loadBoolLoad is a shorthand for --output=type=docker (default false)
networkStringSet the networking mode for the RUN instructions during build
no-cacheBoolDo not use cache when building the image (default false)
no-cache-filtersList/CSVDo not cache specified stages
outputsListList of output destinations (format: type=local,dest=path)
platformsList/CSVList of target platforms for build
provenanceBool/StringGenerate provenance attestation for the build (shorthand for --attest=type=provenance)
pullBoolAlways attempt to pull all referenced images (default false)
pushBoolPush is a shorthand for --output=type=registry (default false)
sbomBool/StringGenerate SBOM attestation for the build (shorthand for --attest=type=sbom)
secretsListList of secrets to expose to the build (e.g., key=string, GIT_AUTH_TOKEN=mytoken)
secret-envsList/CSVList of secret env vars to expose to the build (e.g., key=envname, MY_SECRET=MY_ENV_VAR)
secret-filesListList of secret files to expose to the build (e.g., key=filename, MY_SECRET=./secret.txt)
shm-sizeStringSize of /dev/shm (e.g., 2g)
sshListList of SSH agent socket or keys to expose to the build
tagsList/CSVList of tags
targetStringSets the target stage to build
ulimitListUlimit options (e.g., nofile=1024:1024)
github-tokenStringGitHub Token used to authenticate against a repository for Git context (default ${{ github.token }})

outputs

The following outputs are available:

NameTypeDescription
imageidStringImage ID
digestStringImage digest
metadataJSONBuild result metadata

environment variables

NameTypeDefaultDescription
DOCKER_BUILD_CHECKS_ANNOTATIONSBooltrueIf false, GitHub annotations are not generated for build checks
DOCKER_BUILD_SUMMARYBooltrueIf false, build summary generation is disabled
DOCKER_BUILD_RECORD_UPLOADBooltrueIf false, build record upload as GitHub artifact is disabled
DOCKER_BUILD_RECORD_RETENTION_DAYSNumberDuration after which build record artifact will expire in days. Defaults to repository/org retention settings if unset or 0
DOCKER_BUILD_EXPORT_LEGACYBoolfalseIf true, exports build using legacy export-build tool instead of buildx history export command

Troubleshooting

See TROUBLESHOOTING.md

Contributing

Want to contribute? Awesome! You can find information about contributing to this project in the CONTRIBUTING.md