For Bitbucket Pipelines, you can use project or user access tokens for authenticating your build with Depot. We recommend using project tokens as they are scoped to a specific project and owned by the organization.
Note: The CLI looks for the DEPOT_TOKEN
environment variable by default. For both token options, you should configure this variable for your build environment via repository variables.
You can inject project access tokens into the Pipeline environment for depot
CLI authentication. These tokens are tied to a specific project in your organization and not a user.
It is also possible to generate a user access token to inject into the Pipeline environment for depot
CLI authentication. This token is tied to a specific user and not a project. Therefore, it can be used to build all projects across all organizations that the user can access.
To build a Docker image from Bitbucket Pipelines, you must set the DEPOT_TOKEN
environment variable in your repository settings. You can do this through the UI for your repository via the Repository Settings > Pipelines > Repository variables
.
In addition, you must also install the depot
CLI before you run depot build
.
This example shows how you can use the --platform
flag to build a multi-platform image for Intel and Arm architectures natively without emulation.
This example installs the depot
CLI to be used directly in the pipeline. Then, docker login
is invoked with the environment variables for DOCKERHUB_USERNAME
and DOCKERHUB_TOKEN
for the authentication context of the build to push to the registry.
This example installs the depot
and aws
CLIs to be used directly in the pipeline. Then, aws ecr get-login-password
is piped into docker login
for the authentication context of the build to push to the registry.
You can use the --load
flag to download the built container image into the workflow.
You can simultaneously push the built image to a registry and load it back into the CI job by using the --load
and --push
flag together.