Skip to main content

Using Modules from Remote Repositories

Dagger supports the use of HTTP and SSH protocols for accessing remote repositories as Dagger modules, compatible with all major Git hosting platforms such as GitHub, GitLab, BitBucket, Azure DevOps, Codeberg, and Sourcehut. For SSH references ("refs"), Dagger employs a unified authentication approach.

Dagger supports various reference schemes for Dagger modules, as below:

ProtocolSchemePublic repositoriesPrivate repositoriesExample
HTTP(S)Go-like ref styleSupportedIn progressgithub.com/username/repo[/subdir][@version]
HTTP(S)Git HTTP styleSupportedIn progresshttps://github.com/username/repo.git[/subdir][@version]
SSHSCP-likeSupportedSupportedgit@github.com:username/repo.git[/subdir][@version]
SSHExplicit SSHSupportedSupportedssh://git@github.com/username/repo.git[/subdir][@version]

Dagger provides additional flexibility in referencing modules through the following options:

  • The .git extension is optional for HTTP refs or explicit SSH refs, except for GitLab, when referencing modules stored on a private repo or private subgroup.
  • Monorepo support: Append /subpath to access a specific subdirectory within the repository.
  • Version specification: Add @version to target a particular version of the module. This can be a tag, branch name, or full commit hash. If omitted, the default branch is used.

Here is an example of using a Go builder Dagger module from a public repository over HTTPS:

dagger -m github.com/kpenfound/dagger-modules/golang@v0.2.0 call \
build --source=https://github.com/dagger/dagger --args=./cmd/dagger \
export --path=./build

Here is the same example using SSH authentication. Note that this requires SSH authentication to be properly configured on your Dagger host).

dagger -m git@github.com:kpenfound/dagger-modules/golang@v0.2.0 call \
build --source=https://github.com/dagger/dagger --args=./cmd/dagger \
export --path=./build

Configuring SSH authentication

Dagger mounts the socket specified by your host's SSH_AUTH_SOCK environment variable to the Dagger Engine. This is essential for SSH refs, as most Git servers use your SSH key for authentication and tracking purposes, even when cloning public repositories.

This means that you must ensure that the SSH_AUTH_SOCK environment variable is properly set in your environment when using SSH refs with Dagger.

Read detailed instructions on setting up SSH authentication, including how to generate SSH keys, start the SSH agent, and add your keys.

Best practices

For quick and easy referencing:

  • Copy the repository ref from your preferred Git server's UI.
  • To specify a particular version or commit, append #version (for directory arguments) or @version (for modules).
  • To target a specific directory within the repository, use the format #version:subpath (for directory arguments) or add a /subpath (for modules). Remember that the version is mandatory when specifying a subpath.

Known limitations and workarounds

This section outlines current limitations and provides workarounds for common issues. We're actively working on improvements for these areas.

Windows is not supported

Currently, SSH refs are fully supported on UNIX-based systems (Linux and macOS). Windows support is under development. Track progress and contribute to the discussion in our GitHub issue for Windows support.

Multiple SSH keys may cause SSH forwarding to fail

SSH forwarding may fail when multiple keys are loaded in your SSH agent. This is under active investigation in our GitHub issue. Until this is resolved, the following workaround may be used:

  1. Clear all loaded keys: ssh-add -D
  2. Add back only the required key: ssh-add /path/to/key