controller.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424
  1. package buildkit
  2. import (
  3. "context"
  4. "net/http"
  5. "os"
  6. "path/filepath"
  7. "time"
  8. ctd "github.com/containerd/containerd"
  9. "github.com/containerd/containerd/content/local"
  10. ctdmetadata "github.com/containerd/containerd/metadata"
  11. "github.com/containerd/containerd/snapshots"
  12. "github.com/docker/docker/api/types"
  13. "github.com/docker/docker/api/types/filters"
  14. "github.com/docker/docker/builder/builder-next/adapters/containerimage"
  15. "github.com/docker/docker/builder/builder-next/adapters/localinlinecache"
  16. "github.com/docker/docker/builder/builder-next/adapters/snapshot"
  17. "github.com/docker/docker/builder/builder-next/exporter/mobyexporter"
  18. "github.com/docker/docker/builder/builder-next/imagerefchecker"
  19. mobyworker "github.com/docker/docker/builder/builder-next/worker"
  20. wlabel "github.com/docker/docker/builder/builder-next/worker/label"
  21. "github.com/docker/docker/daemon/config"
  22. "github.com/docker/docker/daemon/graphdriver"
  23. units "github.com/docker/go-units"
  24. "github.com/moby/buildkit/cache"
  25. "github.com/moby/buildkit/cache/metadata"
  26. "github.com/moby/buildkit/cache/remotecache"
  27. "github.com/moby/buildkit/cache/remotecache/gha"
  28. inlineremotecache "github.com/moby/buildkit/cache/remotecache/inline"
  29. localremotecache "github.com/moby/buildkit/cache/remotecache/local"
  30. registryremotecache "github.com/moby/buildkit/cache/remotecache/registry"
  31. "github.com/moby/buildkit/client"
  32. bkconfig "github.com/moby/buildkit/cmd/buildkitd/config"
  33. "github.com/moby/buildkit/control"
  34. "github.com/moby/buildkit/frontend"
  35. dockerfile "github.com/moby/buildkit/frontend/dockerfile/builder"
  36. "github.com/moby/buildkit/frontend/gateway"
  37. "github.com/moby/buildkit/frontend/gateway/forwarder"
  38. containerdsnapshot "github.com/moby/buildkit/snapshot/containerd"
  39. "github.com/moby/buildkit/solver/bboltcachestorage"
  40. "github.com/moby/buildkit/util/archutil"
  41. "github.com/moby/buildkit/util/entitlements"
  42. "github.com/moby/buildkit/util/leaseutil"
  43. "github.com/moby/buildkit/util/network/netproviders"
  44. "github.com/moby/buildkit/worker"
  45. "github.com/moby/buildkit/worker/containerd"
  46. "github.com/moby/buildkit/worker/label"
  47. "github.com/pkg/errors"
  48. "go.etcd.io/bbolt"
  49. bolt "go.etcd.io/bbolt"
  50. "github.com/moby/buildkit/solver/pb"
  51. "github.com/moby/buildkit/util/apicaps"
  52. )
  53. func newController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  54. if opt.UseSnapshotter {
  55. return newSnapshotterController(ctx, rt, opt)
  56. }
  57. return newGraphDriverController(ctx, rt, opt)
  58. }
  59. func newSnapshotterController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  60. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  61. return nil, err
  62. }
  63. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  64. if err != nil {
  65. return nil, err
  66. }
  67. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  68. if err != nil {
  69. return nil, err
  70. }
  71. nc := netproviders.Opt{
  72. Mode: "host",
  73. }
  74. dns := getDNSConfig(opt.DNSConfig)
  75. wo, err := containerd.NewWorkerOpt(opt.Root, opt.ContainerdAddress, opt.Snapshotter, opt.ContainerdNamespace,
  76. opt.Rootless, map[string]string{
  77. label.Snapshotter: opt.Snapshotter,
  78. }, dns, nc, opt.ApparmorProfile, false, nil, "", ctd.WithTimeout(60*time.Second))
  79. if err != nil {
  80. return nil, err
  81. }
  82. policy, err := getGCPolicy(opt.BuilderConfig, opt.Root)
  83. if err != nil {
  84. return nil, err
  85. }
  86. wo.GCPolicy = policy
  87. wo.RegistryHosts = opt.RegistryHosts
  88. wo.Labels = getLabels(opt, wo.Labels)
  89. exec, err := newExecutor(opt.Root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  90. if err != nil {
  91. return nil, err
  92. }
  93. wo.Executor = exec
  94. w, err := mobyworker.NewContainerdWorker(ctx, wo)
  95. if err != nil {
  96. return nil, err
  97. }
  98. wc := &worker.Controller{}
  99. err = wc.Add(w)
  100. if err != nil {
  101. return nil, err
  102. }
  103. frontends := map[string]frontend.Frontend{
  104. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  105. "gateway.v0": gateway.NewGatewayFrontend(wc),
  106. }
  107. return control.NewController(control.Opt{
  108. SessionManager: opt.SessionManager,
  109. WorkerController: wc,
  110. Frontends: frontends,
  111. CacheKeyStorage: cacheStorage,
  112. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  113. "gha": gha.ResolveCacheImporterFunc(),
  114. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  115. "registry": registryremotecache.ResolveCacheImporterFunc(opt.SessionManager, wo.ContentStore, opt.RegistryHosts),
  116. },
  117. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  118. "gha": gha.ResolveCacheExporterFunc(),
  119. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  120. "local": localremotecache.ResolveCacheExporterFunc(opt.SessionManager),
  121. "registry": registryremotecache.ResolveCacheExporterFunc(opt.SessionManager, opt.RegistryHosts),
  122. },
  123. Entitlements: getEntitlements(opt.BuilderConfig),
  124. HistoryDB: historyDB,
  125. HistoryConfig: historyConf,
  126. LeaseManager: wo.LeaseManager,
  127. ContentStore: wo.ContentStore,
  128. })
  129. }
  130. func openHistoryDB(root string, cfg *config.BuilderHistoryConfig) (*bolt.DB, *bkconfig.HistoryConfig, error) {
  131. db, err := bbolt.Open(filepath.Join(root, "history.db"), 0o600, nil)
  132. if err != nil {
  133. return nil, nil, err
  134. }
  135. var conf *bkconfig.HistoryConfig
  136. if cfg != nil {
  137. conf = &bkconfig.HistoryConfig{
  138. MaxAge: cfg.MaxAge,
  139. MaxEntries: cfg.MaxEntries,
  140. }
  141. }
  142. return db, conf, nil
  143. }
  144. func newGraphDriverController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  145. if err := os.MkdirAll(opt.Root, 0711); err != nil {
  146. return nil, err
  147. }
  148. dist := opt.Dist
  149. root := opt.Root
  150. pb.Caps.Init(apicaps.Cap{
  151. ID: pb.CapMergeOp,
  152. Enabled: false,
  153. DisabledReasonMsg: "only enabled with containerd image store backend",
  154. })
  155. pb.Caps.Init(apicaps.Cap{
  156. ID: pb.CapDiffOp,
  157. Enabled: false,
  158. DisabledReasonMsg: "only enabled with containerd image store backend",
  159. })
  160. var driver graphdriver.Driver
  161. if ls, ok := dist.LayerStore.(interface {
  162. Driver() graphdriver.Driver
  163. }); ok {
  164. driver = ls.Driver()
  165. } else {
  166. return nil, errors.Errorf("could not access graphdriver")
  167. }
  168. store, err := local.NewStore(filepath.Join(root, "content"))
  169. if err != nil {
  170. return nil, err
  171. }
  172. db, err := bolt.Open(filepath.Join(root, "containerdmeta.db"), 0o644, nil)
  173. if err != nil {
  174. return nil, errors.WithStack(err)
  175. }
  176. mdb := ctdmetadata.NewDB(db, store, map[string]snapshots.Snapshotter{})
  177. store = containerdsnapshot.NewContentStore(mdb.ContentStore(), "buildkit")
  178. lm := leaseutil.WithNamespace(ctdmetadata.NewLeaseManager(mdb), "buildkit")
  179. snapshotter, lm, err := snapshot.NewSnapshotter(snapshot.Opt{
  180. GraphDriver: driver,
  181. LayerStore: dist.LayerStore,
  182. Root: root,
  183. IdentityMapping: opt.IdentityMapping,
  184. }, lm)
  185. if err != nil {
  186. return nil, err
  187. }
  188. if err := cache.MigrateV2(context.Background(), filepath.Join(root, "metadata.db"), filepath.Join(root, "metadata_v2.db"), store, snapshotter, lm); err != nil {
  189. return nil, err
  190. }
  191. md, err := metadata.NewStore(filepath.Join(root, "metadata_v2.db"))
  192. if err != nil {
  193. return nil, err
  194. }
  195. layerGetter, ok := snapshotter.(imagerefchecker.LayerGetter)
  196. if !ok {
  197. return nil, errors.Errorf("snapshotter does not implement layergetter")
  198. }
  199. refChecker := imagerefchecker.New(imagerefchecker.Opt{
  200. ImageStore: dist.ImageStore,
  201. LayerGetter: layerGetter,
  202. })
  203. cm, err := cache.NewManager(cache.ManagerOpt{
  204. Snapshotter: snapshotter,
  205. MetadataStore: md,
  206. PruneRefChecker: refChecker,
  207. LeaseManager: lm,
  208. ContentStore: store,
  209. GarbageCollect: mdb.GarbageCollect,
  210. })
  211. if err != nil {
  212. return nil, err
  213. }
  214. src, err := containerimage.NewSource(containerimage.SourceOpt{
  215. CacheAccessor: cm,
  216. ContentStore: store,
  217. DownloadManager: dist.DownloadManager,
  218. MetadataStore: dist.V2MetadataService,
  219. ImageStore: dist.ImageStore,
  220. ReferenceStore: dist.ReferenceStore,
  221. RegistryHosts: opt.RegistryHosts,
  222. LayerStore: dist.LayerStore,
  223. LeaseManager: lm,
  224. GarbageCollect: mdb.GarbageCollect,
  225. })
  226. if err != nil {
  227. return nil, err
  228. }
  229. dns := getDNSConfig(opt.DNSConfig)
  230. exec, err := newExecutor(root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  231. if err != nil {
  232. return nil, err
  233. }
  234. differ, ok := snapshotter.(mobyexporter.Differ)
  235. if !ok {
  236. return nil, errors.Errorf("snapshotter doesn't support differ")
  237. }
  238. exp, err := mobyexporter.New(mobyexporter.Opt{
  239. ImageStore: dist.ImageStore,
  240. Differ: differ,
  241. ImageTagger: opt.ImageTagger,
  242. })
  243. if err != nil {
  244. return nil, err
  245. }
  246. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  247. if err != nil {
  248. return nil, err
  249. }
  250. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  251. if err != nil {
  252. return nil, err
  253. }
  254. gcPolicy, err := getGCPolicy(opt.BuilderConfig, root)
  255. if err != nil {
  256. return nil, errors.Wrap(err, "could not get builder GC policy")
  257. }
  258. layers, ok := snapshotter.(mobyworker.LayerAccess)
  259. if !ok {
  260. return nil, errors.Errorf("snapshotter doesn't support differ")
  261. }
  262. leases, err := lm.List(ctx, `labels."buildkit/lease.temporary"`)
  263. if err != nil {
  264. return nil, err
  265. }
  266. for _, l := range leases {
  267. lm.Delete(ctx, l)
  268. }
  269. wopt := mobyworker.Opt{
  270. ID: opt.EngineID,
  271. ContentStore: store,
  272. CacheManager: cm,
  273. GCPolicy: gcPolicy,
  274. Snapshotter: snapshotter,
  275. Executor: exec,
  276. ImageSource: src,
  277. DownloadManager: dist.DownloadManager,
  278. V2MetadataService: dist.V2MetadataService,
  279. Exporter: exp,
  280. Transport: rt,
  281. Layers: layers,
  282. Platforms: archutil.SupportedPlatforms(true),
  283. LeaseManager: lm,
  284. Labels: getLabels(opt, nil),
  285. }
  286. wc := &worker.Controller{}
  287. w, err := mobyworker.NewWorker(wopt)
  288. if err != nil {
  289. return nil, err
  290. }
  291. wc.Add(w)
  292. frontends := map[string]frontend.Frontend{
  293. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  294. "gateway.v0": gateway.NewGatewayFrontend(wc),
  295. }
  296. return control.NewController(control.Opt{
  297. SessionManager: opt.SessionManager,
  298. WorkerController: wc,
  299. Frontends: frontends,
  300. CacheKeyStorage: cacheStorage,
  301. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  302. "registry": localinlinecache.ResolveCacheImporterFunc(opt.SessionManager, opt.RegistryHosts, store, dist.ReferenceStore, dist.ImageStore),
  303. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  304. },
  305. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  306. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  307. },
  308. Entitlements: getEntitlements(opt.BuilderConfig),
  309. LeaseManager: lm,
  310. ContentStore: store,
  311. HistoryDB: historyDB,
  312. HistoryConfig: historyConf,
  313. })
  314. }
  315. func getGCPolicy(conf config.BuilderConfig, root string) ([]client.PruneInfo, error) {
  316. var gcPolicy []client.PruneInfo
  317. if conf.GC.Enabled {
  318. var (
  319. defaultKeepStorage int64
  320. err error
  321. )
  322. if conf.GC.DefaultKeepStorage != "" {
  323. defaultKeepStorage, err = units.RAMInBytes(conf.GC.DefaultKeepStorage)
  324. if err != nil {
  325. return nil, errors.Wrapf(err, "could not parse '%s' as Builder.GC.DefaultKeepStorage config", conf.GC.DefaultKeepStorage)
  326. }
  327. }
  328. if conf.GC.Policy == nil {
  329. gcPolicy = mobyworker.DefaultGCPolicy(root, defaultKeepStorage)
  330. } else {
  331. gcPolicy = make([]client.PruneInfo, len(conf.GC.Policy))
  332. for i, p := range conf.GC.Policy {
  333. b, err := units.RAMInBytes(p.KeepStorage)
  334. if err != nil {
  335. return nil, err
  336. }
  337. if b == 0 {
  338. b = defaultKeepStorage
  339. }
  340. gcPolicy[i], err = toBuildkitPruneInfo(types.BuildCachePruneOptions{
  341. All: p.All,
  342. KeepStorage: b,
  343. Filters: filters.Args(p.Filter),
  344. })
  345. if err != nil {
  346. return nil, err
  347. }
  348. }
  349. }
  350. }
  351. return gcPolicy, nil
  352. }
  353. func getEntitlements(conf config.BuilderConfig) []string {
  354. var ents []string
  355. // Incase of no config settings, NetworkHost should be enabled & SecurityInsecure must be disabled.
  356. if conf.Entitlements.NetworkHost == nil || *conf.Entitlements.NetworkHost {
  357. ents = append(ents, string(entitlements.EntitlementNetworkHost))
  358. }
  359. if conf.Entitlements.SecurityInsecure != nil && *conf.Entitlements.SecurityInsecure {
  360. ents = append(ents, string(entitlements.EntitlementSecurityInsecure))
  361. }
  362. return ents
  363. }
  364. func getLabels(opt Opt, labels map[string]string) map[string]string {
  365. if labels == nil {
  366. labels = make(map[string]string)
  367. }
  368. labels[wlabel.HostGatewayIP] = opt.DNSConfig.HostGatewayIP.String()
  369. return labels
  370. }