executor_unix.go 3.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137
  1. // +build !windows
  2. package buildkit
  3. import (
  4. "os"
  5. "path/filepath"
  6. "strconv"
  7. "sync"
  8. "github.com/docker/docker/daemon/config"
  9. "github.com/docker/docker/pkg/idtools"
  10. "github.com/docker/docker/pkg/stringid"
  11. "github.com/docker/libnetwork"
  12. "github.com/moby/buildkit/executor"
  13. "github.com/moby/buildkit/executor/oci"
  14. "github.com/moby/buildkit/executor/runcexecutor"
  15. "github.com/moby/buildkit/identity"
  16. "github.com/moby/buildkit/solver/pb"
  17. "github.com/moby/buildkit/util/network"
  18. specs "github.com/opencontainers/runtime-spec/specs-go"
  19. "github.com/sirupsen/logrus"
  20. )
  21. const networkName = "bridge"
  22. func newExecutor(root, cgroupParent string, net libnetwork.NetworkController, dnsConfig *oci.DNSConfig, rootless bool, idmap *idtools.IdentityMapping, apparmorProfile string) (executor.Executor, error) {
  23. networkProviders := map[pb.NetMode]network.Provider{
  24. pb.NetMode_UNSET: &bridgeProvider{NetworkController: net, Root: filepath.Join(root, "net")},
  25. pb.NetMode_HOST: network.NewHostProvider(),
  26. pb.NetMode_NONE: network.NewNoneProvider(),
  27. }
  28. return runcexecutor.New(runcexecutor.Opt{
  29. Root: filepath.Join(root, "executor"),
  30. CommandCandidates: []string{"runc"},
  31. DefaultCgroupParent: cgroupParent,
  32. Rootless: rootless,
  33. NoPivot: os.Getenv("DOCKER_RAMDISK") != "",
  34. IdentityMapping: idmap,
  35. DNS: dnsConfig,
  36. ApparmorProfile: apparmorProfile,
  37. }, networkProviders)
  38. }
  39. type bridgeProvider struct {
  40. libnetwork.NetworkController
  41. Root string
  42. }
  43. func (p *bridgeProvider) New() (network.Namespace, error) {
  44. n, err := p.NetworkByName(networkName)
  45. if err != nil {
  46. return nil, err
  47. }
  48. iface := &lnInterface{ready: make(chan struct{}), provider: p}
  49. iface.Once.Do(func() {
  50. go iface.init(p.NetworkController, n)
  51. })
  52. return iface, nil
  53. }
  54. type lnInterface struct {
  55. ep libnetwork.Endpoint
  56. sbx libnetwork.Sandbox
  57. sync.Once
  58. err error
  59. ready chan struct{}
  60. provider *bridgeProvider
  61. }
  62. func (iface *lnInterface) init(c libnetwork.NetworkController, n libnetwork.Network) {
  63. defer close(iface.ready)
  64. id := identity.NewID()
  65. ep, err := n.CreateEndpoint(id, libnetwork.CreateOptionDisableResolution())
  66. if err != nil {
  67. iface.err = err
  68. return
  69. }
  70. sbx, err := c.NewSandbox(id, libnetwork.OptionUseExternalKey(), libnetwork.OptionHostsPath(filepath.Join(iface.provider.Root, id, "hosts")),
  71. libnetwork.OptionResolvConfPath(filepath.Join(iface.provider.Root, id, "resolv.conf")))
  72. if err != nil {
  73. iface.err = err
  74. return
  75. }
  76. if err := ep.Join(sbx); err != nil {
  77. iface.err = err
  78. return
  79. }
  80. iface.sbx = sbx
  81. iface.ep = ep
  82. }
  83. func (iface *lnInterface) Set(s *specs.Spec) error {
  84. <-iface.ready
  85. if iface.err != nil {
  86. logrus.WithError(iface.err).Error("failed to set networking spec")
  87. return iface.err
  88. }
  89. shortNetCtlrID := stringid.TruncateID(iface.provider.NetworkController.ID())
  90. // attach netns to bridge within the container namespace, using reexec in a prestart hook
  91. s.Hooks = &specs.Hooks{
  92. Prestart: []specs.Hook{{
  93. Path: filepath.Join("/proc", strconv.Itoa(os.Getpid()), "exe"),
  94. Args: []string{"libnetwork-setkey", "-exec-root=" + iface.provider.Config().Daemon.ExecRoot, iface.sbx.ContainerID(), shortNetCtlrID},
  95. }},
  96. }
  97. return nil
  98. }
  99. func (iface *lnInterface) Close() error {
  100. <-iface.ready
  101. if iface.sbx != nil {
  102. go func() {
  103. if err := iface.sbx.Delete(); err != nil {
  104. logrus.Errorf("failed to delete builder network sandbox: %v", err)
  105. }
  106. }()
  107. }
  108. return iface.err
  109. }
  110. func getDNSConfig(cfg config.DNSConfig) *oci.DNSConfig {
  111. if cfg.DNS != nil || cfg.DNSSearch != nil || cfg.DNSOptions != nil {
  112. return &oci.DNSConfig{
  113. Nameservers: cfg.DNS,
  114. SearchDomains: cfg.DNSSearch,
  115. Options: cfg.DNSOptions,
  116. }
  117. }
  118. return nil
  119. }