controller.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437
  1. package buildkit
  2. import (
  3. "context"
  4. "net/http"
  5. "os"
  6. "path/filepath"
  7. "time"
  8. ctd "github.com/containerd/containerd"
  9. "github.com/containerd/containerd/content/local"
  10. "github.com/containerd/containerd/log"
  11. ctdmetadata "github.com/containerd/containerd/metadata"
  12. "github.com/containerd/containerd/snapshots"
  13. "github.com/docker/docker/api/types"
  14. "github.com/docker/docker/api/types/filters"
  15. "github.com/docker/docker/builder/builder-next/adapters/containerimage"
  16. "github.com/docker/docker/builder/builder-next/adapters/localinlinecache"
  17. "github.com/docker/docker/builder/builder-next/adapters/snapshot"
  18. "github.com/docker/docker/builder/builder-next/exporter/mobyexporter"
  19. "github.com/docker/docker/builder/builder-next/imagerefchecker"
  20. mobyworker "github.com/docker/docker/builder/builder-next/worker"
  21. wlabel "github.com/docker/docker/builder/builder-next/worker/label"
  22. "github.com/docker/docker/daemon/config"
  23. "github.com/docker/docker/daemon/graphdriver"
  24. units "github.com/docker/go-units"
  25. "github.com/moby/buildkit/cache"
  26. "github.com/moby/buildkit/cache/metadata"
  27. "github.com/moby/buildkit/cache/remotecache"
  28. "github.com/moby/buildkit/cache/remotecache/gha"
  29. inlineremotecache "github.com/moby/buildkit/cache/remotecache/inline"
  30. localremotecache "github.com/moby/buildkit/cache/remotecache/local"
  31. registryremotecache "github.com/moby/buildkit/cache/remotecache/registry"
  32. "github.com/moby/buildkit/client"
  33. bkconfig "github.com/moby/buildkit/cmd/buildkitd/config"
  34. "github.com/moby/buildkit/control"
  35. "github.com/moby/buildkit/frontend"
  36. dockerfile "github.com/moby/buildkit/frontend/dockerfile/builder"
  37. "github.com/moby/buildkit/frontend/gateway"
  38. "github.com/moby/buildkit/frontend/gateway/forwarder"
  39. containerdsnapshot "github.com/moby/buildkit/snapshot/containerd"
  40. "github.com/moby/buildkit/solver/bboltcachestorage"
  41. "github.com/moby/buildkit/util/archutil"
  42. "github.com/moby/buildkit/util/entitlements"
  43. "github.com/moby/buildkit/util/leaseutil"
  44. "github.com/moby/buildkit/util/network/netproviders"
  45. "github.com/moby/buildkit/util/tracing/detect"
  46. "github.com/moby/buildkit/worker"
  47. "github.com/moby/buildkit/worker/containerd"
  48. "github.com/moby/buildkit/worker/label"
  49. "github.com/pkg/errors"
  50. "go.etcd.io/bbolt"
  51. bolt "go.etcd.io/bbolt"
  52. "go.opentelemetry.io/otel/sdk/trace"
  53. "github.com/moby/buildkit/solver/pb"
  54. "github.com/moby/buildkit/util/apicaps"
  55. )
  56. func newController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  57. if opt.UseSnapshotter {
  58. return newSnapshotterController(ctx, rt, opt)
  59. }
  60. return newGraphDriverController(ctx, rt, opt)
  61. }
  62. func getTraceExporter(ctx context.Context) trace.SpanExporter {
  63. exp, err := detect.Exporter()
  64. if err != nil {
  65. log.G(ctx).WithError(err).Error("Failed to detect trace exporter for buildkit controller")
  66. }
  67. return exp
  68. }
  69. func newSnapshotterController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  70. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  71. return nil, err
  72. }
  73. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  74. if err != nil {
  75. return nil, err
  76. }
  77. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  78. if err != nil {
  79. return nil, err
  80. }
  81. nc := netproviders.Opt{
  82. Mode: "host",
  83. }
  84. dns := getDNSConfig(opt.DNSConfig)
  85. wo, err := containerd.NewWorkerOpt(opt.Root, opt.ContainerdAddress, opt.Snapshotter, opt.ContainerdNamespace,
  86. opt.Rootless, map[string]string{
  87. label.Snapshotter: opt.Snapshotter,
  88. }, dns, nc, opt.ApparmorProfile, false, nil, "", ctd.WithTimeout(60*time.Second))
  89. if err != nil {
  90. return nil, err
  91. }
  92. policy, err := getGCPolicy(opt.BuilderConfig, opt.Root)
  93. if err != nil {
  94. return nil, err
  95. }
  96. wo.GCPolicy = policy
  97. wo.RegistryHosts = opt.RegistryHosts
  98. wo.Labels = getLabels(opt, wo.Labels)
  99. exec, err := newExecutor(opt.Root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  100. if err != nil {
  101. return nil, err
  102. }
  103. wo.Executor = exec
  104. w, err := mobyworker.NewContainerdWorker(ctx, wo)
  105. if err != nil {
  106. return nil, err
  107. }
  108. wc := &worker.Controller{}
  109. err = wc.Add(w)
  110. if err != nil {
  111. return nil, err
  112. }
  113. frontends := map[string]frontend.Frontend{
  114. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  115. "gateway.v0": gateway.NewGatewayFrontend(wc),
  116. }
  117. return control.NewController(control.Opt{
  118. SessionManager: opt.SessionManager,
  119. WorkerController: wc,
  120. Frontends: frontends,
  121. CacheKeyStorage: cacheStorage,
  122. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  123. "gha": gha.ResolveCacheImporterFunc(),
  124. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  125. "registry": registryremotecache.ResolveCacheImporterFunc(opt.SessionManager, wo.ContentStore, opt.RegistryHosts),
  126. },
  127. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  128. "gha": gha.ResolveCacheExporterFunc(),
  129. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  130. "local": localremotecache.ResolveCacheExporterFunc(opt.SessionManager),
  131. "registry": registryremotecache.ResolveCacheExporterFunc(opt.SessionManager, opt.RegistryHosts),
  132. },
  133. Entitlements: getEntitlements(opt.BuilderConfig),
  134. HistoryDB: historyDB,
  135. HistoryConfig: historyConf,
  136. LeaseManager: wo.LeaseManager,
  137. ContentStore: wo.ContentStore,
  138. TraceCollector: getTraceExporter(ctx),
  139. })
  140. }
  141. func openHistoryDB(root string, cfg *config.BuilderHistoryConfig) (*bolt.DB, *bkconfig.HistoryConfig, error) {
  142. db, err := bbolt.Open(filepath.Join(root, "history.db"), 0o600, nil)
  143. if err != nil {
  144. return nil, nil, err
  145. }
  146. var conf *bkconfig.HistoryConfig
  147. if cfg != nil {
  148. conf = &bkconfig.HistoryConfig{
  149. MaxAge: cfg.MaxAge,
  150. MaxEntries: cfg.MaxEntries,
  151. }
  152. }
  153. return db, conf, nil
  154. }
  155. func newGraphDriverController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  156. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  157. return nil, err
  158. }
  159. dist := opt.Dist
  160. root := opt.Root
  161. pb.Caps.Init(apicaps.Cap{
  162. ID: pb.CapMergeOp,
  163. Enabled: false,
  164. DisabledReasonMsg: "only enabled with containerd image store backend",
  165. })
  166. pb.Caps.Init(apicaps.Cap{
  167. ID: pb.CapDiffOp,
  168. Enabled: false,
  169. DisabledReasonMsg: "only enabled with containerd image store backend",
  170. })
  171. var driver graphdriver.Driver
  172. if ls, ok := dist.LayerStore.(interface {
  173. Driver() graphdriver.Driver
  174. }); ok {
  175. driver = ls.Driver()
  176. } else {
  177. return nil, errors.Errorf("could not access graphdriver")
  178. }
  179. store, err := local.NewStore(filepath.Join(root, "content"))
  180. if err != nil {
  181. return nil, err
  182. }
  183. db, err := bolt.Open(filepath.Join(root, "containerdmeta.db"), 0o644, nil)
  184. if err != nil {
  185. return nil, errors.WithStack(err)
  186. }
  187. mdb := ctdmetadata.NewDB(db, store, map[string]snapshots.Snapshotter{})
  188. store = containerdsnapshot.NewContentStore(mdb.ContentStore(), "buildkit")
  189. lm := leaseutil.WithNamespace(ctdmetadata.NewLeaseManager(mdb), "buildkit")
  190. snapshotter, lm, err := snapshot.NewSnapshotter(snapshot.Opt{
  191. GraphDriver: driver,
  192. LayerStore: dist.LayerStore,
  193. Root: root,
  194. IdentityMapping: opt.IdentityMapping,
  195. }, lm)
  196. if err != nil {
  197. return nil, err
  198. }
  199. if err := cache.MigrateV2(context.Background(), filepath.Join(root, "metadata.db"), filepath.Join(root, "metadata_v2.db"), store, snapshotter, lm); err != nil {
  200. return nil, err
  201. }
  202. md, err := metadata.NewStore(filepath.Join(root, "metadata_v2.db"))
  203. if err != nil {
  204. return nil, err
  205. }
  206. layerGetter, ok := snapshotter.(imagerefchecker.LayerGetter)
  207. if !ok {
  208. return nil, errors.Errorf("snapshotter does not implement layergetter")
  209. }
  210. refChecker := imagerefchecker.New(imagerefchecker.Opt{
  211. ImageStore: dist.ImageStore,
  212. LayerGetter: layerGetter,
  213. })
  214. cm, err := cache.NewManager(cache.ManagerOpt{
  215. Snapshotter: snapshotter,
  216. MetadataStore: md,
  217. PruneRefChecker: refChecker,
  218. LeaseManager: lm,
  219. ContentStore: store,
  220. GarbageCollect: mdb.GarbageCollect,
  221. })
  222. if err != nil {
  223. return nil, err
  224. }
  225. src, err := containerimage.NewSource(containerimage.SourceOpt{
  226. CacheAccessor: cm,
  227. ContentStore: store,
  228. DownloadManager: dist.DownloadManager,
  229. MetadataStore: dist.V2MetadataService,
  230. ImageStore: dist.ImageStore,
  231. ReferenceStore: dist.ReferenceStore,
  232. RegistryHosts: opt.RegistryHosts,
  233. LayerStore: dist.LayerStore,
  234. LeaseManager: lm,
  235. GarbageCollect: mdb.GarbageCollect,
  236. })
  237. if err != nil {
  238. return nil, err
  239. }
  240. dns := getDNSConfig(opt.DNSConfig)
  241. exec, err := newExecutor(root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  242. if err != nil {
  243. return nil, err
  244. }
  245. differ, ok := snapshotter.(mobyexporter.Differ)
  246. if !ok {
  247. return nil, errors.Errorf("snapshotter doesn't support differ")
  248. }
  249. exp, err := mobyexporter.New(mobyexporter.Opt{
  250. ImageStore: dist.ImageStore,
  251. Differ: differ,
  252. ImageTagger: opt.ImageTagger,
  253. })
  254. if err != nil {
  255. return nil, err
  256. }
  257. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  258. if err != nil {
  259. return nil, err
  260. }
  261. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  262. if err != nil {
  263. return nil, err
  264. }
  265. gcPolicy, err := getGCPolicy(opt.BuilderConfig, root)
  266. if err != nil {
  267. return nil, errors.Wrap(err, "could not get builder GC policy")
  268. }
  269. layers, ok := snapshotter.(mobyworker.LayerAccess)
  270. if !ok {
  271. return nil, errors.Errorf("snapshotter doesn't support differ")
  272. }
  273. leases, err := lm.List(ctx, `labels."buildkit/lease.temporary"`)
  274. if err != nil {
  275. return nil, err
  276. }
  277. for _, l := range leases {
  278. lm.Delete(ctx, l)
  279. }
  280. wopt := mobyworker.Opt{
  281. ID: opt.EngineID,
  282. ContentStore: store,
  283. CacheManager: cm,
  284. GCPolicy: gcPolicy,
  285. Snapshotter: snapshotter,
  286. Executor: exec,
  287. ImageSource: src,
  288. DownloadManager: dist.DownloadManager,
  289. V2MetadataService: dist.V2MetadataService,
  290. Exporter: exp,
  291. Transport: rt,
  292. Layers: layers,
  293. Platforms: archutil.SupportedPlatforms(true),
  294. LeaseManager: lm,
  295. Labels: getLabels(opt, nil),
  296. }
  297. wc := &worker.Controller{}
  298. w, err := mobyworker.NewWorker(wopt)
  299. if err != nil {
  300. return nil, err
  301. }
  302. wc.Add(w)
  303. frontends := map[string]frontend.Frontend{
  304. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  305. "gateway.v0": gateway.NewGatewayFrontend(wc),
  306. }
  307. return control.NewController(control.Opt{
  308. SessionManager: opt.SessionManager,
  309. WorkerController: wc,
  310. Frontends: frontends,
  311. CacheKeyStorage: cacheStorage,
  312. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  313. "registry": localinlinecache.ResolveCacheImporterFunc(opt.SessionManager, opt.RegistryHosts, store, dist.ReferenceStore, dist.ImageStore),
  314. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  315. },
  316. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  317. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  318. },
  319. Entitlements: getEntitlements(opt.BuilderConfig),
  320. LeaseManager: lm,
  321. ContentStore: store,
  322. HistoryDB: historyDB,
  323. HistoryConfig: historyConf,
  324. TraceCollector: getTraceExporter(ctx),
  325. })
  326. }
  327. func getGCPolicy(conf config.BuilderConfig, root string) ([]client.PruneInfo, error) {
  328. var gcPolicy []client.PruneInfo
  329. if conf.GC.Enabled {
  330. var (
  331. defaultKeepStorage int64
  332. err error
  333. )
  334. if conf.GC.DefaultKeepStorage != "" {
  335. defaultKeepStorage, err = units.RAMInBytes(conf.GC.DefaultKeepStorage)
  336. if err != nil {
  337. return nil, errors.Wrapf(err, "could not parse '%s' as Builder.GC.DefaultKeepStorage config", conf.GC.DefaultKeepStorage)
  338. }
  339. }
  340. if conf.GC.Policy == nil {
  341. gcPolicy = mobyworker.DefaultGCPolicy(root, defaultKeepStorage)
  342. } else {
  343. gcPolicy = make([]client.PruneInfo, len(conf.GC.Policy))
  344. for i, p := range conf.GC.Policy {
  345. b, err := units.RAMInBytes(p.KeepStorage)
  346. if err != nil {
  347. return nil, err
  348. }
  349. if b == 0 {
  350. b = defaultKeepStorage
  351. }
  352. gcPolicy[i], err = toBuildkitPruneInfo(types.BuildCachePruneOptions{
  353. All: p.All,
  354. KeepStorage: b,
  355. Filters: filters.Args(p.Filter),
  356. })
  357. if err != nil {
  358. return nil, err
  359. }
  360. }
  361. }
  362. }
  363. return gcPolicy, nil
  364. }
  365. func getEntitlements(conf config.BuilderConfig) []string {
  366. var ents []string
  367. // Incase of no config settings, NetworkHost should be enabled & SecurityInsecure must be disabled.
  368. if conf.Entitlements.NetworkHost == nil || *conf.Entitlements.NetworkHost {
  369. ents = append(ents, string(entitlements.EntitlementNetworkHost))
  370. }
  371. if conf.Entitlements.SecurityInsecure != nil && *conf.Entitlements.SecurityInsecure {
  372. ents = append(ents, string(entitlements.EntitlementSecurityInsecure))
  373. }
  374. return ents
  375. }
  376. func getLabels(opt Opt, labels map[string]string) map[string]string {
  377. if labels == nil {
  378. labels = make(map[string]string)
  379. }
  380. labels[wlabel.HostGatewayIP] = opt.DNSConfig.HostGatewayIP.String()
  381. return labels
  382. }