controller.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437
  1. package buildkit
  2. import (
  3. "context"
  4. "net/http"
  5. "os"
  6. "path/filepath"
  7. "time"
  8. ctd "github.com/containerd/containerd"
  9. "github.com/containerd/containerd/content/local"
  10. ctdmetadata "github.com/containerd/containerd/metadata"
  11. "github.com/containerd/containerd/snapshots"
  12. "github.com/containerd/log"
  13. "github.com/docker/docker/api/types"
  14. "github.com/docker/docker/api/types/filters"
  15. "github.com/docker/docker/builder/builder-next/adapters/containerimage"
  16. "github.com/docker/docker/builder/builder-next/adapters/localinlinecache"
  17. "github.com/docker/docker/builder/builder-next/adapters/snapshot"
  18. "github.com/docker/docker/builder/builder-next/exporter/mobyexporter"
  19. "github.com/docker/docker/builder/builder-next/imagerefchecker"
  20. mobyworker "github.com/docker/docker/builder/builder-next/worker"
  21. wlabel "github.com/docker/docker/builder/builder-next/worker/label"
  22. "github.com/docker/docker/daemon/config"
  23. "github.com/docker/docker/daemon/graphdriver"
  24. units "github.com/docker/go-units"
  25. "github.com/moby/buildkit/cache"
  26. "github.com/moby/buildkit/cache/metadata"
  27. "github.com/moby/buildkit/cache/remotecache"
  28. "github.com/moby/buildkit/cache/remotecache/gha"
  29. inlineremotecache "github.com/moby/buildkit/cache/remotecache/inline"
  30. localremotecache "github.com/moby/buildkit/cache/remotecache/local"
  31. registryremotecache "github.com/moby/buildkit/cache/remotecache/registry"
  32. "github.com/moby/buildkit/client"
  33. bkconfig "github.com/moby/buildkit/cmd/buildkitd/config"
  34. "github.com/moby/buildkit/control"
  35. "github.com/moby/buildkit/frontend"
  36. dockerfile "github.com/moby/buildkit/frontend/dockerfile/builder"
  37. "github.com/moby/buildkit/frontend/gateway"
  38. "github.com/moby/buildkit/frontend/gateway/forwarder"
  39. containerdsnapshot "github.com/moby/buildkit/snapshot/containerd"
  40. "github.com/moby/buildkit/solver"
  41. "github.com/moby/buildkit/solver/bboltcachestorage"
  42. "github.com/moby/buildkit/util/archutil"
  43. "github.com/moby/buildkit/util/entitlements"
  44. "github.com/moby/buildkit/util/network/netproviders"
  45. "github.com/moby/buildkit/util/tracing/detect"
  46. "github.com/moby/buildkit/worker"
  47. "github.com/moby/buildkit/worker/containerd"
  48. "github.com/moby/buildkit/worker/label"
  49. "github.com/pkg/errors"
  50. "go.etcd.io/bbolt"
  51. bolt "go.etcd.io/bbolt"
  52. "go.opentelemetry.io/otel/sdk/trace"
  53. "github.com/moby/buildkit/solver/pb"
  54. "github.com/moby/buildkit/util/apicaps"
  55. )
  56. func newController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  57. if opt.UseSnapshotter {
  58. return newSnapshotterController(ctx, rt, opt)
  59. }
  60. return newGraphDriverController(ctx, rt, opt)
  61. }
  62. func getTraceExporter(ctx context.Context) trace.SpanExporter {
  63. exp, err := detect.Exporter()
  64. if err != nil {
  65. log.G(ctx).WithError(err).Error("Failed to detect trace exporter for buildkit controller")
  66. }
  67. return exp
  68. }
  69. func newSnapshotterController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  70. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  71. return nil, err
  72. }
  73. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  74. if err != nil {
  75. return nil, err
  76. }
  77. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  78. if err != nil {
  79. return nil, err
  80. }
  81. nc := netproviders.Opt{
  82. Mode: "host",
  83. }
  84. dns := getDNSConfig(opt.DNSConfig)
  85. wo, err := containerd.NewWorkerOpt(opt.Root, opt.ContainerdAddress, opt.Snapshotter, opt.ContainerdNamespace,
  86. opt.Rootless, map[string]string{
  87. label.Snapshotter: opt.Snapshotter,
  88. }, dns, nc, opt.ApparmorProfile, false, nil, "", ctd.WithTimeout(60*time.Second))
  89. if err != nil {
  90. return nil, err
  91. }
  92. policy, err := getGCPolicy(opt.BuilderConfig, opt.Root)
  93. if err != nil {
  94. return nil, err
  95. }
  96. wo.GCPolicy = policy
  97. wo.RegistryHosts = opt.RegistryHosts
  98. wo.Labels = getLabels(opt, wo.Labels)
  99. exec, err := newExecutor(opt.Root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  100. if err != nil {
  101. return nil, err
  102. }
  103. wo.Executor = exec
  104. w, err := mobyworker.NewContainerdWorker(ctx, wo)
  105. if err != nil {
  106. return nil, err
  107. }
  108. wc := &worker.Controller{}
  109. err = wc.Add(w)
  110. if err != nil {
  111. return nil, err
  112. }
  113. frontends := map[string]frontend.Frontend{
  114. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  115. "gateway.v0": gateway.NewGatewayFrontend(wc),
  116. }
  117. return control.NewController(control.Opt{
  118. SessionManager: opt.SessionManager,
  119. WorkerController: wc,
  120. Frontends: frontends,
  121. CacheManager: solver.NewCacheManager(ctx, "local", cacheStorage, worker.NewCacheResultStorage(wc)),
  122. CacheStore: cacheStorage,
  123. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  124. "gha": gha.ResolveCacheImporterFunc(),
  125. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  126. "registry": registryremotecache.ResolveCacheImporterFunc(opt.SessionManager, wo.ContentStore, opt.RegistryHosts),
  127. },
  128. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  129. "gha": gha.ResolveCacheExporterFunc(),
  130. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  131. "local": localremotecache.ResolveCacheExporterFunc(opt.SessionManager),
  132. "registry": registryremotecache.ResolveCacheExporterFunc(opt.SessionManager, opt.RegistryHosts),
  133. },
  134. Entitlements: getEntitlements(opt.BuilderConfig),
  135. HistoryDB: historyDB,
  136. HistoryConfig: historyConf,
  137. LeaseManager: wo.LeaseManager,
  138. ContentStore: wo.ContentStore,
  139. TraceCollector: getTraceExporter(ctx),
  140. })
  141. }
  142. func openHistoryDB(root string, cfg *config.BuilderHistoryConfig) (*bolt.DB, *bkconfig.HistoryConfig, error) {
  143. db, err := bbolt.Open(filepath.Join(root, "history.db"), 0o600, nil)
  144. if err != nil {
  145. return nil, nil, err
  146. }
  147. var conf *bkconfig.HistoryConfig
  148. if cfg != nil {
  149. conf = &bkconfig.HistoryConfig{
  150. MaxAge: cfg.MaxAge,
  151. MaxEntries: cfg.MaxEntries,
  152. }
  153. }
  154. return db, conf, nil
  155. }
  156. func newGraphDriverController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  157. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  158. return nil, err
  159. }
  160. dist := opt.Dist
  161. root := opt.Root
  162. pb.Caps.Init(apicaps.Cap{
  163. ID: pb.CapMergeOp,
  164. Enabled: false,
  165. DisabledReasonMsg: "only enabled with containerd image store backend",
  166. })
  167. pb.Caps.Init(apicaps.Cap{
  168. ID: pb.CapDiffOp,
  169. Enabled: false,
  170. DisabledReasonMsg: "only enabled with containerd image store backend",
  171. })
  172. var driver graphdriver.Driver
  173. if ls, ok := dist.LayerStore.(interface {
  174. Driver() graphdriver.Driver
  175. }); ok {
  176. driver = ls.Driver()
  177. } else {
  178. return nil, errors.Errorf("could not access graphdriver")
  179. }
  180. innerStore, err := local.NewStore(filepath.Join(root, "content"))
  181. if err != nil {
  182. return nil, err
  183. }
  184. db, err := bolt.Open(filepath.Join(root, "containerdmeta.db"), 0o644, nil)
  185. if err != nil {
  186. return nil, errors.WithStack(err)
  187. }
  188. mdb := ctdmetadata.NewDB(db, innerStore, map[string]snapshots.Snapshotter{})
  189. store := containerdsnapshot.NewContentStore(mdb.ContentStore(), "buildkit")
  190. snapshotter, lm, err := snapshot.NewSnapshotter(snapshot.Opt{
  191. GraphDriver: driver,
  192. LayerStore: dist.LayerStore,
  193. Root: root,
  194. IdentityMapping: opt.IdentityMapping,
  195. }, ctdmetadata.NewLeaseManager(mdb), "buildkit")
  196. if err != nil {
  197. return nil, err
  198. }
  199. if err := cache.MigrateV2(context.Background(), filepath.Join(root, "metadata.db"), filepath.Join(root, "metadata_v2.db"), store, snapshotter, lm); err != nil {
  200. return nil, err
  201. }
  202. md, err := metadata.NewStore(filepath.Join(root, "metadata_v2.db"))
  203. if err != nil {
  204. return nil, err
  205. }
  206. layerGetter, ok := snapshotter.(imagerefchecker.LayerGetter)
  207. if !ok {
  208. return nil, errors.Errorf("snapshotter does not implement layergetter")
  209. }
  210. refChecker := imagerefchecker.New(imagerefchecker.Opt{
  211. ImageStore: dist.ImageStore,
  212. LayerGetter: layerGetter,
  213. })
  214. cm, err := cache.NewManager(cache.ManagerOpt{
  215. Snapshotter: snapshotter,
  216. MetadataStore: md,
  217. PruneRefChecker: refChecker,
  218. LeaseManager: lm,
  219. ContentStore: store,
  220. GarbageCollect: mdb.GarbageCollect,
  221. })
  222. if err != nil {
  223. return nil, err
  224. }
  225. src, err := containerimage.NewSource(containerimage.SourceOpt{
  226. CacheAccessor: cm,
  227. ContentStore: store,
  228. DownloadManager: dist.DownloadManager,
  229. MetadataStore: dist.V2MetadataService,
  230. ImageStore: dist.ImageStore,
  231. ReferenceStore: dist.ReferenceStore,
  232. RegistryHosts: opt.RegistryHosts,
  233. LayerStore: dist.LayerStore,
  234. LeaseManager: lm,
  235. GarbageCollect: mdb.GarbageCollect,
  236. })
  237. if err != nil {
  238. return nil, err
  239. }
  240. dns := getDNSConfig(opt.DNSConfig)
  241. exec, err := newExecutor(root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  242. if err != nil {
  243. return nil, err
  244. }
  245. differ, ok := snapshotter.(mobyexporter.Differ)
  246. if !ok {
  247. return nil, errors.Errorf("snapshotter doesn't support differ")
  248. }
  249. exp, err := mobyexporter.New(mobyexporter.Opt{
  250. ImageStore: dist.ImageStore,
  251. Differ: differ,
  252. ImageTagger: opt.ImageTagger,
  253. })
  254. if err != nil {
  255. return nil, err
  256. }
  257. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  258. if err != nil {
  259. return nil, err
  260. }
  261. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  262. if err != nil {
  263. return nil, err
  264. }
  265. gcPolicy, err := getGCPolicy(opt.BuilderConfig, root)
  266. if err != nil {
  267. return nil, errors.Wrap(err, "could not get builder GC policy")
  268. }
  269. layers, ok := snapshotter.(mobyworker.LayerAccess)
  270. if !ok {
  271. return nil, errors.Errorf("snapshotter doesn't support differ")
  272. }
  273. leases, err := lm.List(ctx, `labels."buildkit/lease.temporary"`)
  274. if err != nil {
  275. return nil, err
  276. }
  277. for _, l := range leases {
  278. lm.Delete(ctx, l)
  279. }
  280. wopt := mobyworker.Opt{
  281. ID: opt.EngineID,
  282. ContentStore: store,
  283. CacheManager: cm,
  284. GCPolicy: gcPolicy,
  285. Snapshotter: snapshotter,
  286. Executor: exec,
  287. ImageSource: src,
  288. DownloadManager: dist.DownloadManager,
  289. V2MetadataService: dist.V2MetadataService,
  290. Exporter: exp,
  291. Transport: rt,
  292. Layers: layers,
  293. Platforms: archutil.SupportedPlatforms(true),
  294. LeaseManager: lm,
  295. Labels: getLabels(opt, nil),
  296. }
  297. wc := &worker.Controller{}
  298. w, err := mobyworker.NewWorker(wopt)
  299. if err != nil {
  300. return nil, err
  301. }
  302. wc.Add(w)
  303. frontends := map[string]frontend.Frontend{
  304. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  305. "gateway.v0": gateway.NewGatewayFrontend(wc),
  306. }
  307. return control.NewController(control.Opt{
  308. SessionManager: opt.SessionManager,
  309. WorkerController: wc,
  310. Frontends: frontends,
  311. CacheManager: solver.NewCacheManager(ctx, "local", cacheStorage, worker.NewCacheResultStorage(wc)),
  312. CacheStore: cacheStorage,
  313. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  314. "registry": localinlinecache.ResolveCacheImporterFunc(opt.SessionManager, opt.RegistryHosts, store, dist.ReferenceStore, dist.ImageStore),
  315. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  316. },
  317. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  318. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  319. },
  320. Entitlements: getEntitlements(opt.BuilderConfig),
  321. LeaseManager: lm,
  322. ContentStore: store,
  323. HistoryDB: historyDB,
  324. HistoryConfig: historyConf,
  325. TraceCollector: getTraceExporter(ctx),
  326. })
  327. }
  328. func getGCPolicy(conf config.BuilderConfig, root string) ([]client.PruneInfo, error) {
  329. var gcPolicy []client.PruneInfo
  330. if conf.GC.Enabled {
  331. var (
  332. defaultKeepStorage int64
  333. err error
  334. )
  335. if conf.GC.DefaultKeepStorage != "" {
  336. defaultKeepStorage, err = units.RAMInBytes(conf.GC.DefaultKeepStorage)
  337. if err != nil {
  338. return nil, errors.Wrapf(err, "could not parse '%s' as Builder.GC.DefaultKeepStorage config", conf.GC.DefaultKeepStorage)
  339. }
  340. }
  341. if conf.GC.Policy == nil {
  342. gcPolicy = mobyworker.DefaultGCPolicy(root, defaultKeepStorage)
  343. } else {
  344. gcPolicy = make([]client.PruneInfo, len(conf.GC.Policy))
  345. for i, p := range conf.GC.Policy {
  346. b, err := units.RAMInBytes(p.KeepStorage)
  347. if err != nil {
  348. return nil, err
  349. }
  350. if b == 0 {
  351. b = defaultKeepStorage
  352. }
  353. gcPolicy[i], err = toBuildkitPruneInfo(types.BuildCachePruneOptions{
  354. All: p.All,
  355. KeepStorage: b,
  356. Filters: filters.Args(p.Filter),
  357. })
  358. if err != nil {
  359. return nil, err
  360. }
  361. }
  362. }
  363. }
  364. return gcPolicy, nil
  365. }
  366. func getEntitlements(conf config.BuilderConfig) []string {
  367. var ents []string
  368. // Incase of no config settings, NetworkHost should be enabled & SecurityInsecure must be disabled.
  369. if conf.Entitlements.NetworkHost == nil || *conf.Entitlements.NetworkHost {
  370. ents = append(ents, string(entitlements.EntitlementNetworkHost))
  371. }
  372. if conf.Entitlements.SecurityInsecure != nil && *conf.Entitlements.SecurityInsecure {
  373. ents = append(ents, string(entitlements.EntitlementSecurityInsecure))
  374. }
  375. return ents
  376. }
  377. func getLabels(opt Opt, labels map[string]string) map[string]string {
  378. if labels == nil {
  379. labels = make(map[string]string)
  380. }
  381. labels[wlabel.HostGatewayIP] = opt.DNSConfig.HostGatewayIP.String()
  382. return labels
  383. }