executor_unix.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155
  1. //go:build !windows
  2. // +build !windows
  3. package buildkit
  4. import (
  5. "io/ioutil"
  6. "os"
  7. "path/filepath"
  8. "strconv"
  9. "sync"
  10. "github.com/docker/docker/daemon/config"
  11. "github.com/docker/docker/libnetwork"
  12. "github.com/docker/docker/pkg/idtools"
  13. "github.com/docker/docker/pkg/stringid"
  14. "github.com/moby/buildkit/executor"
  15. "github.com/moby/buildkit/executor/oci"
  16. "github.com/moby/buildkit/executor/runcexecutor"
  17. "github.com/moby/buildkit/identity"
  18. "github.com/moby/buildkit/solver/pb"
  19. "github.com/moby/buildkit/util/network"
  20. specs "github.com/opencontainers/runtime-spec/specs-go"
  21. "github.com/sirupsen/logrus"
  22. )
  23. const networkName = "bridge"
  24. func newExecutor(root, cgroupParent string, net libnetwork.NetworkController, dnsConfig *oci.DNSConfig, rootless bool, idmap *idtools.IdentityMapping, apparmorProfile string) (executor.Executor, error) {
  25. netRoot := filepath.Join(root, "net")
  26. networkProviders := map[pb.NetMode]network.Provider{
  27. pb.NetMode_UNSET: &bridgeProvider{NetworkController: net, Root: netRoot},
  28. pb.NetMode_HOST: network.NewHostProvider(),
  29. pb.NetMode_NONE: network.NewNoneProvider(),
  30. }
  31. // make sure net state directory is cleared from previous state
  32. fis, err := ioutil.ReadDir(netRoot)
  33. if err == nil {
  34. for _, fi := range fis {
  35. fp := filepath.Join(netRoot, fi.Name())
  36. if err := os.RemoveAll(fp); err != nil {
  37. logrus.WithError(err).Errorf("failed to delete old network state: %v", fp)
  38. }
  39. }
  40. }
  41. return runcexecutor.New(runcexecutor.Opt{
  42. Root: filepath.Join(root, "executor"),
  43. CommandCandidates: []string{"runc"},
  44. DefaultCgroupParent: cgroupParent,
  45. Rootless: rootless,
  46. NoPivot: os.Getenv("DOCKER_RAMDISK") != "",
  47. IdentityMapping: idmap,
  48. DNS: dnsConfig,
  49. ApparmorProfile: apparmorProfile,
  50. }, networkProviders)
  51. }
  52. type bridgeProvider struct {
  53. libnetwork.NetworkController
  54. Root string
  55. }
  56. func (p *bridgeProvider) New() (network.Namespace, error) {
  57. n, err := p.NetworkByName(networkName)
  58. if err != nil {
  59. return nil, err
  60. }
  61. iface := &lnInterface{ready: make(chan struct{}), provider: p}
  62. iface.Once.Do(func() {
  63. go iface.init(p.NetworkController, n)
  64. })
  65. return iface, nil
  66. }
  67. type lnInterface struct {
  68. ep libnetwork.Endpoint
  69. sbx libnetwork.Sandbox
  70. sync.Once
  71. err error
  72. ready chan struct{}
  73. provider *bridgeProvider
  74. }
  75. func (iface *lnInterface) init(c libnetwork.NetworkController, n libnetwork.Network) {
  76. defer close(iface.ready)
  77. id := identity.NewID()
  78. ep, err := n.CreateEndpoint(id, libnetwork.CreateOptionDisableResolution())
  79. if err != nil {
  80. iface.err = err
  81. return
  82. }
  83. sbx, err := c.NewSandbox(id, libnetwork.OptionUseExternalKey(), libnetwork.OptionHostsPath(filepath.Join(iface.provider.Root, id, "hosts")),
  84. libnetwork.OptionResolvConfPath(filepath.Join(iface.provider.Root, id, "resolv.conf")))
  85. if err != nil {
  86. iface.err = err
  87. return
  88. }
  89. if err := ep.Join(sbx); err != nil {
  90. iface.err = err
  91. return
  92. }
  93. iface.sbx = sbx
  94. iface.ep = ep
  95. }
  96. func (iface *lnInterface) Set(s *specs.Spec) error {
  97. <-iface.ready
  98. if iface.err != nil {
  99. logrus.WithError(iface.err).Error("failed to set networking spec")
  100. return iface.err
  101. }
  102. shortNetCtlrID := stringid.TruncateID(iface.provider.NetworkController.ID())
  103. // attach netns to bridge within the container namespace, using reexec in a prestart hook
  104. s.Hooks = &specs.Hooks{
  105. Prestart: []specs.Hook{{
  106. Path: filepath.Join("/proc", strconv.Itoa(os.Getpid()), "exe"),
  107. Args: []string{"libnetwork-setkey", "-exec-root=" + iface.provider.Config().Daemon.ExecRoot, iface.sbx.ContainerID(), shortNetCtlrID},
  108. }},
  109. }
  110. return nil
  111. }
  112. func (iface *lnInterface) Close() error {
  113. <-iface.ready
  114. if iface.sbx != nil {
  115. go func() {
  116. if err := iface.sbx.Delete(); err != nil {
  117. logrus.WithError(err).Errorf("failed to delete builder network sandbox")
  118. }
  119. if err := os.RemoveAll(filepath.Join(iface.provider.Root, iface.sbx.ContainerID())); err != nil {
  120. logrus.WithError(err).Errorf("failed to delete builder sandbox directory")
  121. }
  122. }()
  123. }
  124. return iface.err
  125. }
  126. func getDNSConfig(cfg config.DNSConfig) *oci.DNSConfig {
  127. if cfg.DNS != nil || cfg.DNSSearch != nil || cfg.DNSOptions != nil {
  128. return &oci.DNSConfig{
  129. Nameservers: cfg.DNS,
  130. SearchDomains: cfg.DNSSearch,
  131. Options: cfg.DNSOptions,
  132. }
  133. }
  134. return nil
  135. }