controller.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452
  1. package buildkit
  2. import (
  3. "context"
  4. "net/http"
  5. "os"
  6. "path/filepath"
  7. "runtime"
  8. "time"
  9. ctd "github.com/containerd/containerd"
  10. "github.com/containerd/containerd/content/local"
  11. ctdmetadata "github.com/containerd/containerd/metadata"
  12. "github.com/containerd/containerd/platforms"
  13. "github.com/containerd/containerd/snapshots"
  14. "github.com/containerd/log"
  15. "github.com/docker/docker/api/types"
  16. "github.com/docker/docker/api/types/filters"
  17. "github.com/docker/docker/builder/builder-next/adapters/containerimage"
  18. "github.com/docker/docker/builder/builder-next/adapters/localinlinecache"
  19. "github.com/docker/docker/builder/builder-next/adapters/snapshot"
  20. "github.com/docker/docker/builder/builder-next/exporter/mobyexporter"
  21. "github.com/docker/docker/builder/builder-next/imagerefchecker"
  22. mobyworker "github.com/docker/docker/builder/builder-next/worker"
  23. wlabel "github.com/docker/docker/builder/builder-next/worker/label"
  24. "github.com/docker/docker/daemon/config"
  25. "github.com/docker/docker/daemon/graphdriver"
  26. units "github.com/docker/go-units"
  27. "github.com/moby/buildkit/cache"
  28. "github.com/moby/buildkit/cache/metadata"
  29. "github.com/moby/buildkit/cache/remotecache"
  30. "github.com/moby/buildkit/cache/remotecache/gha"
  31. inlineremotecache "github.com/moby/buildkit/cache/remotecache/inline"
  32. localremotecache "github.com/moby/buildkit/cache/remotecache/local"
  33. registryremotecache "github.com/moby/buildkit/cache/remotecache/registry"
  34. "github.com/moby/buildkit/client"
  35. bkconfig "github.com/moby/buildkit/cmd/buildkitd/config"
  36. "github.com/moby/buildkit/control"
  37. "github.com/moby/buildkit/frontend"
  38. dockerfile "github.com/moby/buildkit/frontend/dockerfile/builder"
  39. "github.com/moby/buildkit/frontend/gateway"
  40. "github.com/moby/buildkit/frontend/gateway/forwarder"
  41. containerdsnapshot "github.com/moby/buildkit/snapshot/containerd"
  42. "github.com/moby/buildkit/solver"
  43. "github.com/moby/buildkit/solver/bboltcachestorage"
  44. "github.com/moby/buildkit/util/archutil"
  45. "github.com/moby/buildkit/util/entitlements"
  46. "github.com/moby/buildkit/util/network/netproviders"
  47. "github.com/moby/buildkit/util/tracing/detect"
  48. "github.com/moby/buildkit/worker"
  49. "github.com/moby/buildkit/worker/containerd"
  50. "github.com/moby/buildkit/worker/label"
  51. "github.com/pkg/errors"
  52. "go.etcd.io/bbolt"
  53. bolt "go.etcd.io/bbolt"
  54. "go.opentelemetry.io/otel/sdk/trace"
  55. "github.com/moby/buildkit/solver/pb"
  56. "github.com/moby/buildkit/util/apicaps"
  57. )
  58. func newController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  59. if opt.UseSnapshotter {
  60. return newSnapshotterController(ctx, rt, opt)
  61. }
  62. return newGraphDriverController(ctx, rt, opt)
  63. }
  64. func getTraceExporter(ctx context.Context) trace.SpanExporter {
  65. span, _, err := detect.Exporter()
  66. if err != nil {
  67. log.G(ctx).WithError(err).Error("Failed to detect trace exporter for buildkit controller")
  68. }
  69. return span
  70. }
  71. func newSnapshotterController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  72. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  73. return nil, err
  74. }
  75. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  76. if err != nil {
  77. return nil, err
  78. }
  79. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  80. if err != nil {
  81. return nil, err
  82. }
  83. nc := netproviders.Opt{
  84. Mode: "host",
  85. }
  86. // HACK! Windows doesn't have 'host' mode networking.
  87. if runtime.GOOS == "windows" {
  88. nc = netproviders.Opt{
  89. Mode: "auto",
  90. }
  91. }
  92. dns := getDNSConfig(opt.DNSConfig)
  93. wo, err := containerd.NewWorkerOpt(opt.Root, opt.ContainerdAddress, opt.Snapshotter, opt.ContainerdNamespace,
  94. opt.Rootless, map[string]string{
  95. label.Snapshotter: opt.Snapshotter,
  96. }, dns, nc, opt.ApparmorProfile, false, nil, "", ctd.WithTimeout(60*time.Second))
  97. if err != nil {
  98. return nil, err
  99. }
  100. policy, err := getGCPolicy(opt.BuilderConfig, opt.Root)
  101. if err != nil {
  102. return nil, err
  103. }
  104. // make sure platforms are normalized moby/buildkit#4391
  105. for i, p := range wo.Platforms {
  106. wo.Platforms[i] = platforms.Normalize(p)
  107. }
  108. wo.GCPolicy = policy
  109. wo.RegistryHosts = opt.RegistryHosts
  110. wo.Labels = getLabels(opt, wo.Labels)
  111. exec, err := newExecutor(opt.Root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  112. if err != nil {
  113. return nil, err
  114. }
  115. wo.Executor = exec
  116. w, err := mobyworker.NewContainerdWorker(ctx, wo)
  117. if err != nil {
  118. return nil, err
  119. }
  120. wc := &worker.Controller{}
  121. err = wc.Add(w)
  122. if err != nil {
  123. return nil, err
  124. }
  125. frontends := map[string]frontend.Frontend{
  126. "dockerfile.v0": forwarder.NewGatewayForwarder(wc.Infos(), dockerfile.Build),
  127. "gateway.v0": gateway.NewGatewayFrontend(wc.Infos()),
  128. }
  129. return control.NewController(control.Opt{
  130. SessionManager: opt.SessionManager,
  131. WorkerController: wc,
  132. Frontends: frontends,
  133. CacheManager: solver.NewCacheManager(ctx, "local", cacheStorage, worker.NewCacheResultStorage(wc)),
  134. CacheStore: cacheStorage,
  135. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  136. "gha": gha.ResolveCacheImporterFunc(),
  137. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  138. "registry": registryremotecache.ResolveCacheImporterFunc(opt.SessionManager, wo.ContentStore, opt.RegistryHosts),
  139. },
  140. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  141. "gha": gha.ResolveCacheExporterFunc(),
  142. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  143. "local": localremotecache.ResolveCacheExporterFunc(opt.SessionManager),
  144. "registry": registryremotecache.ResolveCacheExporterFunc(opt.SessionManager, opt.RegistryHosts),
  145. },
  146. Entitlements: getEntitlements(opt.BuilderConfig),
  147. HistoryDB: historyDB,
  148. HistoryConfig: historyConf,
  149. LeaseManager: wo.LeaseManager,
  150. ContentStore: wo.ContentStore,
  151. TraceCollector: getTraceExporter(ctx),
  152. })
  153. }
  154. func openHistoryDB(root string, cfg *config.BuilderHistoryConfig) (*bolt.DB, *bkconfig.HistoryConfig, error) {
  155. db, err := bbolt.Open(filepath.Join(root, "history.db"), 0o600, nil)
  156. if err != nil {
  157. return nil, nil, err
  158. }
  159. var conf *bkconfig.HistoryConfig
  160. if cfg != nil {
  161. conf = &bkconfig.HistoryConfig{
  162. MaxAge: cfg.MaxAge,
  163. MaxEntries: cfg.MaxEntries,
  164. }
  165. }
  166. return db, conf, nil
  167. }
  168. func newGraphDriverController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  169. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  170. return nil, err
  171. }
  172. dist := opt.Dist
  173. root := opt.Root
  174. pb.Caps.Init(apicaps.Cap{
  175. ID: pb.CapMergeOp,
  176. Enabled: false,
  177. DisabledReasonMsg: "only enabled with containerd image store backend",
  178. })
  179. pb.Caps.Init(apicaps.Cap{
  180. ID: pb.CapDiffOp,
  181. Enabled: false,
  182. DisabledReasonMsg: "only enabled with containerd image store backend",
  183. })
  184. var driver graphdriver.Driver
  185. if ls, ok := dist.LayerStore.(interface {
  186. Driver() graphdriver.Driver
  187. }); ok {
  188. driver = ls.Driver()
  189. } else {
  190. return nil, errors.Errorf("could not access graphdriver")
  191. }
  192. innerStore, err := local.NewStore(filepath.Join(root, "content"))
  193. if err != nil {
  194. return nil, err
  195. }
  196. db, err := bolt.Open(filepath.Join(root, "containerdmeta.db"), 0o644, nil)
  197. if err != nil {
  198. return nil, errors.WithStack(err)
  199. }
  200. mdb := ctdmetadata.NewDB(db, innerStore, map[string]snapshots.Snapshotter{})
  201. store := containerdsnapshot.NewContentStore(mdb.ContentStore(), "buildkit")
  202. snapshotter, lm, err := snapshot.NewSnapshotter(snapshot.Opt{
  203. GraphDriver: driver,
  204. LayerStore: dist.LayerStore,
  205. Root: root,
  206. IdentityMapping: opt.IdentityMapping,
  207. }, ctdmetadata.NewLeaseManager(mdb), "buildkit")
  208. if err != nil {
  209. return nil, err
  210. }
  211. if err := cache.MigrateV2(context.Background(), filepath.Join(root, "metadata.db"), filepath.Join(root, "metadata_v2.db"), store, snapshotter, lm); err != nil {
  212. return nil, err
  213. }
  214. md, err := metadata.NewStore(filepath.Join(root, "metadata_v2.db"))
  215. if err != nil {
  216. return nil, err
  217. }
  218. layerGetter, ok := snapshotter.(imagerefchecker.LayerGetter)
  219. if !ok {
  220. return nil, errors.Errorf("snapshotter does not implement layergetter")
  221. }
  222. refChecker := imagerefchecker.New(imagerefchecker.Opt{
  223. ImageStore: dist.ImageStore,
  224. LayerGetter: layerGetter,
  225. })
  226. cm, err := cache.NewManager(cache.ManagerOpt{
  227. Snapshotter: snapshotter,
  228. MetadataStore: md,
  229. PruneRefChecker: refChecker,
  230. LeaseManager: lm,
  231. ContentStore: store,
  232. GarbageCollect: mdb.GarbageCollect,
  233. })
  234. if err != nil {
  235. return nil, err
  236. }
  237. src, err := containerimage.NewSource(containerimage.SourceOpt{
  238. CacheAccessor: cm,
  239. ContentStore: store,
  240. DownloadManager: dist.DownloadManager,
  241. MetadataStore: dist.V2MetadataService,
  242. ImageStore: dist.ImageStore,
  243. ReferenceStore: dist.ReferenceStore,
  244. RegistryHosts: opt.RegistryHosts,
  245. LayerStore: dist.LayerStore,
  246. LeaseManager: lm,
  247. GarbageCollect: mdb.GarbageCollect,
  248. })
  249. if err != nil {
  250. return nil, err
  251. }
  252. dns := getDNSConfig(opt.DNSConfig)
  253. exec, err := newExecutor(root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  254. if err != nil {
  255. return nil, err
  256. }
  257. differ, ok := snapshotter.(mobyexporter.Differ)
  258. if !ok {
  259. return nil, errors.Errorf("snapshotter doesn't support differ")
  260. }
  261. exp, err := mobyexporter.New(mobyexporter.Opt{
  262. ImageStore: dist.ImageStore,
  263. Differ: differ,
  264. ImageTagger: opt.ImageTagger,
  265. })
  266. if err != nil {
  267. return nil, err
  268. }
  269. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  270. if err != nil {
  271. return nil, err
  272. }
  273. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  274. if err != nil {
  275. return nil, err
  276. }
  277. gcPolicy, err := getGCPolicy(opt.BuilderConfig, root)
  278. if err != nil {
  279. return nil, errors.Wrap(err, "could not get builder GC policy")
  280. }
  281. layers, ok := snapshotter.(mobyworker.LayerAccess)
  282. if !ok {
  283. return nil, errors.Errorf("snapshotter doesn't support differ")
  284. }
  285. leases, err := lm.List(ctx, `labels."buildkit/lease.temporary"`)
  286. if err != nil {
  287. return nil, err
  288. }
  289. for _, l := range leases {
  290. lm.Delete(ctx, l)
  291. }
  292. wopt := mobyworker.Opt{
  293. ID: opt.EngineID,
  294. ContentStore: store,
  295. CacheManager: cm,
  296. GCPolicy: gcPolicy,
  297. Snapshotter: snapshotter,
  298. Executor: exec,
  299. ImageSource: src,
  300. DownloadManager: dist.DownloadManager,
  301. V2MetadataService: dist.V2MetadataService,
  302. Exporter: exp,
  303. Transport: rt,
  304. Layers: layers,
  305. Platforms: archutil.SupportedPlatforms(true),
  306. LeaseManager: lm,
  307. Labels: getLabels(opt, nil),
  308. }
  309. wc := &worker.Controller{}
  310. w, err := mobyworker.NewWorker(wopt)
  311. if err != nil {
  312. return nil, err
  313. }
  314. wc.Add(w)
  315. frontends := map[string]frontend.Frontend{
  316. "dockerfile.v0": forwarder.NewGatewayForwarder(wc.Infos(), dockerfile.Build),
  317. "gateway.v0": gateway.NewGatewayFrontend(wc.Infos()),
  318. }
  319. return control.NewController(control.Opt{
  320. SessionManager: opt.SessionManager,
  321. WorkerController: wc,
  322. Frontends: frontends,
  323. CacheManager: solver.NewCacheManager(ctx, "local", cacheStorage, worker.NewCacheResultStorage(wc)),
  324. CacheStore: cacheStorage,
  325. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  326. "registry": localinlinecache.ResolveCacheImporterFunc(opt.SessionManager, opt.RegistryHosts, store, dist.ReferenceStore, dist.ImageStore),
  327. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  328. },
  329. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  330. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  331. },
  332. Entitlements: getEntitlements(opt.BuilderConfig),
  333. LeaseManager: lm,
  334. ContentStore: store,
  335. HistoryDB: historyDB,
  336. HistoryConfig: historyConf,
  337. TraceCollector: getTraceExporter(ctx),
  338. })
  339. }
  340. func getGCPolicy(conf config.BuilderConfig, root string) ([]client.PruneInfo, error) {
  341. var gcPolicy []client.PruneInfo
  342. if conf.GC.Enabled {
  343. var (
  344. defaultKeepStorage int64
  345. err error
  346. )
  347. if conf.GC.DefaultKeepStorage != "" {
  348. defaultKeepStorage, err = units.RAMInBytes(conf.GC.DefaultKeepStorage)
  349. if err != nil {
  350. return nil, errors.Wrapf(err, "could not parse '%s' as Builder.GC.DefaultKeepStorage config", conf.GC.DefaultKeepStorage)
  351. }
  352. }
  353. if conf.GC.Policy == nil {
  354. gcPolicy = mobyworker.DefaultGCPolicy(root, defaultKeepStorage)
  355. } else {
  356. gcPolicy = make([]client.PruneInfo, len(conf.GC.Policy))
  357. for i, p := range conf.GC.Policy {
  358. b, err := units.RAMInBytes(p.KeepStorage)
  359. if err != nil {
  360. return nil, err
  361. }
  362. if b == 0 {
  363. b = defaultKeepStorage
  364. }
  365. gcPolicy[i], err = toBuildkitPruneInfo(types.BuildCachePruneOptions{
  366. All: p.All,
  367. KeepStorage: b,
  368. Filters: filters.Args(p.Filter),
  369. })
  370. if err != nil {
  371. return nil, err
  372. }
  373. }
  374. }
  375. }
  376. return gcPolicy, nil
  377. }
  378. func getEntitlements(conf config.BuilderConfig) []string {
  379. var ents []string
  380. // Incase of no config settings, NetworkHost should be enabled & SecurityInsecure must be disabled.
  381. if conf.Entitlements.NetworkHost == nil || *conf.Entitlements.NetworkHost {
  382. ents = append(ents, string(entitlements.EntitlementNetworkHost))
  383. }
  384. if conf.Entitlements.SecurityInsecure != nil && *conf.Entitlements.SecurityInsecure {
  385. ents = append(ents, string(entitlements.EntitlementSecurityInsecure))
  386. }
  387. return ents
  388. }
  389. func getLabels(opt Opt, labels map[string]string) map[string]string {
  390. if labels == nil {
  391. labels = make(map[string]string)
  392. }
  393. labels[wlabel.HostGatewayIP] = opt.DNSConfig.HostGatewayIP.String()
  394. return labels
  395. }