123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161 |
- //go:build !windows
- // +build !windows
- package buildkit
- import (
- "os"
- "path/filepath"
- "strconv"
- "sync"
- "github.com/docker/docker/daemon/config"
- "github.com/docker/docker/libnetwork"
- "github.com/docker/docker/pkg/idtools"
- "github.com/docker/docker/pkg/stringid"
- "github.com/moby/buildkit/executor"
- "github.com/moby/buildkit/executor/oci"
- "github.com/moby/buildkit/executor/runcexecutor"
- "github.com/moby/buildkit/identity"
- "github.com/moby/buildkit/solver/pb"
- "github.com/moby/buildkit/util/network"
- specs "github.com/opencontainers/runtime-spec/specs-go"
- "github.com/sirupsen/logrus"
- )
- const networkName = "bridge"
- func newExecutor(root, cgroupParent string, net *libnetwork.Controller, dnsConfig *oci.DNSConfig, rootless bool, idmap idtools.IdentityMapping, apparmorProfile string) (executor.Executor, error) {
- netRoot := filepath.Join(root, "net")
- networkProviders := map[pb.NetMode]network.Provider{
- pb.NetMode_UNSET: &bridgeProvider{Controller: net, Root: netRoot},
- pb.NetMode_HOST: network.NewHostProvider(),
- pb.NetMode_NONE: network.NewNoneProvider(),
- }
- // make sure net state directory is cleared from previous state
- fis, err := os.ReadDir(netRoot)
- if err == nil {
- for _, fi := range fis {
- fp := filepath.Join(netRoot, fi.Name())
- if err := os.RemoveAll(fp); err != nil {
- logrus.WithError(err).Errorf("failed to delete old network state: %v", fp)
- }
- }
- }
- // Returning a non-nil but empty *IdentityMapping breaks BuildKit:
- // https://github.com/moby/moby/pull/39444
- pidmap := &idmap
- if idmap.Empty() {
- pidmap = nil
- }
- return runcexecutor.New(runcexecutor.Opt{
- Root: filepath.Join(root, "executor"),
- CommandCandidates: []string{"runc"},
- DefaultCgroupParent: cgroupParent,
- Rootless: rootless,
- NoPivot: os.Getenv("DOCKER_RAMDISK") != "",
- IdentityMapping: pidmap,
- DNS: dnsConfig,
- ApparmorProfile: apparmorProfile,
- }, networkProviders)
- }
- type bridgeProvider struct {
- *libnetwork.Controller
- Root string
- }
- func (p *bridgeProvider) New() (network.Namespace, error) {
- n, err := p.NetworkByName(networkName)
- if err != nil {
- return nil, err
- }
- iface := &lnInterface{ready: make(chan struct{}), provider: p}
- iface.Once.Do(func() {
- go iface.init(p.Controller, n)
- })
- return iface, nil
- }
- type lnInterface struct {
- ep *libnetwork.Endpoint
- sbx *libnetwork.Sandbox
- sync.Once
- err error
- ready chan struct{}
- provider *bridgeProvider
- }
- func (iface *lnInterface) init(c *libnetwork.Controller, n libnetwork.Network) {
- defer close(iface.ready)
- id := identity.NewID()
- ep, err := n.CreateEndpoint(id, libnetwork.CreateOptionDisableResolution())
- if err != nil {
- iface.err = err
- return
- }
- sbx, err := c.NewSandbox(id, libnetwork.OptionUseExternalKey(), libnetwork.OptionHostsPath(filepath.Join(iface.provider.Root, id, "hosts")),
- libnetwork.OptionResolvConfPath(filepath.Join(iface.provider.Root, id, "resolv.conf")))
- if err != nil {
- iface.err = err
- return
- }
- if err := ep.Join(sbx); err != nil {
- iface.err = err
- return
- }
- iface.sbx = sbx
- iface.ep = ep
- }
- func (iface *lnInterface) Set(s *specs.Spec) error {
- <-iface.ready
- if iface.err != nil {
- logrus.WithError(iface.err).Error("failed to set networking spec")
- return iface.err
- }
- shortNetCtlrID := stringid.TruncateID(iface.provider.Controller.ID())
- // attach netns to bridge within the container namespace, using reexec in a prestart hook
- s.Hooks = &specs.Hooks{
- Prestart: []specs.Hook{{
- Path: filepath.Join("/proc", strconv.Itoa(os.Getpid()), "exe"),
- Args: []string{"libnetwork-setkey", "-exec-root=" + iface.provider.Config().ExecRoot, iface.sbx.ContainerID(), shortNetCtlrID},
- }},
- }
- return nil
- }
- func (iface *lnInterface) Close() error {
- <-iface.ready
- if iface.sbx != nil {
- go func() {
- if err := iface.sbx.Delete(); err != nil {
- logrus.WithError(err).Errorf("failed to delete builder network sandbox")
- }
- if err := os.RemoveAll(filepath.Join(iface.provider.Root, iface.sbx.ContainerID())); err != nil {
- logrus.WithError(err).Errorf("failed to delete builder sandbox directory")
- }
- }()
- }
- return iface.err
- }
- func getDNSConfig(cfg config.DNSConfig) *oci.DNSConfig {
- if cfg.DNS != nil || cfg.DNSSearch != nil || cfg.DNSOptions != nil {
- return &oci.DNSConfig{
- Nameservers: cfg.DNS,
- SearchDomains: cfg.DNSSearch,
- Options: cfg.DNSOptions,
- }
- }
- return nil
- }
|