controller.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414
  1. package buildkit
  2. import (
  3. "context"
  4. "net/http"
  5. "os"
  6. "path/filepath"
  7. "time"
  8. ctd "github.com/containerd/containerd"
  9. "github.com/containerd/containerd/content/local"
  10. ctdmetadata "github.com/containerd/containerd/metadata"
  11. "github.com/containerd/containerd/snapshots"
  12. "github.com/docker/docker/api/types"
  13. "github.com/docker/docker/api/types/filters"
  14. "github.com/docker/docker/builder/builder-next/adapters/containerimage"
  15. "github.com/docker/docker/builder/builder-next/adapters/localinlinecache"
  16. "github.com/docker/docker/builder/builder-next/adapters/snapshot"
  17. "github.com/docker/docker/builder/builder-next/exporter"
  18. "github.com/docker/docker/builder/builder-next/exporter/mobyexporter"
  19. "github.com/docker/docker/builder/builder-next/imagerefchecker"
  20. mobyworker "github.com/docker/docker/builder/builder-next/worker"
  21. "github.com/docker/docker/daemon/config"
  22. "github.com/docker/docker/daemon/graphdriver"
  23. units "github.com/docker/go-units"
  24. "github.com/moby/buildkit/cache"
  25. "github.com/moby/buildkit/cache/metadata"
  26. "github.com/moby/buildkit/cache/remotecache"
  27. "github.com/moby/buildkit/cache/remotecache/gha"
  28. inlineremotecache "github.com/moby/buildkit/cache/remotecache/inline"
  29. localremotecache "github.com/moby/buildkit/cache/remotecache/local"
  30. registryremotecache "github.com/moby/buildkit/cache/remotecache/registry"
  31. "github.com/moby/buildkit/client"
  32. bkconfig "github.com/moby/buildkit/cmd/buildkitd/config"
  33. "github.com/moby/buildkit/control"
  34. "github.com/moby/buildkit/frontend"
  35. dockerfile "github.com/moby/buildkit/frontend/dockerfile/builder"
  36. "github.com/moby/buildkit/frontend/gateway"
  37. "github.com/moby/buildkit/frontend/gateway/forwarder"
  38. containerdsnapshot "github.com/moby/buildkit/snapshot/containerd"
  39. "github.com/moby/buildkit/solver/bboltcachestorage"
  40. "github.com/moby/buildkit/util/archutil"
  41. "github.com/moby/buildkit/util/entitlements"
  42. "github.com/moby/buildkit/util/leaseutil"
  43. "github.com/moby/buildkit/util/network/netproviders"
  44. "github.com/moby/buildkit/worker"
  45. "github.com/moby/buildkit/worker/containerd"
  46. "github.com/moby/buildkit/worker/label"
  47. "github.com/pkg/errors"
  48. "go.etcd.io/bbolt"
  49. bolt "go.etcd.io/bbolt"
  50. "github.com/moby/buildkit/solver/pb"
  51. "github.com/moby/buildkit/util/apicaps"
  52. )
  53. func newController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  54. if opt.UseSnapshotter {
  55. return newSnapshotterController(ctx, rt, opt)
  56. }
  57. return newGraphDriverController(ctx, rt, opt)
  58. }
  59. func newSnapshotterController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  60. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  61. return nil, err
  62. }
  63. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  64. if err != nil {
  65. return nil, err
  66. }
  67. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  68. if err != nil {
  69. return nil, err
  70. }
  71. nc := netproviders.Opt{
  72. Mode: "host",
  73. }
  74. dns := getDNSConfig(opt.DNSConfig)
  75. wo, err := containerd.NewWorkerOpt(opt.Root, opt.ContainerdAddress, opt.Snapshotter, opt.ContainerdNamespace,
  76. opt.Rootless, map[string]string{
  77. label.Snapshotter: opt.Snapshotter,
  78. }, dns, nc, opt.ApparmorProfile, false, nil, "", ctd.WithTimeout(60*time.Second))
  79. if err != nil {
  80. return nil, err
  81. }
  82. policy, err := getGCPolicy(opt.BuilderConfig, opt.Root)
  83. if err != nil {
  84. return nil, err
  85. }
  86. wo.GCPolicy = policy
  87. wo.RegistryHosts = opt.RegistryHosts
  88. exec, err := newExecutor(opt.Root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  89. if err != nil {
  90. return nil, err
  91. }
  92. wo.Executor = exec
  93. w, err := mobyworker.NewContainerdWorker(ctx, wo)
  94. if err != nil {
  95. return nil, err
  96. }
  97. wc := &worker.Controller{}
  98. err = wc.Add(w)
  99. if err != nil {
  100. return nil, err
  101. }
  102. frontends := map[string]frontend.Frontend{
  103. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  104. "gateway.v0": gateway.NewGatewayFrontend(wc),
  105. }
  106. return control.NewController(control.Opt{
  107. SessionManager: opt.SessionManager,
  108. WorkerController: wc,
  109. Frontends: frontends,
  110. CacheKeyStorage: cacheStorage,
  111. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  112. "gha": gha.ResolveCacheImporterFunc(),
  113. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  114. "registry": registryremotecache.ResolveCacheImporterFunc(opt.SessionManager, wo.ContentStore, opt.RegistryHosts),
  115. },
  116. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  117. "gha": gha.ResolveCacheExporterFunc(),
  118. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  119. "local": localremotecache.ResolveCacheExporterFunc(opt.SessionManager),
  120. "registry": registryremotecache.ResolveCacheExporterFunc(opt.SessionManager, opt.RegistryHosts),
  121. },
  122. Entitlements: getEntitlements(opt.BuilderConfig),
  123. HistoryDB: historyDB,
  124. HistoryConfig: historyConf,
  125. LeaseManager: wo.LeaseManager,
  126. ContentStore: wo.ContentStore,
  127. })
  128. }
  129. func openHistoryDB(root string, cfg *config.BuilderHistoryConfig) (*bolt.DB, *bkconfig.HistoryConfig, error) {
  130. db, err := bbolt.Open(filepath.Join(root, "history.db"), 0o600, nil)
  131. if err != nil {
  132. return nil, nil, err
  133. }
  134. var conf *bkconfig.HistoryConfig
  135. if cfg != nil {
  136. conf = &bkconfig.HistoryConfig{
  137. MaxAge: cfg.MaxAge,
  138. MaxEntries: cfg.MaxEntries,
  139. }
  140. }
  141. return db, conf, nil
  142. }
  143. func newGraphDriverController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  144. if err := os.MkdirAll(opt.Root, 0711); err != nil {
  145. return nil, err
  146. }
  147. dist := opt.Dist
  148. root := opt.Root
  149. pb.Caps.Init(apicaps.Cap{
  150. ID: pb.CapMergeOp,
  151. Enabled: false,
  152. DisabledReasonMsg: "only enabled with containerd image store backend",
  153. })
  154. pb.Caps.Init(apicaps.Cap{
  155. ID: pb.CapDiffOp,
  156. Enabled: false,
  157. DisabledReasonMsg: "only enabled with containerd image store backend",
  158. })
  159. var driver graphdriver.Driver
  160. if ls, ok := dist.LayerStore.(interface {
  161. Driver() graphdriver.Driver
  162. }); ok {
  163. driver = ls.Driver()
  164. } else {
  165. return nil, errors.Errorf("could not access graphdriver")
  166. }
  167. store, err := local.NewStore(filepath.Join(root, "content"))
  168. if err != nil {
  169. return nil, err
  170. }
  171. db, err := bolt.Open(filepath.Join(root, "containerdmeta.db"), 0644, nil)
  172. if err != nil {
  173. return nil, errors.WithStack(err)
  174. }
  175. mdb := ctdmetadata.NewDB(db, store, map[string]snapshots.Snapshotter{})
  176. store = containerdsnapshot.NewContentStore(mdb.ContentStore(), "buildkit")
  177. lm := leaseutil.WithNamespace(ctdmetadata.NewLeaseManager(mdb), "buildkit")
  178. snapshotter, lm, err := snapshot.NewSnapshotter(snapshot.Opt{
  179. GraphDriver: driver,
  180. LayerStore: dist.LayerStore,
  181. Root: root,
  182. IdentityMapping: opt.IdentityMapping,
  183. }, lm)
  184. if err != nil {
  185. return nil, err
  186. }
  187. if err := cache.MigrateV2(context.Background(), filepath.Join(root, "metadata.db"), filepath.Join(root, "metadata_v2.db"), store, snapshotter, lm); err != nil {
  188. return nil, err
  189. }
  190. md, err := metadata.NewStore(filepath.Join(root, "metadata_v2.db"))
  191. if err != nil {
  192. return nil, err
  193. }
  194. layerGetter, ok := snapshotter.(imagerefchecker.LayerGetter)
  195. if !ok {
  196. return nil, errors.Errorf("snapshotter does not implement layergetter")
  197. }
  198. refChecker := imagerefchecker.New(imagerefchecker.Opt{
  199. ImageStore: dist.ImageStore,
  200. LayerGetter: layerGetter,
  201. })
  202. cm, err := cache.NewManager(cache.ManagerOpt{
  203. Snapshotter: snapshotter,
  204. MetadataStore: md,
  205. PruneRefChecker: refChecker,
  206. LeaseManager: lm,
  207. ContentStore: store,
  208. GarbageCollect: mdb.GarbageCollect,
  209. })
  210. if err != nil {
  211. return nil, err
  212. }
  213. src, err := containerimage.NewSource(containerimage.SourceOpt{
  214. CacheAccessor: cm,
  215. ContentStore: store,
  216. DownloadManager: dist.DownloadManager,
  217. MetadataStore: dist.V2MetadataService,
  218. ImageStore: dist.ImageStore,
  219. ReferenceStore: dist.ReferenceStore,
  220. RegistryHosts: opt.RegistryHosts,
  221. LayerStore: dist.LayerStore,
  222. LeaseManager: lm,
  223. GarbageCollect: mdb.GarbageCollect,
  224. })
  225. if err != nil {
  226. return nil, err
  227. }
  228. dns := getDNSConfig(opt.DNSConfig)
  229. exec, err := newExecutor(root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  230. if err != nil {
  231. return nil, err
  232. }
  233. differ, ok := snapshotter.(mobyexporter.Differ)
  234. if !ok {
  235. return nil, errors.Errorf("snapshotter doesn't support differ")
  236. }
  237. exp, err := mobyexporter.New(mobyexporter.Opt{
  238. ImageStore: dist.ImageStore,
  239. Differ: differ,
  240. ImageTagger: opt.ImageTagger,
  241. })
  242. if err != nil {
  243. return nil, err
  244. }
  245. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  246. if err != nil {
  247. return nil, err
  248. }
  249. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  250. if err != nil {
  251. return nil, err
  252. }
  253. gcPolicy, err := getGCPolicy(opt.BuilderConfig, root)
  254. if err != nil {
  255. return nil, errors.Wrap(err, "could not get builder GC policy")
  256. }
  257. layers, ok := snapshotter.(mobyworker.LayerAccess)
  258. if !ok {
  259. return nil, errors.Errorf("snapshotter doesn't support differ")
  260. }
  261. leases, err := lm.List(ctx, "labels.\"buildkit/lease.temporary\"")
  262. if err != nil {
  263. return nil, err
  264. }
  265. for _, l := range leases {
  266. lm.Delete(ctx, l)
  267. }
  268. wopt := mobyworker.Opt{
  269. ID: exporter.Moby,
  270. ContentStore: store,
  271. CacheManager: cm,
  272. GCPolicy: gcPolicy,
  273. Snapshotter: snapshotter,
  274. Executor: exec,
  275. ImageSource: src,
  276. DownloadManager: dist.DownloadManager,
  277. V2MetadataService: dist.V2MetadataService,
  278. Exporter: exp,
  279. Transport: rt,
  280. Layers: layers,
  281. Platforms: archutil.SupportedPlatforms(true),
  282. LeaseManager: lm,
  283. }
  284. wc := &worker.Controller{}
  285. w, err := mobyworker.NewWorker(wopt)
  286. if err != nil {
  287. return nil, err
  288. }
  289. wc.Add(w)
  290. frontends := map[string]frontend.Frontend{
  291. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  292. "gateway.v0": gateway.NewGatewayFrontend(wc),
  293. }
  294. return control.NewController(control.Opt{
  295. SessionManager: opt.SessionManager,
  296. WorkerController: wc,
  297. Frontends: frontends,
  298. CacheKeyStorage: cacheStorage,
  299. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  300. "registry": localinlinecache.ResolveCacheImporterFunc(opt.SessionManager, opt.RegistryHosts, store, dist.ReferenceStore, dist.ImageStore),
  301. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  302. },
  303. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  304. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  305. },
  306. Entitlements: getEntitlements(opt.BuilderConfig),
  307. LeaseManager: lm,
  308. ContentStore: store,
  309. HistoryDB: historyDB,
  310. HistoryConfig: historyConf,
  311. })
  312. }
  313. func getGCPolicy(conf config.BuilderConfig, root string) ([]client.PruneInfo, error) {
  314. var gcPolicy []client.PruneInfo
  315. if conf.GC.Enabled {
  316. var (
  317. defaultKeepStorage int64
  318. err error
  319. )
  320. if conf.GC.DefaultKeepStorage != "" {
  321. defaultKeepStorage, err = units.RAMInBytes(conf.GC.DefaultKeepStorage)
  322. if err != nil {
  323. return nil, errors.Wrapf(err, "could not parse '%s' as Builder.GC.DefaultKeepStorage config", conf.GC.DefaultKeepStorage)
  324. }
  325. }
  326. if conf.GC.Policy == nil {
  327. gcPolicy = mobyworker.DefaultGCPolicy(root, defaultKeepStorage)
  328. } else {
  329. gcPolicy = make([]client.PruneInfo, len(conf.GC.Policy))
  330. for i, p := range conf.GC.Policy {
  331. b, err := units.RAMInBytes(p.KeepStorage)
  332. if err != nil {
  333. return nil, err
  334. }
  335. if b == 0 {
  336. b = defaultKeepStorage
  337. }
  338. gcPolicy[i], err = toBuildkitPruneInfo(types.BuildCachePruneOptions{
  339. All: p.All,
  340. KeepStorage: b,
  341. Filters: filters.Args(p.Filter),
  342. })
  343. if err != nil {
  344. return nil, err
  345. }
  346. }
  347. }
  348. }
  349. return gcPolicy, nil
  350. }
  351. func getEntitlements(conf config.BuilderConfig) []string {
  352. var ents []string
  353. // Incase of no config settings, NetworkHost should be enabled & SecurityInsecure must be disabled.
  354. if conf.Entitlements.NetworkHost == nil || *conf.Entitlements.NetworkHost {
  355. ents = append(ents, string(entitlements.EntitlementNetworkHost))
  356. }
  357. if conf.Entitlements.SecurityInsecure != nil && *conf.Entitlements.SecurityInsecure {
  358. ents = append(ents, string(entitlements.EntitlementSecurityInsecure))
  359. }
  360. return ents
  361. }