controller.go 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290
  1. package buildkit
  2. import (
  3. "context"
  4. "net/http"
  5. "os"
  6. "path/filepath"
  7. "github.com/containerd/containerd/content/local"
  8. ctdmetadata "github.com/containerd/containerd/metadata"
  9. "github.com/containerd/containerd/platforms"
  10. "github.com/containerd/containerd/snapshots"
  11. "github.com/docker/docker/api/types"
  12. "github.com/docker/docker/api/types/filters"
  13. "github.com/docker/docker/builder/builder-next/adapters/containerimage"
  14. "github.com/docker/docker/builder/builder-next/adapters/localinlinecache"
  15. "github.com/docker/docker/builder/builder-next/adapters/snapshot"
  16. containerimageexp "github.com/docker/docker/builder/builder-next/exporter"
  17. "github.com/docker/docker/builder/builder-next/imagerefchecker"
  18. mobyworker "github.com/docker/docker/builder/builder-next/worker"
  19. "github.com/docker/docker/daemon/config"
  20. "github.com/docker/docker/daemon/graphdriver"
  21. units "github.com/docker/go-units"
  22. "github.com/moby/buildkit/cache"
  23. "github.com/moby/buildkit/cache/metadata"
  24. "github.com/moby/buildkit/cache/remotecache"
  25. inlineremotecache "github.com/moby/buildkit/cache/remotecache/inline"
  26. localremotecache "github.com/moby/buildkit/cache/remotecache/local"
  27. "github.com/moby/buildkit/client"
  28. "github.com/moby/buildkit/control"
  29. "github.com/moby/buildkit/frontend"
  30. dockerfile "github.com/moby/buildkit/frontend/dockerfile/builder"
  31. "github.com/moby/buildkit/frontend/gateway"
  32. "github.com/moby/buildkit/frontend/gateway/forwarder"
  33. containerdsnapshot "github.com/moby/buildkit/snapshot/containerd"
  34. "github.com/moby/buildkit/solver/bboltcachestorage"
  35. "github.com/moby/buildkit/util/archutil"
  36. "github.com/moby/buildkit/util/entitlements"
  37. "github.com/moby/buildkit/util/leaseutil"
  38. "github.com/moby/buildkit/worker"
  39. specs "github.com/opencontainers/image-spec/specs-go/v1"
  40. "github.com/pkg/errors"
  41. bolt "go.etcd.io/bbolt"
  42. )
  43. func newController(rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  44. if err := os.MkdirAll(opt.Root, 0711); err != nil {
  45. return nil, err
  46. }
  47. dist := opt.Dist
  48. root := opt.Root
  49. var driver graphdriver.Driver
  50. if ls, ok := dist.LayerStore.(interface {
  51. Driver() graphdriver.Driver
  52. }); ok {
  53. driver = ls.Driver()
  54. } else {
  55. return nil, errors.Errorf("could not access graphdriver")
  56. }
  57. store, err := local.NewStore(filepath.Join(root, "content"))
  58. if err != nil {
  59. return nil, err
  60. }
  61. db, err := bolt.Open(filepath.Join(root, "containerdmeta.db"), 0644, nil)
  62. if err != nil {
  63. return nil, errors.WithStack(err)
  64. }
  65. mdb := ctdmetadata.NewDB(db, store, map[string]snapshots.Snapshotter{})
  66. store = containerdsnapshot.NewContentStore(mdb.ContentStore(), "buildkit")
  67. lm := leaseutil.WithNamespace(ctdmetadata.NewLeaseManager(mdb), "buildkit")
  68. snapshotter, lm, err := snapshot.NewSnapshotter(snapshot.Opt{
  69. GraphDriver: driver,
  70. LayerStore: dist.LayerStore,
  71. Root: root,
  72. IdentityMapping: opt.IdentityMapping,
  73. }, lm)
  74. if err != nil {
  75. return nil, err
  76. }
  77. if err := cache.MigrateV2(context.Background(), filepath.Join(root, "metadata.db"), filepath.Join(root, "metadata_v2.db"), store, snapshotter, lm); err != nil {
  78. return nil, err
  79. }
  80. md, err := metadata.NewStore(filepath.Join(root, "metadata_v2.db"))
  81. if err != nil {
  82. return nil, err
  83. }
  84. layerGetter, ok := snapshotter.(imagerefchecker.LayerGetter)
  85. if !ok {
  86. return nil, errors.Errorf("snapshotter does not implement layergetter")
  87. }
  88. refChecker := imagerefchecker.New(imagerefchecker.Opt{
  89. ImageStore: dist.ImageStore,
  90. LayerGetter: layerGetter,
  91. })
  92. cm, err := cache.NewManager(cache.ManagerOpt{
  93. Snapshotter: snapshotter,
  94. MetadataStore: md,
  95. PruneRefChecker: refChecker,
  96. LeaseManager: lm,
  97. ContentStore: store,
  98. })
  99. if err != nil {
  100. return nil, err
  101. }
  102. src, err := containerimage.NewSource(containerimage.SourceOpt{
  103. CacheAccessor: cm,
  104. ContentStore: store,
  105. DownloadManager: dist.DownloadManager,
  106. MetadataStore: dist.V2MetadataService,
  107. ImageStore: dist.ImageStore,
  108. ReferenceStore: dist.ReferenceStore,
  109. RegistryHosts: opt.RegistryHosts,
  110. LayerStore: dist.LayerStore,
  111. })
  112. if err != nil {
  113. return nil, err
  114. }
  115. dns := getDNSConfig(opt.DNSConfig)
  116. exec, err := newExecutor(root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping)
  117. if err != nil {
  118. return nil, err
  119. }
  120. differ, ok := snapshotter.(containerimageexp.Differ)
  121. if !ok {
  122. return nil, errors.Errorf("snapshotter doesn't support differ")
  123. }
  124. exp, err := containerimageexp.New(containerimageexp.Opt{
  125. ImageStore: dist.ImageStore,
  126. ReferenceStore: dist.ReferenceStore,
  127. Differ: differ,
  128. })
  129. if err != nil {
  130. return nil, err
  131. }
  132. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  133. if err != nil {
  134. return nil, err
  135. }
  136. gcPolicy, err := getGCPolicy(opt.BuilderConfig, root)
  137. if err != nil {
  138. return nil, errors.Wrap(err, "could not get builder GC policy")
  139. }
  140. layers, ok := snapshotter.(mobyworker.LayerAccess)
  141. if !ok {
  142. return nil, errors.Errorf("snapshotter doesn't support differ")
  143. }
  144. p, err := parsePlatforms(archutil.SupportedPlatforms(true))
  145. if err != nil {
  146. return nil, err
  147. }
  148. leases, err := lm.List(context.TODO(), "labels.\"buildkit/lease.temporary\"")
  149. if err != nil {
  150. return nil, err
  151. }
  152. for _, l := range leases {
  153. lm.Delete(context.TODO(), l)
  154. }
  155. wopt := mobyworker.Opt{
  156. ID: "moby",
  157. MetadataStore: md,
  158. ContentStore: store,
  159. CacheManager: cm,
  160. GCPolicy: gcPolicy,
  161. Snapshotter: snapshotter,
  162. Executor: exec,
  163. ImageSource: src,
  164. DownloadManager: dist.DownloadManager,
  165. V2MetadataService: dist.V2MetadataService,
  166. Exporter: exp,
  167. Transport: rt,
  168. Layers: layers,
  169. Platforms: p,
  170. }
  171. wc := &worker.Controller{}
  172. w, err := mobyworker.NewWorker(wopt)
  173. if err != nil {
  174. return nil, err
  175. }
  176. wc.Add(w)
  177. frontends := map[string]frontend.Frontend{
  178. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  179. "gateway.v0": gateway.NewGatewayFrontend(wc),
  180. }
  181. return control.NewController(control.Opt{
  182. SessionManager: opt.SessionManager,
  183. WorkerController: wc,
  184. Frontends: frontends,
  185. CacheKeyStorage: cacheStorage,
  186. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  187. "registry": localinlinecache.ResolveCacheImporterFunc(opt.SessionManager, opt.RegistryHosts, store, dist.ReferenceStore, dist.ImageStore),
  188. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  189. },
  190. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  191. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  192. },
  193. Entitlements: getEntitlements(opt.BuilderConfig),
  194. })
  195. }
  196. func getGCPolicy(conf config.BuilderConfig, root string) ([]client.PruneInfo, error) {
  197. var gcPolicy []client.PruneInfo
  198. if conf.GC.Enabled {
  199. var (
  200. defaultKeepStorage int64
  201. err error
  202. )
  203. if conf.GC.DefaultKeepStorage != "" {
  204. defaultKeepStorage, err = units.RAMInBytes(conf.GC.DefaultKeepStorage)
  205. if err != nil {
  206. return nil, errors.Wrapf(err, "could not parse '%s' as Builder.GC.DefaultKeepStorage config", conf.GC.DefaultKeepStorage)
  207. }
  208. }
  209. if conf.GC.Policy == nil {
  210. gcPolicy = mobyworker.DefaultGCPolicy(root, defaultKeepStorage)
  211. } else {
  212. gcPolicy = make([]client.PruneInfo, len(conf.GC.Policy))
  213. for i, p := range conf.GC.Policy {
  214. b, err := units.RAMInBytes(p.KeepStorage)
  215. if err != nil {
  216. return nil, err
  217. }
  218. if b == 0 {
  219. b = defaultKeepStorage
  220. }
  221. gcPolicy[i], err = toBuildkitPruneInfo(types.BuildCachePruneOptions{
  222. All: p.All,
  223. KeepStorage: b,
  224. Filters: filters.Args(p.Filter),
  225. })
  226. if err != nil {
  227. return nil, err
  228. }
  229. }
  230. }
  231. }
  232. return gcPolicy, nil
  233. }
  234. func parsePlatforms(platformsStr []string) ([]specs.Platform, error) {
  235. out := make([]specs.Platform, 0, len(platformsStr))
  236. for _, s := range platformsStr {
  237. p, err := platforms.Parse(s)
  238. if err != nil {
  239. return nil, err
  240. }
  241. out = append(out, platforms.Normalize(p))
  242. }
  243. return out, nil
  244. }
  245. func getEntitlements(conf config.BuilderConfig) []string {
  246. var ents []string
  247. // Incase of no config settings, NetworkHost should be enabled & SecurityInsecure must be disabled.
  248. if conf.Entitlements.NetworkHost == nil || *conf.Entitlements.NetworkHost {
  249. ents = append(ents, string(entitlements.EntitlementNetworkHost))
  250. }
  251. if conf.Entitlements.SecurityInsecure != nil && *conf.Entitlements.SecurityInsecure {
  252. ents = append(ents, string(entitlements.EntitlementSecurityInsecure))
  253. }
  254. return ents
  255. }