controller.go 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443
  1. package buildkit
  2. import (
  3. "context"
  4. "net/http"
  5. "os"
  6. "path/filepath"
  7. "time"
  8. ctd "github.com/containerd/containerd"
  9. "github.com/containerd/containerd/content/local"
  10. ctdmetadata "github.com/containerd/containerd/metadata"
  11. "github.com/containerd/containerd/platforms"
  12. "github.com/containerd/containerd/snapshots"
  13. "github.com/containerd/log"
  14. "github.com/docker/docker/api/types"
  15. "github.com/docker/docker/api/types/filters"
  16. "github.com/docker/docker/builder/builder-next/adapters/containerimage"
  17. "github.com/docker/docker/builder/builder-next/adapters/localinlinecache"
  18. "github.com/docker/docker/builder/builder-next/adapters/snapshot"
  19. "github.com/docker/docker/builder/builder-next/exporter/mobyexporter"
  20. "github.com/docker/docker/builder/builder-next/imagerefchecker"
  21. mobyworker "github.com/docker/docker/builder/builder-next/worker"
  22. wlabel "github.com/docker/docker/builder/builder-next/worker/label"
  23. "github.com/docker/docker/daemon/config"
  24. "github.com/docker/docker/daemon/graphdriver"
  25. units "github.com/docker/go-units"
  26. "github.com/moby/buildkit/cache"
  27. "github.com/moby/buildkit/cache/metadata"
  28. "github.com/moby/buildkit/cache/remotecache"
  29. "github.com/moby/buildkit/cache/remotecache/gha"
  30. inlineremotecache "github.com/moby/buildkit/cache/remotecache/inline"
  31. localremotecache "github.com/moby/buildkit/cache/remotecache/local"
  32. registryremotecache "github.com/moby/buildkit/cache/remotecache/registry"
  33. "github.com/moby/buildkit/client"
  34. bkconfig "github.com/moby/buildkit/cmd/buildkitd/config"
  35. "github.com/moby/buildkit/control"
  36. "github.com/moby/buildkit/frontend"
  37. dockerfile "github.com/moby/buildkit/frontend/dockerfile/builder"
  38. "github.com/moby/buildkit/frontend/gateway"
  39. "github.com/moby/buildkit/frontend/gateway/forwarder"
  40. containerdsnapshot "github.com/moby/buildkit/snapshot/containerd"
  41. "github.com/moby/buildkit/solver"
  42. "github.com/moby/buildkit/solver/bboltcachestorage"
  43. "github.com/moby/buildkit/util/archutil"
  44. "github.com/moby/buildkit/util/entitlements"
  45. "github.com/moby/buildkit/util/network/netproviders"
  46. "github.com/moby/buildkit/util/tracing/detect"
  47. "github.com/moby/buildkit/worker"
  48. "github.com/moby/buildkit/worker/containerd"
  49. "github.com/moby/buildkit/worker/label"
  50. "github.com/pkg/errors"
  51. "go.etcd.io/bbolt"
  52. bolt "go.etcd.io/bbolt"
  53. "go.opentelemetry.io/otel/sdk/trace"
  54. "github.com/moby/buildkit/solver/pb"
  55. "github.com/moby/buildkit/util/apicaps"
  56. )
  57. func newController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  58. if opt.UseSnapshotter {
  59. return newSnapshotterController(ctx, rt, opt)
  60. }
  61. return newGraphDriverController(ctx, rt, opt)
  62. }
  63. func getTraceExporter(ctx context.Context) trace.SpanExporter {
  64. exp, err := detect.Exporter()
  65. if err != nil {
  66. log.G(ctx).WithError(err).Error("Failed to detect trace exporter for buildkit controller")
  67. }
  68. return exp
  69. }
  70. func newSnapshotterController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  71. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  72. return nil, err
  73. }
  74. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  75. if err != nil {
  76. return nil, err
  77. }
  78. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  79. if err != nil {
  80. return nil, err
  81. }
  82. nc := netproviders.Opt{
  83. Mode: "host",
  84. }
  85. dns := getDNSConfig(opt.DNSConfig)
  86. wo, err := containerd.NewWorkerOpt(opt.Root, opt.ContainerdAddress, opt.Snapshotter, opt.ContainerdNamespace,
  87. opt.Rootless, map[string]string{
  88. label.Snapshotter: opt.Snapshotter,
  89. }, dns, nc, opt.ApparmorProfile, false, nil, "", ctd.WithTimeout(60*time.Second))
  90. if err != nil {
  91. return nil, err
  92. }
  93. policy, err := getGCPolicy(opt.BuilderConfig, opt.Root)
  94. if err != nil {
  95. return nil, err
  96. }
  97. // make sure platforms are normalized moby/buildkit#4391
  98. for i, p := range wo.Platforms {
  99. wo.Platforms[i] = platforms.Normalize(p)
  100. }
  101. wo.GCPolicy = policy
  102. wo.RegistryHosts = opt.RegistryHosts
  103. wo.Labels = getLabels(opt, wo.Labels)
  104. exec, err := newExecutor(opt.Root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  105. if err != nil {
  106. return nil, err
  107. }
  108. wo.Executor = exec
  109. w, err := mobyworker.NewContainerdWorker(ctx, wo)
  110. if err != nil {
  111. return nil, err
  112. }
  113. wc := &worker.Controller{}
  114. err = wc.Add(w)
  115. if err != nil {
  116. return nil, err
  117. }
  118. frontends := map[string]frontend.Frontend{
  119. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  120. "gateway.v0": gateway.NewGatewayFrontend(wc),
  121. }
  122. return control.NewController(control.Opt{
  123. SessionManager: opt.SessionManager,
  124. WorkerController: wc,
  125. Frontends: frontends,
  126. CacheManager: solver.NewCacheManager(ctx, "local", cacheStorage, worker.NewCacheResultStorage(wc)),
  127. CacheStore: cacheStorage,
  128. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  129. "gha": gha.ResolveCacheImporterFunc(),
  130. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  131. "registry": registryremotecache.ResolveCacheImporterFunc(opt.SessionManager, wo.ContentStore, opt.RegistryHosts),
  132. },
  133. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  134. "gha": gha.ResolveCacheExporterFunc(),
  135. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  136. "local": localremotecache.ResolveCacheExporterFunc(opt.SessionManager),
  137. "registry": registryremotecache.ResolveCacheExporterFunc(opt.SessionManager, opt.RegistryHosts),
  138. },
  139. Entitlements: getEntitlements(opt.BuilderConfig),
  140. HistoryDB: historyDB,
  141. HistoryConfig: historyConf,
  142. LeaseManager: wo.LeaseManager,
  143. ContentStore: wo.ContentStore,
  144. TraceCollector: getTraceExporter(ctx),
  145. })
  146. }
  147. func openHistoryDB(root string, cfg *config.BuilderHistoryConfig) (*bolt.DB, *bkconfig.HistoryConfig, error) {
  148. db, err := bbolt.Open(filepath.Join(root, "history.db"), 0o600, nil)
  149. if err != nil {
  150. return nil, nil, err
  151. }
  152. var conf *bkconfig.HistoryConfig
  153. if cfg != nil {
  154. conf = &bkconfig.HistoryConfig{
  155. MaxAge: cfg.MaxAge,
  156. MaxEntries: cfg.MaxEntries,
  157. }
  158. }
  159. return db, conf, nil
  160. }
  161. func newGraphDriverController(ctx context.Context, rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  162. if err := os.MkdirAll(opt.Root, 0o711); err != nil {
  163. return nil, err
  164. }
  165. dist := opt.Dist
  166. root := opt.Root
  167. pb.Caps.Init(apicaps.Cap{
  168. ID: pb.CapMergeOp,
  169. Enabled: false,
  170. DisabledReasonMsg: "only enabled with containerd image store backend",
  171. })
  172. pb.Caps.Init(apicaps.Cap{
  173. ID: pb.CapDiffOp,
  174. Enabled: false,
  175. DisabledReasonMsg: "only enabled with containerd image store backend",
  176. })
  177. var driver graphdriver.Driver
  178. if ls, ok := dist.LayerStore.(interface {
  179. Driver() graphdriver.Driver
  180. }); ok {
  181. driver = ls.Driver()
  182. } else {
  183. return nil, errors.Errorf("could not access graphdriver")
  184. }
  185. innerStore, err := local.NewStore(filepath.Join(root, "content"))
  186. if err != nil {
  187. return nil, err
  188. }
  189. db, err := bolt.Open(filepath.Join(root, "containerdmeta.db"), 0o644, nil)
  190. if err != nil {
  191. return nil, errors.WithStack(err)
  192. }
  193. mdb := ctdmetadata.NewDB(db, innerStore, map[string]snapshots.Snapshotter{})
  194. store := containerdsnapshot.NewContentStore(mdb.ContentStore(), "buildkit")
  195. snapshotter, lm, err := snapshot.NewSnapshotter(snapshot.Opt{
  196. GraphDriver: driver,
  197. LayerStore: dist.LayerStore,
  198. Root: root,
  199. IdentityMapping: opt.IdentityMapping,
  200. }, ctdmetadata.NewLeaseManager(mdb), "buildkit")
  201. if err != nil {
  202. return nil, err
  203. }
  204. if err := cache.MigrateV2(context.Background(), filepath.Join(root, "metadata.db"), filepath.Join(root, "metadata_v2.db"), store, snapshotter, lm); err != nil {
  205. return nil, err
  206. }
  207. md, err := metadata.NewStore(filepath.Join(root, "metadata_v2.db"))
  208. if err != nil {
  209. return nil, err
  210. }
  211. layerGetter, ok := snapshotter.(imagerefchecker.LayerGetter)
  212. if !ok {
  213. return nil, errors.Errorf("snapshotter does not implement layergetter")
  214. }
  215. refChecker := imagerefchecker.New(imagerefchecker.Opt{
  216. ImageStore: dist.ImageStore,
  217. LayerGetter: layerGetter,
  218. })
  219. cm, err := cache.NewManager(cache.ManagerOpt{
  220. Snapshotter: snapshotter,
  221. MetadataStore: md,
  222. PruneRefChecker: refChecker,
  223. LeaseManager: lm,
  224. ContentStore: store,
  225. GarbageCollect: mdb.GarbageCollect,
  226. })
  227. if err != nil {
  228. return nil, err
  229. }
  230. src, err := containerimage.NewSource(containerimage.SourceOpt{
  231. CacheAccessor: cm,
  232. ContentStore: store,
  233. DownloadManager: dist.DownloadManager,
  234. MetadataStore: dist.V2MetadataService,
  235. ImageStore: dist.ImageStore,
  236. ReferenceStore: dist.ReferenceStore,
  237. RegistryHosts: opt.RegistryHosts,
  238. LayerStore: dist.LayerStore,
  239. LeaseManager: lm,
  240. GarbageCollect: mdb.GarbageCollect,
  241. })
  242. if err != nil {
  243. return nil, err
  244. }
  245. dns := getDNSConfig(opt.DNSConfig)
  246. exec, err := newExecutor(root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  247. if err != nil {
  248. return nil, err
  249. }
  250. differ, ok := snapshotter.(mobyexporter.Differ)
  251. if !ok {
  252. return nil, errors.Errorf("snapshotter doesn't support differ")
  253. }
  254. exp, err := mobyexporter.New(mobyexporter.Opt{
  255. ImageStore: dist.ImageStore,
  256. Differ: differ,
  257. ImageTagger: opt.ImageTagger,
  258. })
  259. if err != nil {
  260. return nil, err
  261. }
  262. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  263. if err != nil {
  264. return nil, err
  265. }
  266. historyDB, historyConf, err := openHistoryDB(opt.Root, opt.BuilderConfig.History)
  267. if err != nil {
  268. return nil, err
  269. }
  270. gcPolicy, err := getGCPolicy(opt.BuilderConfig, root)
  271. if err != nil {
  272. return nil, errors.Wrap(err, "could not get builder GC policy")
  273. }
  274. layers, ok := snapshotter.(mobyworker.LayerAccess)
  275. if !ok {
  276. return nil, errors.Errorf("snapshotter doesn't support differ")
  277. }
  278. leases, err := lm.List(ctx, `labels."buildkit/lease.temporary"`)
  279. if err != nil {
  280. return nil, err
  281. }
  282. for _, l := range leases {
  283. lm.Delete(ctx, l)
  284. }
  285. wopt := mobyworker.Opt{
  286. ID: opt.EngineID,
  287. ContentStore: store,
  288. CacheManager: cm,
  289. GCPolicy: gcPolicy,
  290. Snapshotter: snapshotter,
  291. Executor: exec,
  292. ImageSource: src,
  293. DownloadManager: dist.DownloadManager,
  294. V2MetadataService: dist.V2MetadataService,
  295. Exporter: exp,
  296. Transport: rt,
  297. Layers: layers,
  298. Platforms: archutil.SupportedPlatforms(true),
  299. LeaseManager: lm,
  300. Labels: getLabels(opt, nil),
  301. }
  302. wc := &worker.Controller{}
  303. w, err := mobyworker.NewWorker(wopt)
  304. if err != nil {
  305. return nil, err
  306. }
  307. wc.Add(w)
  308. frontends := map[string]frontend.Frontend{
  309. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  310. "gateway.v0": gateway.NewGatewayFrontend(wc),
  311. }
  312. return control.NewController(control.Opt{
  313. SessionManager: opt.SessionManager,
  314. WorkerController: wc,
  315. Frontends: frontends,
  316. CacheManager: solver.NewCacheManager(ctx, "local", cacheStorage, worker.NewCacheResultStorage(wc)),
  317. CacheStore: cacheStorage,
  318. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  319. "registry": localinlinecache.ResolveCacheImporterFunc(opt.SessionManager, opt.RegistryHosts, store, dist.ReferenceStore, dist.ImageStore),
  320. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  321. },
  322. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  323. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  324. },
  325. Entitlements: getEntitlements(opt.BuilderConfig),
  326. LeaseManager: lm,
  327. ContentStore: store,
  328. HistoryDB: historyDB,
  329. HistoryConfig: historyConf,
  330. TraceCollector: getTraceExporter(ctx),
  331. })
  332. }
  333. func getGCPolicy(conf config.BuilderConfig, root string) ([]client.PruneInfo, error) {
  334. var gcPolicy []client.PruneInfo
  335. if conf.GC.Enabled {
  336. var (
  337. defaultKeepStorage int64
  338. err error
  339. )
  340. if conf.GC.DefaultKeepStorage != "" {
  341. defaultKeepStorage, err = units.RAMInBytes(conf.GC.DefaultKeepStorage)
  342. if err != nil {
  343. return nil, errors.Wrapf(err, "could not parse '%s' as Builder.GC.DefaultKeepStorage config", conf.GC.DefaultKeepStorage)
  344. }
  345. }
  346. if conf.GC.Policy == nil {
  347. gcPolicy = mobyworker.DefaultGCPolicy(root, defaultKeepStorage)
  348. } else {
  349. gcPolicy = make([]client.PruneInfo, len(conf.GC.Policy))
  350. for i, p := range conf.GC.Policy {
  351. b, err := units.RAMInBytes(p.KeepStorage)
  352. if err != nil {
  353. return nil, err
  354. }
  355. if b == 0 {
  356. b = defaultKeepStorage
  357. }
  358. gcPolicy[i], err = toBuildkitPruneInfo(types.BuildCachePruneOptions{
  359. All: p.All,
  360. KeepStorage: b,
  361. Filters: filters.Args(p.Filter),
  362. })
  363. if err != nil {
  364. return nil, err
  365. }
  366. }
  367. }
  368. }
  369. return gcPolicy, nil
  370. }
  371. func getEntitlements(conf config.BuilderConfig) []string {
  372. var ents []string
  373. // Incase of no config settings, NetworkHost should be enabled & SecurityInsecure must be disabled.
  374. if conf.Entitlements.NetworkHost == nil || *conf.Entitlements.NetworkHost {
  375. ents = append(ents, string(entitlements.EntitlementNetworkHost))
  376. }
  377. if conf.Entitlements.SecurityInsecure != nil && *conf.Entitlements.SecurityInsecure {
  378. ents = append(ents, string(entitlements.EntitlementSecurityInsecure))
  379. }
  380. return ents
  381. }
  382. func getLabels(opt Opt, labels map[string]string) map[string]string {
  383. if labels == nil {
  384. labels = make(map[string]string)
  385. }
  386. labels[wlabel.HostGatewayIP] = opt.DNSConfig.HostGatewayIP.String()
  387. return labels
  388. }