image_prune.go 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267
  1. package containerd
  2. import (
  3. "context"
  4. "strings"
  5. cerrdefs "github.com/containerd/containerd/errdefs"
  6. containerdimages "github.com/containerd/containerd/images"
  7. "github.com/containerd/log"
  8. "github.com/distribution/reference"
  9. "github.com/docker/docker/api/types"
  10. "github.com/docker/docker/api/types/filters"
  11. "github.com/docker/docker/api/types/image"
  12. "github.com/docker/docker/errdefs"
  13. "github.com/docker/docker/internal/compatcontext"
  14. "github.com/hashicorp/go-multierror"
  15. "github.com/opencontainers/go-digest"
  16. ocispec "github.com/opencontainers/image-spec/specs-go/v1"
  17. "github.com/pkg/errors"
  18. )
  19. var imagesAcceptedFilters = map[string]bool{
  20. "dangling": true,
  21. "label": true,
  22. "label!": true,
  23. "until": true,
  24. }
  25. // errPruneRunning is returned when a prune request is received while
  26. // one is in progress
  27. var errPruneRunning = errdefs.Conflict(errors.New("a prune operation is already running"))
  28. // ImagesPrune removes unused images
  29. func (i *ImageService) ImagesPrune(ctx context.Context, fltrs filters.Args) (*types.ImagesPruneReport, error) {
  30. if !i.pruneRunning.CompareAndSwap(false, true) {
  31. return nil, errPruneRunning
  32. }
  33. defer i.pruneRunning.Store(false)
  34. err := fltrs.Validate(imagesAcceptedFilters)
  35. if err != nil {
  36. return nil, err
  37. }
  38. danglingOnly, err := fltrs.GetBoolOrDefault("dangling", false)
  39. if err != nil {
  40. return nil, err
  41. }
  42. // dangling=false will filter out dangling images like in image list.
  43. // Remove it, because in this context dangling=false means that we're
  44. // pruning NOT ONLY dangling (`docker image prune -a`) instead of NOT DANGLING.
  45. // This will be handled by the danglingOnly parameter of pruneUnused.
  46. for _, v := range fltrs.Get("dangling") {
  47. fltrs.Del("dangling", v)
  48. }
  49. filterFunc, err := i.setupFilters(ctx, fltrs)
  50. if err != nil {
  51. return nil, err
  52. }
  53. return i.pruneUnused(ctx, filterFunc, danglingOnly)
  54. }
  55. func (i *ImageService) pruneUnused(ctx context.Context, filterFunc imageFilterFunc, danglingOnly bool) (*types.ImagesPruneReport, error) {
  56. report := types.ImagesPruneReport{}
  57. is := i.client.ImageService()
  58. store := i.client.ContentStore()
  59. allImages, err := i.client.ImageService().List(ctx)
  60. if err != nil {
  61. return nil, err
  62. }
  63. // How many images make reference to a particular target digest.
  64. digestRefCount := map[digest.Digest]int{}
  65. // Images considered for pruning.
  66. imagesToPrune := map[string]containerdimages.Image{}
  67. for _, img := range allImages {
  68. digestRefCount[img.Target.Digest] += 1
  69. if !danglingOnly || isDanglingImage(img) {
  70. canBePruned := filterFunc(img)
  71. log.G(ctx).WithFields(log.Fields{
  72. "image": img.Name,
  73. "canBePruned": canBePruned,
  74. }).Debug("considering image for pruning")
  75. if canBePruned {
  76. imagesToPrune[img.Name] = img
  77. }
  78. }
  79. }
  80. // Image specified by digests that are used by containers.
  81. usedDigests := map[digest.Digest]struct{}{}
  82. // Exclude images used by existing containers
  83. for _, ctr := range i.containers.List() {
  84. // If the original image was deleted, make sure we don't delete the dangling image
  85. delete(imagesToPrune, danglingImageName(ctr.ImageID.Digest()))
  86. // Config.Image is the image reference passed by user.
  87. // Config.ImageID is the resolved content digest based on the user's Config.Image.
  88. // For example: container created by:
  89. // `docker run alpine` will have Config.Image="alpine"
  90. // `docker run 82d1e9d` will have Config.Image="82d1e9d"
  91. // but both will have ImageID="sha256:82d1e9d7ed48a7523bdebc18cf6290bdb97b82302a8a9c27d4fe885949ea94d1"
  92. imageDgst := ctr.ImageID.Digest()
  93. // If user didn't specify an explicit image, mark the digest as used.
  94. normalizedImageID := "sha256:" + strings.TrimPrefix(ctr.Config.Image, "sha256:")
  95. if strings.HasPrefix(imageDgst.String(), normalizedImageID) {
  96. usedDigests[imageDgst] = struct{}{}
  97. continue
  98. }
  99. ref, err := reference.ParseNormalizedNamed(ctr.Config.Image)
  100. log.G(ctx).WithFields(log.Fields{
  101. "ctr": ctr.ID,
  102. "image": ref,
  103. "nameParseErr": err,
  104. }).Debug("filtering container's image")
  105. if err == nil {
  106. // If user provided a specific image name, exclude that image.
  107. name := reference.TagNameOnly(ref)
  108. delete(imagesToPrune, name.String())
  109. }
  110. }
  111. // Create dangling images for images that will be deleted but are still in use.
  112. for _, img := range imagesToPrune {
  113. dgst := img.Target.Digest
  114. digestRefCount[dgst] -= 1
  115. if digestRefCount[dgst] == 0 {
  116. if _, isUsed := usedDigests[dgst]; isUsed {
  117. if err := i.ensureDanglingImage(ctx, img); err != nil {
  118. return &report, errors.Wrapf(err, "failed to create ensure dangling image for %s", img.Name)
  119. }
  120. }
  121. }
  122. }
  123. possiblyDeletedConfigs := map[digest.Digest]struct{}{}
  124. var errs error
  125. // Workaround for https://github.com/moby/buildkit/issues/3797
  126. defer func() {
  127. if err := i.unleaseSnapshotsFromDeletedConfigs(compatcontext.WithoutCancel(ctx), possiblyDeletedConfigs); err != nil {
  128. errs = multierror.Append(errs, err)
  129. }
  130. }()
  131. for _, img := range imagesToPrune {
  132. log.G(ctx).WithField("image", img).Debug("pruning image")
  133. blobs := []ocispec.Descriptor{}
  134. err := i.walkPresentChildren(ctx, img.Target, func(_ context.Context, desc ocispec.Descriptor) error {
  135. blobs = append(blobs, desc)
  136. if containerdimages.IsConfigType(desc.MediaType) {
  137. possiblyDeletedConfigs[desc.Digest] = struct{}{}
  138. }
  139. return nil
  140. })
  141. if err != nil {
  142. errs = multierror.Append(errs, err)
  143. if errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded) {
  144. return &report, errs
  145. }
  146. continue
  147. }
  148. err = is.Delete(ctx, img.Name, containerdimages.SynchronousDelete())
  149. if err != nil && !cerrdefs.IsNotFound(err) {
  150. errs = multierror.Append(errs, err)
  151. if errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded) {
  152. return &report, errs
  153. }
  154. continue
  155. }
  156. report.ImagesDeleted = append(report.ImagesDeleted,
  157. image.DeleteResponse{
  158. Untagged: img.Name,
  159. },
  160. )
  161. // Check which blobs have been deleted and sum their sizes
  162. for _, blob := range blobs {
  163. _, err := store.ReaderAt(ctx, blob)
  164. if cerrdefs.IsNotFound(err) {
  165. report.ImagesDeleted = append(report.ImagesDeleted,
  166. image.DeleteResponse{
  167. Deleted: blob.Digest.String(),
  168. },
  169. )
  170. report.SpaceReclaimed += uint64(blob.Size)
  171. }
  172. }
  173. }
  174. return &report, errs
  175. }
  176. // unleaseSnapshotsFromDeletedConfigs removes gc.ref.snapshot content label from configs that are not
  177. // referenced by any of the existing images.
  178. // This is a temporary solution to the rootfs snapshot not being deleted when there's a buildkit history
  179. // item referencing an image config.
  180. func (i *ImageService) unleaseSnapshotsFromDeletedConfigs(ctx context.Context, possiblyDeletedConfigs map[digest.Digest]struct{}) error {
  181. is := i.client.ImageService()
  182. store := i.client.ContentStore()
  183. all, err := is.List(ctx)
  184. if err != nil {
  185. return errors.Wrap(err, "failed to list images during snapshot lease removal")
  186. }
  187. var errs error
  188. for _, img := range all {
  189. err := i.walkPresentChildren(ctx, img.Target, func(_ context.Context, desc ocispec.Descriptor) error {
  190. if containerdimages.IsConfigType(desc.MediaType) {
  191. delete(possiblyDeletedConfigs, desc.Digest)
  192. }
  193. return nil
  194. })
  195. if err != nil {
  196. errs = multierror.Append(errs, err)
  197. if errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded) {
  198. return errs
  199. }
  200. continue
  201. }
  202. }
  203. // At this point, all configs that are used by any image has been removed from the slice
  204. for cfgDigest := range possiblyDeletedConfigs {
  205. info, err := store.Info(ctx, cfgDigest)
  206. if err != nil {
  207. if cerrdefs.IsNotFound(err) {
  208. log.G(ctx).WithField("config", cfgDigest).Debug("config already gone")
  209. } else {
  210. errs = multierror.Append(errs, err)
  211. if errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded) {
  212. return errs
  213. }
  214. }
  215. continue
  216. }
  217. label := "containerd.io/gc.ref.snapshot." + i.StorageDriver()
  218. delete(info.Labels, label)
  219. _, err = store.Update(ctx, info, "labels."+label)
  220. if err != nil {
  221. errs = multierror.Append(errs, errors.Wrapf(err, "failed to remove gc.ref.snapshot label from %s", cfgDigest))
  222. if errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded) {
  223. return errs
  224. }
  225. }
  226. }
  227. return errs
  228. }