build.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223
  1. package daemon
  2. import (
  3. "io"
  4. "runtime"
  5. "github.com/docker/distribution/reference"
  6. "github.com/docker/docker/api/types"
  7. "github.com/docker/docker/api/types/backend"
  8. "github.com/docker/docker/builder"
  9. "github.com/docker/docker/image"
  10. "github.com/docker/docker/layer"
  11. "github.com/docker/docker/pkg/containerfs"
  12. "github.com/docker/docker/pkg/idtools"
  13. "github.com/docker/docker/pkg/stringid"
  14. "github.com/docker/docker/registry"
  15. "github.com/pkg/errors"
  16. "github.com/sirupsen/logrus"
  17. "golang.org/x/net/context"
  18. )
  19. type releaseableLayer struct {
  20. released bool
  21. layerStore layer.Store
  22. roLayer layer.Layer
  23. rwLayer layer.RWLayer
  24. }
  25. func (rl *releaseableLayer) Mount() (containerfs.ContainerFS, error) {
  26. var err error
  27. var mountPath containerfs.ContainerFS
  28. var chainID layer.ChainID
  29. if rl.roLayer != nil {
  30. chainID = rl.roLayer.ChainID()
  31. }
  32. mountID := stringid.GenerateRandomID()
  33. rl.rwLayer, err = rl.layerStore.CreateRWLayer(mountID, chainID, nil)
  34. if err != nil {
  35. return nil, errors.Wrap(err, "failed to create rwlayer")
  36. }
  37. mountPath, err = rl.rwLayer.Mount("")
  38. if err != nil {
  39. // Clean up the layer if we fail to mount it here.
  40. metadata, err := rl.layerStore.ReleaseRWLayer(rl.rwLayer)
  41. layer.LogReleaseMetadata(metadata)
  42. if err != nil {
  43. logrus.Errorf("Failed to release RWLayer: %s", err)
  44. }
  45. rl.rwLayer = nil
  46. return nil, err
  47. }
  48. return mountPath, nil
  49. }
  50. func (rl *releaseableLayer) Commit(os string) (builder.ReleaseableLayer, error) {
  51. var chainID layer.ChainID
  52. if rl.roLayer != nil {
  53. chainID = rl.roLayer.ChainID()
  54. }
  55. stream, err := rl.rwLayer.TarStream()
  56. if err != nil {
  57. return nil, err
  58. }
  59. defer stream.Close()
  60. newLayer, err := rl.layerStore.Register(stream, chainID, layer.OS(os))
  61. if err != nil {
  62. return nil, err
  63. }
  64. // TODO: An optimization would be to handle empty layers before returning
  65. return &releaseableLayer{layerStore: rl.layerStore, roLayer: newLayer}, nil
  66. }
  67. func (rl *releaseableLayer) DiffID() layer.DiffID {
  68. if rl.roLayer == nil {
  69. return layer.DigestSHA256EmptyTar
  70. }
  71. return rl.roLayer.DiffID()
  72. }
  73. func (rl *releaseableLayer) Release() error {
  74. if rl.released {
  75. return nil
  76. }
  77. if err := rl.releaseRWLayer(); err != nil {
  78. // Best effort attempt at releasing read-only layer before returning original error.
  79. rl.releaseROLayer()
  80. return err
  81. }
  82. if err := rl.releaseROLayer(); err != nil {
  83. return err
  84. }
  85. rl.released = true
  86. return nil
  87. }
  88. func (rl *releaseableLayer) releaseRWLayer() error {
  89. if rl.rwLayer == nil {
  90. return nil
  91. }
  92. if err := rl.rwLayer.Unmount(); err != nil {
  93. logrus.Errorf("Failed to unmount RWLayer: %s", err)
  94. return err
  95. }
  96. metadata, err := rl.layerStore.ReleaseRWLayer(rl.rwLayer)
  97. layer.LogReleaseMetadata(metadata)
  98. if err != nil {
  99. logrus.Errorf("Failed to release RWLayer: %s", err)
  100. }
  101. rl.rwLayer = nil
  102. return err
  103. }
  104. func (rl *releaseableLayer) releaseROLayer() error {
  105. if rl.roLayer == nil {
  106. return nil
  107. }
  108. metadata, err := rl.layerStore.Release(rl.roLayer)
  109. layer.LogReleaseMetadata(metadata)
  110. if err != nil {
  111. logrus.Errorf("Failed to release ROLayer: %s", err)
  112. }
  113. rl.roLayer = nil
  114. return err
  115. }
  116. func newReleasableLayerForImage(img *image.Image, layerStore layer.Store) (builder.ReleaseableLayer, error) {
  117. if img == nil || img.RootFS.ChainID() == "" {
  118. return &releaseableLayer{layerStore: layerStore}, nil
  119. }
  120. // Hold a reference to the image layer so that it can't be removed before
  121. // it is released
  122. roLayer, err := layerStore.Get(img.RootFS.ChainID())
  123. if err != nil {
  124. return nil, errors.Wrapf(err, "failed to get layer for image %s", img.ImageID())
  125. }
  126. return &releaseableLayer{layerStore: layerStore, roLayer: roLayer}, nil
  127. }
  128. // TODO: could this use the regular daemon PullImage ?
  129. func (daemon *Daemon) pullForBuilder(ctx context.Context, name string, authConfigs map[string]types.AuthConfig, output io.Writer, platform string) (*image.Image, error) {
  130. ref, err := reference.ParseNormalizedNamed(name)
  131. if err != nil {
  132. return nil, err
  133. }
  134. ref = reference.TagNameOnly(ref)
  135. pullRegistryAuth := &types.AuthConfig{}
  136. if len(authConfigs) > 0 {
  137. // The request came with a full auth config, use it
  138. repoInfo, err := daemon.RegistryService.ResolveRepository(ref)
  139. if err != nil {
  140. return nil, err
  141. }
  142. resolvedConfig := registry.ResolveAuthConfig(authConfigs, repoInfo.Index)
  143. pullRegistryAuth = &resolvedConfig
  144. }
  145. if err := daemon.pullImageWithReference(ctx, ref, platform, nil, pullRegistryAuth, output); err != nil {
  146. return nil, err
  147. }
  148. return daemon.GetImage(name)
  149. }
  150. // GetImageAndReleasableLayer returns an image and releaseable layer for a reference or ID.
  151. // Every call to GetImageAndReleasableLayer MUST call releasableLayer.Release() to prevent
  152. // leaking of layers.
  153. func (daemon *Daemon) GetImageAndReleasableLayer(ctx context.Context, refOrID string, opts backend.GetImageAndLayerOptions) (builder.Image, builder.ReleaseableLayer, error) {
  154. if refOrID == "" {
  155. layer, err := newReleasableLayerForImage(nil, daemon.stores[opts.OS].layerStore)
  156. return nil, layer, err
  157. }
  158. if opts.PullOption != backend.PullOptionForcePull {
  159. image, err := daemon.GetImage(refOrID)
  160. if err != nil && opts.PullOption == backend.PullOptionNoPull {
  161. return nil, nil, err
  162. }
  163. // TODO: shouldn't we error out if error is different from "not found" ?
  164. if image != nil {
  165. layer, err := newReleasableLayerForImage(image, daemon.stores[opts.OS].layerStore)
  166. return image, layer, err
  167. }
  168. }
  169. image, err := daemon.pullForBuilder(ctx, refOrID, opts.AuthConfig, opts.Output, opts.OS)
  170. if err != nil {
  171. return nil, nil, err
  172. }
  173. layer, err := newReleasableLayerForImage(image, daemon.stores[opts.OS].layerStore)
  174. return image, layer, err
  175. }
  176. // CreateImage creates a new image by adding a config and ID to the image store.
  177. // This is similar to LoadImage() except that it receives JSON encoded bytes of
  178. // an image instead of a tar archive.
  179. func (daemon *Daemon) CreateImage(config []byte, parent string, platform string) (builder.Image, error) {
  180. if platform == "" {
  181. platform = runtime.GOOS
  182. }
  183. id, err := daemon.stores[platform].imageStore.Create(config)
  184. if err != nil {
  185. return nil, errors.Wrapf(err, "failed to create image")
  186. }
  187. if parent != "" {
  188. if err := daemon.stores[platform].imageStore.SetParent(id, image.ID(parent)); err != nil {
  189. return nil, errors.Wrapf(err, "failed to set parent %s", parent)
  190. }
  191. }
  192. return daemon.stores[platform].imageStore.Get(id)
  193. }
  194. // IDMappings returns uid/gid mappings for the builder
  195. func (daemon *Daemon) IDMappings() *idtools.IDMappings {
  196. return daemon.idMappings
  197. }