controller.go 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293
  1. package buildkit
  2. import (
  3. "context"
  4. "net/http"
  5. "os"
  6. "path/filepath"
  7. "github.com/containerd/containerd/content/local"
  8. ctdmetadata "github.com/containerd/containerd/metadata"
  9. "github.com/containerd/containerd/platforms"
  10. "github.com/containerd/containerd/snapshots"
  11. "github.com/docker/docker/api/types"
  12. "github.com/docker/docker/api/types/filters"
  13. "github.com/docker/docker/builder/builder-next/adapters/containerimage"
  14. "github.com/docker/docker/builder/builder-next/adapters/localinlinecache"
  15. "github.com/docker/docker/builder/builder-next/adapters/snapshot"
  16. containerimageexp "github.com/docker/docker/builder/builder-next/exporter"
  17. "github.com/docker/docker/builder/builder-next/imagerefchecker"
  18. mobyworker "github.com/docker/docker/builder/builder-next/worker"
  19. "github.com/docker/docker/daemon/config"
  20. "github.com/docker/docker/daemon/graphdriver"
  21. units "github.com/docker/go-units"
  22. "github.com/moby/buildkit/cache"
  23. "github.com/moby/buildkit/cache/metadata"
  24. "github.com/moby/buildkit/cache/remotecache"
  25. inlineremotecache "github.com/moby/buildkit/cache/remotecache/inline"
  26. localremotecache "github.com/moby/buildkit/cache/remotecache/local"
  27. "github.com/moby/buildkit/client"
  28. "github.com/moby/buildkit/control"
  29. "github.com/moby/buildkit/frontend"
  30. dockerfile "github.com/moby/buildkit/frontend/dockerfile/builder"
  31. "github.com/moby/buildkit/frontend/gateway"
  32. "github.com/moby/buildkit/frontend/gateway/forwarder"
  33. containerdsnapshot "github.com/moby/buildkit/snapshot/containerd"
  34. "github.com/moby/buildkit/solver/bboltcachestorage"
  35. "github.com/moby/buildkit/util/archutil"
  36. "github.com/moby/buildkit/util/entitlements"
  37. "github.com/moby/buildkit/util/leaseutil"
  38. "github.com/moby/buildkit/worker"
  39. specs "github.com/opencontainers/image-spec/specs-go/v1"
  40. "github.com/pkg/errors"
  41. bolt "go.etcd.io/bbolt"
  42. )
  43. func newController(rt http.RoundTripper, opt Opt) (*control.Controller, error) {
  44. if err := os.MkdirAll(opt.Root, 0711); err != nil {
  45. return nil, err
  46. }
  47. dist := opt.Dist
  48. root := opt.Root
  49. var driver graphdriver.Driver
  50. if ls, ok := dist.LayerStore.(interface {
  51. Driver() graphdriver.Driver
  52. }); ok {
  53. driver = ls.Driver()
  54. } else {
  55. return nil, errors.Errorf("could not access graphdriver")
  56. }
  57. store, err := local.NewStore(filepath.Join(root, "content"))
  58. if err != nil {
  59. return nil, err
  60. }
  61. db, err := bolt.Open(filepath.Join(root, "containerdmeta.db"), 0644, nil)
  62. if err != nil {
  63. return nil, errors.WithStack(err)
  64. }
  65. mdb := ctdmetadata.NewDB(db, store, map[string]snapshots.Snapshotter{})
  66. store = containerdsnapshot.NewContentStore(mdb.ContentStore(), "buildkit")
  67. lm := leaseutil.WithNamespace(ctdmetadata.NewLeaseManager(mdb), "buildkit")
  68. snapshotter, lm, err := snapshot.NewSnapshotter(snapshot.Opt{
  69. GraphDriver: driver,
  70. LayerStore: dist.LayerStore,
  71. Root: root,
  72. IdentityMapping: opt.IdentityMapping,
  73. }, lm)
  74. if err != nil {
  75. return nil, err
  76. }
  77. if err := cache.MigrateV2(context.Background(), filepath.Join(root, "metadata.db"), filepath.Join(root, "metadata_v2.db"), store, snapshotter, lm); err != nil {
  78. return nil, err
  79. }
  80. md, err := metadata.NewStore(filepath.Join(root, "metadata_v2.db"))
  81. if err != nil {
  82. return nil, err
  83. }
  84. layerGetter, ok := snapshotter.(imagerefchecker.LayerGetter)
  85. if !ok {
  86. return nil, errors.Errorf("snapshotter does not implement layergetter")
  87. }
  88. refChecker := imagerefchecker.New(imagerefchecker.Opt{
  89. ImageStore: dist.ImageStore,
  90. LayerGetter: layerGetter,
  91. })
  92. cm, err := cache.NewManager(cache.ManagerOpt{
  93. Snapshotter: snapshotter,
  94. MetadataStore: md,
  95. PruneRefChecker: refChecker,
  96. LeaseManager: lm,
  97. ContentStore: store,
  98. GarbageCollect: mdb.GarbageCollect,
  99. })
  100. if err != nil {
  101. return nil, err
  102. }
  103. src, err := containerimage.NewSource(containerimage.SourceOpt{
  104. CacheAccessor: cm,
  105. ContentStore: store,
  106. DownloadManager: dist.DownloadManager,
  107. MetadataStore: dist.V2MetadataService,
  108. ImageStore: dist.ImageStore,
  109. ReferenceStore: dist.ReferenceStore,
  110. RegistryHosts: opt.RegistryHosts,
  111. LayerStore: dist.LayerStore,
  112. LeaseManager: lm,
  113. GarbageCollect: mdb.GarbageCollect,
  114. })
  115. if err != nil {
  116. return nil, err
  117. }
  118. dns := getDNSConfig(opt.DNSConfig)
  119. exec, err := newExecutor(root, opt.DefaultCgroupParent, opt.NetworkController, dns, opt.Rootless, opt.IdentityMapping, opt.ApparmorProfile)
  120. if err != nil {
  121. return nil, err
  122. }
  123. differ, ok := snapshotter.(containerimageexp.Differ)
  124. if !ok {
  125. return nil, errors.Errorf("snapshotter doesn't support differ")
  126. }
  127. exp, err := containerimageexp.New(containerimageexp.Opt{
  128. ImageStore: dist.ImageStore,
  129. ReferenceStore: dist.ReferenceStore,
  130. Differ: differ,
  131. })
  132. if err != nil {
  133. return nil, err
  134. }
  135. cacheStorage, err := bboltcachestorage.NewStore(filepath.Join(opt.Root, "cache.db"))
  136. if err != nil {
  137. return nil, err
  138. }
  139. gcPolicy, err := getGCPolicy(opt.BuilderConfig, root)
  140. if err != nil {
  141. return nil, errors.Wrap(err, "could not get builder GC policy")
  142. }
  143. layers, ok := snapshotter.(mobyworker.LayerAccess)
  144. if !ok {
  145. return nil, errors.Errorf("snapshotter doesn't support differ")
  146. }
  147. p, err := parsePlatforms(archutil.SupportedPlatforms(true))
  148. if err != nil {
  149. return nil, err
  150. }
  151. leases, err := lm.List(context.TODO(), "labels.\"buildkit/lease.temporary\"")
  152. if err != nil {
  153. return nil, err
  154. }
  155. for _, l := range leases {
  156. lm.Delete(context.TODO(), l)
  157. }
  158. wopt := mobyworker.Opt{
  159. ID: "moby",
  160. MetadataStore: md,
  161. ContentStore: store,
  162. CacheManager: cm,
  163. GCPolicy: gcPolicy,
  164. Snapshotter: snapshotter,
  165. Executor: exec,
  166. ImageSource: src,
  167. DownloadManager: dist.DownloadManager,
  168. V2MetadataService: dist.V2MetadataService,
  169. Exporter: exp,
  170. Transport: rt,
  171. Layers: layers,
  172. Platforms: p,
  173. }
  174. wc := &worker.Controller{}
  175. w, err := mobyworker.NewWorker(wopt)
  176. if err != nil {
  177. return nil, err
  178. }
  179. wc.Add(w)
  180. frontends := map[string]frontend.Frontend{
  181. "dockerfile.v0": forwarder.NewGatewayForwarder(wc, dockerfile.Build),
  182. "gateway.v0": gateway.NewGatewayFrontend(wc),
  183. }
  184. return control.NewController(control.Opt{
  185. SessionManager: opt.SessionManager,
  186. WorkerController: wc,
  187. Frontends: frontends,
  188. CacheKeyStorage: cacheStorage,
  189. ResolveCacheImporterFuncs: map[string]remotecache.ResolveCacheImporterFunc{
  190. "registry": localinlinecache.ResolveCacheImporterFunc(opt.SessionManager, opt.RegistryHosts, store, dist.ReferenceStore, dist.ImageStore),
  191. "local": localremotecache.ResolveCacheImporterFunc(opt.SessionManager),
  192. },
  193. ResolveCacheExporterFuncs: map[string]remotecache.ResolveCacheExporterFunc{
  194. "inline": inlineremotecache.ResolveCacheExporterFunc(),
  195. },
  196. Entitlements: getEntitlements(opt.BuilderConfig),
  197. })
  198. }
  199. func getGCPolicy(conf config.BuilderConfig, root string) ([]client.PruneInfo, error) {
  200. var gcPolicy []client.PruneInfo
  201. if conf.GC.Enabled {
  202. var (
  203. defaultKeepStorage int64
  204. err error
  205. )
  206. if conf.GC.DefaultKeepStorage != "" {
  207. defaultKeepStorage, err = units.RAMInBytes(conf.GC.DefaultKeepStorage)
  208. if err != nil {
  209. return nil, errors.Wrapf(err, "could not parse '%s' as Builder.GC.DefaultKeepStorage config", conf.GC.DefaultKeepStorage)
  210. }
  211. }
  212. if conf.GC.Policy == nil {
  213. gcPolicy = mobyworker.DefaultGCPolicy(root, defaultKeepStorage)
  214. } else {
  215. gcPolicy = make([]client.PruneInfo, len(conf.GC.Policy))
  216. for i, p := range conf.GC.Policy {
  217. b, err := units.RAMInBytes(p.KeepStorage)
  218. if err != nil {
  219. return nil, err
  220. }
  221. if b == 0 {
  222. b = defaultKeepStorage
  223. }
  224. gcPolicy[i], err = toBuildkitPruneInfo(types.BuildCachePruneOptions{
  225. All: p.All,
  226. KeepStorage: b,
  227. Filters: filters.Args(p.Filter),
  228. })
  229. if err != nil {
  230. return nil, err
  231. }
  232. }
  233. }
  234. }
  235. return gcPolicy, nil
  236. }
  237. func parsePlatforms(platformsStr []string) ([]specs.Platform, error) {
  238. out := make([]specs.Platform, 0, len(platformsStr))
  239. for _, s := range platformsStr {
  240. p, err := platforms.Parse(s)
  241. if err != nil {
  242. return nil, err
  243. }
  244. out = append(out, platforms.Normalize(p))
  245. }
  246. return out, nil
  247. }
  248. func getEntitlements(conf config.BuilderConfig) []string {
  249. var ents []string
  250. // Incase of no config settings, NetworkHost should be enabled & SecurityInsecure must be disabled.
  251. if conf.Entitlements.NetworkHost == nil || *conf.Entitlements.NetworkHost {
  252. ents = append(ents, string(entitlements.EntitlementNetworkHost))
  253. }
  254. if conf.Entitlements.SecurityInsecure != nil && *conf.Entitlements.SecurityInsecure {
  255. ents = append(ents, string(entitlements.EntitlementSecurityInsecure))
  256. }
  257. return ents
  258. }