# syntax=docker/dockerfile:1 ARG GO_VERSION=1.19.4 ARG BASE_DEBIAN_DISTRO="bullseye" ARG GOLANG_IMAGE="golang:${GO_VERSION}-${BASE_DEBIAN_DISTRO}" ARG XX_VERSION=1.1.2 ARG VPNKIT_VERSION=0.5.0 ARG DOCKERCLI_VERSION=v17.06.2-ce ARG CROSS="false" ARG SYSTEMD="false" ARG DEBIAN_FRONTEND=noninteractive ARG DOCKER_STATIC=1 # cross compilation helper FROM --platform=$BUILDPLATFORM tonistiigi/xx:${XX_VERSION} AS xx # dummy stage to make sure the image is built for deps that don't support some # architectures FROM --platform=$BUILDPLATFORM busybox AS build-dummy RUN mkdir -p /build FROM scratch AS binary-dummy COPY --from=build-dummy /build /build # base FROM --platform=$BUILDPLATFORM ${GOLANG_IMAGE} AS base COPY --from=xx / / RUN echo 'Binary::apt::APT::Keep-Downloaded-Packages "true";' > /etc/apt/apt.conf.d/keep-cache ARG APT_MIRROR RUN sed -ri "s/(httpredir|deb).debian.org/${APT_MIRROR:-deb.debian.org}/g" /etc/apt/sources.list \ && sed -ri "s/(security).debian.org/${APT_MIRROR:-security.debian.org}/g" /etc/apt/sources.list ARG DEBIAN_FRONTEND RUN apt-get update && apt-get install --no-install-recommends -y file ENV GO111MODULE=off FROM base AS criu ARG DEBIAN_FRONTEND ADD --chmod=0644 https://download.opensuse.org/repositories/devel:/tools:/criu/Debian_11/Release.key /etc/apt/trusted.gpg.d/criu.gpg.asc RUN --mount=type=cache,sharing=locked,id=moby-criu-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-criu-aptcache,target=/var/cache/apt \ echo 'deb https://download.opensuse.org/repositories/devel:/tools:/criu/Debian_11/ /' > /etc/apt/sources.list.d/criu.list \ && apt-get update \ && apt-get install -y --no-install-recommends criu \ && install -D /usr/sbin/criu /build/criu # registry FROM base AS registry-src WORKDIR /usr/src/registry RUN git init . && git remote add origin "https://github.com/distribution/distribution.git" FROM base AS registry WORKDIR /go/src/github.com/docker/distribution # REGISTRY_VERSION specifies the version of the registry to build and install # from the https://github.com/docker/distribution repository. This version of # the registry is used to test both schema 1 and schema 2 manifests. Generally, # the version specified here should match a current release. ARG REGISTRY_VERSION=v2.3.0 # REGISTRY_VERSION_SCHEMA1 specifies the version of the registry to build and # install from the https://github.com/docker/distribution repository. This is # an older (pre v2.3.0) version of the registry that only supports schema1 # manifests. This version of the registry is not working on arm64, so installation # is skipped on that architecture. ARG REGISTRY_VERSION_SCHEMA1=v2.1.0 ARG TARGETPLATFORM RUN --mount=from=registry-src,src=/usr/src/registry,rw \ --mount=type=cache,target=/root/.cache/go-build,id=registry-build-$TARGETPLATFORM \ --mount=type=cache,target=/go/pkg/mod \ --mount=type=tmpfs,target=/go/src <, but this doesn't want to install # on non-amd64 systems, so other architectures cannot crossbuild amd64. RUN --mount=type=cache,sharing=locked,id=moby-cross-true-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-cross-true-aptcache,target=/var/cache/apt \ apt-get update && apt-get install -y --no-install-recommends \ libapparmor-dev:arm64 \ libapparmor-dev:armel \ libapparmor-dev:armhf \ libapparmor-dev:ppc64el \ libapparmor-dev:s390x \ libseccomp-dev:arm64 \ libseccomp-dev:armel \ libseccomp-dev:armhf \ libseccomp-dev:ppc64el \ libseccomp-dev:s390x FROM runtime-dev-cross-${CROSS} AS runtime-dev FROM base AS delve # DELVE_VERSION specifies the version of the Delve debugger binary # from the https://github.com/go-delve/delve repository. # It can be used to run Docker with a possibility of # attaching debugger to it. # ARG DELVE_VERSION=v1.8.1 # Delve on Linux is currently only supported on amd64 and arm64; # https://github.com/go-delve/delve/blob/v1.8.1/pkg/proc/native/support_sentinel.go#L1-L6 RUN --mount=type=cache,target=/root/.cache/go-build \ --mount=type=cache,target=/go/pkg/mod \ case $(dpkg --print-architecture) in \ amd64|arm64) \ GOBIN=/build/ GO111MODULE=on go install "github.com/go-delve/delve/cmd/dlv@${DELVE_VERSION}" \ && /build/dlv --help \ ;; \ *) \ mkdir -p /build/ \ ;; \ esac FROM base AS tomll # GOTOML_VERSION specifies the version of the tomll binary to build and install # from the https://github.com/pelletier/go-toml repository. This binary is used # in CI in the hack/validate/toml script. # # When updating this version, consider updating the github.com/pelletier/go-toml # dependency in vendor.mod accordingly. ARG GOTOML_VERSION=v1.8.1 RUN --mount=type=cache,target=/root/.cache/go-build \ --mount=type=cache,target=/go/pkg/mod \ GOBIN=/build/ GO111MODULE=on go install "github.com/pelletier/go-toml/cmd/tomll@${GOTOML_VERSION}" \ && /build/tomll --help FROM base AS gowinres # GOWINRES_VERSION defines go-winres tool version ARG GOWINRES_VERSION=v0.3.0 RUN --mount=type=cache,target=/root/.cache/go-build \ --mount=type=cache,target=/go/pkg/mod \ GOBIN=/build/ GO111MODULE=on go install "github.com/tc-hib/go-winres@${GOWINRES_VERSION}" \ && /build/go-winres --help # containerd FROM base AS containerd-src WORKDIR /usr/src/containerd RUN git init . && git remote add origin "https://github.com/containerd/containerd.git" # CONTAINERD_VERSION is used to build containerd binaries, and used for the # integration tests. The distributed docker .deb and .rpm packages depend on a # separate (containerd.io) package, which may be a different version as is # specified here. The containerd golang package is also pinned in vendor.mod. # When updating the binary version you may also need to update the vendor # version to pick up bug fixes or new APIs, however, usually the Go packages # are built from a commit from the master branch. ARG CONTAINERD_VERSION=v1.7.0-beta.0 RUN git fetch -q --depth 1 origin "${CONTAINERD_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD FROM base AS containerd-build WORKDIR /go/src/github.com/containerd/containerd ARG DEBIAN_FRONTEND ARG TARGETPLATFORM RUN --mount=type=cache,sharing=locked,id=moby-containerd-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-containerd-aptcache,target=/var/cache/apt \ apt-get update && xx-apt-get install -y --no-install-recommends \ gcc libbtrfs-dev libsecret-1-dev ARG DOCKER_STATIC RUN --mount=from=containerd-src,src=/usr/src/containerd,rw \ --mount=type=cache,target=/root/.cache/go-build,id=containerd-build-$TARGETPLATFORM </dev/null 2>&1; then mkdir /build curl -Ls "${DOWNLOAD_URL}" | tar -xz docker/docker mv docker/docker /build/docker else CGO_ENABLED=0 xx-go build -o /build/docker ./cmd/docker fi xx-verify /build/docker EOT # runc FROM base AS runc-src WORKDIR /usr/src/runc RUN git init . && git remote add origin "https://github.com/opencontainers/runc.git" # RUNC_VERSION should match the version that is used by the containerd version # that is used. If you need to update runc, open a pull request in the containerd # project first, and update both after that is merged. When updating RUNC_VERSION, # consider updating runc in vendor.mod accordingly. ARG RUNC_VERSION=v1.1.4 RUN git fetch -q --depth 1 origin "${RUNC_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD FROM base AS runc-build WORKDIR /go/src/github.com/opencontainers/runc ARG DEBIAN_FRONTEND ARG TARGETPLATFORM RUN --mount=type=cache,sharing=locked,id=moby-runc-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-runc-aptcache,target=/var/cache/apt \ apt-get update && xx-apt-get install -y --no-install-recommends \ dpkg-dev gcc libc6-dev libseccomp-dev ARG DOCKER_STATIC RUN --mount=from=runc-src,src=/usr/src/runc,rw \ --mount=type=cache,target=/root/.cache/go-build,id=runc-build-$TARGETPLATFORM <> /etc/bash.bashrc RUN ln -s /usr/local/completion/bash/docker /etc/bash_completion.d/docker RUN ldconfig # This should only install packages that are specifically needed for the dev environment and nothing else # Do you really need to add another package here? Can it be done in a different build stage? RUN --mount=type=cache,sharing=locked,id=moby-dev-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-dev-aptcache,target=/var/cache/apt \ apt-get update && apt-get install -y --no-install-recommends \ apparmor \ bash-completion \ bzip2 \ inetutils-ping \ iproute2 \ iptables \ jq \ libcap2-bin \ libnet1 \ libnl-3-200 \ libprotobuf-c1 \ libyajl2 \ net-tools \ patch \ pigz \ python3-pip \ python3-setuptools \ python3-wheel \ sudo \ systemd-journal-remote \ thin-provisioning-tools \ uidmap \ vim \ vim-common \ xfsprogs \ xz-utils \ zip \ zstd # Switch to use iptables instead of nftables (to match the CI hosts) # TODO use some kind of runtime auto-detection instead if/when nftables is supported (https://github.com/moby/moby/issues/26824) RUN update-alternatives --set iptables /usr/sbin/iptables-legacy || true \ && update-alternatives --set ip6tables /usr/sbin/ip6tables-legacy || true \ && update-alternatives --set arptables /usr/sbin/arptables-legacy || true ARG YAMLLINT_VERSION=1.27.1 RUN pip3 install yamllint==${YAMLLINT_VERSION} COPY --from=dockercli /build/ /usr/local/cli COPY --from=frozen-images /build/ /docker-frozen-images COPY --from=swagger /build/ /usr/local/bin/ COPY --from=delve /build/ /usr/local/bin/ COPY --from=tomll /build/ /usr/local/bin/ COPY --from=gowinres /build/ /usr/local/bin/ COPY --from=tini /build/ /usr/local/bin/ COPY --from=registry /build/ /usr/local/bin/ COPY --from=criu /build/ /usr/local/bin/ COPY --from=gotestsum /build/ /usr/local/bin/ COPY --from=golangci_lint /build/ /usr/local/bin/ COPY --from=shfmt /build/ /usr/local/bin/ COPY --from=runc /build/ /usr/local/bin/ COPY --from=containerd /build/ /usr/local/bin/ COPY --from=rootlesskit /build/ /usr/local/bin/ COPY --from=vpnkit / /usr/local/bin/ COPY --from=containerutil /build/ /usr/local/bin/ COPY --from=crun /build/ /usr/local/bin/ COPY hack/dockerfile/etc/docker/ /etc/docker/ ENV PATH=/usr/local/cli:$PATH ARG DOCKER_BUILDTAGS ENV DOCKER_BUILDTAGS="${DOCKER_BUILDTAGS}" WORKDIR /go/src/github.com/docker/docker VOLUME /var/lib/docker VOLUME /home/unprivilegeduser/.local/share/docker # Wrap all commands in the "docker-in-docker" script to allow nested containers ENTRYPOINT ["hack/dind"] FROM dev-systemd-false AS dev-systemd-true RUN --mount=type=cache,sharing=locked,id=moby-dev-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-dev-aptcache,target=/var/cache/apt \ apt-get update && apt-get install -y --no-install-recommends \ dbus \ dbus-user-session \ systemd \ systemd-sysv ENTRYPOINT ["hack/dind-systemd"] FROM dev-systemd-${SYSTEMD} AS dev FROM runtime-dev AS binary-base ARG DOCKER_GITCOMMIT=HEAD ENV DOCKER_GITCOMMIT=${DOCKER_GITCOMMIT} ARG VERSION ENV VERSION=${VERSION} ARG PLATFORM ENV PLATFORM=${PLATFORM} ARG PRODUCT ENV PRODUCT=${PRODUCT} ARG DEFAULT_PRODUCT_LICENSE ENV DEFAULT_PRODUCT_LICENSE=${DEFAULT_PRODUCT_LICENSE} ARG PACKAGER_NAME ENV PACKAGER_NAME=${PACKAGER_NAME} ARG DOCKER_BUILDTAGS ENV DOCKER_BUILDTAGS="${DOCKER_BUILDTAGS}" ENV PREFIX=/build # TODO: This is here because hack/make.sh binary copies these extras binaries # from $PATH into the bundles dir. # It would be nice to handle this in a different way. COPY --from=tini /build/ /usr/local/bin/ COPY --from=runc /build/ /usr/local/bin/ COPY --from=containerd /build/ /usr/local/bin/ COPY --from=rootlesskit /build/ /usr/local/bin/ COPY --from=vpnkit / /usr/local/bin/ COPY --from=containerutil /build/ /usr/local/bin/ COPY --from=gowinres /build/ /usr/local/bin/ WORKDIR /go/src/github.com/docker/docker FROM binary-base AS build-binary RUN --mount=type=cache,target=/root/.cache \ --mount=type=bind,target=.,ro \ --mount=type=tmpfs,target=cli/winresources/dockerd \ --mount=type=tmpfs,target=cli/winresources/docker-proxy \ hack/make.sh binary FROM binary-base AS build-dynbinary RUN --mount=type=cache,target=/root/.cache \ --mount=type=bind,target=.,ro \ --mount=type=tmpfs,target=cli/winresources/dockerd \ --mount=type=tmpfs,target=cli/winresources/docker-proxy \ hack/make.sh dynbinary FROM binary-base AS build-cross ARG DOCKER_CROSSPLATFORMS RUN --mount=type=cache,target=/root/.cache \ --mount=type=bind,target=.,ro \ --mount=type=tmpfs,target=cli/winresources/dockerd \ --mount=type=tmpfs,target=cli/winresources/docker-proxy \ hack/make.sh cross FROM scratch AS binary COPY --from=build-binary /build/bundles/ / FROM scratch AS dynbinary COPY --from=build-dynbinary /build/bundles/ / FROM scratch AS cross COPY --from=build-cross /build/bundles/ / FROM dev AS final COPY . /go/src/github.com/docker/docker