build.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "os"
  19. "strings"
  20. "sync"
  21. "time"
  22. "github.com/compose-spec/compose-go/v2/types"
  23. "github.com/containerd/platforms"
  24. "github.com/docker/buildx/build"
  25. "github.com/docker/buildx/builder"
  26. "github.com/docker/buildx/controller/pb"
  27. "github.com/docker/buildx/store/storeutil"
  28. "github.com/docker/buildx/util/buildflags"
  29. xprogress "github.com/docker/buildx/util/progress"
  30. "github.com/docker/cli/cli/command"
  31. "github.com/docker/cli/cli/hints"
  32. cliopts "github.com/docker/cli/opts"
  33. "github.com/docker/compose/v2/internal/tracing"
  34. "github.com/docker/compose/v2/pkg/api"
  35. "github.com/docker/compose/v2/pkg/progress"
  36. "github.com/docker/compose/v2/pkg/utils"
  37. "github.com/docker/docker/api/types/container"
  38. bclient "github.com/moby/buildkit/client"
  39. "github.com/moby/buildkit/session"
  40. "github.com/moby/buildkit/session/auth/authprovider"
  41. "github.com/moby/buildkit/session/secrets/secretsprovider"
  42. "github.com/moby/buildkit/session/sshforward/sshprovider"
  43. "github.com/moby/buildkit/util/entitlements"
  44. "github.com/moby/buildkit/util/progress/progressui"
  45. specs "github.com/opencontainers/image-spec/specs-go/v1"
  46. "github.com/sirupsen/logrus"
  47. "go.opentelemetry.io/otel/attribute"
  48. "go.opentelemetry.io/otel/trace"
  49. // required to get default driver registered
  50. _ "github.com/docker/buildx/driver/docker"
  51. )
  52. func (s *composeService) Build(ctx context.Context, project *types.Project, options api.BuildOptions) error {
  53. err := options.Apply(project)
  54. if err != nil {
  55. return err
  56. }
  57. return progress.RunWithTitle(ctx, func(ctx context.Context) error {
  58. return tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  59. func(ctx context.Context) error {
  60. _, err := s.build(ctx, project, options, nil)
  61. return err
  62. })(ctx)
  63. }, s.stdinfo(), "Building")
  64. }
  65. const bakeSuggest = "Compose can now delegate builds to bake for better performance.\n To do so, set COMPOSE_BAKE=true."
  66. var suggest sync.Once
  67. //nolint:gocyclo
  68. func (s *composeService) build(ctx context.Context, project *types.Project, options api.BuildOptions, localImages map[string]api.ImageSummary) (map[string]string, error) {
  69. imageIDs := map[string]string{}
  70. serviceToBuild := types.Services{}
  71. var policy types.DependencyOption = types.IgnoreDependencies
  72. if options.Deps {
  73. policy = types.IncludeDependencies
  74. }
  75. err := project.ForEachService(options.Services, func(serviceName string, service *types.ServiceConfig) error {
  76. if service.Build == nil {
  77. return nil
  78. }
  79. image := api.GetImageNameOrDefault(*service, project.Name)
  80. _, localImagePresent := localImages[image]
  81. if localImagePresent && service.PullPolicy != types.PullPolicyBuild {
  82. return nil
  83. }
  84. serviceToBuild[serviceName] = *service
  85. return nil
  86. }, policy)
  87. if err != nil || len(serviceToBuild) == 0 {
  88. return imageIDs, err
  89. }
  90. bake, err := buildWithBake(s.dockerCli)
  91. if err != nil {
  92. return nil, err
  93. }
  94. if bake || options.Print {
  95. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "bake"))
  96. return s.doBuildBake(ctx, project, serviceToBuild, options)
  97. }
  98. // Not using bake, additional_context: service:xx is implemented by building images in dependency order
  99. project, err = project.WithServicesTransform(func(serviceName string, service types.ServiceConfig) (types.ServiceConfig, error) {
  100. if service.Build != nil {
  101. for _, c := range service.Build.AdditionalContexts {
  102. if t, found := strings.CutPrefix(c, types.ServicePrefix); found {
  103. if service.DependsOn == nil {
  104. service.DependsOn = map[string]types.ServiceDependency{}
  105. }
  106. service.DependsOn[t] = types.ServiceDependency{
  107. Condition: "build", // non-canonical, but will force dependency graph ordering
  108. }
  109. }
  110. }
  111. }
  112. return service, nil
  113. })
  114. if err != nil {
  115. return imageIDs, err
  116. }
  117. // Initialize buildkit nodes
  118. buildkitEnabled, err := s.dockerCli.BuildKitEnabled()
  119. if err != nil {
  120. return nil, err
  121. }
  122. var (
  123. b *builder.Builder
  124. nodes []builder.Node
  125. w *xprogress.Printer
  126. )
  127. if buildkitEnabled {
  128. if hints.Enabled() && progress.Mode != progress.ModeQuiet && progress.Mode != progress.ModeJSON {
  129. suggest.Do(func() {
  130. fmt.Fprintln(s.dockerCli.Out(), bakeSuggest) //nolint:errcheck
  131. })
  132. }
  133. builderName := options.Builder
  134. if builderName == "" {
  135. builderName = os.Getenv("BUILDX_BUILDER")
  136. }
  137. b, err = builder.New(s.dockerCli, builder.WithName(builderName))
  138. if err != nil {
  139. return nil, err
  140. }
  141. nodes, err = b.LoadNodes(ctx)
  142. if err != nil {
  143. return nil, err
  144. }
  145. // Progress needs its own context that lives longer than the
  146. // build one otherwise it won't read all the messages from
  147. // build and will lock
  148. progressCtx, cancel := context.WithCancel(context.Background())
  149. defer cancel()
  150. if options.Quiet {
  151. options.Progress = progress.ModeQuiet
  152. }
  153. if options.Progress == "" {
  154. options.Progress = os.Getenv("BUILDKIT_PROGRESS")
  155. }
  156. w, err = xprogress.NewPrinter(progressCtx, os.Stdout, progressui.DisplayMode(options.Progress),
  157. xprogress.WithDesc(
  158. fmt.Sprintf("building with %q instance using %s driver", b.Name, b.Driver),
  159. fmt.Sprintf("%s:%s", b.Driver, b.Name),
  160. ))
  161. if err != nil {
  162. return nil, err
  163. }
  164. }
  165. // we use a pre-allocated []string to collect build digest by service index while running concurrent goroutines
  166. builtDigests := make([]string, len(project.Services))
  167. names := project.ServiceNames()
  168. getServiceIndex := func(name string) int {
  169. for idx, n := range names {
  170. if n == name {
  171. return idx
  172. }
  173. }
  174. return -1
  175. }
  176. cw := progress.ContextWriter(ctx)
  177. err = InDependencyOrder(ctx, project, func(ctx context.Context, name string) error {
  178. service, ok := serviceToBuild[name]
  179. if !ok {
  180. return nil
  181. }
  182. serviceName := fmt.Sprintf("Service %s", name)
  183. if !buildkitEnabled {
  184. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "classic"))
  185. cw.Event(progress.BuildingEvent(serviceName))
  186. id, err := s.doBuildClassic(ctx, project, service, options)
  187. if err != nil {
  188. return err
  189. }
  190. cw.Event(progress.BuiltEvent(serviceName))
  191. builtDigests[getServiceIndex(name)] = id
  192. if options.Push {
  193. return s.push(ctx, project, api.PushOptions{})
  194. }
  195. return nil
  196. }
  197. if options.Memory != 0 {
  198. _, _ = fmt.Fprintln(s.stderr(), "WARNING: --memory is not supported by BuildKit and will be ignored")
  199. }
  200. buildOptions, err := s.toBuildOptions(project, service, options)
  201. if err != nil {
  202. return err
  203. }
  204. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "buildkit"))
  205. digest, err := s.doBuildBuildkit(ctx, name, buildOptions, w, nodes)
  206. if err != nil {
  207. return err
  208. }
  209. builtDigests[getServiceIndex(name)] = digest
  210. return nil
  211. }, func(traversal *graphTraversal) {
  212. traversal.maxConcurrency = s.maxConcurrency
  213. })
  214. // enforce all build event get consumed
  215. if buildkitEnabled {
  216. if errw := w.Wait(); errw != nil {
  217. return nil, errw
  218. }
  219. }
  220. if err != nil {
  221. return nil, err
  222. }
  223. for i, imageDigest := range builtDigests {
  224. if imageDigest != "" {
  225. service := project.Services[names[i]]
  226. imageRef := api.GetImageNameOrDefault(service, project.Name)
  227. imageIDs[imageRef] = imageDigest
  228. cw.Event(progress.BuiltEvent(names[i]))
  229. }
  230. }
  231. return imageIDs, err
  232. }
  233. func (s *composeService) ensureImagesExists(ctx context.Context, project *types.Project, buildOpts *api.BuildOptions, quietPull bool) error {
  234. for name, service := range project.Services {
  235. if service.Provider == nil && service.Image == "" && service.Build == nil {
  236. return fmt.Errorf("invalid service %q. Must specify either image or build", name)
  237. }
  238. }
  239. images, err := s.getLocalImagesDigests(ctx, project)
  240. if err != nil {
  241. return err
  242. }
  243. err = tracing.SpanWrapFunc("project/pull", tracing.ProjectOptions(ctx, project),
  244. func(ctx context.Context) error {
  245. return s.pullRequiredImages(ctx, project, images, quietPull)
  246. },
  247. )(ctx)
  248. if err != nil {
  249. return err
  250. }
  251. if buildOpts != nil {
  252. err = tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  253. func(ctx context.Context) error {
  254. builtImages, err := s.build(ctx, project, *buildOpts, images)
  255. if err != nil {
  256. return err
  257. }
  258. for name, digest := range builtImages {
  259. images[name] = api.ImageSummary{
  260. Repository: name,
  261. ID: digest,
  262. LastTagTime: time.Now(),
  263. }
  264. }
  265. return nil
  266. },
  267. )(ctx)
  268. if err != nil {
  269. return err
  270. }
  271. }
  272. // set digest as com.docker.compose.image label so we can detect outdated containers
  273. for name, service := range project.Services {
  274. image := api.GetImageNameOrDefault(service, project.Name)
  275. img, ok := images[image]
  276. if ok {
  277. service.CustomLabels.Add(api.ImageDigestLabel, img.ID)
  278. }
  279. project.Services[name] = service
  280. }
  281. return nil
  282. }
  283. func (s *composeService) getLocalImagesDigests(ctx context.Context, project *types.Project) (map[string]api.ImageSummary, error) {
  284. imageNames := utils.Set[string]{}
  285. for _, s := range project.Services {
  286. imgName := api.GetImageNameOrDefault(s, project.Name)
  287. imageNames.Add(imgName)
  288. for _, volume := range s.Volumes {
  289. if volume.Type == types.VolumeTypeImage {
  290. imageNames.Add(volume.Source)
  291. }
  292. }
  293. }
  294. imgs, err := s.getImageSummaries(ctx, imageNames.Elements())
  295. if err != nil {
  296. return nil, err
  297. }
  298. for i, service := range project.Services {
  299. imgName := api.GetImageNameOrDefault(service, project.Name)
  300. img, ok := imgs[imgName]
  301. if !ok {
  302. continue
  303. }
  304. if service.Platform != "" {
  305. platform, err := platforms.Parse(service.Platform)
  306. if err != nil {
  307. return nil, err
  308. }
  309. inspect, err := s.apiClient().ImageInspect(ctx, img.ID)
  310. if err != nil {
  311. return nil, err
  312. }
  313. actual := specs.Platform{
  314. Architecture: inspect.Architecture,
  315. OS: inspect.Os,
  316. Variant: inspect.Variant,
  317. }
  318. if !platforms.NewMatcher(platform).Match(actual) {
  319. // there is a local image, but it's for the wrong platform, so
  320. // pretend it doesn't exist so that we can pull/build an image
  321. // for the correct platform instead
  322. delete(imgs, imgName)
  323. }
  324. }
  325. project.Services[i].CustomLabels.Add(api.ImageDigestLabel, img.ID)
  326. }
  327. return imgs, nil
  328. }
  329. // resolveAndMergeBuildArgs returns the final set of build arguments to use for the service image build.
  330. //
  331. // First, args directly defined via `build.args` in YAML are considered.
  332. // Then, any explicitly passed args in opts (e.g. via `--build-arg` on the CLI) are merged, overwriting any
  333. // keys that already exist.
  334. // Next, any keys without a value are resolved using the project environment.
  335. //
  336. // Finally, standard proxy variables based on the Docker client configuration are added, but will not overwrite
  337. // any values if already present.
  338. func resolveAndMergeBuildArgs(dockerCli command.Cli, project *types.Project, service types.ServiceConfig, opts api.BuildOptions) types.MappingWithEquals {
  339. result := make(types.MappingWithEquals).
  340. OverrideBy(service.Build.Args).
  341. OverrideBy(opts.Args).
  342. Resolve(envResolver(project.Environment))
  343. // proxy arguments do NOT override and should NOT have env resolution applied,
  344. // so they're handled last
  345. for k, v := range storeutil.GetProxyConfig(dockerCli) {
  346. if _, ok := result[k]; !ok {
  347. v := v
  348. result[k] = &v
  349. }
  350. }
  351. return result
  352. }
  353. func (s *composeService) toBuildOptions(project *types.Project, service types.ServiceConfig, options api.BuildOptions) (build.Options, error) {
  354. plats, err := parsePlatforms(service)
  355. if err != nil {
  356. return build.Options{}, err
  357. }
  358. cacheFrom, err := buildflags.ParseCacheEntry(service.Build.CacheFrom)
  359. if err != nil {
  360. return build.Options{}, err
  361. }
  362. cacheTo, err := buildflags.ParseCacheEntry(service.Build.CacheTo)
  363. if err != nil {
  364. return build.Options{}, err
  365. }
  366. sessionConfig := []session.Attachable{
  367. authprovider.NewDockerAuthProvider(authprovider.DockerAuthProviderConfig{
  368. ConfigFile: s.configFile(),
  369. }),
  370. }
  371. if len(options.SSHs) > 0 || len(service.Build.SSH) > 0 {
  372. sshAgentProvider, err := sshAgentProvider(append(service.Build.SSH, options.SSHs...))
  373. if err != nil {
  374. return build.Options{}, err
  375. }
  376. sessionConfig = append(sessionConfig, sshAgentProvider)
  377. }
  378. if len(service.Build.Secrets) > 0 {
  379. secretsProvider, err := addSecretsConfig(project, service)
  380. if err != nil {
  381. return build.Options{}, err
  382. }
  383. sessionConfig = append(sessionConfig, secretsProvider)
  384. }
  385. tags := []string{api.GetImageNameOrDefault(service, project.Name)}
  386. if len(service.Build.Tags) > 0 {
  387. tags = append(tags, service.Build.Tags...)
  388. }
  389. allow, err := buildflags.ParseEntitlements(service.Build.Entitlements)
  390. if err != nil {
  391. return build.Options{}, err
  392. }
  393. if service.Build.Privileged {
  394. allow = append(allow, entitlements.EntitlementSecurityInsecure.String())
  395. }
  396. imageLabels := getImageBuildLabels(project, service)
  397. push := options.Push && service.Image != ""
  398. exports := []bclient.ExportEntry{{
  399. Type: "docker",
  400. Attrs: map[string]string{
  401. "load": "true",
  402. "push": fmt.Sprint(push),
  403. },
  404. }}
  405. if len(service.Build.Platforms) > 1 {
  406. exports = []bclient.ExportEntry{{
  407. Type: "image",
  408. Attrs: map[string]string{
  409. "push": fmt.Sprint(push),
  410. },
  411. }}
  412. }
  413. sp, err := build.ReadSourcePolicy()
  414. if err != nil {
  415. return build.Options{}, err
  416. }
  417. return build.Options{
  418. Inputs: build.Inputs{
  419. ContextPath: service.Build.Context,
  420. DockerfileInline: service.Build.DockerfileInline,
  421. DockerfilePath: dockerFilePath(service.Build.Context, service.Build.Dockerfile),
  422. NamedContexts: toBuildContexts(service, project),
  423. },
  424. CacheFrom: pb.CreateCaches(cacheFrom.ToPB()),
  425. CacheTo: pb.CreateCaches(cacheTo.ToPB()),
  426. NoCache: service.Build.NoCache,
  427. Pull: service.Build.Pull,
  428. BuildArgs: flatten(resolveAndMergeBuildArgs(s.dockerCli, project, service, options)),
  429. Tags: tags,
  430. Target: service.Build.Target,
  431. Exports: exports,
  432. Platforms: plats,
  433. Labels: imageLabels,
  434. NetworkMode: service.Build.Network,
  435. ExtraHosts: service.Build.ExtraHosts.AsList(":"),
  436. Ulimits: toUlimitOpt(service.Build.Ulimits),
  437. Session: sessionConfig,
  438. Allow: allow,
  439. SourcePolicy: sp,
  440. }, nil
  441. }
  442. func toUlimitOpt(ulimits map[string]*types.UlimitsConfig) *cliopts.UlimitOpt {
  443. ref := map[string]*container.Ulimit{}
  444. for _, limit := range toUlimits(ulimits) {
  445. ref[limit.Name] = &container.Ulimit{
  446. Name: limit.Name,
  447. Hard: limit.Hard,
  448. Soft: limit.Soft,
  449. }
  450. }
  451. return cliopts.NewUlimitOpt(&ref)
  452. }
  453. func flatten(in types.MappingWithEquals) types.Mapping {
  454. out := types.Mapping{}
  455. if len(in) == 0 {
  456. return out
  457. }
  458. for k, v := range in {
  459. if v == nil {
  460. continue
  461. }
  462. out[k] = *v
  463. }
  464. return out
  465. }
  466. func sshAgentProvider(sshKeys types.SSHConfig) (session.Attachable, error) {
  467. sshConfig := make([]sshprovider.AgentConfig, 0, len(sshKeys))
  468. for _, sshKey := range sshKeys {
  469. sshConfig = append(sshConfig, sshprovider.AgentConfig{
  470. ID: sshKey.ID,
  471. Paths: []string{sshKey.Path},
  472. })
  473. }
  474. return sshprovider.NewSSHAgentProvider(sshConfig)
  475. }
  476. func addSecretsConfig(project *types.Project, service types.ServiceConfig) (session.Attachable, error) {
  477. var sources []secretsprovider.Source
  478. for _, secret := range service.Build.Secrets {
  479. config := project.Secrets[secret.Source]
  480. id := secret.Source
  481. if secret.Target != "" {
  482. id = secret.Target
  483. }
  484. switch {
  485. case config.File != "":
  486. sources = append(sources, secretsprovider.Source{
  487. ID: id,
  488. FilePath: config.File,
  489. })
  490. case config.Environment != "":
  491. sources = append(sources, secretsprovider.Source{
  492. ID: id,
  493. Env: config.Environment,
  494. })
  495. default:
  496. return nil, fmt.Errorf("build.secrets only supports environment or file-based secrets: %q", secret.Source)
  497. }
  498. if secret.UID != "" || secret.GID != "" || secret.Mode != nil {
  499. logrus.Warn("secrets `uid`, `gid` and `mode` are not supported by BuildKit, they will be ignored")
  500. }
  501. }
  502. store, err := secretsprovider.NewStore(sources)
  503. if err != nil {
  504. return nil, err
  505. }
  506. return secretsprovider.NewSecretProvider(store), nil
  507. }
  508. func getImageBuildLabels(project *types.Project, service types.ServiceConfig) types.Labels {
  509. ret := make(types.Labels)
  510. if service.Build != nil {
  511. for k, v := range service.Build.Labels {
  512. ret.Add(k, v)
  513. }
  514. }
  515. ret.Add(api.VersionLabel, api.ComposeVersion)
  516. ret.Add(api.ProjectLabel, project.Name)
  517. ret.Add(api.ServiceLabel, service.Name)
  518. return ret
  519. }
  520. func toBuildContexts(service types.ServiceConfig, project *types.Project) map[string]build.NamedContext {
  521. namedContexts := map[string]build.NamedContext{}
  522. for name, contextPath := range service.Build.AdditionalContexts {
  523. if strings.HasPrefix(contextPath, types.ServicePrefix) {
  524. // image we depend on has been built previously, as we run in dependency order.
  525. // so we convert the service reference into an image reference
  526. target := contextPath[len(types.ServicePrefix):]
  527. image := api.GetImageNameOrDefault(project.Services[target], project.Name)
  528. contextPath = "docker-image://" + image
  529. }
  530. namedContexts[name] = build.NamedContext{Path: contextPath}
  531. }
  532. return namedContexts
  533. }
  534. func parsePlatforms(service types.ServiceConfig) ([]specs.Platform, error) {
  535. if service.Build == nil || len(service.Build.Platforms) == 0 {
  536. return nil, nil
  537. }
  538. var errs []error
  539. ret := make([]specs.Platform, len(service.Build.Platforms))
  540. for i := range service.Build.Platforms {
  541. p, err := platforms.Parse(service.Build.Platforms[i])
  542. if err != nil {
  543. errs = append(errs, err)
  544. } else {
  545. ret[i] = p
  546. }
  547. }
  548. if err := errors.Join(errs...); err != nil {
  549. return nil, err
  550. }
  551. return ret, nil
  552. }