build.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "os"
  19. "path/filepath"
  20. "sync"
  21. "github.com/moby/buildkit/util/progress/progressui"
  22. "github.com/compose-spec/compose-go/v2/types"
  23. "github.com/containerd/containerd/platforms"
  24. "github.com/docker/buildx/build"
  25. "github.com/docker/buildx/builder"
  26. "github.com/docker/buildx/controller/pb"
  27. "github.com/docker/buildx/store/storeutil"
  28. "github.com/docker/buildx/util/buildflags"
  29. xprogress "github.com/docker/buildx/util/progress"
  30. "github.com/docker/cli/cli/command"
  31. cliopts "github.com/docker/cli/opts"
  32. "github.com/docker/compose/v2/internal/tracing"
  33. "github.com/docker/compose/v2/pkg/api"
  34. "github.com/docker/compose/v2/pkg/progress"
  35. "github.com/docker/compose/v2/pkg/utils"
  36. "github.com/docker/docker/builder/remotecontext/urlutil"
  37. "github.com/docker/go-units"
  38. bclient "github.com/moby/buildkit/client"
  39. "github.com/moby/buildkit/session"
  40. "github.com/moby/buildkit/session/auth/authprovider"
  41. "github.com/moby/buildkit/session/secrets/secretsprovider"
  42. "github.com/moby/buildkit/session/sshforward/sshprovider"
  43. "github.com/moby/buildkit/util/entitlements"
  44. specs "github.com/opencontainers/image-spec/specs-go/v1"
  45. "github.com/sirupsen/logrus"
  46. // required to get default driver registered
  47. _ "github.com/docker/buildx/driver/docker"
  48. )
  49. func (s *composeService) Build(ctx context.Context, project *types.Project, options api.BuildOptions) error {
  50. err := options.Apply(project)
  51. if err != nil {
  52. return err
  53. }
  54. return progress.RunWithTitle(ctx, func(ctx context.Context) error {
  55. _, err := s.build(ctx, project, options, nil)
  56. return err
  57. }, s.stdinfo(), "Building")
  58. }
  59. type serviceToBuild struct {
  60. name string
  61. service types.ServiceConfig
  62. }
  63. //nolint:gocyclo
  64. func (s *composeService) build(ctx context.Context, project *types.Project, options api.BuildOptions, localImages map[string]string) (map[string]string, error) {
  65. buildkitEnabled, err := s.dockerCli.BuildKitEnabled()
  66. if err != nil {
  67. return nil, err
  68. }
  69. imageIDs := map[string]string{}
  70. serviceToBeBuild := map[string]serviceToBuild{}
  71. mapServiceMutx := sync.Mutex{}
  72. err = InDependencyOrder(ctx, project, func(ctx context.Context, name string) error {
  73. if len(options.Services) > 0 && !utils.Contains(options.Services, name) {
  74. return nil
  75. }
  76. service := project.Services[name]
  77. if service.Build == nil {
  78. return nil
  79. }
  80. image := api.GetImageNameOrDefault(service, project.Name)
  81. _, localImagePresent := localImages[image]
  82. if localImagePresent && service.PullPolicy != types.PullPolicyBuild {
  83. return nil
  84. }
  85. mapServiceMutx.Lock()
  86. serviceToBeBuild[name] = serviceToBuild{name: name, service: service}
  87. mapServiceMutx.Unlock()
  88. return nil
  89. }, func(traversal *graphTraversal) {
  90. traversal.maxConcurrency = s.maxConcurrency
  91. })
  92. if err != nil || len(serviceToBeBuild) == 0 {
  93. return imageIDs, err
  94. }
  95. // Initialize buildkit nodes
  96. var (
  97. b *builder.Builder
  98. nodes []builder.Node
  99. w *xprogress.Printer
  100. )
  101. if buildkitEnabled {
  102. builderName := options.Builder
  103. if builderName == "" {
  104. builderName = os.Getenv("BUILDX_BUILDER")
  105. }
  106. b, err = builder.New(s.dockerCli, builder.WithName(builderName))
  107. if err != nil {
  108. return nil, err
  109. }
  110. nodes, err = b.LoadNodes(ctx)
  111. if err != nil {
  112. return nil, err
  113. }
  114. // Progress needs its own context that lives longer than the
  115. // build one otherwise it won't read all the messages from
  116. // build and will lock
  117. progressCtx, cancel := context.WithCancel(context.Background())
  118. defer cancel()
  119. w, err = xprogress.NewPrinter(progressCtx, os.Stdout, progressui.DisplayMode(options.Progress),
  120. xprogress.WithDesc(
  121. fmt.Sprintf("building with %q instance using %s driver", b.Name, b.Driver),
  122. fmt.Sprintf("%s:%s", b.Driver, b.Name),
  123. ))
  124. if err != nil {
  125. return nil, err
  126. }
  127. }
  128. // we use a pre-allocated []string to collect build digest by service index while running concurrent goroutines
  129. builtDigests := make([]string, len(project.Services))
  130. names := project.ServiceNames()
  131. getServiceIndex := func(name string) int {
  132. for idx, n := range names {
  133. if n == name {
  134. return idx
  135. }
  136. }
  137. return -1
  138. }
  139. err = InDependencyOrder(ctx, project, func(ctx context.Context, name string) error {
  140. if len(options.Services) > 0 && !utils.Contains(options.Services, name) {
  141. return nil
  142. }
  143. serviceToBuild, ok := serviceToBeBuild[name]
  144. if !ok {
  145. return nil
  146. }
  147. service := serviceToBuild.service
  148. if !buildkitEnabled {
  149. id, err := s.doBuildClassic(ctx, project, service, options)
  150. if err != nil {
  151. return err
  152. }
  153. builtDigests[getServiceIndex(name)] = id
  154. if options.Push {
  155. return s.push(ctx, project, api.PushOptions{})
  156. }
  157. return nil
  158. }
  159. if options.Memory != 0 {
  160. fmt.Fprintln(s.stderr(), "WARNING: --memory is not supported by BuildKit and will be ignored.")
  161. }
  162. buildOptions, err := s.toBuildOptions(project, service, options)
  163. if err != nil {
  164. return err
  165. }
  166. digest, err := s.doBuildBuildkit(ctx, service.Name, buildOptions, w, nodes)
  167. if err != nil {
  168. return err
  169. }
  170. builtDigests[getServiceIndex(name)] = digest
  171. return nil
  172. }, func(traversal *graphTraversal) {
  173. traversal.maxConcurrency = s.maxConcurrency
  174. })
  175. // enforce all build event get consumed
  176. if buildkitEnabled {
  177. if errw := w.Wait(); errw != nil {
  178. return nil, errw
  179. }
  180. }
  181. if err != nil {
  182. return nil, err
  183. }
  184. for i, imageDigest := range builtDigests {
  185. if imageDigest != "" {
  186. imageRef := api.GetImageNameOrDefault(project.Services[names[i]], project.Name)
  187. imageIDs[imageRef] = imageDigest
  188. }
  189. }
  190. return imageIDs, err
  191. }
  192. func (s *composeService) ensureImagesExists(ctx context.Context, project *types.Project, buildOpts *api.BuildOptions, quietPull bool) error {
  193. for _, service := range project.Services {
  194. if service.Image == "" && service.Build == nil {
  195. return fmt.Errorf("invalid service %q. Must specify either image or build", service.Name)
  196. }
  197. }
  198. images, err := s.getLocalImagesDigests(ctx, project)
  199. if err != nil {
  200. return err
  201. }
  202. err = tracing.SpanWrapFunc("project/pull", tracing.ProjectOptions(project),
  203. func(ctx context.Context) error {
  204. return s.pullRequiredImages(ctx, project, images, quietPull)
  205. },
  206. )(ctx)
  207. if err != nil {
  208. return err
  209. }
  210. if buildOpts != nil {
  211. err = tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(project),
  212. func(ctx context.Context) error {
  213. builtImages, err := s.build(ctx, project, *buildOpts, images)
  214. if err != nil {
  215. return err
  216. }
  217. for name, digest := range builtImages {
  218. images[name] = digest
  219. }
  220. return nil
  221. },
  222. )(ctx)
  223. if err != nil {
  224. return err
  225. }
  226. }
  227. // set digest as com.docker.compose.image label so we can detect outdated containers
  228. for _, service := range project.Services {
  229. image := api.GetImageNameOrDefault(service, project.Name)
  230. digest, ok := images[image]
  231. if ok {
  232. if service.Labels == nil {
  233. service.Labels = types.Labels{}
  234. }
  235. service.CustomLabels.Add(api.ImageDigestLabel, digest)
  236. }
  237. }
  238. return nil
  239. }
  240. func (s *composeService) getLocalImagesDigests(ctx context.Context, project *types.Project) (map[string]string, error) {
  241. var imageNames []string
  242. for _, s := range project.Services {
  243. imgName := api.GetImageNameOrDefault(s, project.Name)
  244. if !utils.StringContains(imageNames, imgName) {
  245. imageNames = append(imageNames, imgName)
  246. }
  247. }
  248. imgs, err := s.getImages(ctx, imageNames)
  249. if err != nil {
  250. return nil, err
  251. }
  252. images := map[string]string{}
  253. for name, info := range imgs {
  254. images[name] = info.ID
  255. }
  256. for i, service := range project.Services {
  257. imgName := api.GetImageNameOrDefault(service, project.Name)
  258. digest, ok := images[imgName]
  259. if !ok {
  260. continue
  261. }
  262. if service.Platform != "" {
  263. platform, err := platforms.Parse(service.Platform)
  264. if err != nil {
  265. return nil, err
  266. }
  267. inspect, _, err := s.apiClient().ImageInspectWithRaw(ctx, digest)
  268. if err != nil {
  269. return nil, err
  270. }
  271. actual := specs.Platform{
  272. Architecture: inspect.Architecture,
  273. OS: inspect.Os,
  274. Variant: inspect.Variant,
  275. }
  276. if !platforms.NewMatcher(platform).Match(actual) {
  277. // there is a local image, but it's for the wrong platform, so
  278. // pretend it doesn't exist so that we can pull/build an image
  279. // for the correct platform instead
  280. delete(images, imgName)
  281. }
  282. }
  283. project.Services[i].CustomLabels.Add(api.ImageDigestLabel, digest)
  284. }
  285. return images, nil
  286. }
  287. // resolveAndMergeBuildArgs returns the final set of build arguments to use for the service image build.
  288. //
  289. // First, args directly defined via `build.args` in YAML are considered.
  290. // Then, any explicitly passed args in opts (e.g. via `--build-arg` on the CLI) are merged, overwriting any
  291. // keys that already exist.
  292. // Next, any keys without a value are resolved using the project environment.
  293. //
  294. // Finally, standard proxy variables based on the Docker client configuration are added, but will not overwrite
  295. // any values if already present.
  296. func resolveAndMergeBuildArgs(
  297. dockerCli command.Cli,
  298. project *types.Project,
  299. service types.ServiceConfig,
  300. opts api.BuildOptions,
  301. ) types.MappingWithEquals {
  302. result := make(types.MappingWithEquals).
  303. OverrideBy(service.Build.Args).
  304. OverrideBy(opts.Args).
  305. Resolve(envResolver(project.Environment))
  306. // proxy arguments do NOT override and should NOT have env resolution applied,
  307. // so they're handled last
  308. for k, v := range storeutil.GetProxyConfig(dockerCli) {
  309. if _, ok := result[k]; !ok {
  310. v := v
  311. result[k] = &v
  312. }
  313. }
  314. return result
  315. }
  316. func (s *composeService) toBuildOptions(project *types.Project, service types.ServiceConfig, options api.BuildOptions) (build.Options, error) {
  317. plats, err := parsePlatforms(service)
  318. if err != nil {
  319. return build.Options{}, err
  320. }
  321. cacheFrom, err := buildflags.ParseCacheEntry(service.Build.CacheFrom)
  322. if err != nil {
  323. return build.Options{}, err
  324. }
  325. cacheTo, err := buildflags.ParseCacheEntry(service.Build.CacheTo)
  326. if err != nil {
  327. return build.Options{}, err
  328. }
  329. sessionConfig := []session.Attachable{
  330. authprovider.NewDockerAuthProvider(s.configFile(), nil),
  331. }
  332. if len(options.SSHs) > 0 || len(service.Build.SSH) > 0 {
  333. sshAgentProvider, err := sshAgentProvider(append(service.Build.SSH, options.SSHs...))
  334. if err != nil {
  335. return build.Options{}, err
  336. }
  337. sessionConfig = append(sessionConfig, sshAgentProvider)
  338. }
  339. if len(service.Build.Secrets) > 0 {
  340. secretsProvider, err := addSecretsConfig(project, service)
  341. if err != nil {
  342. return build.Options{}, err
  343. }
  344. sessionConfig = append(sessionConfig, secretsProvider)
  345. }
  346. tags := []string{api.GetImageNameOrDefault(service, project.Name)}
  347. if len(service.Build.Tags) > 0 {
  348. tags = append(tags, service.Build.Tags...)
  349. }
  350. var allow []entitlements.Entitlement
  351. if service.Build.Privileged {
  352. allow = append(allow, entitlements.EntitlementSecurityInsecure)
  353. }
  354. imageLabels := getImageBuildLabels(project, service)
  355. push := options.Push && service.Image != ""
  356. exports := []bclient.ExportEntry{{
  357. Type: "docker",
  358. Attrs: map[string]string{
  359. "load": "true",
  360. "push": fmt.Sprint(push),
  361. },
  362. }}
  363. if len(service.Build.Platforms) > 1 {
  364. exports = []bclient.ExportEntry{{
  365. Type: "image",
  366. Attrs: map[string]string{
  367. "push": fmt.Sprint(push),
  368. },
  369. }}
  370. }
  371. return build.Options{
  372. Inputs: build.Inputs{
  373. ContextPath: service.Build.Context,
  374. DockerfileInline: service.Build.DockerfileInline,
  375. DockerfilePath: dockerFilePath(service.Build.Context, service.Build.Dockerfile),
  376. NamedContexts: toBuildContexts(service.Build.AdditionalContexts),
  377. },
  378. CacheFrom: pb.CreateCaches(cacheFrom),
  379. CacheTo: pb.CreateCaches(cacheTo),
  380. NoCache: service.Build.NoCache,
  381. Pull: service.Build.Pull,
  382. BuildArgs: flatten(resolveAndMergeBuildArgs(s.dockerCli, project, service, options)),
  383. Tags: tags,
  384. Target: service.Build.Target,
  385. Exports: exports,
  386. Platforms: plats,
  387. Labels: imageLabels,
  388. NetworkMode: service.Build.Network,
  389. ExtraHosts: service.Build.ExtraHosts.AsList(":"),
  390. Ulimits: toUlimitOpt(service.Build.Ulimits),
  391. Session: sessionConfig,
  392. Allow: allow,
  393. }, nil
  394. }
  395. func toUlimitOpt(ulimits map[string]*types.UlimitsConfig) *cliopts.UlimitOpt {
  396. ref := map[string]*units.Ulimit{}
  397. for _, limit := range toUlimits(ulimits) {
  398. ref[limit.Name] = &units.Ulimit{
  399. Name: limit.Name,
  400. Hard: limit.Hard,
  401. Soft: limit.Soft,
  402. }
  403. }
  404. return cliopts.NewUlimitOpt(&ref)
  405. }
  406. func flatten(in types.MappingWithEquals) types.Mapping {
  407. out := types.Mapping{}
  408. if len(in) == 0 {
  409. return out
  410. }
  411. for k, v := range in {
  412. if v == nil {
  413. continue
  414. }
  415. out[k] = *v
  416. }
  417. return out
  418. }
  419. func dockerFilePath(ctxName string, dockerfile string) string {
  420. if dockerfile == "" {
  421. return ""
  422. }
  423. if urlutil.IsGitURL(ctxName) || filepath.IsAbs(dockerfile) {
  424. return dockerfile
  425. }
  426. return filepath.Join(ctxName, dockerfile)
  427. }
  428. func sshAgentProvider(sshKeys types.SSHConfig) (session.Attachable, error) {
  429. sshConfig := make([]sshprovider.AgentConfig, 0, len(sshKeys))
  430. for _, sshKey := range sshKeys {
  431. sshConfig = append(sshConfig, sshprovider.AgentConfig{
  432. ID: sshKey.ID,
  433. Paths: []string{sshKey.Path},
  434. })
  435. }
  436. return sshprovider.NewSSHAgentProvider(sshConfig)
  437. }
  438. func addSecretsConfig(project *types.Project, service types.ServiceConfig) (session.Attachable, error) {
  439. var sources []secretsprovider.Source
  440. for _, secret := range service.Build.Secrets {
  441. config := project.Secrets[secret.Source]
  442. id := secret.Source
  443. if secret.Target != "" {
  444. id = secret.Target
  445. }
  446. switch {
  447. case config.File != "":
  448. sources = append(sources, secretsprovider.Source{
  449. ID: id,
  450. FilePath: config.File,
  451. })
  452. case config.Environment != "":
  453. sources = append(sources, secretsprovider.Source{
  454. ID: id,
  455. Env: config.Environment,
  456. })
  457. default:
  458. return nil, fmt.Errorf("build.secrets only supports environment or file-based secrets: %q", secret.Source)
  459. }
  460. if secret.UID != "" || secret.GID != "" || secret.Mode != nil {
  461. logrus.Warn("secrets `uid`, `gid` and `mode` are not supported by BuildKit, they will be ignored")
  462. }
  463. }
  464. store, err := secretsprovider.NewStore(sources)
  465. if err != nil {
  466. return nil, err
  467. }
  468. return secretsprovider.NewSecretProvider(store), nil
  469. }
  470. func getImageBuildLabels(project *types.Project, service types.ServiceConfig) types.Labels {
  471. ret := make(types.Labels)
  472. if service.Build != nil {
  473. for k, v := range service.Build.Labels {
  474. ret.Add(k, v)
  475. }
  476. }
  477. ret.Add(api.VersionLabel, api.ComposeVersion)
  478. ret.Add(api.ProjectLabel, project.Name)
  479. ret.Add(api.ServiceLabel, service.Name)
  480. return ret
  481. }
  482. func toBuildContexts(additionalContexts types.Mapping) map[string]build.NamedContext {
  483. namedContexts := map[string]build.NamedContext{}
  484. for name, context := range additionalContexts {
  485. namedContexts[name] = build.NamedContext{Path: context}
  486. }
  487. return namedContexts
  488. }
  489. func parsePlatforms(service types.ServiceConfig) ([]specs.Platform, error) {
  490. if service.Build == nil || len(service.Build.Platforms) == 0 {
  491. return nil, nil
  492. }
  493. var errs []error
  494. ret := make([]specs.Platform, len(service.Build.Platforms))
  495. for i := range service.Build.Platforms {
  496. p, err := platforms.Parse(service.Build.Platforms[i])
  497. if err != nil {
  498. errs = append(errs, err)
  499. } else {
  500. ret[i] = p
  501. }
  502. }
  503. if err := errors.Join(errs...); err != nil {
  504. return nil, err
  505. }
  506. return ret, nil
  507. }