build.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "os"
  19. "strings"
  20. "sync"
  21. "time"
  22. "github.com/compose-spec/compose-go/v2/types"
  23. "github.com/containerd/platforms"
  24. "github.com/docker/buildx/build"
  25. "github.com/docker/buildx/builder"
  26. "github.com/docker/buildx/controller/pb"
  27. "github.com/docker/buildx/store/storeutil"
  28. "github.com/docker/buildx/util/buildflags"
  29. xprogress "github.com/docker/buildx/util/progress"
  30. "github.com/docker/cli/cli/command"
  31. "github.com/docker/cli/cli/hints"
  32. cliopts "github.com/docker/cli/opts"
  33. "github.com/docker/compose/v2/internal/tracing"
  34. "github.com/docker/compose/v2/pkg/api"
  35. "github.com/docker/compose/v2/pkg/progress"
  36. "github.com/docker/compose/v2/pkg/utils"
  37. "github.com/docker/docker/api/types/container"
  38. bclient "github.com/moby/buildkit/client"
  39. "github.com/moby/buildkit/session"
  40. "github.com/moby/buildkit/session/auth/authprovider"
  41. "github.com/moby/buildkit/session/secrets/secretsprovider"
  42. "github.com/moby/buildkit/session/sshforward/sshprovider"
  43. "github.com/moby/buildkit/util/entitlements"
  44. "github.com/moby/buildkit/util/progress/progressui"
  45. specs "github.com/opencontainers/image-spec/specs-go/v1"
  46. "github.com/sirupsen/logrus"
  47. "go.opentelemetry.io/otel/attribute"
  48. "go.opentelemetry.io/otel/trace"
  49. // required to get default driver registered
  50. _ "github.com/docker/buildx/driver/docker"
  51. )
  52. func (s *composeService) Build(ctx context.Context, project *types.Project, options api.BuildOptions) error {
  53. err := options.Apply(project)
  54. if err != nil {
  55. return err
  56. }
  57. return progress.RunWithTitle(ctx, func(ctx context.Context) error {
  58. return tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  59. func(ctx context.Context) error {
  60. _, err := s.build(ctx, project, options, nil)
  61. return err
  62. })(ctx)
  63. }, s.stdinfo(), "Building")
  64. }
  65. const bakeSuggest = "Compose can now delegate builds to bake for better performance.\n To do so, set COMPOSE_BAKE=true."
  66. var suggest sync.Once
  67. //nolint:gocyclo
  68. func (s *composeService) build(ctx context.Context, project *types.Project, options api.BuildOptions, localImages map[string]api.ImageSummary) (map[string]string, error) {
  69. imageIDs := map[string]string{}
  70. serviceToBuild := types.Services{}
  71. var policy types.DependencyOption = types.IgnoreDependencies
  72. if options.Deps {
  73. policy = types.IncludeDependencies
  74. }
  75. var err error
  76. if len(options.Services) > 0 {
  77. // As user requested some services to be built, also include those used as additional_contexts
  78. options.Services = addBuildDependencies(options.Services, project)
  79. // Some build dependencies we just introduced may not be enabled
  80. project, err = project.WithServicesEnabled(options.Services...)
  81. if err != nil {
  82. return nil, err
  83. }
  84. }
  85. project, err = project.WithSelectedServices(options.Services)
  86. if err != nil {
  87. return nil, err
  88. }
  89. err = project.ForEachService(options.Services, func(serviceName string, service *types.ServiceConfig) error {
  90. if service.Build == nil {
  91. return nil
  92. }
  93. image := api.GetImageNameOrDefault(*service, project.Name)
  94. _, localImagePresent := localImages[image]
  95. if localImagePresent && service.PullPolicy != types.PullPolicyBuild {
  96. return nil
  97. }
  98. serviceToBuild[serviceName] = *service
  99. return nil
  100. }, policy)
  101. if err != nil || len(serviceToBuild) == 0 {
  102. return imageIDs, err
  103. }
  104. bake, err := buildWithBake(s.dockerCli)
  105. if err != nil {
  106. return nil, err
  107. }
  108. if bake || options.Print {
  109. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "bake"))
  110. return s.doBuildBake(ctx, project, serviceToBuild, options)
  111. }
  112. // Not using bake, additional_context: service:xx is implemented by building images in dependency order
  113. project, err = project.WithServicesTransform(func(serviceName string, service types.ServiceConfig) (types.ServiceConfig, error) {
  114. if service.Build != nil {
  115. for _, c := range service.Build.AdditionalContexts {
  116. if t, found := strings.CutPrefix(c, types.ServicePrefix); found {
  117. if service.DependsOn == nil {
  118. service.DependsOn = map[string]types.ServiceDependency{}
  119. }
  120. service.DependsOn[t] = types.ServiceDependency{
  121. Condition: "build", // non-canonical, but will force dependency graph ordering
  122. }
  123. }
  124. }
  125. }
  126. return service, nil
  127. })
  128. if err != nil {
  129. return imageIDs, err
  130. }
  131. // Initialize buildkit nodes
  132. buildkitEnabled, err := s.dockerCli.BuildKitEnabled()
  133. if err != nil {
  134. return nil, err
  135. }
  136. var (
  137. b *builder.Builder
  138. nodes []builder.Node
  139. w *xprogress.Printer
  140. )
  141. if buildkitEnabled {
  142. if hints.Enabled() && progress.Mode != progress.ModeQuiet && progress.Mode != progress.ModeJSON {
  143. suggest.Do(func() {
  144. fmt.Fprintln(s.dockerCli.Out(), bakeSuggest) //nolint:errcheck
  145. })
  146. }
  147. builderName := options.Builder
  148. if builderName == "" {
  149. builderName = os.Getenv("BUILDX_BUILDER")
  150. }
  151. b, err = builder.New(s.dockerCli, builder.WithName(builderName))
  152. if err != nil {
  153. return nil, err
  154. }
  155. nodes, err = b.LoadNodes(ctx)
  156. if err != nil {
  157. return nil, err
  158. }
  159. // Progress needs its own context that lives longer than the
  160. // build one otherwise it won't read all the messages from
  161. // build and will lock
  162. progressCtx, cancel := context.WithCancel(context.Background())
  163. defer cancel()
  164. if options.Quiet {
  165. options.Progress = progress.ModeQuiet
  166. }
  167. if options.Progress == "" {
  168. options.Progress = os.Getenv("BUILDKIT_PROGRESS")
  169. }
  170. w, err = xprogress.NewPrinter(progressCtx, os.Stdout, progressui.DisplayMode(options.Progress),
  171. xprogress.WithDesc(
  172. fmt.Sprintf("building with %q instance using %s driver", b.Name, b.Driver),
  173. fmt.Sprintf("%s:%s", b.Driver, b.Name),
  174. ))
  175. if err != nil {
  176. return nil, err
  177. }
  178. }
  179. // we use a pre-allocated []string to collect build digest by service index while running concurrent goroutines
  180. builtDigests := make([]string, len(project.Services))
  181. names := project.ServiceNames()
  182. getServiceIndex := func(name string) int {
  183. for idx, n := range names {
  184. if n == name {
  185. return idx
  186. }
  187. }
  188. return -1
  189. }
  190. cw := progress.ContextWriter(ctx)
  191. err = InDependencyOrder(ctx, project, func(ctx context.Context, name string) error {
  192. service, ok := serviceToBuild[name]
  193. if !ok {
  194. return nil
  195. }
  196. serviceName := fmt.Sprintf("Service %s", name)
  197. if !buildkitEnabled {
  198. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "classic"))
  199. cw.Event(progress.BuildingEvent(serviceName))
  200. id, err := s.doBuildClassic(ctx, project, service, options)
  201. if err != nil {
  202. return err
  203. }
  204. cw.Event(progress.BuiltEvent(serviceName))
  205. builtDigests[getServiceIndex(name)] = id
  206. if options.Push {
  207. return s.push(ctx, project, api.PushOptions{})
  208. }
  209. return nil
  210. }
  211. if options.Memory != 0 {
  212. _, _ = fmt.Fprintln(s.stderr(), "WARNING: --memory is not supported by BuildKit and will be ignored")
  213. }
  214. buildOptions, err := s.toBuildOptions(project, service, options)
  215. if err != nil {
  216. return err
  217. }
  218. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "buildkit"))
  219. digest, err := s.doBuildBuildkit(ctx, name, buildOptions, w, nodes)
  220. if err != nil {
  221. return err
  222. }
  223. builtDigests[getServiceIndex(name)] = digest
  224. return nil
  225. }, func(traversal *graphTraversal) {
  226. traversal.maxConcurrency = s.maxConcurrency
  227. })
  228. // enforce all build event get consumed
  229. if buildkitEnabled {
  230. if errw := w.Wait(); errw != nil {
  231. return nil, errw
  232. }
  233. }
  234. if err != nil {
  235. return nil, err
  236. }
  237. for i, imageDigest := range builtDigests {
  238. if imageDigest != "" {
  239. service := project.Services[names[i]]
  240. imageRef := api.GetImageNameOrDefault(service, project.Name)
  241. imageIDs[imageRef] = imageDigest
  242. cw.Event(progress.BuiltEvent(names[i]))
  243. }
  244. }
  245. return imageIDs, err
  246. }
  247. func (s *composeService) ensureImagesExists(ctx context.Context, project *types.Project, buildOpts *api.BuildOptions, quietPull bool) error {
  248. for name, service := range project.Services {
  249. if service.Provider == nil && service.Image == "" && service.Build == nil {
  250. return fmt.Errorf("invalid service %q. Must specify either image or build", name)
  251. }
  252. }
  253. images, err := s.getLocalImagesDigests(ctx, project)
  254. if err != nil {
  255. return err
  256. }
  257. err = tracing.SpanWrapFunc("project/pull", tracing.ProjectOptions(ctx, project),
  258. func(ctx context.Context) error {
  259. return s.pullRequiredImages(ctx, project, images, quietPull)
  260. },
  261. )(ctx)
  262. if err != nil {
  263. return err
  264. }
  265. if buildOpts != nil {
  266. err = tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  267. func(ctx context.Context) error {
  268. builtImages, err := s.build(ctx, project, *buildOpts, images)
  269. if err != nil {
  270. return err
  271. }
  272. for name, digest := range builtImages {
  273. images[name] = api.ImageSummary{
  274. Repository: name,
  275. ID: digest,
  276. LastTagTime: time.Now(),
  277. }
  278. }
  279. return nil
  280. },
  281. )(ctx)
  282. if err != nil {
  283. return err
  284. }
  285. }
  286. // set digest as com.docker.compose.image label so we can detect outdated containers
  287. for name, service := range project.Services {
  288. image := api.GetImageNameOrDefault(service, project.Name)
  289. img, ok := images[image]
  290. if ok {
  291. service.CustomLabels.Add(api.ImageDigestLabel, img.ID)
  292. }
  293. project.Services[name] = service
  294. }
  295. return nil
  296. }
  297. func (s *composeService) getLocalImagesDigests(ctx context.Context, project *types.Project) (map[string]api.ImageSummary, error) {
  298. imageNames := utils.Set[string]{}
  299. for _, s := range project.Services {
  300. imageNames.Add(api.GetImageNameOrDefault(s, project.Name))
  301. for _, volume := range s.Volumes {
  302. if volume.Type == types.VolumeTypeImage {
  303. imageNames.Add(volume.Source)
  304. }
  305. }
  306. }
  307. imgs, err := s.getImageSummaries(ctx, imageNames.Elements())
  308. if err != nil {
  309. return nil, err
  310. }
  311. for i, service := range project.Services {
  312. imgName := api.GetImageNameOrDefault(service, project.Name)
  313. img, ok := imgs[imgName]
  314. if !ok {
  315. continue
  316. }
  317. if service.Platform != "" {
  318. platform, err := platforms.Parse(service.Platform)
  319. if err != nil {
  320. return nil, err
  321. }
  322. inspect, err := s.apiClient().ImageInspect(ctx, img.ID)
  323. if err != nil {
  324. return nil, err
  325. }
  326. actual := specs.Platform{
  327. Architecture: inspect.Architecture,
  328. OS: inspect.Os,
  329. Variant: inspect.Variant,
  330. }
  331. if !platforms.NewMatcher(platform).Match(actual) {
  332. logrus.Debugf("local image %s doesn't match expected platform %s", service.Image, service.Platform)
  333. // there is a local image, but it's for the wrong platform, so
  334. // pretend it doesn't exist so that we can pull/build an image
  335. // for the correct platform instead
  336. delete(imgs, imgName)
  337. }
  338. }
  339. project.Services[i].CustomLabels.Add(api.ImageDigestLabel, img.ID)
  340. }
  341. return imgs, nil
  342. }
  343. // resolveAndMergeBuildArgs returns the final set of build arguments to use for the service image build.
  344. //
  345. // First, args directly defined via `build.args` in YAML are considered.
  346. // Then, any explicitly passed args in opts (e.g. via `--build-arg` on the CLI) are merged, overwriting any
  347. // keys that already exist.
  348. // Next, any keys without a value are resolved using the project environment.
  349. //
  350. // Finally, standard proxy variables based on the Docker client configuration are added, but will not overwrite
  351. // any values if already present.
  352. func resolveAndMergeBuildArgs(dockerCli command.Cli, project *types.Project, service types.ServiceConfig, opts api.BuildOptions) types.MappingWithEquals {
  353. result := make(types.MappingWithEquals).
  354. OverrideBy(service.Build.Args).
  355. OverrideBy(opts.Args).
  356. Resolve(envResolver(project.Environment))
  357. // proxy arguments do NOT override and should NOT have env resolution applied,
  358. // so they're handled last
  359. for k, v := range storeutil.GetProxyConfig(dockerCli) {
  360. if _, ok := result[k]; !ok {
  361. v := v
  362. result[k] = &v
  363. }
  364. }
  365. return result
  366. }
  367. func (s *composeService) toBuildOptions(project *types.Project, service types.ServiceConfig, options api.BuildOptions) (build.Options, error) {
  368. plats, err := parsePlatforms(service)
  369. if err != nil {
  370. return build.Options{}, err
  371. }
  372. cacheFrom, err := buildflags.ParseCacheEntry(service.Build.CacheFrom)
  373. if err != nil {
  374. return build.Options{}, err
  375. }
  376. cacheTo, err := buildflags.ParseCacheEntry(service.Build.CacheTo)
  377. if err != nil {
  378. return build.Options{}, err
  379. }
  380. sessionConfig := []session.Attachable{
  381. authprovider.NewDockerAuthProvider(authprovider.DockerAuthProviderConfig{
  382. ConfigFile: s.configFile(),
  383. }),
  384. }
  385. if len(options.SSHs) > 0 || len(service.Build.SSH) > 0 {
  386. sshAgentProvider, err := sshAgentProvider(append(service.Build.SSH, options.SSHs...))
  387. if err != nil {
  388. return build.Options{}, err
  389. }
  390. sessionConfig = append(sessionConfig, sshAgentProvider)
  391. }
  392. if len(service.Build.Secrets) > 0 {
  393. secretsProvider, err := addSecretsConfig(project, service)
  394. if err != nil {
  395. return build.Options{}, err
  396. }
  397. sessionConfig = append(sessionConfig, secretsProvider)
  398. }
  399. tags := []string{api.GetImageNameOrDefault(service, project.Name)}
  400. if len(service.Build.Tags) > 0 {
  401. tags = append(tags, service.Build.Tags...)
  402. }
  403. allow, err := buildflags.ParseEntitlements(service.Build.Entitlements)
  404. if err != nil {
  405. return build.Options{}, err
  406. }
  407. if service.Build.Privileged {
  408. allow = append(allow, entitlements.EntitlementSecurityInsecure.String())
  409. }
  410. imageLabels := getImageBuildLabels(project, service)
  411. push := options.Push && service.Image != ""
  412. exports := []bclient.ExportEntry{{
  413. Type: "docker",
  414. Attrs: map[string]string{
  415. "load": "true",
  416. "push": fmt.Sprint(push),
  417. },
  418. }}
  419. if len(service.Build.Platforms) > 1 {
  420. exports = []bclient.ExportEntry{{
  421. Type: "image",
  422. Attrs: map[string]string{
  423. "push": fmt.Sprint(push),
  424. },
  425. }}
  426. }
  427. sp, err := build.ReadSourcePolicy()
  428. if err != nil {
  429. return build.Options{}, err
  430. }
  431. attests := map[string]*string{}
  432. if !options.Provenance {
  433. attests["provenance"] = nil
  434. }
  435. return build.Options{
  436. Inputs: build.Inputs{
  437. ContextPath: service.Build.Context,
  438. DockerfileInline: service.Build.DockerfileInline,
  439. DockerfilePath: dockerFilePath(service.Build.Context, service.Build.Dockerfile),
  440. NamedContexts: toBuildContexts(service, project),
  441. },
  442. CacheFrom: pb.CreateCaches(cacheFrom.ToPB()),
  443. CacheTo: pb.CreateCaches(cacheTo.ToPB()),
  444. NoCache: service.Build.NoCache,
  445. Pull: service.Build.Pull,
  446. BuildArgs: flatten(resolveAndMergeBuildArgs(s.dockerCli, project, service, options)),
  447. Tags: tags,
  448. Target: service.Build.Target,
  449. Exports: exports,
  450. Platforms: plats,
  451. Labels: imageLabels,
  452. NetworkMode: service.Build.Network,
  453. ExtraHosts: service.Build.ExtraHosts.AsList(":"),
  454. Ulimits: toUlimitOpt(service.Build.Ulimits),
  455. Session: sessionConfig,
  456. Allow: allow,
  457. SourcePolicy: sp,
  458. Attests: attests,
  459. }, nil
  460. }
  461. func toUlimitOpt(ulimits map[string]*types.UlimitsConfig) *cliopts.UlimitOpt {
  462. ref := map[string]*container.Ulimit{}
  463. for _, limit := range toUlimits(ulimits) {
  464. ref[limit.Name] = &container.Ulimit{
  465. Name: limit.Name,
  466. Hard: limit.Hard,
  467. Soft: limit.Soft,
  468. }
  469. }
  470. return cliopts.NewUlimitOpt(&ref)
  471. }
  472. func flatten(in types.MappingWithEquals) types.Mapping {
  473. out := types.Mapping{}
  474. if len(in) == 0 {
  475. return out
  476. }
  477. for k, v := range in {
  478. if v == nil {
  479. continue
  480. }
  481. out[k] = *v
  482. }
  483. return out
  484. }
  485. func sshAgentProvider(sshKeys types.SSHConfig) (session.Attachable, error) {
  486. sshConfig := make([]sshprovider.AgentConfig, 0, len(sshKeys))
  487. for _, sshKey := range sshKeys {
  488. sshConfig = append(sshConfig, sshprovider.AgentConfig{
  489. ID: sshKey.ID,
  490. Paths: []string{sshKey.Path},
  491. })
  492. }
  493. return sshprovider.NewSSHAgentProvider(sshConfig)
  494. }
  495. func addSecretsConfig(project *types.Project, service types.ServiceConfig) (session.Attachable, error) {
  496. var sources []secretsprovider.Source
  497. for _, secret := range service.Build.Secrets {
  498. config := project.Secrets[secret.Source]
  499. id := secret.Source
  500. if secret.Target != "" {
  501. id = secret.Target
  502. }
  503. switch {
  504. case config.File != "":
  505. sources = append(sources, secretsprovider.Source{
  506. ID: id,
  507. FilePath: config.File,
  508. })
  509. case config.Environment != "":
  510. sources = append(sources, secretsprovider.Source{
  511. ID: id,
  512. Env: config.Environment,
  513. })
  514. default:
  515. return nil, fmt.Errorf("build.secrets only supports environment or file-based secrets: %q", secret.Source)
  516. }
  517. if secret.UID != "" || secret.GID != "" || secret.Mode != nil {
  518. logrus.Warn("secrets `uid`, `gid` and `mode` are not supported by BuildKit, they will be ignored")
  519. }
  520. }
  521. store, err := secretsprovider.NewStore(sources)
  522. if err != nil {
  523. return nil, err
  524. }
  525. return secretsprovider.NewSecretProvider(store), nil
  526. }
  527. func getImageBuildLabels(project *types.Project, service types.ServiceConfig) types.Labels {
  528. ret := make(types.Labels)
  529. if service.Build != nil {
  530. for k, v := range service.Build.Labels {
  531. ret.Add(k, v)
  532. }
  533. }
  534. ret.Add(api.VersionLabel, api.ComposeVersion)
  535. ret.Add(api.ProjectLabel, project.Name)
  536. ret.Add(api.ServiceLabel, service.Name)
  537. return ret
  538. }
  539. func toBuildContexts(service types.ServiceConfig, project *types.Project) map[string]build.NamedContext {
  540. namedContexts := map[string]build.NamedContext{}
  541. for name, contextPath := range service.Build.AdditionalContexts {
  542. if strings.HasPrefix(contextPath, types.ServicePrefix) {
  543. // image we depend on has been built previously, as we run in dependency order.
  544. // so we convert the service reference into an image reference
  545. target := contextPath[len(types.ServicePrefix):]
  546. image := api.GetImageNameOrDefault(project.Services[target], project.Name)
  547. contextPath = "docker-image://" + image
  548. }
  549. namedContexts[name] = build.NamedContext{Path: contextPath}
  550. }
  551. return namedContexts
  552. }
  553. func parsePlatforms(service types.ServiceConfig) ([]specs.Platform, error) {
  554. if service.Build == nil || len(service.Build.Platforms) == 0 {
  555. return nil, nil
  556. }
  557. var errs []error
  558. ret := make([]specs.Platform, len(service.Build.Platforms))
  559. for i := range service.Build.Platforms {
  560. p, err := platforms.Parse(service.Build.Platforms[i])
  561. if err != nil {
  562. errs = append(errs, err)
  563. } else {
  564. ret[i] = p
  565. }
  566. }
  567. if err := errors.Join(errs...); err != nil {
  568. return nil, err
  569. }
  570. return ret, nil
  571. }
  572. func addBuildDependencies(services []string, project *types.Project) []string {
  573. servicesWithDependencies := utils.NewSet(services...)
  574. for _, service := range services {
  575. b := project.Services[service].Build
  576. if b != nil {
  577. for _, target := range b.AdditionalContexts {
  578. if s, found := strings.CutPrefix(target, types.ServicePrefix); found {
  579. servicesWithDependencies.Add(s)
  580. }
  581. }
  582. }
  583. }
  584. if len(servicesWithDependencies) > len(services) {
  585. return addBuildDependencies(servicesWithDependencies.Elements(), project)
  586. }
  587. return servicesWithDependencies.Elements()
  588. }