build.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "os"
  19. "strings"
  20. "sync"
  21. "time"
  22. "github.com/compose-spec/compose-go/v2/types"
  23. "github.com/containerd/platforms"
  24. "github.com/docker/buildx/build"
  25. "github.com/docker/buildx/builder"
  26. "github.com/docker/buildx/controller/pb"
  27. "github.com/docker/buildx/store/storeutil"
  28. "github.com/docker/buildx/util/buildflags"
  29. xprogress "github.com/docker/buildx/util/progress"
  30. "github.com/docker/cli/cli/command"
  31. "github.com/docker/cli/cli/hints"
  32. cliopts "github.com/docker/cli/opts"
  33. "github.com/docker/compose/v2/internal/tracing"
  34. "github.com/docker/compose/v2/pkg/api"
  35. "github.com/docker/compose/v2/pkg/progress"
  36. "github.com/docker/compose/v2/pkg/utils"
  37. "github.com/docker/docker/api/types/container"
  38. bclient "github.com/moby/buildkit/client"
  39. "github.com/moby/buildkit/session"
  40. "github.com/moby/buildkit/session/auth/authprovider"
  41. "github.com/moby/buildkit/session/secrets/secretsprovider"
  42. "github.com/moby/buildkit/session/sshforward/sshprovider"
  43. "github.com/moby/buildkit/util/entitlements"
  44. "github.com/moby/buildkit/util/progress/progressui"
  45. specs "github.com/opencontainers/image-spec/specs-go/v1"
  46. "github.com/sirupsen/logrus"
  47. "go.opentelemetry.io/otel/attribute"
  48. "go.opentelemetry.io/otel/trace"
  49. // required to get default driver registered
  50. _ "github.com/docker/buildx/driver/docker"
  51. )
  52. func (s *composeService) Build(ctx context.Context, project *types.Project, options api.BuildOptions) error {
  53. err := options.Apply(project)
  54. if err != nil {
  55. return err
  56. }
  57. return progress.RunWithTitle(ctx, func(ctx context.Context) error {
  58. _, err := s.build(ctx, project, options, nil)
  59. return err
  60. }, s.stdinfo(), "Building")
  61. }
  62. const bakeSuggest = "Compose now can delegate build to bake for better performances\nJust set COMPOSE_BAKE=true"
  63. var suggest sync.Once
  64. //nolint:gocyclo
  65. func (s *composeService) build(ctx context.Context, project *types.Project, options api.BuildOptions, localImages map[string]api.ImageSummary) (map[string]string, error) {
  66. imageIDs := map[string]string{}
  67. serviceToBuild := types.Services{}
  68. var policy types.DependencyOption = types.IgnoreDependencies
  69. if options.Deps {
  70. policy = types.IncludeDependencies
  71. }
  72. err := project.ForEachService(options.Services, func(serviceName string, service *types.ServiceConfig) error {
  73. if service.Build == nil {
  74. return nil
  75. }
  76. image := api.GetImageNameOrDefault(*service, project.Name)
  77. _, localImagePresent := localImages[image]
  78. if localImagePresent && service.PullPolicy != types.PullPolicyBuild {
  79. return nil
  80. }
  81. serviceToBuild[serviceName] = *service
  82. return nil
  83. }, policy)
  84. if err != nil || len(serviceToBuild) == 0 {
  85. return imageIDs, err
  86. }
  87. bake, err := buildWithBake(s.dockerCli)
  88. if err != nil {
  89. return nil, err
  90. }
  91. if bake {
  92. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "bake"))
  93. return s.doBuildBake(ctx, project, serviceToBuild, options)
  94. }
  95. // Not using bake, additional_context: service:xx is implemented by building images in dependency order
  96. project, err = project.WithServicesTransform(func(serviceName string, service types.ServiceConfig) (types.ServiceConfig, error) {
  97. if service.Build != nil {
  98. for _, c := range service.Build.AdditionalContexts {
  99. if t, found := strings.CutPrefix(c, types.ServicePrefix); found {
  100. if service.DependsOn == nil {
  101. service.DependsOn = map[string]types.ServiceDependency{}
  102. }
  103. service.DependsOn[t] = types.ServiceDependency{
  104. Condition: "build", // non-canonical, but will force dependency graph ordering
  105. }
  106. }
  107. }
  108. }
  109. return service, nil
  110. })
  111. if err != nil {
  112. return imageIDs, err
  113. }
  114. // Initialize buildkit nodes
  115. buildkitEnabled, err := s.dockerCli.BuildKitEnabled()
  116. if err != nil {
  117. return nil, err
  118. }
  119. var (
  120. b *builder.Builder
  121. nodes []builder.Node
  122. w *xprogress.Printer
  123. )
  124. if buildkitEnabled {
  125. if hints.Enabled() && progress.Mode != progress.ModeQuiet && progress.Mode != progress.ModeJSON {
  126. suggest.Do(func() {
  127. fmt.Fprintln(s.dockerCli.Out(), bakeSuggest) //nolint:errcheck
  128. })
  129. }
  130. builderName := options.Builder
  131. if builderName == "" {
  132. builderName = os.Getenv("BUILDX_BUILDER")
  133. }
  134. b, err = builder.New(s.dockerCli, builder.WithName(builderName))
  135. if err != nil {
  136. return nil, err
  137. }
  138. nodes, err = b.LoadNodes(ctx)
  139. if err != nil {
  140. return nil, err
  141. }
  142. // Progress needs its own context that lives longer than the
  143. // build one otherwise it won't read all the messages from
  144. // build and will lock
  145. progressCtx, cancel := context.WithCancel(context.Background())
  146. defer cancel()
  147. if options.Quiet {
  148. options.Progress = progress.ModeQuiet
  149. }
  150. if options.Progress == "" {
  151. options.Progress = os.Getenv("BUILDKIT_PROGRESS")
  152. }
  153. w, err = xprogress.NewPrinter(progressCtx, os.Stdout, progressui.DisplayMode(options.Progress),
  154. xprogress.WithDesc(
  155. fmt.Sprintf("building with %q instance using %s driver", b.Name, b.Driver),
  156. fmt.Sprintf("%s:%s", b.Driver, b.Name),
  157. ))
  158. if err != nil {
  159. return nil, err
  160. }
  161. }
  162. // we use a pre-allocated []string to collect build digest by service index while running concurrent goroutines
  163. builtDigests := make([]string, len(project.Services))
  164. names := project.ServiceNames()
  165. getServiceIndex := func(name string) int {
  166. for idx, n := range names {
  167. if n == name {
  168. return idx
  169. }
  170. }
  171. return -1
  172. }
  173. cw := progress.ContextWriter(ctx)
  174. err = InDependencyOrder(ctx, project, func(ctx context.Context, name string) error {
  175. service, ok := serviceToBuild[name]
  176. if !ok {
  177. return nil
  178. }
  179. serviceName := fmt.Sprintf("Service %s", name)
  180. if !buildkitEnabled {
  181. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "classic"))
  182. cw.Event(progress.BuildingEvent(serviceName))
  183. id, err := s.doBuildClassic(ctx, project, service, options)
  184. if err != nil {
  185. return err
  186. }
  187. cw.Event(progress.BuiltEvent(serviceName))
  188. builtDigests[getServiceIndex(name)] = id
  189. if options.Push {
  190. return s.push(ctx, project, api.PushOptions{})
  191. }
  192. return nil
  193. }
  194. if options.Memory != 0 {
  195. _, _ = fmt.Fprintln(s.stderr(), "WARNING: --memory is not supported by BuildKit and will be ignored")
  196. }
  197. buildOptions, err := s.toBuildOptions(project, service, options)
  198. if err != nil {
  199. return err
  200. }
  201. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "buildkit"))
  202. digest, err := s.doBuildBuildkit(ctx, name, buildOptions, w, nodes)
  203. if err != nil {
  204. return err
  205. }
  206. builtDigests[getServiceIndex(name)] = digest
  207. return nil
  208. }, func(traversal *graphTraversal) {
  209. traversal.maxConcurrency = s.maxConcurrency
  210. })
  211. // enforce all build event get consumed
  212. if buildkitEnabled {
  213. if errw := w.Wait(); errw != nil {
  214. return nil, errw
  215. }
  216. }
  217. if err != nil {
  218. return nil, err
  219. }
  220. for i, imageDigest := range builtDigests {
  221. if imageDigest != "" {
  222. service := project.Services[names[i]]
  223. imageRef := api.GetImageNameOrDefault(service, project.Name)
  224. imageIDs[imageRef] = imageDigest
  225. cw.Event(progress.BuiltEvent(names[i]))
  226. }
  227. }
  228. return imageIDs, err
  229. }
  230. func (s *composeService) ensureImagesExists(ctx context.Context, project *types.Project, buildOpts *api.BuildOptions, quietPull bool) error {
  231. for name, service := range project.Services {
  232. if service.Image == "" && service.Build == nil {
  233. return fmt.Errorf("invalid service %q. Must specify either image or build", name)
  234. }
  235. }
  236. images, err := s.getLocalImagesDigests(ctx, project)
  237. if err != nil {
  238. return err
  239. }
  240. err = tracing.SpanWrapFunc("project/pull", tracing.ProjectOptions(ctx, project),
  241. func(ctx context.Context) error {
  242. return s.pullRequiredImages(ctx, project, images, quietPull)
  243. },
  244. )(ctx)
  245. if err != nil {
  246. return err
  247. }
  248. if buildOpts != nil {
  249. err = tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  250. func(ctx context.Context) error {
  251. builtImages, err := s.build(ctx, project, *buildOpts, images)
  252. if err != nil {
  253. return err
  254. }
  255. for name, digest := range builtImages {
  256. images[name] = api.ImageSummary{
  257. Repository: name,
  258. ID: digest,
  259. LastTagTime: time.Now(),
  260. }
  261. }
  262. return nil
  263. },
  264. )(ctx)
  265. if err != nil {
  266. return err
  267. }
  268. }
  269. // set digest as com.docker.compose.image label so we can detect outdated containers
  270. for name, service := range project.Services {
  271. image := api.GetImageNameOrDefault(service, project.Name)
  272. img, ok := images[image]
  273. if ok {
  274. service.CustomLabels.Add(api.ImageDigestLabel, img.ID)
  275. }
  276. project.Services[name] = service
  277. }
  278. return nil
  279. }
  280. func (s *composeService) getLocalImagesDigests(ctx context.Context, project *types.Project) (map[string]api.ImageSummary, error) {
  281. var imageNames []string
  282. for _, s := range project.Services {
  283. imgName := api.GetImageNameOrDefault(s, project.Name)
  284. if !utils.StringContains(imageNames, imgName) {
  285. imageNames = append(imageNames, imgName)
  286. }
  287. }
  288. imgs, err := s.getImageSummaries(ctx, imageNames)
  289. if err != nil {
  290. return nil, err
  291. }
  292. for i, service := range project.Services {
  293. imgName := api.GetImageNameOrDefault(service, project.Name)
  294. img, ok := imgs[imgName]
  295. if !ok {
  296. continue
  297. }
  298. if service.Platform != "" {
  299. platform, err := platforms.Parse(service.Platform)
  300. if err != nil {
  301. return nil, err
  302. }
  303. inspect, err := s.apiClient().ImageInspect(ctx, img.ID)
  304. if err != nil {
  305. return nil, err
  306. }
  307. actual := specs.Platform{
  308. Architecture: inspect.Architecture,
  309. OS: inspect.Os,
  310. Variant: inspect.Variant,
  311. }
  312. if !platforms.NewMatcher(platform).Match(actual) {
  313. // there is a local image, but it's for the wrong platform, so
  314. // pretend it doesn't exist so that we can pull/build an image
  315. // for the correct platform instead
  316. delete(imgs, imgName)
  317. }
  318. }
  319. project.Services[i].CustomLabels.Add(api.ImageDigestLabel, img.ID)
  320. }
  321. return imgs, nil
  322. }
  323. // resolveAndMergeBuildArgs returns the final set of build arguments to use for the service image build.
  324. //
  325. // First, args directly defined via `build.args` in YAML are considered.
  326. // Then, any explicitly passed args in opts (e.g. via `--build-arg` on the CLI) are merged, overwriting any
  327. // keys that already exist.
  328. // Next, any keys without a value are resolved using the project environment.
  329. //
  330. // Finally, standard proxy variables based on the Docker client configuration are added, but will not overwrite
  331. // any values if already present.
  332. func resolveAndMergeBuildArgs(dockerCli command.Cli, project *types.Project, service types.ServiceConfig, opts api.BuildOptions) types.MappingWithEquals {
  333. result := make(types.MappingWithEquals).
  334. OverrideBy(service.Build.Args).
  335. OverrideBy(opts.Args).
  336. Resolve(envResolver(project.Environment))
  337. // proxy arguments do NOT override and should NOT have env resolution applied,
  338. // so they're handled last
  339. for k, v := range storeutil.GetProxyConfig(dockerCli) {
  340. if _, ok := result[k]; !ok {
  341. v := v
  342. result[k] = &v
  343. }
  344. }
  345. return result
  346. }
  347. func (s *composeService) toBuildOptions(project *types.Project, service types.ServiceConfig, options api.BuildOptions) (build.Options, error) {
  348. plats, err := parsePlatforms(service)
  349. if err != nil {
  350. return build.Options{}, err
  351. }
  352. cacheFrom, err := buildflags.ParseCacheEntry(service.Build.CacheFrom)
  353. if err != nil {
  354. return build.Options{}, err
  355. }
  356. cacheTo, err := buildflags.ParseCacheEntry(service.Build.CacheTo)
  357. if err != nil {
  358. return build.Options{}, err
  359. }
  360. sessionConfig := []session.Attachable{
  361. authprovider.NewDockerAuthProvider(authprovider.DockerAuthProviderConfig{
  362. ConfigFile: s.configFile(),
  363. }),
  364. }
  365. if len(options.SSHs) > 0 || len(service.Build.SSH) > 0 {
  366. sshAgentProvider, err := sshAgentProvider(append(service.Build.SSH, options.SSHs...))
  367. if err != nil {
  368. return build.Options{}, err
  369. }
  370. sessionConfig = append(sessionConfig, sshAgentProvider)
  371. }
  372. if len(service.Build.Secrets) > 0 {
  373. secretsProvider, err := addSecretsConfig(project, service)
  374. if err != nil {
  375. return build.Options{}, err
  376. }
  377. sessionConfig = append(sessionConfig, secretsProvider)
  378. }
  379. tags := []string{api.GetImageNameOrDefault(service, project.Name)}
  380. if len(service.Build.Tags) > 0 {
  381. tags = append(tags, service.Build.Tags...)
  382. }
  383. allow, err := buildflags.ParseEntitlements(service.Build.Entitlements)
  384. if err != nil {
  385. return build.Options{}, err
  386. }
  387. if service.Build.Privileged {
  388. allow = append(allow, entitlements.EntitlementSecurityInsecure.String())
  389. }
  390. imageLabels := getImageBuildLabels(project, service)
  391. push := options.Push && service.Image != ""
  392. exports := []bclient.ExportEntry{{
  393. Type: "docker",
  394. Attrs: map[string]string{
  395. "load": "true",
  396. "push": fmt.Sprint(push),
  397. },
  398. }}
  399. if len(service.Build.Platforms) > 1 {
  400. exports = []bclient.ExportEntry{{
  401. Type: "image",
  402. Attrs: map[string]string{
  403. "push": fmt.Sprint(push),
  404. },
  405. }}
  406. }
  407. sp, err := build.ReadSourcePolicy()
  408. if err != nil {
  409. return build.Options{}, err
  410. }
  411. return build.Options{
  412. Inputs: build.Inputs{
  413. ContextPath: service.Build.Context,
  414. DockerfileInline: service.Build.DockerfileInline,
  415. DockerfilePath: dockerFilePath(service.Build.Context, service.Build.Dockerfile),
  416. NamedContexts: toBuildContexts(service, project),
  417. },
  418. CacheFrom: pb.CreateCaches(cacheFrom.ToPB()),
  419. CacheTo: pb.CreateCaches(cacheTo.ToPB()),
  420. NoCache: service.Build.NoCache,
  421. Pull: service.Build.Pull,
  422. BuildArgs: flatten(resolveAndMergeBuildArgs(s.dockerCli, project, service, options)),
  423. Tags: tags,
  424. Target: service.Build.Target,
  425. Exports: exports,
  426. Platforms: plats,
  427. Labels: imageLabels,
  428. NetworkMode: service.Build.Network,
  429. ExtraHosts: service.Build.ExtraHosts.AsList(":"),
  430. Ulimits: toUlimitOpt(service.Build.Ulimits),
  431. Session: sessionConfig,
  432. Allow: allow,
  433. SourcePolicy: sp,
  434. }, nil
  435. }
  436. func toUlimitOpt(ulimits map[string]*types.UlimitsConfig) *cliopts.UlimitOpt {
  437. ref := map[string]*container.Ulimit{}
  438. for _, limit := range toUlimits(ulimits) {
  439. ref[limit.Name] = &container.Ulimit{
  440. Name: limit.Name,
  441. Hard: limit.Hard,
  442. Soft: limit.Soft,
  443. }
  444. }
  445. return cliopts.NewUlimitOpt(&ref)
  446. }
  447. func flatten(in types.MappingWithEquals) types.Mapping {
  448. out := types.Mapping{}
  449. if len(in) == 0 {
  450. return out
  451. }
  452. for k, v := range in {
  453. if v == nil {
  454. continue
  455. }
  456. out[k] = *v
  457. }
  458. return out
  459. }
  460. func sshAgentProvider(sshKeys types.SSHConfig) (session.Attachable, error) {
  461. sshConfig := make([]sshprovider.AgentConfig, 0, len(sshKeys))
  462. for _, sshKey := range sshKeys {
  463. sshConfig = append(sshConfig, sshprovider.AgentConfig{
  464. ID: sshKey.ID,
  465. Paths: []string{sshKey.Path},
  466. })
  467. }
  468. return sshprovider.NewSSHAgentProvider(sshConfig)
  469. }
  470. func addSecretsConfig(project *types.Project, service types.ServiceConfig) (session.Attachable, error) {
  471. var sources []secretsprovider.Source
  472. for _, secret := range service.Build.Secrets {
  473. config := project.Secrets[secret.Source]
  474. id := secret.Source
  475. if secret.Target != "" {
  476. id = secret.Target
  477. }
  478. switch {
  479. case config.File != "":
  480. sources = append(sources, secretsprovider.Source{
  481. ID: id,
  482. FilePath: config.File,
  483. })
  484. case config.Environment != "":
  485. sources = append(sources, secretsprovider.Source{
  486. ID: id,
  487. Env: config.Environment,
  488. })
  489. default:
  490. return nil, fmt.Errorf("build.secrets only supports environment or file-based secrets: %q", secret.Source)
  491. }
  492. if secret.UID != "" || secret.GID != "" || secret.Mode != nil {
  493. logrus.Warn("secrets `uid`, `gid` and `mode` are not supported by BuildKit, they will be ignored")
  494. }
  495. }
  496. store, err := secretsprovider.NewStore(sources)
  497. if err != nil {
  498. return nil, err
  499. }
  500. return secretsprovider.NewSecretProvider(store), nil
  501. }
  502. func getImageBuildLabels(project *types.Project, service types.ServiceConfig) types.Labels {
  503. ret := make(types.Labels)
  504. if service.Build != nil {
  505. for k, v := range service.Build.Labels {
  506. ret.Add(k, v)
  507. }
  508. }
  509. ret.Add(api.VersionLabel, api.ComposeVersion)
  510. ret.Add(api.ProjectLabel, project.Name)
  511. ret.Add(api.ServiceLabel, service.Name)
  512. return ret
  513. }
  514. func toBuildContexts(service types.ServiceConfig, project *types.Project) map[string]build.NamedContext {
  515. namedContexts := map[string]build.NamedContext{}
  516. for name, contextPath := range service.Build.AdditionalContexts {
  517. if strings.HasPrefix(contextPath, types.ServicePrefix) {
  518. // image we depend on has been built previously, as we run in dependency order.
  519. // so we convert the service reference into an image reference
  520. target := contextPath[len(types.ServicePrefix):]
  521. image := api.GetImageNameOrDefault(project.Services[target], project.Name)
  522. contextPath = "docker-image://" + image
  523. }
  524. namedContexts[name] = build.NamedContext{Path: contextPath}
  525. }
  526. return namedContexts
  527. }
  528. func parsePlatforms(service types.ServiceConfig) ([]specs.Platform, error) {
  529. if service.Build == nil || len(service.Build.Platforms) == 0 {
  530. return nil, nil
  531. }
  532. var errs []error
  533. ret := make([]specs.Platform, len(service.Build.Platforms))
  534. for i := range service.Build.Platforms {
  535. p, err := platforms.Parse(service.Build.Platforms[i])
  536. if err != nil {
  537. errs = append(errs, err)
  538. } else {
  539. ret[i] = p
  540. }
  541. }
  542. if err := errors.Join(errs...); err != nil {
  543. return nil, err
  544. }
  545. return ret, nil
  546. }