build.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "os"
  19. "strings"
  20. "sync"
  21. "time"
  22. "github.com/compose-spec/compose-go/v2/types"
  23. "github.com/containerd/platforms"
  24. "github.com/docker/buildx/build"
  25. "github.com/docker/buildx/builder"
  26. "github.com/docker/buildx/controller/pb"
  27. "github.com/docker/buildx/store/storeutil"
  28. "github.com/docker/buildx/util/buildflags"
  29. xprogress "github.com/docker/buildx/util/progress"
  30. "github.com/docker/cli/cli/command"
  31. "github.com/docker/cli/cli/hints"
  32. cliopts "github.com/docker/cli/opts"
  33. "github.com/docker/compose/v2/internal/tracing"
  34. "github.com/docker/compose/v2/pkg/api"
  35. "github.com/docker/compose/v2/pkg/progress"
  36. "github.com/docker/compose/v2/pkg/utils"
  37. "github.com/docker/docker/api/types/container"
  38. bclient "github.com/moby/buildkit/client"
  39. "github.com/moby/buildkit/session"
  40. "github.com/moby/buildkit/session/auth/authprovider"
  41. "github.com/moby/buildkit/session/secrets/secretsprovider"
  42. "github.com/moby/buildkit/session/sshforward/sshprovider"
  43. "github.com/moby/buildkit/util/entitlements"
  44. "github.com/moby/buildkit/util/progress/progressui"
  45. specs "github.com/opencontainers/image-spec/specs-go/v1"
  46. "github.com/sirupsen/logrus"
  47. "go.opentelemetry.io/otel/attribute"
  48. "go.opentelemetry.io/otel/trace"
  49. // required to get default driver registered
  50. _ "github.com/docker/buildx/driver/docker"
  51. )
  52. func (s *composeService) Build(ctx context.Context, project *types.Project, options api.BuildOptions) error {
  53. err := options.Apply(project)
  54. if err != nil {
  55. return err
  56. }
  57. return progress.RunWithTitle(ctx, func(ctx context.Context) error {
  58. return tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  59. func(ctx context.Context) error {
  60. _, err := s.build(ctx, project, options, nil)
  61. return err
  62. })(ctx)
  63. }, s.stdinfo(), "Building")
  64. }
  65. const bakeSuggest = "Compose can now delegate builds to bake for better performance.\n To do so, set COMPOSE_BAKE=true."
  66. var suggest sync.Once
  67. //nolint:gocyclo
  68. func (s *composeService) build(ctx context.Context, project *types.Project, options api.BuildOptions, localImages map[string]api.ImageSummary) (map[string]string, error) {
  69. imageIDs := map[string]string{}
  70. serviceToBuild := types.Services{}
  71. var policy types.DependencyOption = types.IgnoreDependencies
  72. if options.Deps {
  73. policy = types.IncludeDependencies
  74. }
  75. err := project.ForEachService(options.Services, func(serviceName string, service *types.ServiceConfig) error {
  76. if service.Build == nil {
  77. return nil
  78. }
  79. image := api.GetImageNameOrDefault(*service, project.Name)
  80. _, localImagePresent := localImages[image]
  81. if localImagePresent && service.PullPolicy != types.PullPolicyBuild {
  82. return nil
  83. }
  84. serviceToBuild[serviceName] = *service
  85. return nil
  86. }, policy)
  87. if err != nil || len(serviceToBuild) == 0 {
  88. return imageIDs, err
  89. }
  90. bake, err := buildWithBake(s.dockerCli)
  91. if err != nil {
  92. return nil, err
  93. }
  94. if bake {
  95. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "bake"))
  96. return s.doBuildBake(ctx, project, serviceToBuild, options)
  97. }
  98. // Not using bake, additional_context: service:xx is implemented by building images in dependency order
  99. project, err = project.WithServicesTransform(func(serviceName string, service types.ServiceConfig) (types.ServiceConfig, error) {
  100. if service.Build != nil {
  101. for _, c := range service.Build.AdditionalContexts {
  102. if t, found := strings.CutPrefix(c, types.ServicePrefix); found {
  103. if service.DependsOn == nil {
  104. service.DependsOn = map[string]types.ServiceDependency{}
  105. }
  106. service.DependsOn[t] = types.ServiceDependency{
  107. Condition: "build", // non-canonical, but will force dependency graph ordering
  108. }
  109. }
  110. }
  111. }
  112. return service, nil
  113. })
  114. if err != nil {
  115. return imageIDs, err
  116. }
  117. // Initialize buildkit nodes
  118. buildkitEnabled, err := s.dockerCli.BuildKitEnabled()
  119. if err != nil {
  120. return nil, err
  121. }
  122. var (
  123. b *builder.Builder
  124. nodes []builder.Node
  125. w *xprogress.Printer
  126. )
  127. if buildkitEnabled {
  128. if hints.Enabled() && progress.Mode != progress.ModeQuiet && progress.Mode != progress.ModeJSON {
  129. suggest.Do(func() {
  130. fmt.Fprintln(s.dockerCli.Out(), bakeSuggest) //nolint:errcheck
  131. })
  132. }
  133. builderName := options.Builder
  134. if builderName == "" {
  135. builderName = os.Getenv("BUILDX_BUILDER")
  136. }
  137. b, err = builder.New(s.dockerCli, builder.WithName(builderName))
  138. if err != nil {
  139. return nil, err
  140. }
  141. nodes, err = b.LoadNodes(ctx)
  142. if err != nil {
  143. return nil, err
  144. }
  145. // Progress needs its own context that lives longer than the
  146. // build one otherwise it won't read all the messages from
  147. // build and will lock
  148. progressCtx, cancel := context.WithCancel(context.Background())
  149. defer cancel()
  150. if options.Quiet {
  151. options.Progress = progress.ModeQuiet
  152. }
  153. if options.Progress == "" {
  154. options.Progress = os.Getenv("BUILDKIT_PROGRESS")
  155. }
  156. w, err = xprogress.NewPrinter(progressCtx, os.Stdout, progressui.DisplayMode(options.Progress),
  157. xprogress.WithDesc(
  158. fmt.Sprintf("building with %q instance using %s driver", b.Name, b.Driver),
  159. fmt.Sprintf("%s:%s", b.Driver, b.Name),
  160. ))
  161. if err != nil {
  162. return nil, err
  163. }
  164. }
  165. // we use a pre-allocated []string to collect build digest by service index while running concurrent goroutines
  166. builtDigests := make([]string, len(project.Services))
  167. names := project.ServiceNames()
  168. getServiceIndex := func(name string) int {
  169. for idx, n := range names {
  170. if n == name {
  171. return idx
  172. }
  173. }
  174. return -1
  175. }
  176. cw := progress.ContextWriter(ctx)
  177. err = InDependencyOrder(ctx, project, func(ctx context.Context, name string) error {
  178. service, ok := serviceToBuild[name]
  179. if !ok {
  180. return nil
  181. }
  182. serviceName := fmt.Sprintf("Service %s", name)
  183. if !buildkitEnabled {
  184. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "classic"))
  185. cw.Event(progress.BuildingEvent(serviceName))
  186. id, err := s.doBuildClassic(ctx, project, service, options)
  187. if err != nil {
  188. return err
  189. }
  190. cw.Event(progress.BuiltEvent(serviceName))
  191. builtDigests[getServiceIndex(name)] = id
  192. if options.Push {
  193. return s.push(ctx, project, api.PushOptions{})
  194. }
  195. return nil
  196. }
  197. if options.Memory != 0 {
  198. _, _ = fmt.Fprintln(s.stderr(), "WARNING: --memory is not supported by BuildKit and will be ignored")
  199. }
  200. buildOptions, err := s.toBuildOptions(project, service, options)
  201. if err != nil {
  202. return err
  203. }
  204. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "buildkit"))
  205. digest, err := s.doBuildBuildkit(ctx, name, buildOptions, w, nodes)
  206. if err != nil {
  207. return err
  208. }
  209. builtDigests[getServiceIndex(name)] = digest
  210. return nil
  211. }, func(traversal *graphTraversal) {
  212. traversal.maxConcurrency = s.maxConcurrency
  213. })
  214. // enforce all build event get consumed
  215. if buildkitEnabled {
  216. if errw := w.Wait(); errw != nil {
  217. return nil, errw
  218. }
  219. }
  220. if err != nil {
  221. return nil, err
  222. }
  223. for i, imageDigest := range builtDigests {
  224. if imageDigest != "" {
  225. service := project.Services[names[i]]
  226. imageRef := api.GetImageNameOrDefault(service, project.Name)
  227. imageIDs[imageRef] = imageDigest
  228. cw.Event(progress.BuiltEvent(names[i]))
  229. }
  230. }
  231. return imageIDs, err
  232. }
  233. func (s *composeService) ensureImagesExists(ctx context.Context, project *types.Project, buildOpts *api.BuildOptions, quietPull bool) error {
  234. for name, service := range project.Services {
  235. if service.Image == "" && service.Build == nil {
  236. return fmt.Errorf("invalid service %q. Must specify either image or build", name)
  237. }
  238. }
  239. images, err := s.getLocalImagesDigests(ctx, project)
  240. if err != nil {
  241. return err
  242. }
  243. err = tracing.SpanWrapFunc("project/pull", tracing.ProjectOptions(ctx, project),
  244. func(ctx context.Context) error {
  245. return s.pullRequiredImages(ctx, project, images, quietPull)
  246. },
  247. )(ctx)
  248. if err != nil {
  249. return err
  250. }
  251. if buildOpts != nil {
  252. err = tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  253. func(ctx context.Context) error {
  254. builtImages, err := s.build(ctx, project, *buildOpts, images)
  255. if err != nil {
  256. return err
  257. }
  258. for name, digest := range builtImages {
  259. images[name] = api.ImageSummary{
  260. Repository: name,
  261. ID: digest,
  262. LastTagTime: time.Now(),
  263. }
  264. }
  265. return nil
  266. },
  267. )(ctx)
  268. if err != nil {
  269. return err
  270. }
  271. }
  272. // set digest as com.docker.compose.image label so we can detect outdated containers
  273. for name, service := range project.Services {
  274. image := api.GetImageNameOrDefault(service, project.Name)
  275. img, ok := images[image]
  276. if ok {
  277. service.CustomLabels.Add(api.ImageDigestLabel, img.ID)
  278. }
  279. project.Services[name] = service
  280. }
  281. return nil
  282. }
  283. func (s *composeService) getLocalImagesDigests(ctx context.Context, project *types.Project) (map[string]api.ImageSummary, error) {
  284. var imageNames []string
  285. for _, s := range project.Services {
  286. imgName := api.GetImageNameOrDefault(s, project.Name)
  287. if !utils.StringContains(imageNames, imgName) {
  288. imageNames = append(imageNames, imgName)
  289. }
  290. }
  291. imgs, err := s.getImageSummaries(ctx, imageNames)
  292. if err != nil {
  293. return nil, err
  294. }
  295. for i, service := range project.Services {
  296. imgName := api.GetImageNameOrDefault(service, project.Name)
  297. img, ok := imgs[imgName]
  298. if !ok {
  299. continue
  300. }
  301. if service.Platform != "" {
  302. platform, err := platforms.Parse(service.Platform)
  303. if err != nil {
  304. return nil, err
  305. }
  306. inspect, err := s.apiClient().ImageInspect(ctx, img.ID)
  307. if err != nil {
  308. return nil, err
  309. }
  310. actual := specs.Platform{
  311. Architecture: inspect.Architecture,
  312. OS: inspect.Os,
  313. Variant: inspect.Variant,
  314. }
  315. if !platforms.NewMatcher(platform).Match(actual) {
  316. // there is a local image, but it's for the wrong platform, so
  317. // pretend it doesn't exist so that we can pull/build an image
  318. // for the correct platform instead
  319. delete(imgs, imgName)
  320. }
  321. }
  322. project.Services[i].CustomLabels.Add(api.ImageDigestLabel, img.ID)
  323. }
  324. return imgs, nil
  325. }
  326. // resolveAndMergeBuildArgs returns the final set of build arguments to use for the service image build.
  327. //
  328. // First, args directly defined via `build.args` in YAML are considered.
  329. // Then, any explicitly passed args in opts (e.g. via `--build-arg` on the CLI) are merged, overwriting any
  330. // keys that already exist.
  331. // Next, any keys without a value are resolved using the project environment.
  332. //
  333. // Finally, standard proxy variables based on the Docker client configuration are added, but will not overwrite
  334. // any values if already present.
  335. func resolveAndMergeBuildArgs(dockerCli command.Cli, project *types.Project, service types.ServiceConfig, opts api.BuildOptions) types.MappingWithEquals {
  336. result := make(types.MappingWithEquals).
  337. OverrideBy(service.Build.Args).
  338. OverrideBy(opts.Args).
  339. Resolve(envResolver(project.Environment))
  340. // proxy arguments do NOT override and should NOT have env resolution applied,
  341. // so they're handled last
  342. for k, v := range storeutil.GetProxyConfig(dockerCli) {
  343. if _, ok := result[k]; !ok {
  344. v := v
  345. result[k] = &v
  346. }
  347. }
  348. return result
  349. }
  350. func (s *composeService) toBuildOptions(project *types.Project, service types.ServiceConfig, options api.BuildOptions) (build.Options, error) {
  351. plats, err := parsePlatforms(service)
  352. if err != nil {
  353. return build.Options{}, err
  354. }
  355. cacheFrom, err := buildflags.ParseCacheEntry(service.Build.CacheFrom)
  356. if err != nil {
  357. return build.Options{}, err
  358. }
  359. cacheTo, err := buildflags.ParseCacheEntry(service.Build.CacheTo)
  360. if err != nil {
  361. return build.Options{}, err
  362. }
  363. sessionConfig := []session.Attachable{
  364. authprovider.NewDockerAuthProvider(authprovider.DockerAuthProviderConfig{
  365. ConfigFile: s.configFile(),
  366. }),
  367. }
  368. if len(options.SSHs) > 0 || len(service.Build.SSH) > 0 {
  369. sshAgentProvider, err := sshAgentProvider(append(service.Build.SSH, options.SSHs...))
  370. if err != nil {
  371. return build.Options{}, err
  372. }
  373. sessionConfig = append(sessionConfig, sshAgentProvider)
  374. }
  375. if len(service.Build.Secrets) > 0 {
  376. secretsProvider, err := addSecretsConfig(project, service)
  377. if err != nil {
  378. return build.Options{}, err
  379. }
  380. sessionConfig = append(sessionConfig, secretsProvider)
  381. }
  382. tags := []string{api.GetImageNameOrDefault(service, project.Name)}
  383. if len(service.Build.Tags) > 0 {
  384. tags = append(tags, service.Build.Tags...)
  385. }
  386. allow, err := buildflags.ParseEntitlements(service.Build.Entitlements)
  387. if err != nil {
  388. return build.Options{}, err
  389. }
  390. if service.Build.Privileged {
  391. allow = append(allow, entitlements.EntitlementSecurityInsecure.String())
  392. }
  393. imageLabels := getImageBuildLabels(project, service)
  394. push := options.Push && service.Image != ""
  395. exports := []bclient.ExportEntry{{
  396. Type: "docker",
  397. Attrs: map[string]string{
  398. "load": "true",
  399. "push": fmt.Sprint(push),
  400. },
  401. }}
  402. if len(service.Build.Platforms) > 1 {
  403. exports = []bclient.ExportEntry{{
  404. Type: "image",
  405. Attrs: map[string]string{
  406. "push": fmt.Sprint(push),
  407. },
  408. }}
  409. }
  410. sp, err := build.ReadSourcePolicy()
  411. if err != nil {
  412. return build.Options{}, err
  413. }
  414. return build.Options{
  415. Inputs: build.Inputs{
  416. ContextPath: service.Build.Context,
  417. DockerfileInline: service.Build.DockerfileInline,
  418. DockerfilePath: dockerFilePath(service.Build.Context, service.Build.Dockerfile),
  419. NamedContexts: toBuildContexts(service, project),
  420. },
  421. CacheFrom: pb.CreateCaches(cacheFrom.ToPB()),
  422. CacheTo: pb.CreateCaches(cacheTo.ToPB()),
  423. NoCache: service.Build.NoCache,
  424. Pull: service.Build.Pull,
  425. BuildArgs: flatten(resolveAndMergeBuildArgs(s.dockerCli, project, service, options)),
  426. Tags: tags,
  427. Target: service.Build.Target,
  428. Exports: exports,
  429. Platforms: plats,
  430. Labels: imageLabels,
  431. NetworkMode: service.Build.Network,
  432. ExtraHosts: service.Build.ExtraHosts.AsList(":"),
  433. Ulimits: toUlimitOpt(service.Build.Ulimits),
  434. Session: sessionConfig,
  435. Allow: allow,
  436. SourcePolicy: sp,
  437. }, nil
  438. }
  439. func toUlimitOpt(ulimits map[string]*types.UlimitsConfig) *cliopts.UlimitOpt {
  440. ref := map[string]*container.Ulimit{}
  441. for _, limit := range toUlimits(ulimits) {
  442. ref[limit.Name] = &container.Ulimit{
  443. Name: limit.Name,
  444. Hard: limit.Hard,
  445. Soft: limit.Soft,
  446. }
  447. }
  448. return cliopts.NewUlimitOpt(&ref)
  449. }
  450. func flatten(in types.MappingWithEquals) types.Mapping {
  451. out := types.Mapping{}
  452. if len(in) == 0 {
  453. return out
  454. }
  455. for k, v := range in {
  456. if v == nil {
  457. continue
  458. }
  459. out[k] = *v
  460. }
  461. return out
  462. }
  463. func sshAgentProvider(sshKeys types.SSHConfig) (session.Attachable, error) {
  464. sshConfig := make([]sshprovider.AgentConfig, 0, len(sshKeys))
  465. for _, sshKey := range sshKeys {
  466. sshConfig = append(sshConfig, sshprovider.AgentConfig{
  467. ID: sshKey.ID,
  468. Paths: []string{sshKey.Path},
  469. })
  470. }
  471. return sshprovider.NewSSHAgentProvider(sshConfig)
  472. }
  473. func addSecretsConfig(project *types.Project, service types.ServiceConfig) (session.Attachable, error) {
  474. var sources []secretsprovider.Source
  475. for _, secret := range service.Build.Secrets {
  476. config := project.Secrets[secret.Source]
  477. id := secret.Source
  478. if secret.Target != "" {
  479. id = secret.Target
  480. }
  481. switch {
  482. case config.File != "":
  483. sources = append(sources, secretsprovider.Source{
  484. ID: id,
  485. FilePath: config.File,
  486. })
  487. case config.Environment != "":
  488. sources = append(sources, secretsprovider.Source{
  489. ID: id,
  490. Env: config.Environment,
  491. })
  492. default:
  493. return nil, fmt.Errorf("build.secrets only supports environment or file-based secrets: %q", secret.Source)
  494. }
  495. if secret.UID != "" || secret.GID != "" || secret.Mode != nil {
  496. logrus.Warn("secrets `uid`, `gid` and `mode` are not supported by BuildKit, they will be ignored")
  497. }
  498. }
  499. store, err := secretsprovider.NewStore(sources)
  500. if err != nil {
  501. return nil, err
  502. }
  503. return secretsprovider.NewSecretProvider(store), nil
  504. }
  505. func getImageBuildLabels(project *types.Project, service types.ServiceConfig) types.Labels {
  506. ret := make(types.Labels)
  507. if service.Build != nil {
  508. for k, v := range service.Build.Labels {
  509. ret.Add(k, v)
  510. }
  511. }
  512. ret.Add(api.VersionLabel, api.ComposeVersion)
  513. ret.Add(api.ProjectLabel, project.Name)
  514. ret.Add(api.ServiceLabel, service.Name)
  515. return ret
  516. }
  517. func toBuildContexts(service types.ServiceConfig, project *types.Project) map[string]build.NamedContext {
  518. namedContexts := map[string]build.NamedContext{}
  519. for name, contextPath := range service.Build.AdditionalContexts {
  520. if strings.HasPrefix(contextPath, types.ServicePrefix) {
  521. // image we depend on has been built previously, as we run in dependency order.
  522. // so we convert the service reference into an image reference
  523. target := contextPath[len(types.ServicePrefix):]
  524. image := api.GetImageNameOrDefault(project.Services[target], project.Name)
  525. contextPath = "docker-image://" + image
  526. }
  527. namedContexts[name] = build.NamedContext{Path: contextPath}
  528. }
  529. return namedContexts
  530. }
  531. func parsePlatforms(service types.ServiceConfig) ([]specs.Platform, error) {
  532. if service.Build == nil || len(service.Build.Platforms) == 0 {
  533. return nil, nil
  534. }
  535. var errs []error
  536. ret := make([]specs.Platform, len(service.Build.Platforms))
  537. for i := range service.Build.Platforms {
  538. p, err := platforms.Parse(service.Build.Platforms[i])
  539. if err != nil {
  540. errs = append(errs, err)
  541. } else {
  542. ret[i] = p
  543. }
  544. }
  545. if err := errors.Join(errs...); err != nil {
  546. return nil, err
  547. }
  548. return ret, nil
  549. }