build.go 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "os"
  19. "strings"
  20. "sync"
  21. "github.com/compose-spec/compose-go/v2/types"
  22. "github.com/containerd/platforms"
  23. "github.com/docker/buildx/build"
  24. "github.com/docker/buildx/builder"
  25. "github.com/docker/buildx/controller/pb"
  26. "github.com/docker/buildx/store/storeutil"
  27. "github.com/docker/buildx/util/buildflags"
  28. xprogress "github.com/docker/buildx/util/progress"
  29. "github.com/docker/cli/cli/command"
  30. "github.com/docker/cli/cli/hints"
  31. cliopts "github.com/docker/cli/opts"
  32. "github.com/docker/compose/v2/internal/tracing"
  33. "github.com/docker/compose/v2/pkg/api"
  34. "github.com/docker/compose/v2/pkg/progress"
  35. "github.com/docker/compose/v2/pkg/utils"
  36. "github.com/docker/docker/api/types/container"
  37. bclient "github.com/moby/buildkit/client"
  38. "github.com/moby/buildkit/session"
  39. "github.com/moby/buildkit/session/auth/authprovider"
  40. "github.com/moby/buildkit/session/secrets/secretsprovider"
  41. "github.com/moby/buildkit/session/sshforward/sshprovider"
  42. "github.com/moby/buildkit/util/entitlements"
  43. "github.com/moby/buildkit/util/progress/progressui"
  44. specs "github.com/opencontainers/image-spec/specs-go/v1"
  45. "github.com/sirupsen/logrus"
  46. // required to get default driver registered
  47. _ "github.com/docker/buildx/driver/docker"
  48. )
  49. func (s *composeService) Build(ctx context.Context, project *types.Project, options api.BuildOptions) error {
  50. err := options.Apply(project)
  51. if err != nil {
  52. return err
  53. }
  54. return progress.RunWithTitle(ctx, func(ctx context.Context) error {
  55. _, err := s.build(ctx, project, options, nil)
  56. return err
  57. }, s.stdinfo(), "Building")
  58. }
  59. const bakeSuggest = "Compose now can delegate build to bake for better performances\nJust set COMPOSE_BAKE=true"
  60. var suggest sync.Once
  61. //nolint:gocyclo
  62. func (s *composeService) build(ctx context.Context, project *types.Project, options api.BuildOptions, localImages map[string]string) (map[string]string, error) {
  63. imageIDs := map[string]string{}
  64. serviceToBuild := types.Services{}
  65. var policy types.DependencyOption = types.IgnoreDependencies
  66. if options.Deps {
  67. policy = types.IncludeDependencies
  68. }
  69. serviceDeps := false
  70. project, err := project.WithServicesTransform(func(serviceName string, service types.ServiceConfig) (types.ServiceConfig, error) {
  71. if service.Build != nil {
  72. for _, c := range service.Build.AdditionalContexts {
  73. if t, found := strings.CutPrefix(c, types.ServicePrefix); found {
  74. serviceDeps = true
  75. if service.DependsOn == nil {
  76. service.DependsOn = map[string]types.ServiceDependency{}
  77. }
  78. service.DependsOn[t] = types.ServiceDependency{
  79. Condition: "build", // non-canonical, but will force dependency graph ordering
  80. }
  81. }
  82. }
  83. }
  84. return service, nil
  85. })
  86. if err != nil {
  87. return imageIDs, err
  88. }
  89. if serviceDeps {
  90. logrus.Infof(`additional_context with "service:"" is better supported when delegating build go bake. Set COMPOSE_BAKE=true`)
  91. }
  92. err = project.ForEachService(options.Services, func(serviceName string, service *types.ServiceConfig) error {
  93. if service.Build == nil {
  94. return nil
  95. }
  96. image := api.GetImageNameOrDefault(*service, project.Name)
  97. _, localImagePresent := localImages[image]
  98. if localImagePresent && service.PullPolicy != types.PullPolicyBuild {
  99. return nil
  100. }
  101. serviceToBuild[serviceName] = *service
  102. return nil
  103. }, policy)
  104. if err != nil || len(serviceToBuild) == 0 {
  105. return imageIDs, err
  106. }
  107. bake, err := buildWithBake(s.dockerCli)
  108. if err != nil {
  109. return nil, err
  110. }
  111. if bake {
  112. return s.doBuildBake(ctx, project, serviceToBuild, options)
  113. }
  114. // Initialize buildkit nodes
  115. buildkitEnabled, err := s.dockerCli.BuildKitEnabled()
  116. if err != nil {
  117. return nil, err
  118. }
  119. var (
  120. b *builder.Builder
  121. nodes []builder.Node
  122. w *xprogress.Printer
  123. )
  124. if buildkitEnabled {
  125. if hints.Enabled() && progress.Mode != progress.ModeQuiet && progress.Mode != progress.ModeJSON {
  126. suggest.Do(func() {
  127. fmt.Fprintln(s.dockerCli.Out(), bakeSuggest) //nolint:errcheck
  128. })
  129. }
  130. builderName := options.Builder
  131. if builderName == "" {
  132. builderName = os.Getenv("BUILDX_BUILDER")
  133. }
  134. b, err = builder.New(s.dockerCli, builder.WithName(builderName))
  135. if err != nil {
  136. return nil, err
  137. }
  138. nodes, err = b.LoadNodes(ctx)
  139. if err != nil {
  140. return nil, err
  141. }
  142. // Progress needs its own context that lives longer than the
  143. // build one otherwise it won't read all the messages from
  144. // build and will lock
  145. progressCtx, cancel := context.WithCancel(context.Background())
  146. defer cancel()
  147. if options.Quiet {
  148. options.Progress = progress.ModeQuiet
  149. }
  150. if options.Progress == "" {
  151. options.Progress = os.Getenv("BUILDKIT_PROGRESS")
  152. }
  153. w, err = xprogress.NewPrinter(progressCtx, os.Stdout, progressui.DisplayMode(options.Progress),
  154. xprogress.WithDesc(
  155. fmt.Sprintf("building with %q instance using %s driver", b.Name, b.Driver),
  156. fmt.Sprintf("%s:%s", b.Driver, b.Name),
  157. ))
  158. if err != nil {
  159. return nil, err
  160. }
  161. }
  162. // we use a pre-allocated []string to collect build digest by service index while running concurrent goroutines
  163. builtDigests := make([]string, len(project.Services))
  164. names := project.ServiceNames()
  165. getServiceIndex := func(name string) int {
  166. for idx, n := range names {
  167. if n == name {
  168. return idx
  169. }
  170. }
  171. return -1
  172. }
  173. cw := progress.ContextWriter(ctx)
  174. err = InDependencyOrder(ctx, project, func(ctx context.Context, name string) error {
  175. service, ok := serviceToBuild[name]
  176. if !ok {
  177. return nil
  178. }
  179. serviceName := fmt.Sprintf("Service %s", name)
  180. if !buildkitEnabled {
  181. cw.Event(progress.BuildingEvent(serviceName))
  182. id, err := s.doBuildClassic(ctx, project, service, options)
  183. if err != nil {
  184. return err
  185. }
  186. cw.Event(progress.BuiltEvent(serviceName))
  187. builtDigests[getServiceIndex(name)] = id
  188. if options.Push {
  189. return s.push(ctx, project, api.PushOptions{})
  190. }
  191. return nil
  192. }
  193. if options.Memory != 0 {
  194. _, _ = fmt.Fprintln(s.stderr(), "WARNING: --memory is not supported by BuildKit and will be ignored")
  195. }
  196. buildOptions, err := s.toBuildOptions(project, service, options)
  197. if err != nil {
  198. return err
  199. }
  200. digest, err := s.doBuildBuildkit(ctx, name, buildOptions, w, nodes)
  201. if err != nil {
  202. return err
  203. }
  204. builtDigests[getServiceIndex(name)] = digest
  205. return nil
  206. }, func(traversal *graphTraversal) {
  207. traversal.maxConcurrency = s.maxConcurrency
  208. })
  209. // enforce all build event get consumed
  210. if buildkitEnabled {
  211. if errw := w.Wait(); errw != nil {
  212. return nil, errw
  213. }
  214. }
  215. if err != nil {
  216. return nil, err
  217. }
  218. for i, imageDigest := range builtDigests {
  219. if imageDigest != "" {
  220. service := project.Services[names[i]]
  221. imageRef := api.GetImageNameOrDefault(service, project.Name)
  222. imageIDs[imageRef] = imageDigest
  223. cw.Event(progress.BuiltEvent(names[i]))
  224. }
  225. }
  226. return imageIDs, err
  227. }
  228. func (s *composeService) ensureImagesExists(ctx context.Context, project *types.Project, buildOpts *api.BuildOptions, quietPull bool) error {
  229. for name, service := range project.Services {
  230. if service.Image == "" && service.Build == nil {
  231. return fmt.Errorf("invalid service %q. Must specify either image or build", name)
  232. }
  233. }
  234. images, err := s.getLocalImagesDigests(ctx, project)
  235. if err != nil {
  236. return err
  237. }
  238. err = tracing.SpanWrapFunc("project/pull", tracing.ProjectOptions(ctx, project),
  239. func(ctx context.Context) error {
  240. return s.pullRequiredImages(ctx, project, images, quietPull)
  241. },
  242. )(ctx)
  243. if err != nil {
  244. return err
  245. }
  246. if buildOpts != nil {
  247. err = tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  248. func(ctx context.Context) error {
  249. builtImages, err := s.build(ctx, project, *buildOpts, images)
  250. if err != nil {
  251. return err
  252. }
  253. for name, digest := range builtImages {
  254. images[name] = digest
  255. }
  256. return nil
  257. },
  258. )(ctx)
  259. if err != nil {
  260. return err
  261. }
  262. }
  263. // set digest as com.docker.compose.image label so we can detect outdated containers
  264. for name, service := range project.Services {
  265. image := api.GetImageNameOrDefault(service, project.Name)
  266. digest, ok := images[image]
  267. if ok {
  268. if service.Labels == nil {
  269. service.Labels = types.Labels{}
  270. }
  271. service.CustomLabels.Add(api.ImageDigestLabel, digest)
  272. }
  273. project.Services[name] = service
  274. }
  275. return nil
  276. }
  277. func (s *composeService) getLocalImagesDigests(ctx context.Context, project *types.Project) (map[string]string, error) {
  278. var imageNames []string
  279. for _, s := range project.Services {
  280. imgName := api.GetImageNameOrDefault(s, project.Name)
  281. if !utils.StringContains(imageNames, imgName) {
  282. imageNames = append(imageNames, imgName)
  283. }
  284. }
  285. imgs, err := s.getImageSummaries(ctx, imageNames)
  286. if err != nil {
  287. return nil, err
  288. }
  289. images := map[string]string{}
  290. for name, info := range imgs {
  291. images[name] = info.ID
  292. }
  293. for i, service := range project.Services {
  294. imgName := api.GetImageNameOrDefault(service, project.Name)
  295. digest, ok := images[imgName]
  296. if !ok {
  297. continue
  298. }
  299. if service.Platform != "" {
  300. platform, err := platforms.Parse(service.Platform)
  301. if err != nil {
  302. return nil, err
  303. }
  304. inspect, _, err := s.apiClient().ImageInspectWithRaw(ctx, digest)
  305. if err != nil {
  306. return nil, err
  307. }
  308. actual := specs.Platform{
  309. Architecture: inspect.Architecture,
  310. OS: inspect.Os,
  311. Variant: inspect.Variant,
  312. }
  313. if !platforms.NewMatcher(platform).Match(actual) {
  314. // there is a local image, but it's for the wrong platform, so
  315. // pretend it doesn't exist so that we can pull/build an image
  316. // for the correct platform instead
  317. delete(images, imgName)
  318. }
  319. }
  320. project.Services[i].CustomLabels.Add(api.ImageDigestLabel, digest)
  321. }
  322. return images, nil
  323. }
  324. // resolveAndMergeBuildArgs returns the final set of build arguments to use for the service image build.
  325. //
  326. // First, args directly defined via `build.args` in YAML are considered.
  327. // Then, any explicitly passed args in opts (e.g. via `--build-arg` on the CLI) are merged, overwriting any
  328. // keys that already exist.
  329. // Next, any keys without a value are resolved using the project environment.
  330. //
  331. // Finally, standard proxy variables based on the Docker client configuration are added, but will not overwrite
  332. // any values if already present.
  333. func resolveAndMergeBuildArgs(dockerCli command.Cli, project *types.Project, service types.ServiceConfig, opts api.BuildOptions) types.MappingWithEquals {
  334. result := make(types.MappingWithEquals).
  335. OverrideBy(service.Build.Args).
  336. OverrideBy(opts.Args).
  337. Resolve(envResolver(project.Environment))
  338. // proxy arguments do NOT override and should NOT have env resolution applied,
  339. // so they're handled last
  340. for k, v := range storeutil.GetProxyConfig(dockerCli) {
  341. if _, ok := result[k]; !ok {
  342. v := v
  343. result[k] = &v
  344. }
  345. }
  346. return result
  347. }
  348. func (s *composeService) toBuildOptions(project *types.Project, service types.ServiceConfig, options api.BuildOptions) (build.Options, error) {
  349. plats, err := parsePlatforms(service)
  350. if err != nil {
  351. return build.Options{}, err
  352. }
  353. cacheFrom, err := buildflags.ParseCacheEntry(service.Build.CacheFrom)
  354. if err != nil {
  355. return build.Options{}, err
  356. }
  357. cacheTo, err := buildflags.ParseCacheEntry(service.Build.CacheTo)
  358. if err != nil {
  359. return build.Options{}, err
  360. }
  361. sessionConfig := []session.Attachable{
  362. authprovider.NewDockerAuthProvider(s.configFile(), nil),
  363. }
  364. if len(options.SSHs) > 0 || len(service.Build.SSH) > 0 {
  365. sshAgentProvider, err := sshAgentProvider(append(service.Build.SSH, options.SSHs...))
  366. if err != nil {
  367. return build.Options{}, err
  368. }
  369. sessionConfig = append(sessionConfig, sshAgentProvider)
  370. }
  371. if len(service.Build.Secrets) > 0 {
  372. secretsProvider, err := addSecretsConfig(project, service)
  373. if err != nil {
  374. return build.Options{}, err
  375. }
  376. sessionConfig = append(sessionConfig, secretsProvider)
  377. }
  378. tags := []string{api.GetImageNameOrDefault(service, project.Name)}
  379. if len(service.Build.Tags) > 0 {
  380. tags = append(tags, service.Build.Tags...)
  381. }
  382. allow, err := buildflags.ParseEntitlements(service.Build.Entitlements)
  383. if err != nil {
  384. return build.Options{}, err
  385. }
  386. if service.Build.Privileged {
  387. allow = append(allow, entitlements.EntitlementSecurityInsecure)
  388. }
  389. imageLabels := getImageBuildLabels(project, service)
  390. push := options.Push && service.Image != ""
  391. exports := []bclient.ExportEntry{{
  392. Type: "docker",
  393. Attrs: map[string]string{
  394. "load": "true",
  395. "push": fmt.Sprint(push),
  396. },
  397. }}
  398. if len(service.Build.Platforms) > 1 {
  399. exports = []bclient.ExportEntry{{
  400. Type: "image",
  401. Attrs: map[string]string{
  402. "push": fmt.Sprint(push),
  403. },
  404. }}
  405. }
  406. sp, err := build.ReadSourcePolicy()
  407. if err != nil {
  408. return build.Options{}, err
  409. }
  410. return build.Options{
  411. Inputs: build.Inputs{
  412. ContextPath: service.Build.Context,
  413. DockerfileInline: service.Build.DockerfileInline,
  414. DockerfilePath: dockerFilePath(service.Build.Context, service.Build.Dockerfile),
  415. NamedContexts: toBuildContexts(service.Build.AdditionalContexts),
  416. },
  417. CacheFrom: pb.CreateCaches(cacheFrom.ToPB()),
  418. CacheTo: pb.CreateCaches(cacheTo.ToPB()),
  419. NoCache: service.Build.NoCache,
  420. Pull: service.Build.Pull,
  421. BuildArgs: flatten(resolveAndMergeBuildArgs(s.dockerCli, project, service, options)),
  422. Tags: tags,
  423. Target: service.Build.Target,
  424. Exports: exports,
  425. Platforms: plats,
  426. Labels: imageLabels,
  427. NetworkMode: service.Build.Network,
  428. ExtraHosts: service.Build.ExtraHosts.AsList(":"),
  429. Ulimits: toUlimitOpt(service.Build.Ulimits),
  430. Session: sessionConfig,
  431. Allow: allow,
  432. SourcePolicy: sp,
  433. }, nil
  434. }
  435. func toUlimitOpt(ulimits map[string]*types.UlimitsConfig) *cliopts.UlimitOpt {
  436. ref := map[string]*container.Ulimit{}
  437. for _, limit := range toUlimits(ulimits) {
  438. ref[limit.Name] = &container.Ulimit{
  439. Name: limit.Name,
  440. Hard: limit.Hard,
  441. Soft: limit.Soft,
  442. }
  443. }
  444. return cliopts.NewUlimitOpt(&ref)
  445. }
  446. func flatten(in types.MappingWithEquals) types.Mapping {
  447. out := types.Mapping{}
  448. if len(in) == 0 {
  449. return out
  450. }
  451. for k, v := range in {
  452. if v == nil {
  453. continue
  454. }
  455. out[k] = *v
  456. }
  457. return out
  458. }
  459. func sshAgentProvider(sshKeys types.SSHConfig) (session.Attachable, error) {
  460. sshConfig := make([]sshprovider.AgentConfig, 0, len(sshKeys))
  461. for _, sshKey := range sshKeys {
  462. sshConfig = append(sshConfig, sshprovider.AgentConfig{
  463. ID: sshKey.ID,
  464. Paths: []string{sshKey.Path},
  465. })
  466. }
  467. return sshprovider.NewSSHAgentProvider(sshConfig)
  468. }
  469. func addSecretsConfig(project *types.Project, service types.ServiceConfig) (session.Attachable, error) {
  470. var sources []secretsprovider.Source
  471. for _, secret := range service.Build.Secrets {
  472. config := project.Secrets[secret.Source]
  473. id := secret.Source
  474. if secret.Target != "" {
  475. id = secret.Target
  476. }
  477. switch {
  478. case config.File != "":
  479. sources = append(sources, secretsprovider.Source{
  480. ID: id,
  481. FilePath: config.File,
  482. })
  483. case config.Environment != "":
  484. sources = append(sources, secretsprovider.Source{
  485. ID: id,
  486. Env: config.Environment,
  487. })
  488. default:
  489. return nil, fmt.Errorf("build.secrets only supports environment or file-based secrets: %q", secret.Source)
  490. }
  491. if secret.UID != "" || secret.GID != "" || secret.Mode != nil {
  492. logrus.Warn("secrets `uid`, `gid` and `mode` are not supported by BuildKit, they will be ignored")
  493. }
  494. }
  495. store, err := secretsprovider.NewStore(sources)
  496. if err != nil {
  497. return nil, err
  498. }
  499. return secretsprovider.NewSecretProvider(store), nil
  500. }
  501. func getImageBuildLabels(project *types.Project, service types.ServiceConfig) types.Labels {
  502. ret := make(types.Labels)
  503. if service.Build != nil {
  504. for k, v := range service.Build.Labels {
  505. ret.Add(k, v)
  506. }
  507. }
  508. ret.Add(api.VersionLabel, api.ComposeVersion)
  509. ret.Add(api.ProjectLabel, project.Name)
  510. ret.Add(api.ServiceLabel, service.Name)
  511. return ret
  512. }
  513. func toBuildContexts(additionalContexts types.Mapping) map[string]build.NamedContext {
  514. namedContexts := map[string]build.NamedContext{}
  515. for name, contextPath := range additionalContexts {
  516. if _, found := strings.CutPrefix(contextPath, types.ServicePrefix); found {
  517. // image we depend on has been build previously, as we run in dependency order.
  518. // this assumes use of docker engine builder, so that build can access local images
  519. continue
  520. }
  521. namedContexts[name] = build.NamedContext{Path: contextPath}
  522. }
  523. return namedContexts
  524. }
  525. func parsePlatforms(service types.ServiceConfig) ([]specs.Platform, error) {
  526. if service.Build == nil || len(service.Build.Platforms) == 0 {
  527. return nil, nil
  528. }
  529. var errs []error
  530. ret := make([]specs.Platform, len(service.Build.Platforms))
  531. for i := range service.Build.Platforms {
  532. p, err := platforms.Parse(service.Build.Platforms[i])
  533. if err != nil {
  534. errs = append(errs, err)
  535. } else {
  536. ret[i] = p
  537. }
  538. }
  539. if err := errors.Join(errs...); err != nil {
  540. return nil, err
  541. }
  542. return ret, nil
  543. }