build.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "context"
  16. "errors"
  17. "fmt"
  18. "os"
  19. "strconv"
  20. "strings"
  21. "time"
  22. "github.com/compose-spec/compose-go/v2/types"
  23. "github.com/containerd/platforms"
  24. "github.com/docker/buildx/build"
  25. "github.com/docker/buildx/builder"
  26. "github.com/docker/buildx/util/buildflags"
  27. xprogress "github.com/docker/buildx/util/progress"
  28. cliopts "github.com/docker/cli/opts"
  29. "github.com/docker/compose/v2/internal/tracing"
  30. "github.com/docker/compose/v2/pkg/api"
  31. "github.com/docker/compose/v2/pkg/progress"
  32. "github.com/docker/compose/v2/pkg/utils"
  33. "github.com/docker/docker/api/types/container"
  34. bclient "github.com/moby/buildkit/client"
  35. "github.com/moby/buildkit/session"
  36. "github.com/moby/buildkit/session/auth/authprovider"
  37. "github.com/moby/buildkit/session/secrets/secretsprovider"
  38. "github.com/moby/buildkit/session/sshforward/sshprovider"
  39. "github.com/moby/buildkit/util/entitlements"
  40. "github.com/moby/buildkit/util/progress/progressui"
  41. specs "github.com/opencontainers/image-spec/specs-go/v1"
  42. "github.com/sirupsen/logrus"
  43. "go.opentelemetry.io/otel/attribute"
  44. "go.opentelemetry.io/otel/trace"
  45. // required to get default driver registered
  46. _ "github.com/docker/buildx/driver/docker"
  47. )
  48. func (s *composeService) Build(ctx context.Context, project *types.Project, options api.BuildOptions) error {
  49. err := options.Apply(project)
  50. if err != nil {
  51. return err
  52. }
  53. return progress.Run(ctx, func(ctx context.Context) error {
  54. return tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  55. func(ctx context.Context) error {
  56. _, err := s.build(ctx, project, options, nil)
  57. return err
  58. })(ctx)
  59. }, "build", s.events)
  60. }
  61. //nolint:gocyclo
  62. func (s *composeService) build(ctx context.Context, project *types.Project, options api.BuildOptions, localImages map[string]api.ImageSummary) (map[string]string, error) {
  63. imageIDs := map[string]string{}
  64. serviceToBuild := types.Services{}
  65. var policy types.DependencyOption = types.IgnoreDependencies
  66. if options.Deps {
  67. policy = types.IncludeDependencies
  68. }
  69. if len(options.Services) == 0 {
  70. options.Services = project.ServiceNames()
  71. }
  72. // also include services used as additional_contexts with service: prefix
  73. options.Services = addBuildDependencies(options.Services, project)
  74. // Some build dependencies we just introduced may not be enabled
  75. var err error
  76. project, err = project.WithServicesEnabled(options.Services...)
  77. if err != nil {
  78. return nil, err
  79. }
  80. project, err = project.WithSelectedServices(options.Services)
  81. if err != nil {
  82. return nil, err
  83. }
  84. err = project.ForEachService(options.Services, func(serviceName string, service *types.ServiceConfig) error {
  85. if service.Build == nil {
  86. return nil
  87. }
  88. image := api.GetImageNameOrDefault(*service, project.Name)
  89. _, localImagePresent := localImages[image]
  90. if localImagePresent && service.PullPolicy != types.PullPolicyBuild {
  91. return nil
  92. }
  93. serviceToBuild[serviceName] = *service
  94. return nil
  95. }, policy)
  96. if err != nil || len(serviceToBuild) == 0 {
  97. return imageIDs, err
  98. }
  99. bake, err := buildWithBake(s.dockerCli)
  100. if err != nil {
  101. return nil, err
  102. }
  103. if bake || options.Print {
  104. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "bake"))
  105. return s.doBuildBake(ctx, project, serviceToBuild, options)
  106. }
  107. // Not using bake, additional_context: service:xx is implemented by building images in dependency order
  108. project, err = project.WithServicesTransform(func(serviceName string, service types.ServiceConfig) (types.ServiceConfig, error) {
  109. if service.Build != nil {
  110. for _, c := range service.Build.AdditionalContexts {
  111. if t, found := strings.CutPrefix(c, types.ServicePrefix); found {
  112. if service.DependsOn == nil {
  113. service.DependsOn = map[string]types.ServiceDependency{}
  114. }
  115. service.DependsOn[t] = types.ServiceDependency{
  116. Condition: "build", // non-canonical, but will force dependency graph ordering
  117. }
  118. }
  119. }
  120. }
  121. return service, nil
  122. })
  123. if err != nil {
  124. return imageIDs, err
  125. }
  126. // Initialize buildkit nodes
  127. buildkitEnabled, err := s.getContextInfo().BuildKitEnabled()
  128. if err != nil {
  129. return nil, err
  130. }
  131. var (
  132. b *builder.Builder
  133. nodes []builder.Node
  134. w *xprogress.Printer
  135. )
  136. if buildkitEnabled {
  137. builderName := options.Builder
  138. if builderName == "" {
  139. builderName = os.Getenv("BUILDX_BUILDER")
  140. }
  141. b, err = builder.New(s.dockerCli, builder.WithName(builderName))
  142. if err != nil {
  143. return nil, err
  144. }
  145. nodes, err = b.LoadNodes(ctx)
  146. if err != nil {
  147. return nil, err
  148. }
  149. // Progress needs its own context that lives longer than the
  150. // build one otherwise it won't read all the messages from
  151. // build and will lock
  152. progressCtx, cancel := context.WithCancel(context.Background())
  153. defer cancel()
  154. if options.Quiet {
  155. options.Progress = progress.ModeQuiet
  156. }
  157. if options.Progress == progress.ModeAuto {
  158. options.Progress = os.Getenv("BUILDKIT_PROGRESS")
  159. }
  160. w, err = xprogress.NewPrinter(progressCtx, s.stdout(), progressui.DisplayMode(options.Progress),
  161. xprogress.WithDesc(
  162. fmt.Sprintf("building with %q instance using %s driver", b.Name, b.Driver),
  163. fmt.Sprintf("%s:%s", b.Driver, b.Name),
  164. ))
  165. if err != nil {
  166. return nil, err
  167. }
  168. }
  169. // we use a pre-allocated []string to collect build digest by service index while running concurrent goroutines
  170. builtDigests := make([]string, len(project.Services))
  171. names := project.ServiceNames()
  172. getServiceIndex := func(name string) int {
  173. for idx, n := range names {
  174. if n == name {
  175. return idx
  176. }
  177. }
  178. return -1
  179. }
  180. err = InDependencyOrder(ctx, project, func(ctx context.Context, name string) error {
  181. service, ok := serviceToBuild[name]
  182. if !ok {
  183. return nil
  184. }
  185. if !buildkitEnabled {
  186. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "classic"))
  187. id, err := s.doBuildClassic(ctx, project, service, options)
  188. if err != nil {
  189. return err
  190. }
  191. builtDigests[getServiceIndex(name)] = id
  192. if options.Push {
  193. return s.push(ctx, project, api.PushOptions{})
  194. }
  195. return nil
  196. }
  197. if options.Memory != 0 {
  198. _, _ = fmt.Fprintln(s.stderr(), "WARNING: --memory is not supported by BuildKit and will be ignored")
  199. }
  200. buildOptions, err := s.toBuildOptions(project, service, options)
  201. if err != nil {
  202. return err
  203. }
  204. s.events.On(progress.BuildingEvent("Image " + buildOptions.Tags[0]))
  205. trace.SpanFromContext(ctx).SetAttributes(attribute.String("builder", "buildkit"))
  206. digest, err := s.doBuildBuildkit(ctx, name, buildOptions, w, nodes)
  207. if err != nil {
  208. return err
  209. }
  210. builtDigests[getServiceIndex(name)] = digest
  211. return nil
  212. }, func(traversal *graphTraversal) {
  213. traversal.maxConcurrency = s.maxConcurrency
  214. })
  215. // enforce all build event get consumed
  216. if buildkitEnabled {
  217. if errw := w.Wait(); errw != nil {
  218. return nil, errw
  219. }
  220. }
  221. if err != nil {
  222. return nil, err
  223. }
  224. for i, imageDigest := range builtDigests {
  225. if imageDigest != "" {
  226. service := project.Services[names[i]]
  227. imageRef := api.GetImageNameOrDefault(service, project.Name)
  228. imageIDs[imageRef] = imageDigest
  229. s.events.On(progress.BuiltEvent("Image " + imageRef))
  230. }
  231. }
  232. return imageIDs, err
  233. }
  234. func (s *composeService) ensureImagesExists(ctx context.Context, project *types.Project, buildOpts *api.BuildOptions, quietPull bool) error {
  235. for name, service := range project.Services {
  236. if service.Provider == nil && service.Image == "" && service.Build == nil {
  237. return fmt.Errorf("invalid service %q. Must specify either image or build", name)
  238. }
  239. }
  240. images, err := s.getLocalImagesDigests(ctx, project)
  241. if err != nil {
  242. return err
  243. }
  244. err = tracing.SpanWrapFunc("project/pull", tracing.ProjectOptions(ctx, project),
  245. func(ctx context.Context) error {
  246. return s.pullRequiredImages(ctx, project, images, quietPull)
  247. },
  248. )(ctx)
  249. if err != nil {
  250. return err
  251. }
  252. if buildOpts != nil {
  253. err = tracing.SpanWrapFunc("project/build", tracing.ProjectOptions(ctx, project),
  254. func(ctx context.Context) error {
  255. builtImages, err := s.build(ctx, project, *buildOpts, images)
  256. if err != nil {
  257. return err
  258. }
  259. for name, digest := range builtImages {
  260. images[name] = api.ImageSummary{
  261. Repository: name,
  262. ID: digest,
  263. LastTagTime: time.Now(),
  264. }
  265. }
  266. return nil
  267. },
  268. )(ctx)
  269. if err != nil {
  270. return err
  271. }
  272. }
  273. // set digest as com.docker.compose.image label so we can detect outdated containers
  274. for name, service := range project.Services {
  275. image := api.GetImageNameOrDefault(service, project.Name)
  276. img, ok := images[image]
  277. if ok {
  278. service.CustomLabels.Add(api.ImageDigestLabel, img.ID)
  279. }
  280. project.Services[name] = service
  281. }
  282. return nil
  283. }
  284. func (s *composeService) getLocalImagesDigests(ctx context.Context, project *types.Project) (map[string]api.ImageSummary, error) {
  285. imageNames := utils.Set[string]{}
  286. for _, s := range project.Services {
  287. imageNames.Add(api.GetImageNameOrDefault(s, project.Name))
  288. for _, volume := range s.Volumes {
  289. if volume.Type == types.VolumeTypeImage {
  290. imageNames.Add(volume.Source)
  291. }
  292. }
  293. }
  294. imgs, err := s.getImageSummaries(ctx, imageNames.Elements())
  295. if err != nil {
  296. return nil, err
  297. }
  298. for i, service := range project.Services {
  299. imgName := api.GetImageNameOrDefault(service, project.Name)
  300. img, ok := imgs[imgName]
  301. if !ok {
  302. continue
  303. }
  304. if service.Platform != "" {
  305. platform, err := platforms.Parse(service.Platform)
  306. if err != nil {
  307. return nil, err
  308. }
  309. inspect, err := s.apiClient().ImageInspect(ctx, img.ID)
  310. if err != nil {
  311. return nil, err
  312. }
  313. actual := specs.Platform{
  314. Architecture: inspect.Architecture,
  315. OS: inspect.Os,
  316. Variant: inspect.Variant,
  317. }
  318. if !platforms.NewMatcher(platform).Match(actual) {
  319. logrus.Debugf("local image %s doesn't match expected platform %s", service.Image, service.Platform)
  320. // there is a local image, but it's for the wrong platform, so
  321. // pretend it doesn't exist so that we can pull/build an image
  322. // for the correct platform instead
  323. delete(imgs, imgName)
  324. }
  325. }
  326. project.Services[i].CustomLabels.Add(api.ImageDigestLabel, img.ID)
  327. }
  328. return imgs, nil
  329. }
  330. // resolveAndMergeBuildArgs returns the final set of build arguments to use for the service image build.
  331. //
  332. // First, args directly defined via `build.args` in YAML are considered.
  333. // Then, any explicitly passed args in opts (e.g. via `--build-arg` on the CLI) are merged, overwriting any
  334. // keys that already exist.
  335. // Next, any keys without a value are resolved using the project environment.
  336. //
  337. // Finally, standard proxy variables based on the Docker client configuration are added, but will not overwrite
  338. // any values if already present.
  339. func resolveAndMergeBuildArgs(proxyConfig map[string]string, project *types.Project, service types.ServiceConfig, opts api.BuildOptions) types.MappingWithEquals {
  340. result := make(types.MappingWithEquals).
  341. OverrideBy(service.Build.Args).
  342. OverrideBy(opts.Args).
  343. Resolve(envResolver(project.Environment))
  344. // proxy arguments do NOT override and should NOT have env resolution applied,
  345. // so they're handled last
  346. for k, v := range proxyConfig {
  347. if _, ok := result[k]; !ok {
  348. v := v
  349. result[k] = &v
  350. }
  351. }
  352. return result
  353. }
  354. //nolint:gocyclo
  355. func (s *composeService) toBuildOptions(project *types.Project, service types.ServiceConfig, options api.BuildOptions) (build.Options, error) {
  356. plats, err := parsePlatforms(service)
  357. if err != nil {
  358. return build.Options{}, err
  359. }
  360. cacheFrom, err := buildflags.ParseCacheEntry(service.Build.CacheFrom)
  361. if err != nil {
  362. return build.Options{}, err
  363. }
  364. cacheTo, err := buildflags.ParseCacheEntry(service.Build.CacheTo)
  365. if err != nil {
  366. return build.Options{}, err
  367. }
  368. sessionConfig := []session.Attachable{
  369. authprovider.NewDockerAuthProvider(authprovider.DockerAuthProviderConfig{
  370. ConfigFile: s.configFile(),
  371. }),
  372. }
  373. if len(options.SSHs) > 0 || len(service.Build.SSH) > 0 {
  374. sshAgentProvider, err := sshAgentProvider(append(service.Build.SSH, options.SSHs...))
  375. if err != nil {
  376. return build.Options{}, err
  377. }
  378. sessionConfig = append(sessionConfig, sshAgentProvider)
  379. }
  380. if len(service.Build.Secrets) > 0 {
  381. secretsProvider, err := addSecretsConfig(project, service)
  382. if err != nil {
  383. return build.Options{}, err
  384. }
  385. sessionConfig = append(sessionConfig, secretsProvider)
  386. }
  387. tags := []string{api.GetImageNameOrDefault(service, project.Name)}
  388. if len(service.Build.Tags) > 0 {
  389. tags = append(tags, service.Build.Tags...)
  390. }
  391. allow, err := buildflags.ParseEntitlements(service.Build.Entitlements)
  392. if err != nil {
  393. return build.Options{}, err
  394. }
  395. if service.Build.Privileged {
  396. allow = append(allow, entitlements.EntitlementSecurityInsecure.String())
  397. }
  398. imageLabels := getImageBuildLabels(project, service)
  399. push := options.Push && service.Image != ""
  400. exports := []bclient.ExportEntry{{
  401. Type: "docker",
  402. Attrs: map[string]string{
  403. "load": "true",
  404. "push": fmt.Sprint(push),
  405. },
  406. }}
  407. if len(service.Build.Platforms) > 1 {
  408. exports = []bclient.ExportEntry{{
  409. Type: "image",
  410. Attrs: map[string]string{
  411. "push": fmt.Sprint(push),
  412. },
  413. }}
  414. }
  415. sp, err := build.ReadSourcePolicy()
  416. if err != nil {
  417. return build.Options{}, err
  418. }
  419. attests := map[string]*string{}
  420. if options.Attestations {
  421. if service.Build.Provenance != "" {
  422. attests["provenance"] = attestation(service.Build.Provenance, "provenance")
  423. }
  424. if service.Build.SBOM != "" {
  425. attests["sbom"] = attestation(service.Build.SBOM, "sbom")
  426. }
  427. }
  428. if options.Provenance != "" {
  429. attests["provenance"] = attestation(options.Provenance, "provenance")
  430. }
  431. if options.SBOM != "" {
  432. attests["sbom"] = attestation(options.SBOM, "sbom")
  433. }
  434. return build.Options{
  435. Inputs: build.Inputs{
  436. ContextPath: service.Build.Context,
  437. DockerfileInline: service.Build.DockerfileInline,
  438. DockerfilePath: dockerFilePath(service.Build.Context, service.Build.Dockerfile),
  439. NamedContexts: toBuildContexts(service, project),
  440. },
  441. CacheFrom: build.CreateCaches(cacheFrom),
  442. CacheTo: build.CreateCaches(cacheTo),
  443. NoCache: service.Build.NoCache,
  444. Pull: service.Build.Pull,
  445. BuildArgs: flatten(resolveAndMergeBuildArgs(s.getProxyConfig(), project, service, options)),
  446. Tags: tags,
  447. Target: service.Build.Target,
  448. Exports: exports,
  449. Platforms: plats,
  450. Labels: imageLabels,
  451. NetworkMode: service.Build.Network,
  452. ExtraHosts: service.Build.ExtraHosts.AsList(":"),
  453. Ulimits: toUlimitOpt(service.Build.Ulimits),
  454. Session: sessionConfig,
  455. Allow: allow,
  456. SourcePolicy: sp,
  457. Attests: attests,
  458. }, nil
  459. }
  460. func attestation(attest string, val string) *string {
  461. if b, err := strconv.ParseBool(val); err == nil {
  462. s := fmt.Sprintf("type=%s,disabled=%t", attest, b)
  463. return &s
  464. } else {
  465. s := fmt.Sprintf("type=%s,%s", attest, val)
  466. return &s
  467. }
  468. }
  469. func toUlimitOpt(ulimits map[string]*types.UlimitsConfig) *cliopts.UlimitOpt {
  470. ref := map[string]*container.Ulimit{}
  471. for _, limit := range toUlimits(ulimits) {
  472. ref[limit.Name] = &container.Ulimit{
  473. Name: limit.Name,
  474. Hard: limit.Hard,
  475. Soft: limit.Soft,
  476. }
  477. }
  478. return cliopts.NewUlimitOpt(&ref)
  479. }
  480. func flatten(in types.MappingWithEquals) types.Mapping {
  481. out := types.Mapping{}
  482. if len(in) == 0 {
  483. return out
  484. }
  485. for k, v := range in {
  486. if v == nil {
  487. continue
  488. }
  489. out[k] = *v
  490. }
  491. return out
  492. }
  493. func sshAgentProvider(sshKeys types.SSHConfig) (session.Attachable, error) {
  494. sshConfig := make([]sshprovider.AgentConfig, 0, len(sshKeys))
  495. for _, sshKey := range sshKeys {
  496. sshConfig = append(sshConfig, sshprovider.AgentConfig{
  497. ID: sshKey.ID,
  498. Paths: []string{sshKey.Path},
  499. })
  500. }
  501. return sshprovider.NewSSHAgentProvider(sshConfig)
  502. }
  503. func addSecretsConfig(project *types.Project, service types.ServiceConfig) (session.Attachable, error) {
  504. var sources []secretsprovider.Source
  505. for _, secret := range service.Build.Secrets {
  506. config := project.Secrets[secret.Source]
  507. id := secret.Source
  508. if secret.Target != "" {
  509. id = secret.Target
  510. }
  511. switch {
  512. case config.File != "":
  513. sources = append(sources, secretsprovider.Source{
  514. ID: id,
  515. FilePath: config.File,
  516. })
  517. case config.Environment != "":
  518. sources = append(sources, secretsprovider.Source{
  519. ID: id,
  520. Env: config.Environment,
  521. })
  522. default:
  523. return nil, fmt.Errorf("build.secrets only supports environment or file-based secrets: %q", secret.Source)
  524. }
  525. if secret.UID != "" || secret.GID != "" || secret.Mode != nil {
  526. logrus.Warn("secrets `uid`, `gid` and `mode` are not supported by BuildKit, they will be ignored")
  527. }
  528. }
  529. store, err := secretsprovider.NewStore(sources)
  530. if err != nil {
  531. return nil, err
  532. }
  533. return secretsprovider.NewSecretProvider(store), nil
  534. }
  535. func getImageBuildLabels(project *types.Project, service types.ServiceConfig) types.Labels {
  536. ret := make(types.Labels)
  537. if service.Build != nil {
  538. for k, v := range service.Build.Labels {
  539. ret.Add(k, v)
  540. }
  541. }
  542. ret.Add(api.VersionLabel, api.ComposeVersion)
  543. ret.Add(api.ProjectLabel, project.Name)
  544. ret.Add(api.ServiceLabel, service.Name)
  545. return ret
  546. }
  547. func toBuildContexts(service types.ServiceConfig, project *types.Project) map[string]build.NamedContext {
  548. namedContexts := map[string]build.NamedContext{}
  549. for name, contextPath := range service.Build.AdditionalContexts {
  550. if strings.HasPrefix(contextPath, types.ServicePrefix) {
  551. // image we depend on has been built previously, as we run in dependency order.
  552. // so we convert the service reference into an image reference
  553. target := contextPath[len(types.ServicePrefix):]
  554. image := api.GetImageNameOrDefault(project.Services[target], project.Name)
  555. contextPath = "docker-image://" + image
  556. }
  557. namedContexts[name] = build.NamedContext{Path: contextPath}
  558. }
  559. return namedContexts
  560. }
  561. func parsePlatforms(service types.ServiceConfig) ([]specs.Platform, error) {
  562. if service.Build == nil || len(service.Build.Platforms) == 0 {
  563. return nil, nil
  564. }
  565. var errs []error
  566. ret := make([]specs.Platform, len(service.Build.Platforms))
  567. for i := range service.Build.Platforms {
  568. p, err := platforms.Parse(service.Build.Platforms[i])
  569. if err != nil {
  570. errs = append(errs, err)
  571. } else {
  572. ret[i] = p
  573. }
  574. }
  575. if err := errors.Join(errs...); err != nil {
  576. return nil, err
  577. }
  578. return ret, nil
  579. }
  580. func addBuildDependencies(services []string, project *types.Project) []string {
  581. servicesWithDependencies := utils.NewSet(services...)
  582. for _, service := range services {
  583. s, ok := project.Services[service]
  584. if !ok {
  585. s = project.DisabledServices[service]
  586. }
  587. b := s.Build
  588. if b != nil {
  589. for _, target := range b.AdditionalContexts {
  590. if s, found := strings.CutPrefix(target, types.ServicePrefix); found {
  591. servicesWithDependencies.Add(s)
  592. }
  593. }
  594. }
  595. }
  596. if len(servicesWithDependencies) > len(services) {
  597. return addBuildDependencies(servicesWithDependencies.Elements(), project)
  598. }
  599. return servicesWithDependencies.Elements()
  600. }