build_bake.go 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "bufio"
  16. "bytes"
  17. "context"
  18. "crypto/sha1"
  19. "encoding/json"
  20. "errors"
  21. "fmt"
  22. "io"
  23. "io/fs"
  24. "os"
  25. "os/exec"
  26. "path/filepath"
  27. "slices"
  28. "strconv"
  29. "strings"
  30. "github.com/compose-spec/compose-go/v2/types"
  31. "github.com/containerd/errdefs"
  32. "github.com/docker/cli/cli-plugins/manager"
  33. "github.com/docker/cli/cli/command"
  34. "github.com/docker/cli/cli/command/image/build"
  35. "github.com/docker/compose/v2/pkg/api"
  36. "github.com/docker/compose/v2/pkg/progress"
  37. "github.com/docker/docker/api/types/versions"
  38. "github.com/google/uuid"
  39. "github.com/moby/buildkit/client"
  40. gitutil "github.com/moby/buildkit/frontend/dockerfile/dfgitutil"
  41. "github.com/moby/buildkit/util/progress/progressui"
  42. "github.com/sirupsen/logrus"
  43. "github.com/spf13/cobra"
  44. "golang.org/x/sync/errgroup"
  45. )
  46. func buildWithBake(dockerCli command.Cli) (bool, error) {
  47. b, ok := os.LookupEnv("COMPOSE_BAKE")
  48. if !ok {
  49. b = "true"
  50. }
  51. bake, err := strconv.ParseBool(b)
  52. if err != nil {
  53. return false, err
  54. }
  55. if !bake {
  56. if ok {
  57. logrus.Warnf("COMPOSE_BAKE=false is deprecated, support for internal compose builder will be removed in next release")
  58. }
  59. return false, nil
  60. }
  61. enabled, err := dockerCli.BuildKitEnabled()
  62. if err != nil {
  63. return false, err
  64. }
  65. if !enabled {
  66. logrus.Warnf("Docker Compose is configured to build using Bake, but buildkit isn't enabled")
  67. return false, nil
  68. }
  69. _, err = manager.GetPlugin("buildx", dockerCli, &cobra.Command{})
  70. if err != nil {
  71. if errdefs.IsNotFound(err) {
  72. logrus.Warnf("Docker Compose is configured to build using Bake, but buildx isn't installed")
  73. return false, nil
  74. }
  75. return false, err
  76. }
  77. return true, err
  78. }
  79. // We _could_ use bake.* types from github.com/docker/buildx but long term plan is to remove buildx as a dependency
  80. type bakeConfig struct {
  81. Groups map[string]bakeGroup `json:"group"`
  82. Targets map[string]bakeTarget `json:"target"`
  83. }
  84. type bakeGroup struct {
  85. Targets []string `json:"targets"`
  86. }
  87. type bakeTarget struct {
  88. Context string `json:"context,omitempty"`
  89. Contexts map[string]string `json:"contexts,omitempty"`
  90. Dockerfile string `json:"dockerfile,omitempty"`
  91. DockerfileInline string `json:"dockerfile-inline,omitempty"`
  92. Args map[string]string `json:"args,omitempty"`
  93. Labels map[string]string `json:"labels,omitempty"`
  94. Tags []string `json:"tags,omitempty"`
  95. CacheFrom []string `json:"cache-from,omitempty"`
  96. CacheTo []string `json:"cache-to,omitempty"`
  97. Target string `json:"target,omitempty"`
  98. Secrets []string `json:"secret,omitempty"`
  99. SSH []string `json:"ssh,omitempty"`
  100. Platforms []string `json:"platforms,omitempty"`
  101. Pull bool `json:"pull,omitempty"`
  102. NoCache bool `json:"no-cache,omitempty"`
  103. NetworkMode string `json:"network,omitempty"`
  104. NoCacheFilter []string `json:"no-cache-filter,omitempty"`
  105. ShmSize types.UnitBytes `json:"shm-size,omitempty"`
  106. Ulimits []string `json:"ulimits,omitempty"`
  107. Call string `json:"call,omitempty"`
  108. Entitlements []string `json:"entitlements,omitempty"`
  109. ExtraHosts map[string]string `json:"extra-hosts,omitempty"`
  110. Outputs []string `json:"output,omitempty"`
  111. Attest []string `json:"attest,omitempty"`
  112. }
  113. type bakeMetadata map[string]buildStatus
  114. type buildStatus struct {
  115. Digest string `json:"containerimage.digest"`
  116. Image string `json:"image.name"`
  117. }
  118. func (s *composeService) doBuildBake(ctx context.Context, project *types.Project, serviceToBeBuild types.Services, options api.BuildOptions) (map[string]string, error) { //nolint:gocyclo
  119. eg := errgroup.Group{}
  120. ch := make(chan *client.SolveStatus)
  121. if options.Progress == progress.ModeAuto {
  122. options.Progress = os.Getenv("BUILDKIT_PROGRESS")
  123. }
  124. displayMode := progressui.DisplayMode(options.Progress)
  125. out := options.Out
  126. if out == nil {
  127. if displayMode == progress.ModeAuto && !s.dockerCli.Out().IsTerminal() {
  128. displayMode = progressui.PlainMode
  129. }
  130. out = os.Stdout // should be s.dockerCli.Out(), but NewDisplay require access to the underlying *File
  131. }
  132. display, err := progressui.NewDisplay(out, displayMode)
  133. if err != nil {
  134. return nil, err
  135. }
  136. eg.Go(func() error {
  137. _, err := display.UpdateFrom(ctx, ch)
  138. return err
  139. })
  140. cfg := bakeConfig{
  141. Groups: map[string]bakeGroup{},
  142. Targets: map[string]bakeTarget{},
  143. }
  144. var (
  145. group bakeGroup
  146. privileged bool
  147. read []string
  148. expectedImages = make(map[string]string, len(serviceToBeBuild)) // service name -> expected image
  149. targets = make(map[string]string, len(serviceToBeBuild)) // service name -> build target
  150. )
  151. // produce a unique ID for service used as bake target
  152. for serviceName := range project.Services {
  153. t := strings.ReplaceAll(serviceName, ".", "_")
  154. for {
  155. if _, ok := targets[serviceName]; !ok {
  156. targets[serviceName] = t
  157. break
  158. }
  159. t += "_"
  160. }
  161. }
  162. var secretsEnv []string
  163. for serviceName, service := range project.Services {
  164. if service.Build == nil {
  165. continue
  166. }
  167. build := *service.Build
  168. labels := getImageBuildLabels(project, service)
  169. args := resolveAndMergeBuildArgs(s.dockerCli, project, service, options).ToMapping()
  170. for k, v := range args {
  171. args[k] = strings.ReplaceAll(v, "${", "$${")
  172. }
  173. entitlements := build.Entitlements
  174. if slices.Contains(build.Entitlements, "security.insecure") {
  175. privileged = true
  176. }
  177. if build.Privileged {
  178. entitlements = append(entitlements, "security.insecure")
  179. privileged = true
  180. }
  181. var outputs []string
  182. var call string
  183. push := options.Push && service.Image != ""
  184. switch {
  185. case options.Check:
  186. call = "lint"
  187. case len(service.Build.Platforms) > 1:
  188. outputs = []string{fmt.Sprintf("type=image,push=%t", push)}
  189. default:
  190. if push {
  191. outputs = []string{"type=registry"}
  192. } else {
  193. outputs = []string{"type=docker"}
  194. }
  195. }
  196. read = append(read, build.Context)
  197. for _, path := range build.AdditionalContexts {
  198. _, _, err := gitutil.ParseGitRef(path)
  199. if !strings.Contains(path, "://") && err != nil {
  200. read = append(read, path)
  201. }
  202. }
  203. image := api.GetImageNameOrDefault(service, project.Name)
  204. expectedImages[serviceName] = image
  205. pull := service.Build.Pull || options.Pull
  206. noCache := service.Build.NoCache || options.NoCache
  207. target := targets[serviceName]
  208. secrets, env := toBakeSecrets(project, build.Secrets)
  209. secretsEnv = append(secretsEnv, env...)
  210. cfg.Targets[target] = bakeTarget{
  211. Context: build.Context,
  212. Contexts: additionalContexts(build.AdditionalContexts, targets),
  213. Dockerfile: dockerFilePath(build.Context, build.Dockerfile),
  214. DockerfileInline: strings.ReplaceAll(build.DockerfileInline, "${", "$${"),
  215. Args: args,
  216. Labels: labels,
  217. Tags: append(build.Tags, image),
  218. CacheFrom: build.CacheFrom,
  219. CacheTo: build.CacheTo,
  220. NetworkMode: build.Network,
  221. Platforms: build.Platforms,
  222. Target: build.Target,
  223. Secrets: secrets,
  224. SSH: toBakeSSH(append(build.SSH, options.SSHs...)),
  225. Pull: pull,
  226. NoCache: noCache,
  227. ShmSize: build.ShmSize,
  228. Ulimits: toBakeUlimits(build.Ulimits),
  229. Entitlements: entitlements,
  230. ExtraHosts: toBakeExtraHosts(build.ExtraHosts),
  231. Outputs: outputs,
  232. Call: call,
  233. Attest: toBakeAttest(build),
  234. }
  235. }
  236. // create a bake group with targets for services to build
  237. for serviceName, service := range serviceToBeBuild {
  238. if service.Build == nil {
  239. continue
  240. }
  241. group.Targets = append(group.Targets, targets[serviceName])
  242. }
  243. cfg.Groups["default"] = group
  244. b, err := json.MarshalIndent(cfg, "", " ")
  245. if err != nil {
  246. return nil, err
  247. }
  248. if options.Print {
  249. _, err = fmt.Fprintln(s.stdout(), string(b))
  250. return nil, err
  251. }
  252. logrus.Debugf("bake build config:\n%s", string(b))
  253. tmpdir := os.TempDir()
  254. var metadataFile string
  255. for {
  256. // we don't use os.CreateTemp here as we need a temporary file name, but don't want it actually created
  257. // as bake relies on atomicwriter and this creates conflict during rename
  258. metadataFile = filepath.Join(tmpdir, fmt.Sprintf("compose-build-metadataFile-%s.json", uuid.New().String()))
  259. if _, err = os.Stat(metadataFile); err != nil {
  260. if os.IsNotExist(err) {
  261. break
  262. }
  263. var pathError *fs.PathError
  264. if errors.As(err, &pathError) {
  265. return nil, fmt.Errorf("can't acces os.tempDir %s: %w", tmpdir, pathError.Err)
  266. }
  267. }
  268. }
  269. defer func() {
  270. _ = os.Remove(metadataFile)
  271. }()
  272. buildx, err := manager.GetPlugin("buildx", s.dockerCli, &cobra.Command{})
  273. if err != nil {
  274. return nil, err
  275. }
  276. if versions.LessThan(buildx.Version[1:], "0.17.0") {
  277. return nil, fmt.Errorf("compose build requires buildx 0.17 or later")
  278. }
  279. args := []string{"bake", "--file", "-", "--progress", "rawjson", "--metadata-file", metadataFile}
  280. // FIXME we should prompt user about this, but this is a breaking change in UX
  281. for _, path := range read {
  282. args = append(args, "--allow", "fs.read="+path)
  283. }
  284. if privileged {
  285. args = append(args, "--allow", "security.insecure")
  286. }
  287. if options.SBOM != "" {
  288. args = append(args, "--sbom="+options.SBOM)
  289. }
  290. if options.Provenance != "" {
  291. args = append(args, "--provenance="+options.Provenance)
  292. }
  293. if options.Builder != "" {
  294. args = append(args, "--builder", options.Builder)
  295. }
  296. if options.Quiet {
  297. args = append(args, "--progress=quiet")
  298. }
  299. logrus.Debugf("Executing bake with args: %v", args)
  300. if s.dryRun {
  301. return dryRunBake(ctx, cfg), nil
  302. }
  303. cmd := exec.CommandContext(ctx, buildx.Path, args...)
  304. err = s.prepareShellOut(ctx, types.NewMapping(os.Environ()), cmd)
  305. if err != nil {
  306. return nil, err
  307. }
  308. endpoint, cleanup, err := s.propagateDockerEndpoint()
  309. if err != nil {
  310. return nil, err
  311. }
  312. cmd.Env = append(cmd.Env, endpoint...)
  313. cmd.Env = append(cmd.Env, secretsEnv...)
  314. defer cleanup()
  315. cmd.Stdout = s.stdout()
  316. cmd.Stdin = bytes.NewBuffer(b)
  317. pipe, err := cmd.StderrPipe()
  318. if err != nil {
  319. return nil, err
  320. }
  321. var errMessage []string
  322. reader := bufio.NewReader(pipe)
  323. err = cmd.Start()
  324. if err != nil {
  325. return nil, err
  326. }
  327. eg.Go(cmd.Wait)
  328. for {
  329. line, readErr := reader.ReadString('\n')
  330. if readErr != nil {
  331. if readErr == io.EOF {
  332. break
  333. }
  334. if errors.Is(readErr, os.ErrClosed) {
  335. logrus.Debugf("bake stopped")
  336. break
  337. }
  338. return nil, fmt.Errorf("failed to execute bake: %w", readErr)
  339. }
  340. decoder := json.NewDecoder(strings.NewReader(line))
  341. var status client.SolveStatus
  342. err := decoder.Decode(&status)
  343. if err != nil {
  344. if strings.HasPrefix(line, "ERROR: ") {
  345. errMessage = append(errMessage, line[7:])
  346. } else {
  347. errMessage = append(errMessage, line)
  348. }
  349. continue
  350. }
  351. ch <- &status
  352. }
  353. close(ch) // stop build progress UI
  354. err = eg.Wait()
  355. if err != nil {
  356. if len(errMessage) > 0 {
  357. return nil, errors.New(strings.Join(errMessage, "\n"))
  358. }
  359. return nil, fmt.Errorf("failed to execute bake: %w", err)
  360. }
  361. b, err = os.ReadFile(metadataFile)
  362. if err != nil {
  363. return nil, err
  364. }
  365. var md bakeMetadata
  366. err = json.Unmarshal(b, &md)
  367. if err != nil {
  368. return nil, err
  369. }
  370. cw := progress.ContextWriter(ctx)
  371. results := map[string]string{}
  372. for name := range serviceToBeBuild {
  373. image := expectedImages[name]
  374. target := targets[name]
  375. built, ok := md[target]
  376. if !ok {
  377. return nil, fmt.Errorf("build result not found in Bake metadata for service %s", name)
  378. }
  379. results[image] = built.Digest
  380. cw.Event(progress.BuiltEvent(image))
  381. }
  382. return results, nil
  383. }
  384. func toBakeExtraHosts(hosts types.HostsList) map[string]string {
  385. m := make(map[string]string)
  386. for k, v := range hosts {
  387. m[k] = strings.Join(v, ",")
  388. }
  389. return m
  390. }
  391. func additionalContexts(contexts types.Mapping, targets map[string]string) map[string]string {
  392. ac := map[string]string{}
  393. for k, v := range contexts {
  394. if target, found := strings.CutPrefix(v, types.ServicePrefix); found {
  395. v = "target:" + targets[target]
  396. }
  397. ac[k] = v
  398. }
  399. return ac
  400. }
  401. func toBakeUlimits(ulimits map[string]*types.UlimitsConfig) []string {
  402. s := []string{}
  403. for u, l := range ulimits {
  404. if l.Single > 0 {
  405. s = append(s, fmt.Sprintf("%s=%d", u, l.Single))
  406. } else {
  407. s = append(s, fmt.Sprintf("%s=%d:%d", u, l.Soft, l.Hard))
  408. }
  409. }
  410. return s
  411. }
  412. func toBakeSSH(ssh types.SSHConfig) []string {
  413. var s []string
  414. for _, key := range ssh {
  415. s = append(s, fmt.Sprintf("%s=%s", key.ID, key.Path))
  416. }
  417. return s
  418. }
  419. func toBakeSecrets(project *types.Project, secrets []types.ServiceSecretConfig) ([]string, []string) {
  420. var s []string
  421. var env []string
  422. for _, ref := range secrets {
  423. def := project.Secrets[ref.Source]
  424. target := ref.Target
  425. if target == "" {
  426. target = ref.Source
  427. }
  428. switch {
  429. case def.Environment != "":
  430. env = append(env, fmt.Sprintf("%s=%s", def.Environment, project.Environment[def.Environment]))
  431. s = append(s, fmt.Sprintf("id=%s,type=env,env=%s", target, def.Environment))
  432. case def.File != "":
  433. s = append(s, fmt.Sprintf("id=%s,type=file,src=%s", target, def.File))
  434. }
  435. }
  436. return s, env
  437. }
  438. func toBakeAttest(build types.BuildConfig) []string {
  439. var attests []string
  440. // Handle per-service provenance configuration (only from build config, not global options)
  441. if build.Provenance != "" {
  442. if build.Provenance == "true" {
  443. attests = append(attests, "type=provenance")
  444. } else if build.Provenance != "false" {
  445. attests = append(attests, fmt.Sprintf("type=provenance,%s", build.Provenance))
  446. }
  447. }
  448. // Handle per-service SBOM configuration (only from build config, not global options)
  449. if build.SBOM != "" {
  450. if build.SBOM == "true" {
  451. attests = append(attests, "type=sbom")
  452. } else if build.SBOM != "false" {
  453. attests = append(attests, fmt.Sprintf("type=sbom,%s", build.SBOM))
  454. }
  455. }
  456. return attests
  457. }
  458. func dockerFilePath(ctxName string, dockerfile string) string {
  459. if dockerfile == "" {
  460. return ""
  461. }
  462. if contextType, _ := build.DetectContextType(ctxName); contextType == build.ContextTypeGit {
  463. return dockerfile
  464. }
  465. if !filepath.IsAbs(dockerfile) {
  466. dockerfile = filepath.Join(ctxName, dockerfile)
  467. }
  468. dir := filepath.Dir(dockerfile)
  469. symlinks, err := filepath.EvalSymlinks(dir)
  470. if err == nil {
  471. return filepath.Join(symlinks, filepath.Base(dockerfile))
  472. }
  473. return dockerfile
  474. }
  475. func dryRunBake(ctx context.Context, cfg bakeConfig) map[string]string {
  476. w := progress.ContextWriter(ctx)
  477. bakeResponse := map[string]string{}
  478. for name, target := range cfg.Targets {
  479. dryRunUUID := fmt.Sprintf("dryRun-%x", sha1.Sum([]byte(name)))
  480. displayDryRunBuildEvent(w, name, dryRunUUID, target.Tags[0])
  481. bakeResponse[name] = dryRunUUID
  482. }
  483. for name := range bakeResponse {
  484. w.Event(progress.BuiltEvent(name))
  485. }
  486. return bakeResponse
  487. }
  488. func displayDryRunBuildEvent(w progress.Writer, name string, dryRunUUID, tag string) {
  489. w.Event(progress.Event{
  490. ID: name + " ==>",
  491. Status: progress.Done,
  492. Text: fmt.Sprintf("==> writing image %s", dryRunUUID),
  493. })
  494. w.Event(progress.Event{
  495. ID: name + " ==> ==>",
  496. Status: progress.Done,
  497. Text: fmt.Sprintf(`naming to %s`, tag),
  498. })
  499. }