mirror of
				https://gitea.com/Lydanne/buildx.git
				synced 2025-11-04 10:03:42 +08:00 
			
		
		
		
	Set `UsernsMode="host"` only when the daemon is running in userns-remapping mode. Fix issue 561 The issue will be also fixed in moby/moby PR 43084 (Docker 20.10.13). This buildx PR helps users of old releases of Docker. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
		
			
				
	
	
		
			86 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			86 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package docker
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/docker/buildx/driver"
 | 
						|
	dockertypes "github.com/docker/docker/api/types"
 | 
						|
	dockerclient "github.com/docker/docker/client"
 | 
						|
	"github.com/pkg/errors"
 | 
						|
)
 | 
						|
 | 
						|
const prioritySupported = 30
 | 
						|
const priorityUnsupported = 70
 | 
						|
 | 
						|
func init() {
 | 
						|
	driver.Register(&factory{})
 | 
						|
}
 | 
						|
 | 
						|
type factory struct {
 | 
						|
}
 | 
						|
 | 
						|
func (*factory) Name() string {
 | 
						|
	return "docker-container"
 | 
						|
}
 | 
						|
 | 
						|
func (*factory) Usage() string {
 | 
						|
	return "docker-container"
 | 
						|
}
 | 
						|
 | 
						|
func (*factory) Priority(ctx context.Context, api dockerclient.APIClient) int {
 | 
						|
	if api == nil {
 | 
						|
		return priorityUnsupported
 | 
						|
	}
 | 
						|
	return prioritySupported
 | 
						|
}
 | 
						|
 | 
						|
func (f *factory) New(ctx context.Context, cfg driver.InitConfig) (driver.Driver, error) {
 | 
						|
	if cfg.DockerAPI == nil {
 | 
						|
		return nil, errors.Errorf("%s driver requires docker API access", f.Name())
 | 
						|
	}
 | 
						|
	d := &Driver{factory: f, InitConfig: cfg}
 | 
						|
	dockerInfo, err := cfg.DockerAPI.Info(ctx)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	secOpts, err := dockertypes.DecodeSecurityOptions(dockerInfo.SecurityOptions)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	for _, f := range secOpts {
 | 
						|
		if f.Name == "userns" {
 | 
						|
			d.userNSRemap = true
 | 
						|
			break
 | 
						|
		}
 | 
						|
	}
 | 
						|
	for k, v := range cfg.DriverOpts {
 | 
						|
		switch {
 | 
						|
		case k == "network":
 | 
						|
			d.netMode = v
 | 
						|
			if v == "host" {
 | 
						|
				d.InitConfig.BuildkitFlags = append(d.InitConfig.BuildkitFlags, "--allow-insecure-entitlement=network.host")
 | 
						|
			}
 | 
						|
		case k == "image":
 | 
						|
			d.image = v
 | 
						|
		case k == "cgroup-parent":
 | 
						|
			d.cgroupParent = v
 | 
						|
		case strings.HasPrefix(k, "env."):
 | 
						|
			envName := strings.TrimPrefix(k, "env.")
 | 
						|
			if envName == "" {
 | 
						|
				return nil, errors.Errorf("invalid env option %q, expecting env.FOO=bar", k)
 | 
						|
			}
 | 
						|
			d.env = append(d.env, fmt.Sprintf("%s=%s", envName, v))
 | 
						|
		default:
 | 
						|
			return nil, errors.Errorf("invalid driver option %s for docker-container driver", k)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return d, nil
 | 
						|
}
 | 
						|
 | 
						|
func (f *factory) AllowsInstances() bool {
 | 
						|
	return true
 | 
						|
}
 |