mirror of
				https://gitea.com/Lydanne/buildx.git
				synced 2025-11-04 18:13:42 +08:00 
			
		
		
		
	
		
			
				
	
	
		
			293 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			293 lines
		
	
	
		
			8.5 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package client
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"crypto/tls"
 | 
						|
	"crypto/x509"
 | 
						|
	"net"
 | 
						|
	"net/url"
 | 
						|
	"os"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"github.com/containerd/containerd/defaults"
 | 
						|
	grpc_middleware "github.com/grpc-ecosystem/go-grpc-middleware"
 | 
						|
	controlapi "github.com/moby/buildkit/api/services/control"
 | 
						|
	"github.com/moby/buildkit/client/connhelper"
 | 
						|
	"github.com/moby/buildkit/session"
 | 
						|
	"github.com/moby/buildkit/session/grpchijack"
 | 
						|
	"github.com/moby/buildkit/util/appdefaults"
 | 
						|
	"github.com/moby/buildkit/util/grpcerrors"
 | 
						|
	"github.com/moby/buildkit/util/tracing/otlptracegrpc"
 | 
						|
	"github.com/pkg/errors"
 | 
						|
	"go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc"
 | 
						|
	"go.opentelemetry.io/otel/exporters/otlp/otlptrace"
 | 
						|
	"go.opentelemetry.io/otel/propagation"
 | 
						|
	sdktrace "go.opentelemetry.io/otel/sdk/trace"
 | 
						|
	"go.opentelemetry.io/otel/trace"
 | 
						|
	"google.golang.org/grpc"
 | 
						|
	"google.golang.org/grpc/credentials"
 | 
						|
	"google.golang.org/grpc/credentials/insecure"
 | 
						|
)
 | 
						|
 | 
						|
type Client struct {
 | 
						|
	conn          *grpc.ClientConn
 | 
						|
	sessionDialer func(ctx context.Context, proto string, meta map[string][]string) (net.Conn, error)
 | 
						|
}
 | 
						|
 | 
						|
type ClientOpt interface{}
 | 
						|
 | 
						|
// New returns a new buildkit client. Address can be empty for the system-default address.
 | 
						|
func New(ctx context.Context, address string, opts ...ClientOpt) (*Client, error) {
 | 
						|
	gopts := []grpc.DialOption{
 | 
						|
		grpc.WithDefaultCallOptions(grpc.MaxCallRecvMsgSize(defaults.DefaultMaxRecvMsgSize)),
 | 
						|
		grpc.WithDefaultCallOptions(grpc.MaxCallSendMsgSize(defaults.DefaultMaxSendMsgSize)),
 | 
						|
	}
 | 
						|
	needDialer := true
 | 
						|
	needWithInsecure := true
 | 
						|
	tlsServerName := ""
 | 
						|
 | 
						|
	var unary []grpc.UnaryClientInterceptor
 | 
						|
	var stream []grpc.StreamClientInterceptor
 | 
						|
 | 
						|
	var customTracer bool // allows manually setting disabling tracing even if tracer in context
 | 
						|
	var tracerProvider trace.TracerProvider
 | 
						|
	var tracerDelegate TracerDelegate
 | 
						|
	var sessionDialer func(context.Context, string, map[string][]string) (net.Conn, error)
 | 
						|
 | 
						|
	for _, o := range opts {
 | 
						|
		if _, ok := o.(*withFailFast); ok {
 | 
						|
			gopts = append(gopts, grpc.FailOnNonTempDialError(true))
 | 
						|
		}
 | 
						|
		if credInfo, ok := o.(*withCredentials); ok {
 | 
						|
			opt, err := loadCredentials(credInfo)
 | 
						|
			if err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
			gopts = append(gopts, opt)
 | 
						|
			needWithInsecure = false
 | 
						|
			tlsServerName = credInfo.ServerName
 | 
						|
		}
 | 
						|
		if wt, ok := o.(*withTracer); ok {
 | 
						|
			customTracer = true
 | 
						|
			tracerProvider = wt.tp
 | 
						|
		}
 | 
						|
		if wd, ok := o.(*withDialer); ok {
 | 
						|
			gopts = append(gopts, grpc.WithContextDialer(wd.dialer))
 | 
						|
			needDialer = false
 | 
						|
		}
 | 
						|
		if wt, ok := o.(*withTracerDelegate); ok {
 | 
						|
			tracerDelegate = wt
 | 
						|
		}
 | 
						|
		if sd, ok := o.(*withSessionDialer); ok {
 | 
						|
			sessionDialer = sd.dialer
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if !customTracer {
 | 
						|
		if span := trace.SpanFromContext(ctx); span.SpanContext().IsValid() {
 | 
						|
			tracerProvider = span.TracerProvider()
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if tracerProvider != nil {
 | 
						|
		var propagators = propagation.NewCompositeTextMapPropagator(propagation.TraceContext{}, propagation.Baggage{})
 | 
						|
		unary = append(unary, filterInterceptor(otelgrpc.UnaryClientInterceptor(otelgrpc.WithTracerProvider(tracerProvider), otelgrpc.WithPropagators(propagators))))
 | 
						|
		stream = append(stream, otelgrpc.StreamClientInterceptor(otelgrpc.WithTracerProvider(tracerProvider), otelgrpc.WithPropagators(propagators)))
 | 
						|
	}
 | 
						|
 | 
						|
	if needDialer {
 | 
						|
		dialFn, err := resolveDialer(address)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		gopts = append(gopts, grpc.WithContextDialer(dialFn))
 | 
						|
	}
 | 
						|
	if needWithInsecure {
 | 
						|
		gopts = append(gopts, grpc.WithTransportCredentials(insecure.NewCredentials()))
 | 
						|
	}
 | 
						|
	if address == "" {
 | 
						|
		address = appdefaults.Address
 | 
						|
	}
 | 
						|
 | 
						|
	// Setting :authority pseudo header
 | 
						|
	// - HTTP/2 (RFC7540) defines :authority pseudo header includes
 | 
						|
	//   the authority portion of target URI but it must not include
 | 
						|
	//   userinfo part (i.e. url.Host).
 | 
						|
	//   ref: https://datatracker.ietf.org/doc/html/rfc7540#section-8.1.2.3
 | 
						|
	// - However, when TLS specified, grpc-go requires it must match
 | 
						|
	//   with its servername specified for certificate validation.
 | 
						|
	authority := tlsServerName
 | 
						|
	if authority == "" {
 | 
						|
		// authority as hostname from target address
 | 
						|
		uri, err := url.Parse(address)
 | 
						|
		if err != nil {
 | 
						|
			return nil, err
 | 
						|
		}
 | 
						|
		authority = uri.Host
 | 
						|
	}
 | 
						|
	gopts = append(gopts, grpc.WithAuthority(authority))
 | 
						|
 | 
						|
	unary = append(unary, grpcerrors.UnaryClientInterceptor)
 | 
						|
	stream = append(stream, grpcerrors.StreamClientInterceptor)
 | 
						|
 | 
						|
	if len(unary) == 1 {
 | 
						|
		gopts = append(gopts, grpc.WithUnaryInterceptor(unary[0]))
 | 
						|
	} else if len(unary) > 1 {
 | 
						|
		gopts = append(gopts, grpc.WithUnaryInterceptor(grpc_middleware.ChainUnaryClient(unary...)))
 | 
						|
	}
 | 
						|
 | 
						|
	if len(stream) == 1 {
 | 
						|
		gopts = append(gopts, grpc.WithStreamInterceptor(stream[0]))
 | 
						|
	} else if len(stream) > 1 {
 | 
						|
		gopts = append(gopts, grpc.WithStreamInterceptor(grpc_middleware.ChainStreamClient(stream...)))
 | 
						|
	}
 | 
						|
 | 
						|
	conn, err := grpc.DialContext(ctx, address, gopts...)
 | 
						|
	if err != nil {
 | 
						|
		return nil, errors.Wrapf(err, "failed to dial %q . make sure buildkitd is running", address)
 | 
						|
	}
 | 
						|
 | 
						|
	c := &Client{
 | 
						|
		conn:          conn,
 | 
						|
		sessionDialer: sessionDialer,
 | 
						|
	}
 | 
						|
 | 
						|
	if tracerDelegate != nil {
 | 
						|
		_ = c.setupDelegatedTracing(ctx, tracerDelegate) // ignore error
 | 
						|
	}
 | 
						|
 | 
						|
	return c, nil
 | 
						|
}
 | 
						|
 | 
						|
func (c *Client) setupDelegatedTracing(ctx context.Context, td TracerDelegate) error {
 | 
						|
	pd := otlptracegrpc.NewClient(c.conn)
 | 
						|
	e, err := otlptrace.New(ctx, pd)
 | 
						|
	if err != nil {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
	return td.SetSpanExporter(ctx, e)
 | 
						|
}
 | 
						|
 | 
						|
func (c *Client) controlClient() controlapi.ControlClient {
 | 
						|
	return controlapi.NewControlClient(c.conn)
 | 
						|
}
 | 
						|
 | 
						|
func (c *Client) Dialer() session.Dialer {
 | 
						|
	return grpchijack.Dialer(c.controlClient())
 | 
						|
}
 | 
						|
 | 
						|
func (c *Client) Close() error {
 | 
						|
	return c.conn.Close()
 | 
						|
}
 | 
						|
 | 
						|
type withFailFast struct{}
 | 
						|
 | 
						|
func WithFailFast() ClientOpt {
 | 
						|
	return &withFailFast{}
 | 
						|
}
 | 
						|
 | 
						|
type withDialer struct {
 | 
						|
	dialer func(context.Context, string) (net.Conn, error)
 | 
						|
}
 | 
						|
 | 
						|
func WithContextDialer(df func(context.Context, string) (net.Conn, error)) ClientOpt {
 | 
						|
	return &withDialer{dialer: df}
 | 
						|
}
 | 
						|
 | 
						|
type withCredentials struct {
 | 
						|
	ServerName string
 | 
						|
	CACert     string
 | 
						|
	Cert       string
 | 
						|
	Key        string
 | 
						|
}
 | 
						|
 | 
						|
// WithCredentials configures the TLS parameters of the client.
 | 
						|
// Arguments:
 | 
						|
// * serverName: specifies the name of the target server
 | 
						|
// * ca:				 specifies the filepath of the CA certificate to use for verification
 | 
						|
// * cert:			 specifies the filepath of the client certificate
 | 
						|
// * key:				 specifies the filepath of the client key
 | 
						|
func WithCredentials(serverName, ca, cert, key string) ClientOpt {
 | 
						|
	return &withCredentials{serverName, ca, cert, key}
 | 
						|
}
 | 
						|
 | 
						|
func loadCredentials(opts *withCredentials) (grpc.DialOption, error) {
 | 
						|
	ca, err := os.ReadFile(opts.CACert)
 | 
						|
	if err != nil {
 | 
						|
		return nil, errors.Wrap(err, "could not read ca certificate")
 | 
						|
	}
 | 
						|
 | 
						|
	certPool := x509.NewCertPool()
 | 
						|
	if ok := certPool.AppendCertsFromPEM(ca); !ok {
 | 
						|
		return nil, errors.New("failed to append ca certs")
 | 
						|
	}
 | 
						|
 | 
						|
	cfg := &tls.Config{
 | 
						|
		ServerName: opts.ServerName,
 | 
						|
		RootCAs:    certPool,
 | 
						|
	}
 | 
						|
 | 
						|
	// we will produce an error if the user forgot about either cert or key if at least one is specified
 | 
						|
	if opts.Cert != "" || opts.Key != "" {
 | 
						|
		cert, err := tls.LoadX509KeyPair(opts.Cert, opts.Key)
 | 
						|
		if err != nil {
 | 
						|
			return nil, errors.Wrap(err, "could not read certificate/key")
 | 
						|
		}
 | 
						|
		cfg.Certificates = []tls.Certificate{cert}
 | 
						|
		cfg.BuildNameToCertificate()
 | 
						|
	}
 | 
						|
 | 
						|
	return grpc.WithTransportCredentials(credentials.NewTLS(cfg)), nil
 | 
						|
}
 | 
						|
 | 
						|
func WithTracerProvider(t trace.TracerProvider) ClientOpt {
 | 
						|
	return &withTracer{t}
 | 
						|
}
 | 
						|
 | 
						|
type withTracer struct {
 | 
						|
	tp trace.TracerProvider
 | 
						|
}
 | 
						|
 | 
						|
type TracerDelegate interface {
 | 
						|
	SetSpanExporter(context.Context, sdktrace.SpanExporter) error
 | 
						|
}
 | 
						|
 | 
						|
func WithTracerDelegate(td TracerDelegate) ClientOpt {
 | 
						|
	return &withTracerDelegate{
 | 
						|
		TracerDelegate: td,
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
type withTracerDelegate struct {
 | 
						|
	TracerDelegate
 | 
						|
}
 | 
						|
 | 
						|
func WithSessionDialer(dialer func(context.Context, string, map[string][]string) (net.Conn, error)) ClientOpt {
 | 
						|
	return &withSessionDialer{dialer}
 | 
						|
}
 | 
						|
 | 
						|
type withSessionDialer struct {
 | 
						|
	dialer func(context.Context, string, map[string][]string) (net.Conn, error)
 | 
						|
}
 | 
						|
 | 
						|
func resolveDialer(address string) (func(context.Context, string) (net.Conn, error), error) {
 | 
						|
	ch, err := connhelper.GetConnectionHelper(address)
 | 
						|
	if err != nil {
 | 
						|
		return nil, err
 | 
						|
	}
 | 
						|
	if ch != nil {
 | 
						|
		return ch.ContextDialer, nil
 | 
						|
	}
 | 
						|
	// basic dialer
 | 
						|
	return dialer, nil
 | 
						|
}
 | 
						|
 | 
						|
func filterInterceptor(intercept grpc.UnaryClientInterceptor) grpc.UnaryClientInterceptor {
 | 
						|
	return func(ctx context.Context, method string, req, reply interface{}, cc *grpc.ClientConn, invoker grpc.UnaryInvoker, opts ...grpc.CallOption) error {
 | 
						|
		if strings.HasSuffix(method, "opentelemetry.proto.collector.trace.v1.TraceService/Export") {
 | 
						|
			return invoker(ctx, method, req, reply, cc, opts...)
 | 
						|
		}
 | 
						|
		return intercept(ctx, method, req, reply, cc, invoker, opts...)
 | 
						|
	}
 | 
						|
}
 |