mirror of
https://gitea.com/Lydanne/buildx.git
synced 2025-05-21 19:27:46 +08:00

Removes gogo/protobuf from buildx and updates to a version of moby/buildkit where gogo is removed. This also changes how the proto files are generated. This is because newer versions of protobuf are more strict about name conflicts. If two files have the same name (even if they are relative paths) and are used in different protoc commands, they'll conflict in the registry. Since protobuf file generation doesn't work very well with `paths=source_relative`, this removes the `go:generate` expression and just relies on the dockerfile to perform the generation. Signed-off-by: Jonathan A. Sternberg <jonathan.sternberg@docker.com>
201 lines
6.3 KiB
Go
201 lines
6.3 KiB
Go
package config
|
|
|
|
import (
|
|
resolverconfig "github.com/moby/buildkit/util/resolver/config"
|
|
)
|
|
|
|
// Config provides containerd configuration data for the server
|
|
type Config struct {
|
|
Debug bool `toml:"debug"`
|
|
Trace bool `toml:"trace"`
|
|
|
|
// Root is the path to a directory where buildkit will store persistent data
|
|
Root string `toml:"root"`
|
|
|
|
// Entitlements e.g. security.insecure, network.host
|
|
Entitlements []string `toml:"insecure-entitlements"`
|
|
|
|
// LogFormat is the format of the logs. It can be "json" or "text".
|
|
Log LogConfig `toml:"log"`
|
|
|
|
// GRPC configuration settings
|
|
GRPC GRPCConfig `toml:"grpc"`
|
|
|
|
OTEL OTELConfig `toml:"otel"`
|
|
|
|
Workers struct {
|
|
OCI OCIConfig `toml:"oci"`
|
|
Containerd ContainerdConfig `toml:"containerd"`
|
|
} `toml:"worker"`
|
|
|
|
Registries map[string]resolverconfig.RegistryConfig `toml:"registry"`
|
|
|
|
DNS *DNSConfig `toml:"dns"`
|
|
|
|
History *HistoryConfig `toml:"history"`
|
|
|
|
Frontends struct {
|
|
Dockerfile DockerfileFrontendConfig `toml:"dockerfile.v0"`
|
|
Gateway GatewayFrontendConfig `toml:"gateway.v0"`
|
|
} `toml:"frontend"`
|
|
|
|
System *SystemConfig `toml:"system"`
|
|
}
|
|
|
|
type SystemConfig struct {
|
|
// PlatformCacheMaxAge controls how often supported platforms
|
|
// are refreshed by rescanning the system.
|
|
PlatformsCacheMaxAge *Duration `toml:"platformsCacheMaxAge"`
|
|
}
|
|
|
|
type LogConfig struct {
|
|
Format string `toml:"format"`
|
|
}
|
|
|
|
type GRPCConfig struct {
|
|
Address []string `toml:"address"`
|
|
DebugAddress string `toml:"debugAddress"`
|
|
UID *int `toml:"uid"`
|
|
GID *int `toml:"gid"`
|
|
SecurityDescriptor string `toml:"securityDescriptor"`
|
|
|
|
TLS TLSConfig `toml:"tls"`
|
|
// MaxRecvMsgSize int `toml:"max_recv_message_size"`
|
|
// MaxSendMsgSize int `toml:"max_send_message_size"`
|
|
}
|
|
|
|
type TLSConfig struct {
|
|
Cert string `toml:"cert"`
|
|
Key string `toml:"key"`
|
|
CA string `toml:"ca"`
|
|
}
|
|
|
|
type OTELConfig struct {
|
|
SocketPath string `toml:"socketPath"`
|
|
}
|
|
|
|
type GCConfig struct {
|
|
GC *bool `toml:"gc"`
|
|
GCKeepStorage DiskSpace `toml:"gckeepstorage"`
|
|
GCPolicy []GCPolicy `toml:"gcpolicy"`
|
|
}
|
|
|
|
type NetworkConfig struct {
|
|
Mode string `toml:"networkMode"`
|
|
CNIConfigPath string `toml:"cniConfigPath"`
|
|
CNIBinaryPath string `toml:"cniBinaryPath"`
|
|
CNIPoolSize int `toml:"cniPoolSize"`
|
|
BridgeName string `toml:"bridgeName"`
|
|
BridgeSubnet string `toml:"bridgeSubnet"`
|
|
}
|
|
|
|
type OCIConfig struct {
|
|
Enabled *bool `toml:"enabled"`
|
|
Labels map[string]string `toml:"labels"`
|
|
Platforms []string `toml:"platforms"`
|
|
Snapshotter string `toml:"snapshotter"`
|
|
Rootless bool `toml:"rootless"`
|
|
NoProcessSandbox bool `toml:"noProcessSandbox"`
|
|
GCConfig
|
|
NetworkConfig
|
|
// UserRemapUnsupported is unsupported key for testing. The feature is
|
|
// incomplete and the intention is to make it default without config.
|
|
UserRemapUnsupported string `toml:"userRemapUnsupported"`
|
|
// For use in storing the OCI worker binary name that will replace buildkit-runc
|
|
Binary string `toml:"binary"`
|
|
ProxySnapshotterPath string `toml:"proxySnapshotterPath"`
|
|
DefaultCgroupParent string `toml:"defaultCgroupParent"`
|
|
|
|
// StargzSnapshotterConfig is configuration for stargz snapshotter.
|
|
// We use a generic map[string]interface{} in order to remove the dependency
|
|
// on stargz snapshotter's config pkg from our config.
|
|
StargzSnapshotterConfig map[string]interface{} `toml:"stargzSnapshotter"`
|
|
|
|
// ApparmorProfile is the name of the apparmor profile that should be used to constrain build containers.
|
|
// The profile should already be loaded (by a higher level system) before creating a worker.
|
|
ApparmorProfile string `toml:"apparmor-profile"`
|
|
|
|
// SELinux enables applying SELinux labels.
|
|
SELinux bool `toml:"selinux"`
|
|
|
|
// MaxParallelism is the maximum number of parallel build steps that can be run at the same time.
|
|
MaxParallelism int `toml:"max-parallelism"`
|
|
}
|
|
|
|
type ContainerdConfig struct {
|
|
Address string `toml:"address"`
|
|
Enabled *bool `toml:"enabled"`
|
|
Labels map[string]string `toml:"labels"`
|
|
Platforms []string `toml:"platforms"`
|
|
Namespace string `toml:"namespace"`
|
|
Runtime ContainerdRuntime `toml:"runtime"`
|
|
GCConfig
|
|
NetworkConfig
|
|
Snapshotter string `toml:"snapshotter"`
|
|
|
|
// ApparmorProfile is the name of the apparmor profile that should be used to constrain build containers.
|
|
// The profile should already be loaded (by a higher level system) before creating a worker.
|
|
ApparmorProfile string `toml:"apparmor-profile"`
|
|
|
|
// SELinux enables applying SELinux labels.
|
|
SELinux bool `toml:"selinux"`
|
|
|
|
MaxParallelism int `toml:"max-parallelism"`
|
|
|
|
DefaultCgroupParent string `toml:"defaultCgroupParent"`
|
|
|
|
Rootless bool `toml:"rootless"`
|
|
}
|
|
|
|
type ContainerdRuntime struct {
|
|
Name string `toml:"name"`
|
|
Path string `toml:"path"`
|
|
Options map[string]interface{} `toml:"options"`
|
|
}
|
|
|
|
type GCPolicy struct {
|
|
All bool `toml:"all"`
|
|
Filters []string `toml:"filters"`
|
|
|
|
KeepDuration Duration `toml:"keepDuration"`
|
|
|
|
// KeepBytes is the maximum amount of storage this policy is ever allowed
|
|
// to consume. Any storage above this mark can be cleared during a gc
|
|
// sweep.
|
|
//
|
|
// Deprecated: use MaxStorage instead
|
|
KeepBytes DiskSpace `toml:"keepBytes"`
|
|
|
|
// MinStorage is the minimum amount of storage this policy is always
|
|
// allowed to consume. Any amount of storage below this mark will not be
|
|
// cleared by this policy.
|
|
MinStorage DiskSpace `toml:"minStorage"`
|
|
// MaxStorage is the maximum amount of storage this policy is ever allowed
|
|
// to consume. Any storage above this mark can be cleared during a gc
|
|
// sweep.
|
|
MaxStorage DiskSpace `toml:"maxStorage"`
|
|
// Free is the amount of storage the gc will attempt to leave free on the
|
|
// disk. However, it will never attempt to bring it below MinStorage.
|
|
Free DiskSpace `toml:"free"`
|
|
}
|
|
|
|
type DNSConfig struct {
|
|
Nameservers []string `toml:"nameservers"`
|
|
Options []string `toml:"options"`
|
|
SearchDomains []string `toml:"searchDomains"`
|
|
}
|
|
|
|
type HistoryConfig struct {
|
|
MaxAge Duration `toml:"maxAge"`
|
|
MaxEntries int64 `toml:"maxEntries"`
|
|
}
|
|
|
|
type DockerfileFrontendConfig struct {
|
|
Enabled *bool `toml:"enabled"`
|
|
}
|
|
|
|
type GatewayFrontendConfig struct {
|
|
Enabled *bool `toml:"enabled"`
|
|
AllowedRepositories []string `toml:"allowedRepositories"`
|
|
}
|