147 lines
6.4 KiB
Go
147 lines
6.4 KiB
Go
/*
|
|
Copyright 2018 Google LLC
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package cmd
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
"regexp"
|
|
"time"
|
|
|
|
"github.com/GoogleContainerTools/kaniko/pkg/cache"
|
|
"github.com/GoogleContainerTools/kaniko/pkg/config"
|
|
"github.com/GoogleContainerTools/kaniko/pkg/logging"
|
|
"github.com/GoogleContainerTools/kaniko/pkg/util"
|
|
"github.com/containerd/containerd/platforms"
|
|
v1 "github.com/google/go-containerregistry/pkg/v1"
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
"github.com/spf13/cobra"
|
|
)
|
|
|
|
var (
|
|
opts = &config.WarmerOptions{}
|
|
logLevel string
|
|
logFormat string
|
|
logTimestamp bool
|
|
)
|
|
|
|
func init() {
|
|
RootCmd.PersistentFlags().StringVarP(&logLevel, "verbosity", "v", logging.DefaultLevel, "Log level (trace, debug, info, warn, error, fatal, panic)")
|
|
RootCmd.PersistentFlags().StringVar(&logFormat, "log-format", logging.FormatColor, "Log format (text, color, json)")
|
|
RootCmd.PersistentFlags().BoolVar(&logTimestamp, "log-timestamp", logging.DefaultLogTimestamp, "Timestamp in log output")
|
|
|
|
addKanikoOptionsFlags()
|
|
addHiddenFlags()
|
|
}
|
|
|
|
var RootCmd = &cobra.Command{
|
|
Use: "cache warmer",
|
|
PersistentPreRunE: func(cmd *cobra.Command, args []string) error {
|
|
if err := logging.Configure(logLevel, logFormat, logTimestamp); err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(opts.Images) == 0 && opts.DockerfilePath == "" {
|
|
return errors.New("You must select at least one image to cache or a dockerfilepath to parse")
|
|
}
|
|
|
|
if opts.DockerfilePath != "" {
|
|
if err := validateDockerfilePath(); err != nil {
|
|
return errors.Wrap(err, "error validating dockerfile path")
|
|
}
|
|
}
|
|
|
|
return nil
|
|
},
|
|
Run: func(cmd *cobra.Command, args []string) {
|
|
if _, err := os.Stat(opts.CacheDir); os.IsNotExist(err) {
|
|
err = os.MkdirAll(opts.CacheDir, 0755)
|
|
if err != nil {
|
|
exit(errors.Wrap(err, "Failed to create cache directory"))
|
|
}
|
|
}
|
|
if err := cache.WarmCache(opts); err != nil {
|
|
exit(errors.Wrap(err, "Failed warming cache"))
|
|
}
|
|
|
|
},
|
|
}
|
|
|
|
// addKanikoOptionsFlags configures opts
|
|
func addKanikoOptionsFlags() {
|
|
RootCmd.PersistentFlags().VarP(&opts.Images, "image", "i", "Image to cache. Set it repeatedly for multiple images.")
|
|
RootCmd.PersistentFlags().StringVarP(&opts.CacheDir, "cache-dir", "c", "/cache", "Directory of the cache.")
|
|
RootCmd.PersistentFlags().BoolVarP(&opts.Force, "force", "f", false, "Force cache overwriting.")
|
|
RootCmd.PersistentFlags().DurationVarP(&opts.CacheTTL, "cache-ttl", "", time.Hour*336, "Cache timeout in hours. Defaults to two weeks.")
|
|
RootCmd.PersistentFlags().BoolVarP(&opts.InsecurePull, "insecure-pull", "", false, "Pull from insecure registry using plain HTTP")
|
|
RootCmd.PersistentFlags().BoolVarP(&opts.SkipTLSVerifyPull, "skip-tls-verify-pull", "", false, "Pull from insecure registry ignoring TLS verify")
|
|
RootCmd.PersistentFlags().VarP(&opts.InsecureRegistries, "insecure-registry", "", "Insecure registry using plain HTTP to pull. Set it repeatedly for multiple registries.")
|
|
RootCmd.PersistentFlags().VarP(&opts.SkipTLSVerifyRegistries, "skip-tls-verify-registry", "", "Insecure registry ignoring TLS verify to pull. Set it repeatedly for multiple registries.")
|
|
opts.RegistriesCertificates = make(map[string]string)
|
|
RootCmd.PersistentFlags().VarP(&opts.RegistriesCertificates, "registry-certificate", "", "Use the provided certificate for TLS communication with the given registry. Expected format is 'my.registry.url=/path/to/the/server/certificate'.")
|
|
opts.RegistriesClientCertificates = make(map[string]string)
|
|
RootCmd.PersistentFlags().VarP(&opts.RegistriesClientCertificates, "registry-client-cert", "", "Use the provided client certificate for mutual TLS (mTLS) communication with the given registry. Expected format is 'my.registry.url=/path/to/client/cert,/path/to/client/key'.")
|
|
RootCmd.PersistentFlags().VarP(&opts.RegistryMirrors, "registry-mirror", "", "Registry mirror to use as pull-through cache instead of docker.io. Set it repeatedly for multiple mirrors.")
|
|
RootCmd.PersistentFlags().BoolVarP(&opts.SkipDefaultRegistryFallback, "skip-default-registry-fallback", "", false, "If an image is not found on any mirrors (defined with registry-mirror) do not fallback to the default registry. If registry-mirror is not defined, this flag is ignored.")
|
|
RootCmd.PersistentFlags().StringVarP(&opts.CustomPlatform, "customPlatform", "", "", "Specify the build platform if different from the current host")
|
|
RootCmd.PersistentFlags().StringVarP(&opts.DockerfilePath, "dockerfile", "d", "", "Path to the dockerfile to be cached. The kaniko warmer will parse and write out each stage's base image layers to the cache-dir. Using the same dockerfile path as what you plan to build in the kaniko executor is the expected usage.")
|
|
RootCmd.PersistentFlags().VarP(&opts.BuildArgs, "build-arg", "", "This flag should be used in conjunction with the dockerfile flag for scenarios where dynamic replacement of the base image is required.")
|
|
|
|
// Default the custom platform flag to our current platform, and validate it.
|
|
if opts.CustomPlatform == "" {
|
|
opts.CustomPlatform = platforms.Format(platforms.Normalize(platforms.DefaultSpec()))
|
|
}
|
|
if _, err := v1.ParsePlatform(opts.CustomPlatform); err != nil {
|
|
logrus.Fatalf("Invalid platform %q: %v", opts.CustomPlatform, err)
|
|
}
|
|
}
|
|
|
|
// addHiddenFlags marks certain flags as hidden from the executor help text
|
|
func addHiddenFlags() {
|
|
RootCmd.PersistentFlags().MarkHidden("azure-container-registry-config")
|
|
}
|
|
|
|
func validateDockerfilePath() error {
|
|
if isURL(opts.DockerfilePath) {
|
|
return nil
|
|
}
|
|
if util.FilepathExists(opts.DockerfilePath) {
|
|
abs, err := filepath.Abs(opts.DockerfilePath)
|
|
if err != nil {
|
|
return errors.Wrap(err, "getting absolute path for dockerfile")
|
|
}
|
|
opts.DockerfilePath = abs
|
|
return nil
|
|
}
|
|
|
|
return errors.New("please provide a valid path to a Dockerfile within the build context with --dockerfile")
|
|
}
|
|
|
|
func isURL(path string) bool {
|
|
if match, _ := regexp.MatchString("^https?://", path); match {
|
|
return true
|
|
}
|
|
return false
|
|
}
|
|
|
|
func exit(err error) {
|
|
fmt.Println(err)
|
|
os.Exit(1)
|
|
}
|