# syntax=docker/dockerfile:1 ARG GO_VERSION=1.20.1 ARG BASE_DEBIAN_DISTRO="bullseye" ARG GOLANG_IMAGE="golang:${GO_VERSION}-${BASE_DEBIAN_DISTRO}" ARG XX_VERSION=1.1.2 ARG VPNKIT_VERSION=0.5.0 ARG DOCKERCLI_VERSION=v17.06.2-ce ARG SYSTEMD="false" ARG DEBIAN_FRONTEND=noninteractive ARG DOCKER_STATIC=1 # cross compilation helper FROM --platform=$BUILDPLATFORM tonistiigi/xx:${XX_VERSION} AS xx # dummy stage to make sure the image is built for deps that don't support some # architectures FROM --platform=$BUILDPLATFORM busybox AS build-dummy RUN mkdir -p /build FROM scratch AS binary-dummy COPY --from=build-dummy /build /build # base FROM --platform=$BUILDPLATFORM ${GOLANG_IMAGE} AS base COPY --from=xx / / RUN echo 'Binary::apt::APT::Keep-Downloaded-Packages "true";' > /etc/apt/apt.conf.d/keep-cache ARG APT_MIRROR RUN sed -ri "s/(httpredir|deb).debian.org/${APT_MIRROR:-deb.debian.org}/g" /etc/apt/sources.list \ && sed -ri "s/(security).debian.org/${APT_MIRROR:-security.debian.org}/g" /etc/apt/sources.list ARG DEBIAN_FRONTEND RUN apt-get update && apt-get install --no-install-recommends -y file ENV GO111MODULE=off FROM base AS criu ARG DEBIAN_FRONTEND ADD --chmod=0644 https://download.opensuse.org/repositories/devel:/tools:/criu/Debian_11/Release.key /etc/apt/trusted.gpg.d/criu.gpg.asc RUN --mount=type=cache,sharing=locked,id=moby-criu-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-criu-aptcache,target=/var/cache/apt \ echo 'deb https://download.opensuse.org/repositories/devel:/tools:/criu/Debian_11/ /' > /etc/apt/sources.list.d/criu.list \ && apt-get update \ && apt-get install -y --no-install-recommends criu \ && install -D /usr/sbin/criu /build/criu # registry FROM base AS registry-src WORKDIR /usr/src/registry RUN git init . && git remote add origin "https://github.com/distribution/distribution.git" FROM base AS registry WORKDIR /go/src/github.com/docker/distribution # REGISTRY_VERSION specifies the version of the registry to build and install # from the https://github.com/docker/distribution repository. This version of # the registry is used to test both schema 1 and schema 2 manifests. Generally, # the version specified here should match a current release. ARG REGISTRY_VERSION=v2.3.0 # REGISTRY_VERSION_SCHEMA1 specifies the version of the registry to build and # install from the https://github.com/docker/distribution repository. This is # an older (pre v2.3.0) version of the registry that only supports schema1 # manifests. This version of the registry is not working on arm64, so installation # is skipped on that architecture. ARG REGISTRY_VERSION_SCHEMA1=v2.1.0 ARG TARGETPLATFORM RUN --mount=from=registry-src,src=/usr/src/registry,rw \ --mount=type=cache,target=/root/.cache/go-build,id=registry-build-$TARGETPLATFORM \ --mount=type=cache,target=/go/pkg/mod \ --mount=type=tmpfs,target=/go/src <<EOT set -ex git fetch -q --depth 1 origin "${REGISTRY_VERSION}" +refs/tags/*:refs/tags/* git checkout -q FETCH_HEAD export GOPATH="/go/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" CGO_ENABLED=0 xx-go build -o /build/registry-v2 -v ./cmd/registry xx-verify /build/registry-v2 case $TARGETPLATFORM in linux/amd64|linux/arm/v7|linux/ppc64le|linux/s390x) git fetch -q --depth 1 origin "${REGISTRY_VERSION_SCHEMA1}" +refs/tags/*:refs/tags/* git checkout -q FETCH_HEAD CGO_ENABLED=0 xx-go build -o /build/registry-v2-schema1 -v ./cmd/registry xx-verify /build/registry-v2-schema1 ;; esac EOT # go-swagger FROM base AS swagger-src WORKDIR /usr/src/swagger # Currently uses a fork from https://github.com/kolyshkin/go-swagger/tree/golang-1.13-fix # TODO: move to under moby/ or fix upstream go-swagger to work for us. RUN git init . && git remote add origin "https://github.com/kolyshkin/go-swagger.git" # GO_SWAGGER_COMMIT specifies the version of the go-swagger binary to build and # install. Go-swagger is used in CI for validating swagger.yaml in hack/validate/swagger-gen ARG GO_SWAGGER_COMMIT=c56166c036004ba7a3a321e5951ba472b9ae298c RUN git fetch -q --depth 1 origin "${GO_SWAGGER_COMMIT}" && git checkout -q FETCH_HEAD FROM base AS swagger WORKDIR /go/src/github.com/go-swagger/go-swagger ARG TARGETPLATFORM RUN --mount=from=swagger-src,src=/usr/src/swagger,rw \ --mount=type=cache,target=/root/.cache/go-build,id=swagger-build-$TARGETPLATFORM \ --mount=type=cache,target=/go/pkg/mod \ --mount=type=tmpfs,target=/go/src/ <<EOT set -e xx-go build -o /build/swagger ./cmd/swagger xx-verify /build/swagger EOT # frozen-images # See also frozenImages in "testutil/environment/protect.go" (which needs to # be updated when adding images to this list) FROM debian:${BASE_DEBIAN_DISTRO} AS frozen-images ARG DEBIAN_FRONTEND RUN --mount=type=cache,sharing=locked,id=moby-frozen-images-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-frozen-images-aptcache,target=/var/cache/apt \ apt-get update && apt-get install -y --no-install-recommends \ ca-certificates \ curl \ jq # Get useful and necessary Hub images so we can "docker load" locally instead of pulling COPY contrib/download-frozen-image-v2.sh / ARG TARGETARCH ARG TARGETVARIANT RUN /download-frozen-image-v2.sh /build \ busybox:latest@sha256:95cf004f559831017cdf4628aaf1bb30133677be8702a8c5f2994629f637a209 \ busybox:glibc@sha256:1f81263701cddf6402afe9f33fca0266d9fff379e59b1748f33d3072da71ee85 \ debian:bullseye-slim@sha256:dacf278785a4daa9de07596ec739dbc07131e189942772210709c5c0777e8437 \ hello-world:latest@sha256:d58e752213a51785838f9eed2b7a498ffa1cb3aa7f946dda11af39286c3db9a9 \ arm32v7/hello-world:latest@sha256:50b8560ad574c779908da71f7ce370c0a2471c098d44d1c8f6b513c5a55eeeb1 # delve FROM base AS delve-src WORKDIR /usr/src/delve RUN git init . && git remote add origin "https://github.com/go-delve/delve.git" # DELVE_VERSION specifies the version of the Delve debugger binary # from the https://github.com/go-delve/delve repository. # It can be used to run Docker with a possibility of # attaching debugger to it. ARG DELVE_VERSION=v1.9.1 RUN git fetch -q --depth 1 origin "${DELVE_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD FROM base AS delve-build WORKDIR /usr/src/delve ARG TARGETPLATFORM RUN --mount=from=delve-src,src=/usr/src/delve,rw \ --mount=type=cache,target=/root/.cache/go-build,id=delve-build-$TARGETPLATFORM \ --mount=type=cache,target=/go/pkg/mod <<EOT set -e GO111MODULE=on xx-go build -o /build/dlv ./cmd/dlv xx-verify /build/dlv EOT # delve is currently only supported on linux/amd64 and linux/arm64; # https://github.com/go-delve/delve/blob/v1.8.1/pkg/proc/native/support_sentinel.go#L1-L6 FROM binary-dummy AS delve-windows FROM binary-dummy AS delve-linux-arm FROM binary-dummy AS delve-linux-ppc64le FROM binary-dummy AS delve-linux-s390x FROM delve-build AS delve-linux-amd64 FROM delve-build AS delve-linux-arm64 FROM delve-linux-${TARGETARCH} AS delve-linux FROM delve-${TARGETOS} AS delve FROM base AS tomll # GOTOML_VERSION specifies the version of the tomll binary to build and install # from the https://github.com/pelletier/go-toml repository. This binary is used # in CI in the hack/validate/toml script. # # When updating this version, consider updating the github.com/pelletier/go-toml # dependency in vendor.mod accordingly. ARG GOTOML_VERSION=v1.8.1 RUN --mount=type=cache,target=/root/.cache/go-build \ --mount=type=cache,target=/go/pkg/mod \ GOBIN=/build/ GO111MODULE=on go install "github.com/pelletier/go-toml/cmd/tomll@${GOTOML_VERSION}" \ && /build/tomll --help FROM base AS gowinres # GOWINRES_VERSION defines go-winres tool version ARG GOWINRES_VERSION=v0.3.0 RUN --mount=type=cache,target=/root/.cache/go-build \ --mount=type=cache,target=/go/pkg/mod \ GOBIN=/build/ GO111MODULE=on go install "github.com/tc-hib/go-winres@${GOWINRES_VERSION}" \ && /build/go-winres --help # containerd FROM base AS containerd-src WORKDIR /usr/src/containerd RUN git init . && git remote add origin "https://github.com/containerd/containerd.git" # CONTAINERD_VERSION is used to build containerd binaries, and used for the # integration tests. The distributed docker .deb and .rpm packages depend on a # separate (containerd.io) package, which may be a different version as is # specified here. The containerd golang package is also pinned in vendor.mod. # When updating the binary version you may also need to update the vendor # version to pick up bug fixes or new APIs, however, usually the Go packages # are built from a commit from the master branch. ARG CONTAINERD_VERSION=v1.7.0-beta.4 RUN git fetch -q --depth 1 origin "${CONTAINERD_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD FROM base AS containerd-build WORKDIR /go/src/github.com/containerd/containerd ARG DEBIAN_FRONTEND ARG TARGETPLATFORM RUN --mount=type=cache,sharing=locked,id=moby-containerd-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-containerd-aptcache,target=/var/cache/apt \ apt-get update && xx-apt-get install -y --no-install-recommends \ gcc libbtrfs-dev libsecret-1-dev ARG DOCKER_STATIC RUN --mount=from=containerd-src,src=/usr/src/containerd,rw \ --mount=type=cache,target=/root/.cache/go-build,id=containerd-build-$TARGETPLATFORM <<EOT set -e export CC=$(xx-info)-gcc export CGO_ENABLED=$([ "$DOCKER_STATIC" = "1" ] && echo "0" || echo "1") xx-go --wrap make $([ "$DOCKER_STATIC" = "1" ] && echo "STATIC=1") binaries xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") bin/containerd xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") bin/containerd-shim-runc-v2 xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") bin/ctr mkdir /build mv bin/containerd bin/containerd-shim-runc-v2 bin/ctr /build EOT FROM containerd-build AS containerd-linux FROM binary-dummy AS containerd-windows FROM containerd-${TARGETOS} AS containerd FROM base AS golangci_lint ARG GOLANGCI_LINT_VERSION=v1.51.2 RUN --mount=type=cache,target=/root/.cache/go-build \ --mount=type=cache,target=/go/pkg/mod \ GOBIN=/build/ GO111MODULE=on go install "github.com/golangci/golangci-lint/cmd/golangci-lint@${GOLANGCI_LINT_VERSION}" \ && /build/golangci-lint --version FROM base AS gotestsum ARG GOTESTSUM_VERSION=v1.8.2 RUN --mount=type=cache,target=/root/.cache/go-build \ --mount=type=cache,target=/go/pkg/mod \ GOBIN=/build/ GO111MODULE=on go install "gotest.tools/gotestsum@${GOTESTSUM_VERSION}" \ && /build/gotestsum --version FROM base AS shfmt ARG SHFMT_VERSION=v3.0.2 RUN --mount=type=cache,target=/root/.cache/go-build \ --mount=type=cache,target=/go/pkg/mod \ GOBIN=/build/ GO111MODULE=on go install "mvdan.cc/sh/v3/cmd/shfmt@${SHFMT_VERSION}" \ && /build/shfmt --version # dockercli FROM base AS dockercli-src WORKDIR /tmp/dockercli RUN git init . && git remote add origin "https://github.com/docker/cli.git" ARG DOCKERCLI_VERSION RUN git fetch -q --depth 1 origin "${DOCKERCLI_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD RUN [ -d ./components/cli ] && mv ./components/cli /usr/src/dockercli || mv /tmp/dockercli /usr/src/dockercli WORKDIR /usr/src/dockercli FROM base AS dockercli WORKDIR /go/src/github.com/docker/cli ARG DOCKERCLI_VERSION ARG DOCKERCLI_CHANNEL=stable ARG TARGETPLATFORM RUN xx-apt-get install -y --no-install-recommends gcc libc6-dev RUN --mount=from=dockercli-src,src=/usr/src/dockercli,rw \ --mount=type=cache,target=/root/.cache/go-build,id=dockercli-build-$TARGETPLATFORM <<EOT set -e DOWNLOAD_URL="https://download.docker.com/linux/static/${DOCKERCLI_CHANNEL}/$(xx-info march)/docker-${DOCKERCLI_VERSION#v}.tgz" if curl --head --silent --fail "${DOWNLOAD_URL}" 1>/dev/null 2>&1; then mkdir /build curl -Ls "${DOWNLOAD_URL}" | tar -xz docker/docker mv docker/docker /build/docker else CGO_ENABLED=0 xx-go build -o /build/docker ./cmd/docker fi xx-verify /build/docker EOT # runc FROM base AS runc-src WORKDIR /usr/src/runc RUN git init . && git remote add origin "https://github.com/opencontainers/runc.git" # RUNC_VERSION should match the version that is used by the containerd version # that is used. If you need to update runc, open a pull request in the containerd # project first, and update both after that is merged. When updating RUNC_VERSION, # consider updating runc in vendor.mod accordingly. ARG RUNC_VERSION=v1.1.4 RUN git fetch -q --depth 1 origin "${RUNC_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD FROM base AS runc-build WORKDIR /go/src/github.com/opencontainers/runc ARG DEBIAN_FRONTEND ARG TARGETPLATFORM RUN --mount=type=cache,sharing=locked,id=moby-runc-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-runc-aptcache,target=/var/cache/apt \ apt-get update && xx-apt-get install -y --no-install-recommends \ dpkg-dev gcc libc6-dev libseccomp-dev ARG DOCKER_STATIC RUN --mount=from=runc-src,src=/usr/src/runc,rw \ --mount=type=cache,target=/root/.cache/go-build,id=runc-build-$TARGETPLATFORM <<EOT set -e xx-go --wrap CGO_ENABLED=1 make "$([ "$DOCKER_STATIC" = "1" ] && echo "static" || echo "runc")" xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") runc mkdir /build mv runc /build/ EOT FROM runc-build AS runc-linux FROM binary-dummy AS runc-windows FROM runc-${TARGETOS} AS runc # tini FROM base AS tini-src WORKDIR /usr/src/tini RUN git init . && git remote add origin "https://github.com/krallin/tini.git" # TINI_VERSION specifies the version of tini (docker-init) to build. This # binary is used when starting containers with the `--init` option. ARG TINI_VERSION=v0.19.0 RUN git fetch -q --depth 1 origin "${TINI_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD FROM base AS tini-build WORKDIR /go/src/github.com/krallin/tini ARG DEBIAN_FRONTEND RUN --mount=type=cache,sharing=locked,id=moby-tini-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-tini-aptcache,target=/var/cache/apt \ apt-get update && apt-get install -y --no-install-recommends cmake ARG TARGETPLATFORM RUN --mount=type=cache,sharing=locked,id=moby-tini-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-tini-aptcache,target=/var/cache/apt \ xx-apt-get install -y --no-install-recommends \ gcc libc6-dev RUN --mount=from=tini-src,src=/usr/src/tini,rw \ --mount=type=cache,target=/root/.cache/go-build,id=tini-build-$TARGETPLATFORM <<EOT set -e CC=$(xx-info)-gcc cmake . make tini-static xx-verify --static tini-static mkdir /build mv tini-static /build/docker-init EOT FROM tini-build AS tini-linux FROM binary-dummy AS tini-windows FROM tini-${TARGETOS} AS tini # rootlesskit FROM base AS rootlesskit-src WORKDIR /usr/src/rootlesskit RUN git init . && git remote add origin "https://github.com/rootless-containers/rootlesskit.git" # When updating, also update rootlesskit commit in vendor.mod accordingly. ARG ROOTLESSKIT_VERSION=v1.1.0 RUN git fetch -q --depth 1 origin "${ROOTLESSKIT_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD FROM base AS rootlesskit-build WORKDIR /go/src/github.com/rootless-containers/rootlesskit ARG DEBIAN_FRONTEND ARG TARGETPLATFORM RUN --mount=type=cache,sharing=locked,id=moby-rootlesskit-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-rootlesskit-aptcache,target=/var/cache/apt \ apt-get update && xx-apt-get install -y --no-install-recommends \ gcc libc6-dev ENV GO111MODULE=on ARG DOCKER_STATIC RUN --mount=from=rootlesskit-src,src=/usr/src/rootlesskit,rw \ --mount=type=cache,target=/go/pkg/mod \ --mount=type=cache,target=/root/.cache/go-build,id=rootlesskit-build-$TARGETPLATFORM <<EOT set -e export CGO_ENABLED=$([ "$DOCKER_STATIC" = "1" ] && echo "0" || echo "1") xx-go build -o /build/rootlesskit -ldflags="$([ "$DOCKER_STATIC" != "1" ] && echo "-linkmode=external")" ./cmd/rootlesskit xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") /build/rootlesskit xx-go build -o /build/rootlesskit-docker-proxy -ldflags="$([ "$DOCKER_STATIC" != "1" ] && echo "-linkmode=external")" ./cmd/rootlesskit-docker-proxy xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") /build/rootlesskit-docker-proxy EOT COPY ./contrib/dockerd-rootless.sh /build/ COPY ./contrib/dockerd-rootless-setuptool.sh /build/ FROM rootlesskit-build AS rootlesskit-linux FROM binary-dummy AS rootlesskit-windows FROM rootlesskit-${TARGETOS} AS rootlesskit FROM base AS crun ARG CRUN_VERSION=1.4.5 RUN --mount=type=cache,sharing=locked,id=moby-crun-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-crun-aptcache,target=/var/cache/apt \ apt-get update && apt-get install -y --no-install-recommends \ autoconf \ automake \ build-essential \ libcap-dev \ libprotobuf-c-dev \ libseccomp-dev \ libsystemd-dev \ libtool \ libudev-dev \ libyajl-dev \ python3 \ ; RUN --mount=type=tmpfs,target=/tmp/crun-build \ git clone https://github.com/containers/crun.git /tmp/crun-build && \ cd /tmp/crun-build && \ git checkout -q "${CRUN_VERSION}" && \ ./autogen.sh && \ ./configure --bindir=/build && \ make -j install # vpnkit # use dummy scratch stage to avoid build to fail for unsupported platforms FROM scratch AS vpnkit-windows FROM scratch AS vpnkit-linux-386 FROM scratch AS vpnkit-linux-arm FROM scratch AS vpnkit-linux-ppc64le FROM scratch AS vpnkit-linux-riscv64 FROM scratch AS vpnkit-linux-s390x FROM djs55/vpnkit:${VPNKIT_VERSION} AS vpnkit-linux-amd64 FROM djs55/vpnkit:${VPNKIT_VERSION} AS vpnkit-linux-arm64 FROM vpnkit-linux-${TARGETARCH} AS vpnkit-linux FROM vpnkit-${TARGETOS} AS vpnkit # containerutility FROM base AS containerutil-src WORKDIR /usr/src/containerutil RUN git init . && git remote add origin "https://github.com/docker-archive/windows-container-utility.git" ARG CONTAINERUTILITY_VERSION=aa1ba87e99b68e0113bd27ec26c60b88f9d4ccd9 RUN git fetch -q --depth 1 origin "${CONTAINERUTILITY_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD FROM base AS containerutil-build WORKDIR /usr/src/containerutil ARG TARGETPLATFORM RUN xx-apt-get install -y --no-install-recommends gcc g++ libc6-dev RUN --mount=from=containerutil-src,src=/usr/src/containerutil,rw \ --mount=type=cache,target=/root/.cache/go-build,id=containerutil-build-$TARGETPLATFORM <<EOT set -e CC="$(xx-info)-gcc" CXX="$(xx-info)-g++" make xx-verify --static containerutility.exe mkdir /build mv containerutility.exe /build/ EOT FROM binary-dummy AS containerutil-linux FROM containerutil-build AS containerutil-windows-amd64 FROM containerutil-windows-${TARGETARCH} AS containerutil-windows FROM containerutil-${TARGETOS} AS containerutil FROM base AS dev-systemd-false COPY --from=dockercli /build/ /usr/local/cli COPY --from=frozen-images /build/ /docker-frozen-images COPY --from=swagger /build/ /usr/local/bin/ COPY --from=delve /build/ /usr/local/bin/ COPY --from=tomll /build/ /usr/local/bin/ COPY --from=gowinres /build/ /usr/local/bin/ COPY --from=tini /build/ /usr/local/bin/ COPY --from=registry /build/ /usr/local/bin/ COPY --from=criu /build/ /usr/local/bin/ COPY --from=gotestsum /build/ /usr/local/bin/ COPY --from=golangci_lint /build/ /usr/local/bin/ COPY --from=shfmt /build/ /usr/local/bin/ COPY --from=runc /build/ /usr/local/bin/ COPY --from=containerd /build/ /usr/local/bin/ COPY --from=rootlesskit /build/ /usr/local/bin/ COPY --from=vpnkit / /usr/local/bin/ COPY --from=containerutil /build/ /usr/local/bin/ COPY --from=crun /build/ /usr/local/bin/ COPY hack/dockerfile/etc/docker/ /etc/docker/ ENV PATH=/usr/local/cli:$PATH ENV CONTAINERD_ADDRESS=/run/docker/containerd/containerd.sock ENV CONTAINERD_NAMESPACE=moby WORKDIR /go/src/github.com/docker/docker VOLUME /var/lib/docker VOLUME /home/unprivilegeduser/.local/share/docker # Wrap all commands in the "docker-in-docker" script to allow nested containers ENTRYPOINT ["hack/dind"] FROM dev-systemd-false AS dev-systemd-true RUN --mount=type=cache,sharing=locked,id=moby-dev-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-dev-aptcache,target=/var/cache/apt \ apt-get update && apt-get install -y --no-install-recommends \ dbus \ dbus-user-session \ systemd \ systemd-sysv ENTRYPOINT ["hack/dind-systemd"] FROM dev-systemd-${SYSTEMD} AS dev-base ARG DEBIAN_FRONTEND RUN groupadd -r docker RUN useradd --create-home --gid docker unprivilegeduser \ && mkdir -p /home/unprivilegeduser/.local/share/docker \ && chown -R unprivilegeduser /home/unprivilegeduser # Let us use a .bashrc file RUN ln -sfv /go/src/github.com/docker/docker/.bashrc ~/.bashrc # Activate bash completion and include Docker's completion if mounted with DOCKER_BASH_COMPLETION_PATH RUN echo "source /usr/share/bash-completion/bash_completion" >> /etc/bash.bashrc RUN ln -s /usr/local/completion/bash/docker /etc/bash_completion.d/docker RUN ldconfig # Set dev environment as safe git directory to prevent "dubious ownership" errors # when bind-mounting the source into the dev-container. See https://github.com/moby/moby/pull/44930 RUN git config --global --add safe.directory $GOPATH/src/github.com/docker/docker # This should only install packages that are specifically needed for the dev environment and nothing else # Do you really need to add another package here? Can it be done in a different build stage? RUN --mount=type=cache,sharing=locked,id=moby-dev-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-dev-aptcache,target=/var/cache/apt \ apt-get update && apt-get install -y --no-install-recommends \ apparmor \ bash-completion \ bzip2 \ inetutils-ping \ iproute2 \ iptables \ jq \ libcap2-bin \ libnet1 \ libnl-3-200 \ libprotobuf-c1 \ libyajl2 \ net-tools \ patch \ pigz \ python3-pip \ python3-setuptools \ python3-wheel \ sudo \ systemd-journal-remote \ thin-provisioning-tools \ uidmap \ vim \ vim-common \ xfsprogs \ xz-utils \ zip \ zstd # Switch to use iptables instead of nftables (to match the CI hosts) # TODO use some kind of runtime auto-detection instead if/when nftables is supported (https://github.com/moby/moby/issues/26824) RUN update-alternatives --set iptables /usr/sbin/iptables-legacy || true \ && update-alternatives --set ip6tables /usr/sbin/ip6tables-legacy || true \ && update-alternatives --set arptables /usr/sbin/arptables-legacy || true ARG YAMLLINT_VERSION=1.27.1 RUN pip3 install yamllint==${YAMLLINT_VERSION} RUN --mount=type=cache,sharing=locked,id=moby-dev-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-dev-aptcache,target=/var/cache/apt \ apt-get update && apt-get install --no-install-recommends -y \ gcc \ pkg-config \ dpkg-dev \ libapparmor-dev \ libdevmapper-dev \ libseccomp-dev \ libsecret-1-dev \ libsystemd-dev \ libudev-dev FROM base AS build COPY --from=gowinres /build/ /usr/local/bin/ WORKDIR /go/src/github.com/docker/docker ENV GO111MODULE=off ENV CGO_ENABLED=1 ARG DEBIAN_FRONTEND RUN --mount=type=cache,sharing=locked,id=moby-build-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-build-aptcache,target=/var/cache/apt \ apt-get update && apt-get install --no-install-recommends -y \ clang \ lld \ llvm ARG TARGETPLATFORM RUN --mount=type=cache,sharing=locked,id=moby-build-aptlib,target=/var/lib/apt \ --mount=type=cache,sharing=locked,id=moby-build-aptcache,target=/var/cache/apt \ xx-apt-get install --no-install-recommends -y \ dpkg-dev \ gcc \ libapparmor-dev \ libc6-dev \ libdevmapper-dev \ libseccomp-dev \ libsecret-1-dev \ libsystemd-dev \ libudev-dev ARG DOCKER_BUILDTAGS ARG DOCKER_DEBUG ARG DOCKER_GITCOMMIT=HEAD ARG DOCKER_LDFLAGS ARG DOCKER_STATIC ARG VERSION ARG PLATFORM ARG PRODUCT ARG DEFAULT_PRODUCT_LICENSE ARG PACKAGER_NAME # PREFIX overrides DEST dir in make.sh script otherwise it fails because of # read only mount in current work dir ENV PREFIX=/tmp RUN <<EOT # in bullseye arm64 target does not link with lld so configure it to use ld instead if [ "$(xx-info arch)" = "arm64" ]; then XX_CC_PREFER_LINKER=ld xx-clang --setup-target-triple fi EOT RUN --mount=type=bind,target=. \ --mount=type=tmpfs,target=cli/winresources/dockerd \ --mount=type=tmpfs,target=cli/winresources/docker-proxy \ --mount=type=cache,target=/root/.cache/go-build,id=moby-build-$TARGETPLATFORM <<EOT set -e target=$([ "$DOCKER_STATIC" = "1" ] && echo "binary" || echo "dynbinary") xx-go --wrap PKG_CONFIG=$(xx-go env PKG_CONFIG) ./hack/make.sh $target xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") /tmp/bundles/${target}-daemon/dockerd$([ "$(xx-info os)" = "windows" ] && echo ".exe") xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") /tmp/bundles/${target}-daemon/docker-proxy$([ "$(xx-info os)" = "windows" ] && echo ".exe") mkdir /build mv /tmp/bundles/${target}-daemon/* /build/ EOT # usage: # > docker buildx bake binary # > DOCKER_STATIC=0 docker buildx bake binary # or # > make binary # > make dynbinary FROM scratch AS binary COPY --from=build /build/ / # usage: # > docker buildx bake all FROM scratch AS all COPY --from=tini /build/ / COPY --from=runc /build/ / COPY --from=containerd /build/ / COPY --from=rootlesskit /build/ / COPY --from=containerutil /build/ / COPY --from=vpnkit / / COPY --from=build /build / # smoke tests # usage: # > docker buildx bake binary-smoketest FROM --platform=$TARGETPLATFORM base AS smoketest WORKDIR /usr/local/bin COPY --from=build /build . RUN <<EOT set -ex file dockerd dockerd --version file docker-proxy docker-proxy --version EOT # usage: # > make shell # > SYSTEMD=true make shell FROM dev-base AS dev COPY . .