Unlike `docker build --secret`, `docker build --ssh` allows the build container to use SSH keys with passphrases. $ eval $(ssh-agent) $ ssh-add ~/.ssh/id_rsa (Input your passphrase here) $ docker build --ssh default=$SSH_AUTH_SOCK ... This feature requires the daemon with `CapExecMountSSH` build capability (moby/moby#37973) . Currently, the official Dockerfile frontend does not provide the syntax for using the SSH forwarder. However, the experimental `RUN --mount=type=ssh` syntax can be enabled by using the Dockerfile frontend image built with the `BUILDTAGS="dfrunmount dfssh"`, via the `# syntax =` "shebang". The Dockerfile for the Dockerfile frontend is available at github.com/moby/buildkit/frontend/dockerfile/cmd/dockerfile-frontend) The pre-built image is also available as `tonistiigi/dockerfile:ssh20181002` . An example Dockerfile with `RUN --mount=type=ssh`: # syntax = tonistiigi/dockerfile:ssh20181002 FROM alpine RUN apk add --no-cache openssh-client RUN mkdir -p -m 0700 ~/.ssh && ssh-keyscan gitlab.com >> ~/.ssh/known_hosts RUN --mount=type=ssh ssh git@gitlab.com | tee /hello # "Welcome to GitLab, @GITLAB_USERNAME_ASSOCIATED_WITH_SSHKEY" should be printed here More info available at moby/buildkit#608, moby/buildkit#655 Signed-off-by: Akihiro Suda <suda.akihiro@lab.ntt.co.jp>
114 lines
2.0 KiB
Go
114 lines
2.0 KiB
Go
package sshforward
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"net"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"github.com/moby/buildkit/session"
|
|
context "golang.org/x/net/context"
|
|
"golang.org/x/sync/errgroup"
|
|
"google.golang.org/grpc/metadata"
|
|
)
|
|
|
|
// DefaultID is the default ssh ID
|
|
const DefaultID = "default"
|
|
|
|
const KeySSHID = "buildkit.ssh.id"
|
|
|
|
type server struct {
|
|
caller session.Caller
|
|
}
|
|
|
|
func (s *server) run(ctx context.Context, l net.Listener, id string) error {
|
|
eg, ctx := errgroup.WithContext(ctx)
|
|
|
|
eg.Go(func() error {
|
|
<-ctx.Done()
|
|
return ctx.Err()
|
|
})
|
|
|
|
eg.Go(func() error {
|
|
for {
|
|
conn, err := l.Accept()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
client := NewSSHClient(s.caller.Conn())
|
|
|
|
opts := make(map[string][]string)
|
|
opts[KeySSHID] = []string{id}
|
|
ctx = metadata.NewOutgoingContext(ctx, opts)
|
|
|
|
stream, err := client.ForwardAgent(ctx)
|
|
if err != nil {
|
|
conn.Close()
|
|
return err
|
|
}
|
|
|
|
go Copy(ctx, conn, stream)
|
|
}
|
|
})
|
|
|
|
return eg.Wait()
|
|
}
|
|
|
|
type SocketOpt struct {
|
|
ID string
|
|
UID int
|
|
GID int
|
|
Mode int
|
|
}
|
|
|
|
func MountSSHSocket(ctx context.Context, c session.Caller, opt SocketOpt) (sockPath string, closer func() error, err error) {
|
|
dir, err := ioutil.TempDir("", ".buildkit-ssh-sock")
|
|
if err != nil {
|
|
return "", nil, err
|
|
}
|
|
|
|
defer func() {
|
|
if err != nil {
|
|
os.RemoveAll(dir)
|
|
}
|
|
}()
|
|
|
|
sockPath = filepath.Join(dir, "ssh_auth_sock")
|
|
|
|
l, err := net.Listen("unix", sockPath)
|
|
if err != nil {
|
|
return "", nil, err
|
|
}
|
|
|
|
if err := os.Chown(sockPath, opt.UID, opt.GID); err != nil {
|
|
l.Close()
|
|
return "", nil, err
|
|
}
|
|
if err := os.Chmod(sockPath, os.FileMode(opt.Mode)); err != nil {
|
|
l.Close()
|
|
return "", nil, err
|
|
}
|
|
|
|
s := &server{caller: c}
|
|
|
|
id := opt.ID
|
|
if id == "" {
|
|
id = DefaultID
|
|
}
|
|
|
|
go s.run(ctx, l, id) // erroring per connection allowed
|
|
|
|
return sockPath, func() error {
|
|
err := l.Close()
|
|
os.RemoveAll(sockPath)
|
|
return err
|
|
}, nil
|
|
}
|
|
|
|
func CheckSSHID(ctx context.Context, c session.Caller, id string) error {
|
|
client := NewSSHClient(c.Conn())
|
|
_, err := client.CheckAgent(ctx, &CheckAgentRequest{ID: id})
|
|
return err
|
|
}
|