Documentation ¶
Index ¶
- Variables
- type Config
- type ContainerdConfig
- type ContainerdRuntime
- type DNSConfig
- type DiskSpace
- type DockerfileFrontendConfig
- type Duration
- type GCConfig
- type GCPolicy
- type GRPCConfig
- type GatewayFrontendConfig
- type HistoryConfig
- type LogConfig
- type NetworkConfig
- type OCIConfig
- type OTELConfig
- type SystemConfig
- type TLSConfig
Constants ¶
This section is empty.
Variables ¶
View Source
var DiskSpacePercentage int64 = 10
Functions ¶
This section is empty.
Types ¶
type Config ¶
type Config struct { Debug bool `toml:"debug"` Trace bool `toml:"trace"` // Root is the path to a directory where buildkit will store persistent data Root string `toml:"root"` // Entitlements e.g. security.insecure, network.host Entitlements []string `toml:"insecure-entitlements"` // LogFormat is the format of the logs. It can be "json" or "text". Log LogConfig `toml:"log"` // GRPC configuration settings GRPC GRPCConfig `toml:"grpc"` OTEL OTELConfig `toml:"otel"` Workers struct { OCI OCIConfig `toml:"oci"` Containerd ContainerdConfig `toml:"containerd"` } `toml:"worker"` Registries map[string]resolverconfig.RegistryConfig `toml:"registry"` DNS *DNSConfig `toml:"dns"` History *HistoryConfig `toml:"history"` Frontends struct { Dockerfile DockerfileFrontendConfig `toml:"dockerfile.v0"` Gateway GatewayFrontendConfig `toml:"gateway.v0"` } `toml:"frontend"` System *SystemConfig `toml:"system"` }
Config provides containerd configuration data for the server
type ContainerdConfig ¶
type ContainerdConfig struct { Address string `toml:"address"` Enabled *bool `toml:"enabled"` Labels map[string]string `toml:"labels"` Platforms []string `toml:"platforms"` Namespace string `toml:"namespace"` Runtime ContainerdRuntime `toml:"runtime"` GCConfig NetworkConfig Snapshotter string `toml:"snapshotter"` // ApparmorProfile is the name of the apparmor profile that should be used to constrain build containers. // The profile should already be loaded (by a higher level system) before creating a worker. ApparmorProfile string `toml:"apparmor-profile"` // SELinux enables applying SELinux labels. SELinux bool `toml:"selinux"` MaxParallelism int `toml:"max-parallelism"` Rootless bool `toml:"rootless"` }
type ContainerdRuntime ¶ added in v0.13.0
type DiskSpace ¶ added in v0.12.0
func DetectDefaultGCCap ¶ added in v0.4.0
func DetectDefaultGCCap() DiskSpace
func (*DiskSpace) UnmarshalText ¶ added in v0.12.0
type DockerfileFrontendConfig ¶ added in v0.14.0
type DockerfileFrontendConfig struct {
Enabled *bool `toml:"enabled"`
}
type Duration ¶ added in v0.12.0
func (*Duration) UnmarshalText ¶ added in v0.12.0
type GCPolicy ¶
type GCPolicy struct { All bool `toml:"all"` KeepBytes DiskSpace `toml:"keepBytes"` KeepDuration Duration `toml:"keepDuration"` Filters []string `toml:"filters"` }
func DefaultGCPolicy ¶
type GRPCConfig ¶
type GatewayFrontendConfig ¶ added in v0.14.0
type HistoryConfig ¶ added in v0.11.0
type NetworkConfig ¶ added in v0.6.0
type OCIConfig ¶
type OCIConfig struct { Enabled *bool `toml:"enabled"` Labels map[string]string `toml:"labels"` Platforms []string `toml:"platforms"` Snapshotter string `toml:"snapshotter"` Rootless bool `toml:"rootless"` NoProcessSandbox bool `toml:"noProcessSandbox"` GCConfig NetworkConfig // UserRemapUnsupported is unsupported key for testing. The feature is // incomplete and the intention is to make it default without config. UserRemapUnsupported string `toml:"userRemapUnsupported"` // For use in storing the OCI worker binary name that will replace buildkit-runc Binary string `toml:"binary"` ProxySnapshotterPath string `toml:"proxySnapshotterPath"` DefaultCgroupParent string `toml:"defaultCgroupParent"` // StargzSnapshotterConfig is configuration for stargz snapshotter. // We use a generic map[string]interface{} in order to remove the dependency // on stargz snapshotter's config pkg from our config. StargzSnapshotterConfig map[string]interface{} `toml:"stargzSnapshotter"` // ApparmorProfile is the name of the apparmor profile that should be used to constrain build containers. // The profile should already be loaded (by a higher level system) before creating a worker. ApparmorProfile string `toml:"apparmor-profile"` // SELinux enables applying SELinux labels. SELinux bool `toml:"selinux"` // MaxParallelism is the maximum number of parallel build steps that can be run at the same time. MaxParallelism int `toml:"max-parallelism"` }
type OTELConfig ¶ added in v0.13.0
type OTELConfig struct {
SocketPath string `toml:"socketPath"`
}
type SystemConfig ¶ added in v0.14.0
type SystemConfig struct { // PlatformCacheMaxAge controls how often supported platforms // are refreshed by rescanning the system. PlatformsCacheMaxAge *Duration `toml:"platformsCacheMaxAge"` }
Click to show internal directories.
Click to hide internal directories.