This page contains information about reporting issues as well as some tips and guidelines useful to experienced open source contributors. Finally, make sure you read our community guidelines before you start participating.
The project maintainers take security seriously. If you discover a security issue, please bring it to their attention right away!
Please DO NOT file a public issue, instead send your report privately to security@docker.com.
Security reports are greatly appreciated and we will publicly thank you for it. We also like to send gifts—if you're into schwag, make sure to let us know. We currently do not offer a paid security bounty program, but are not ruling it out in the future.
A great way to contribute to the project is to send a detailed report when you encounter an issue. We always appreciate a well-written, thorough bug report, and will thank you for it!
Check that our issue database doesn't already include that problem or suggestion before submitting an issue. If you find a match, you can use the "subscribe" button to get notified on updates. Do not leave random "+1" or "I have this too" comments, as they only clutter the discussion, and don't help resolving it. However, if you have ways to reproduce the issue or have additional information that may help resolving the issue, please leave a comment.
Include the steps required to reproduce the problem if possible and applicable. This information will help us review and fix your issue faster. When sending lengthy log-files, consider posting them as an attachment, instead of posting inline.
Do not forget to remove sensitive data from your logfiles before submitting (you can replace those parts with "REDACTED").
This section gives the experienced contributor some tips and guidelines.
Dependencies:
- runc
- containerd (if you want to use containerd worker)
The following command installs buildkitd
and buildctl
to /usr/local/bin
:
make && sudo make install
To build containerized moby/buildkit:local
and moby/buildkit:local-rootless
images:
make images
You can launch the backend BuildKit daemon either in a container, or directly:
# run the daemon in a container
$ docker run --rm -d --name buildkitd --privileged moby/buildkit:local
$ export BUILDKIT_HOST=docker-container://buildkitd
$ buildctl debug info
BuildKit: github.com/moby/buildkit v0.11.0-rc3-623-g2ff0d2a2f.m 2ff0d2a2f53663aae917980fa27eada7950ff69c.m
# run the daemon directly (only on linux)
$ sudo buildkitd
$ export BUILDKIT_HOST=unix:///run/buildkit/buildkitd.sock
$ sudo buildctl debug info
BuildKit: github.com/moby/buildkit v0.11.0-rc3-506-g539bab193.m 539bab193c28d3ce731e6013f471ba24848f5c41.m
You can also connect buildx to the BuildKit daemon using the remote
driver:
$ docker buildx create --driver=remote --name=dev $BUILDKIT_HOST
$ docker buildx --builder=dev inspect
Name: dev
Driver: remote
Last Activity: 2023-06-06 14:15:52 +0000 UTC
Nodes:
Name: dev0
Endpoint: tcp://localhost:1234
Status: running
Buildkit: v0.11.0-rc3-506-g539bab193.m
Platforms: linux/amd64, linux/amd64/v2, linux/amd64/v3, linux/386
You can also have buildx run and manage the custom BuildKit daemon itself using
the docker-container
driver.
This is usually the easiest way to get started with a custom BuildKit daemon for development or debugging.
$ docker buildx rm dev || true # remove previous dev builder if exists
$ docker buildx create --driver=docker-container --name=dev --driver-opt image=moby/buildkit:local --bootstrap
[+] Building 0.3s (1/1) FINISHED
=> [internal] booting buildkit
=> => starting container buildx_buildkit_dev0
dev
$ docker buildx --builder=dev inspect
Name: dev
Driver: docker-container
Last Activity: 2023-06-06 14:15:52 +0000 UTC
Nodes:
Name: dev0
Endpoint: desktop-linux
Driver Options: image="moby/buildkit:local"
Status: running
Buildkit: v0.11.0-rc3-623-g2ff0d2a2f.m
Platforms: linux/amd64, linux/amd64/v2, linux/amd64/v3, linux/arm64, linux/riscv64, linux/ppc64le, linux/s390x, linux/386, linux/mips64le, linux/mips64, linux/arm/v7, linux/arm/v6
Running tests:
./hack/test integration gateway dockerfile
This runs all unit and integration tests, gateway client and dockerfile tests in a containerized environment. Locally, every package can be tested separately with standard Go tools, but integration tests are skipped if local user doesn't have enough permissions or worker binaries are not installed. The dockerfile tests run by first building new Dockerfile frontend image and then loading it to the test environment. Builtin Dockerfile frontend can be tested with regular integration tests.
# test a specific package only
TESTPKGS=./client ./hack/test integration
# run a specific test with all worker combinations
TESTPKGS=./client TESTFLAGS="--run /TestCallDiskUsage -v" ./hack/test integration
# run all integration tests with a specific worker
# supported workers: oci, oci-rootless, containerd, containerd-1.1
TESTPKGS=./client TESTFLAGS="--run //worker=containerd -v" ./hack/test integration
# run a specific dockerfile test only on labs channel
DOCKERFILE_RELEASES=labs TESTFLAGS="--run /TestRunGlobalNetwork/worker=oci$/ -v" ./hack/test dockerfile
# enabling go data race detector
CGO_ENABLED=1 GOBUILDFLAGS="-race" ./hack/test integration
Set TEST_KEEP_CACHE=1
for the test framework to keep external dependant images in a docker volume
if you are repeatedly calling ./hack/test
script. This helps to avoid rate limiting on the remote registry side.
If you are working behind a proxy, you can set some of or all
HTTP_PROXY=http://ip:port
, HTTPS_PROXY=http://ip:port
, NO_PROXY=http://ip:port
for the test framework
to specify the proxy build args.
To validate PRs before submitting them you should run:
$ make validate-all
To generate new vendored files with go modules run:
$ make vendor
To generate new versions of automatically generated files run:
$ make generated-files
Not sure if that typo is worth a pull request? Found a bug and know how to fix it? Do it! We will appreciate it.
If your pull request is not accepted on the first try, don't be discouraged! If there's a problem with the implementation, hopefully you received feedback on what to improve.
We're trying very hard to keep BuildKit lean and focused. We don't want it to do everything for everybody. This means that we might decide against incorporating a new feature. However, there might be a way to implement that feature on top of BuildKit.
You can propose new designs for existing features. You can also design entirely new features. We really appreciate contributors who want to refactor or otherwise cleanup our project.
Forums | A public forum for users to discuss questions and explore current design patterns and best practices about all the Moby projects. To participate, log in with your Github account or create an account at https://forums.mobyproject.org. |
Slack |
Register for the Docker Community Slack (dockercommunity.slack.com)
Click here for an invite to docker community slack.
You'll find us in |
You can follow Moby Project Twitter feed to get updates on our products. You can also tweet us questions or just share blogs or stories. |
The sign-off is a simple line at the end of the explanation for the patch. Your signature certifies that you wrote the patch or otherwise have the right to pass it on as an open-source patch. The rules are pretty simple: if you can certify the below (from developercertificate.org):
Developer Certificate of Origin
Version 1.1
Copyright (C) 2004, 2006 The Linux Foundation and its contributors.
1 Letterman Drive
Suite D4700
San Francisco, CA, 94129
Everyone is permitted to copy and distribute verbatim copies of this
license document, but changing it is not allowed.
Developer's Certificate of Origin 1.1
By making a contribution to this project, I certify that:
(a) The contribution was created in whole or in part by me and I
have the right to submit it under the open source license
indicated in the file; or
(b) The contribution is based upon previous work that, to the best
of my knowledge, is covered under an appropriate open source
license and I have the right under that license to submit that
work with modifications, whether created in whole or in part
by me, under the same open source license (unless I am
permitted to submit under a different license), as indicated
in the file; or
(c) The contribution was provided directly to me by some other
person who certified (a), (b) or (c) and I have not modified
it.
(d) I understand and agree that this project and the contribution
are public and that a record of the contribution (including all
personal information I submit with it, including my sign-off) is
maintained indefinitely and may be redistributed consistent with
this project or the open source license(s) involved.
Then you just add a line to every git commit message:
Signed-off-by: Joe Smith <joe.smith@email.com>
Use your real name (sorry, no pseudonyms or anonymous contributions.)
If you set your user.name
and user.email
git configs, you can sign your
commit automatically with git commit -s
.
- Fork the repository and make changes on your fork in a feature branch
- Submit tests for your changes. See run the unit- and integration-tests for details.
Update the documentation when creating or modifying features. Test your documentation changes for clarity, concision, and correctness, as well as a clean documentation build.
Write clean code. Universally formatted code promotes ease of writing, reading,
and maintenance. Always run gofmt -s -w file.go
on each changed file before
committing your changes. Most editors have plug-ins that do this automatically.
Pull request descriptions should be as clear as possible and include a reference to all the issues that they address. Be sure that the commit messages also contain the relevant information.
Before contributing large or high impact changes, make the effort to coordinate with the maintainers of the project before submitting a pull request. This prevents you from doing extra work that may or may not be merged.
Large PRs that are just submitted without any prior communication are unlikely to be successful.
While pull requests are the methodology for submitting changes to code, changes are much more likely to be accepted if they are accompanied by additional engineering work. While we don't define this explicitly, most of these goals are accomplished through communication of the design goals and subsequent solutions. Often times, it helps to first state the problem before presenting solutions.
Typically, the best methods of accomplishing this are to submit an issue, stating the problem. This issue can include a problem statement and a checklist with requirements. If solutions are proposed, alternatives should be listed and eliminated. Even if the criteria for elimination of a solution is frivolous, say so.
Larger changes typically work best with design documents. These are focused on providing context to the design at the time the feature was conceived and can inform future documentation contributions.
Commit messages must start with a capitalized and short summary (max. 50 chars) written in the imperative, followed by an optional, more detailed explanatory text which is separated from the summary by an empty line.
Commit messages should follow best practices, including explaining the context of the problem and how it was solved, including in caveats or follow up changes required. They should tell the story of the change and provide readers understanding of what led to it.
If you're lost about what this even means, please see How to Write a Git Commit Message for a start.
In practice, the best approach to maintaining a nice commit message is to
leverage a git add -p
and git commit --amend
to formulate a solid
changeset. This allows one to piece together a change, as information becomes
available.
If you squash a series of commits, don't just submit that. Re-write the commit message, as if the series of commits was a single stroke of brilliance.
That said, there is no requirement to have a single commit for a PR, as long as each commit tells the story. For example, if there is a feature that requires a package, it might make sense to have the package in a separate commit then have a subsequent commit that uses it.
Remember, you're telling part of the story with the commit message. Don't make your chapter weird.
Code review comments may be added to your pull request. Discuss, then make the suggested modifications and push additional commits to your feature branch. Post a comment after pushing. New commits show up in the pull request automatically, but the reviewers are notified only when you comment.
Pull requests must be cleanly rebased on top of master without multiple branches mixed into the PR.
Git tip: If your PR no longer merges cleanly, use
rebase master
in your feature branch to update your pull request rather thanmerge master
.
Before you make a pull request, squash your commits into logical units of work
using git rebase -i
and git push -f
. A logical unit of work is a consistent
set of patches that should be reviewed together: for example, upgrading the
version of a vendored dependency and taking advantage of its now available new
feature constitute two separate units of work. Implementing a new function and
calling it in another file constitute a single logical unit of work. The very
high majority of submissions should have a single commit, so if in doubt: squash
down to one.
- After every commit, make sure the test suite passes. Include documentation changes in the same pull request so that a revert would remove all traces of the feature or fix.
- Include an issue reference like
closes #XXXX
orfixes #XXXX
in the PR description that close an issue. Including references automatically closes the issue on a merge. - Do not add yourself to the
AUTHORS
file, as it is regenerated regularly from the Git history. - See the Coding Style for further guidelines.
Project maintainers use LGTM (Looks Good To Me) in comments on the code review to indicate acceptance, or use the Github review approval feature.
Unless explicitly stated, we follow all coding guidelines from the Go community. While some of these standards may seem arbitrary, they somehow seem to result in a solid, consistent codebase.
It is possible that the code base does not currently comply with these guidelines. We are not looking for a massive PR that fixes this, since that goes against the spirit of the guidelines. All new contributions should make a best effort to clean up and make the code base better than they left it. Obviously, apply your best judgement. Remember, the goal here is to make the code base easier for humans to navigate and understand. Always keep that in mind when nudging others to comply.
The rules:
- All code should be formatted with
gofmt -s
. - All code should pass the default levels of
golint
. - All code should follow the guidelines covered in Effective Go and Go Code Review Comments.
- Comment the code. Tell us the why, the history and the context.
- Document all declarations and methods, even private ones. Declare expectations, caveats and anything else that may be important. If a type gets exported, having the comments already there will ensure it's ready.
- Variable name length should be proportional to its context and no longer.
noCommaALongVariableNameLikeThisIsNotMoreClearWhenASimpleCommentWouldDo
. In practice, short methods will have short variable names and globals will have longer names. - No underscores in package names. If you need a compound name, step back, and re-examine why you need a compound name. If you still think you need a compound name, lose the underscore.
- No utils or helpers packages. If a function is not general enough to warrant its own package, it has not been written generally enough to be a part of a util package. Just leave it unexported and well-documented.
- All tests should run with
go test
and outside tooling should not be required. No, we don't need another unit testing framework. Assertion packages are acceptable if they provide real incremental value. - Even though we call these "rules" above, they are actually just guidelines. Since you've read all the rules, you now know that.
If you are having trouble getting into the mood of idiomatic Go, we recommend reading through Effective Go. The Go Blog is also a great resource.