docs/content/manuals/build/cache/invalidation.md

95 lines
3.6 KiB
Markdown

---
title: Build cache invalidation
description: Dig into the details about how cache invalidation works for Docker's build cache
keywords: build, buildx, buildkit, cache, invalidation, cache miss
---
When building an image, Docker steps through the instructions in your
Dockerfile, executing each in the order specified. For each instruction, the
[builder](/manuals/build/builders/_index.md) checks whether it can reuse the
instruction from the build cache.
## General rules
The basic rules of build cache invalidation are as follows:
- The builder begins by checking if the base image is already cached. Each
subsequent instruction is compared against the cached layers. If no cached
layer matches the instruction exactly, the cache is invalidated.
- In most cases, comparing the Dockerfile instruction with the corresponding
cached layer is sufficient. However, some instructions require additional
checks and explanations.
- For the `ADD` and `COPY` instructions, and for `RUN` instructions with bind
mounts (`RUN --mount=type=bind`), the builder calculates a cache checksum
from file metadata to determine whether cache is valid. During cache lookup,
cache is invalidated if the file metadata has changed for any of the files
involved.
The modification time of a file (`mtime`) is not taken into account when
calculating the cache checksum. If only the `mtime` of the copied files have
changed, the cache is not invalidated.
- Aside from the `ADD` and `COPY` commands, cache checking doesn't look at the
files in the container to determine a cache match. For example, when processing
a `RUN apt-get -y update` command the files updated in the container
aren't examined to determine if a cache hit exists. In that case just
the command string itself is used to find a match.
Once the cache is invalidated, all subsequent Dockerfile commands generate new
images and the cache isn't used.
If your build contains several layers and you want to ensure the build cache is
reusable, order the instructions from less frequently changed to more
frequently changed where possible.
## RUN instructions
The cache for `RUN` instructions isn't invalidated automatically between builds.
Suppose you have a step in your Dockerfile to install `curl`:
```dockerfile
FROM alpine:{{% param "example_alpine_version" %}} AS install
RUN apk add curl
```
This doesn't mean that the version of `curl` in your image is always up-to-date.
Rebuilding the image one week later will still get you the same packages as before.
To force a re-execution of the `RUN` instruction, you can:
- Make sure that a layer before it has changed
- Clear the build cache ahead of the build using
[`docker builder prune`](/reference/cli/docker/builder/prune.md)
- Use the `--no-cache` or `--no-cache-filter` options
The `--no-cache-filter` option lets you specify a specific build stage to
invalidate the cache for:
```console
$ docker build --no-cache-filter install .
```
## Build secrets
The contents of build secrets are not part of the build cache.
Changing the value of a secret doesn't result in cache invalidation.
If you want to force cache invalidation after changing a secret value,
you can pass a build argument with an arbitrary value that you also change when changing the secret.
Build arguments do result in cache invalidation.
```dockerfile
FROM alpine
ARG CACHEBUST
RUN --mount=type=secret,id=TOKEN,env=TOKEN \
some-command ...
```
```console
$ TOKEN="tkn_pat123456" docker build --secret id=TOKEN --build-arg CACHEBUST=1 .
```
Properties of secrets such as IDs and mount paths do participate in the cache
checksum, and result in cache invalidation if changed.