diff options
Diffstat (limited to 'cmd/podman/main_local.go')
-rw-r--r-- | cmd/podman/main_local.go | 294 |
1 files changed, 0 insertions, 294 deletions
diff --git a/cmd/podman/main_local.go b/cmd/podman/main_local.go deleted file mode 100644 index e71dbbf97..000000000 --- a/cmd/podman/main_local.go +++ /dev/null @@ -1,294 +0,0 @@ -// +build !remoteclient -// +build linux - -package main - -import ( - "context" - "fmt" - "io/ioutil" - "log/syslog" - "os" - "runtime/pprof" - "strconv" - "syscall" - - "github.com/containers/common/pkg/config" - "github.com/containers/libpod/cmd/podman/cliconfig" - "github.com/containers/libpod/cmd/podman/libpodruntime" - "github.com/containers/libpod/pkg/cgroups" - "github.com/containers/libpod/pkg/rootless" - "github.com/containers/libpod/pkg/tracing" - "github.com/containers/libpod/pkg/util" - "github.com/containers/libpod/utils" - "github.com/opentracing/opentracing-go" - "github.com/pkg/errors" - "github.com/sirupsen/logrus" - lsyslog "github.com/sirupsen/logrus/hooks/syslog" - "github.com/spf13/cobra" -) - -const remote = false - -func init() { - cgroupManager := defaultContainerConfig.Engine.CgroupManager - cgroupHelp := `Cgroup manager to use ("cgroupfs"|"systemd")` - cgroupv2, _ := cgroups.IsCgroup2UnifiedMode() - - defaultContainerConfig = cliconfig.GetDefaultConfig() - if rootless.IsRootless() && !cgroupv2 { - cgroupManager = "" - cgroupHelp = "Cgroup manager is not supported in rootless mode" - } - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.CGroupManager, "cgroup-manager", cgroupManager, cgroupHelp) - // -c is deprecated due to conflict with -c on subcommands - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.CpuProfile, "cpu-profile", "", "Path for the cpu profiling results") - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.ConmonPath, "conmon", "", "Path of the conmon binary") - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.NetworkCmdPath, "network-cmd-path", defaultContainerConfig.Engine.NetworkCmdPath, "Path to the command for configuring the network") - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.CniConfigDir, "cni-config-dir", getCNIPluginsDir(), "Path of the configuration directory for CNI networks") - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.DefaultMountsFile, "default-mounts-file", defaultContainerConfig.Containers.DefaultMountsFile, "Path to default mounts file") - if err := rootCmd.PersistentFlags().MarkHidden("cpu-profile"); err != nil { - logrus.Error("unable to mark default-mounts-file flag as hidden") - } - if err := rootCmd.PersistentFlags().MarkHidden("default-mounts-file"); err != nil { - logrus.Error("unable to mark default-mounts-file flag as hidden") - } - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.EventsBackend, "events-backend", defaultContainerConfig.Engine.EventsLogger, `Events backend to use ("file"|"journald"|"none")`) - // Override default --help information of `--help` global flag - var dummyHelp bool - rootCmd.PersistentFlags().BoolVar(&dummyHelp, "help", false, "Help for podman") - rootCmd.PersistentFlags().StringSliceVar(&MainGlobalOpts.HooksDir, "hooks-dir", defaultContainerConfig.Engine.HooksDir, "Set the OCI hooks directory path (may be set multiple times)") - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.LogLevel, "log-level", "error", `Log messages above specified level ("debug"|"info"|"warn"|"error"|"fatal"|"panic")`) - rootCmd.PersistentFlags().IntVar(&MainGlobalOpts.MaxWorks, "max-workers", 0, "The maximum number of workers for parallel operations") - if err := rootCmd.PersistentFlags().MarkHidden("max-workers"); err != nil { - logrus.Error("unable to mark max-workers flag as hidden") - } - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.Namespace, "namespace", defaultContainerConfig.Engine.Namespace, "Set the libpod namespace, used to create separate views of the containers and pods on the system") - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.Root, "root", "", "Path to the root directory in which data, including images, is stored") - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.Runroot, "runroot", "", "Path to the 'run directory' where all state information is stored") - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.Runtime, "runtime", "", "Path to the OCI-compatible binary used to run containers, default is /usr/bin/runc") - // -s is deprecated due to conflict with -s on subcommands - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.StorageDriver, "storage-driver", "", "Select which storage driver is used to manage storage of images and containers (default is overlay)") - rootCmd.PersistentFlags().StringArrayVar(&MainGlobalOpts.StorageOpts, "storage-opt", []string{}, "Used to pass an option to the storage driver") - rootCmd.PersistentFlags().BoolVar(&MainGlobalOpts.Syslog, "syslog", false, "Output logging information to syslog as well as the console (default false)") - - rootCmd.PersistentFlags().StringVar(&MainGlobalOpts.TmpDir, "tmpdir", "", "Path to the tmp directory for libpod state content.\n\nNote: use the environment variable 'TMPDIR' to change the temporary storage location for container images, '/var/tmp'.\n") - rootCmd.PersistentFlags().BoolVar(&MainGlobalOpts.Trace, "trace", false, "Enable opentracing output (default false)") - markFlagHidden(rootCmd.PersistentFlags(), "trace") -} - -func setSyslog() error { - if MainGlobalOpts.Syslog { - hook, err := lsyslog.NewSyslogHook("", "", syslog.LOG_INFO, "") - if err == nil { - logrus.AddHook(hook) - return nil - } - return err - } - return nil -} - -func profileOn(cmd *cobra.Command) error { - if cmd.Flag("cpu-profile").Changed { - f, err := os.Create(MainGlobalOpts.CpuProfile) - if err != nil { - return errors.Wrapf(err, "unable to create cpu profiling file %s", - MainGlobalOpts.CpuProfile) - } - if err := pprof.StartCPUProfile(f); err != nil { - return err - } - } - - if cmd.Flag("trace").Changed { - var tracer opentracing.Tracer - tracer, closer = tracing.Init("podman") - opentracing.SetGlobalTracer(tracer) - - span = tracer.StartSpan("before-context") - - Ctx = opentracing.ContextWithSpan(context.Background(), span) - } - return nil -} - -func profileOff(cmd *cobra.Command) error { - if cmd.Flag("cpu-profile").Changed { - pprof.StopCPUProfile() - } - if cmd.Flag("trace").Changed { - span.Finish() - closer.Close() - } - return nil -} - -func movePauseProcessToScope() error { - pausePidPath, err := util.GetRootlessPauseProcessPidPath() - if err != nil { - return errors.Wrapf(err, "could not get pause process pid file path") - } - - data, err := ioutil.ReadFile(pausePidPath) - if err != nil { - return errors.Wrapf(err, "cannot read pause pid file") - } - pid, err := strconv.ParseUint(string(data), 10, 0) - if err != nil { - return errors.Wrapf(err, "cannot parse pid file %s", pausePidPath) - } - - return utils.RunUnderSystemdScope(int(pid), "user.slice", "podman-pause.scope") -} - -func setupRootless(cmd *cobra.Command, args []string) error { - if !rootless.IsRootless() { - return nil - } - - matches, err := rootless.ConfigurationMatches() - if err != nil { - return err - } - if !matches { - logrus.Warningf("the current user namespace doesn't match the configuration in /etc/subuid or /etc/subgid") - logrus.Warningf("you can use `%s system migrate` to recreate the user namespace and restart the containers", os.Args[0]) - } - - podmanCmd := cliconfig.PodmanCommand{ - Command: cmd, - InputArgs: args, - GlobalFlags: MainGlobalOpts, - Remote: remoteclient, - } - - runtime, err := libpodruntime.GetRuntimeNoStore(getContext(), &podmanCmd) - if err != nil { - return errors.Wrapf(err, "could not get runtime") - } - defer runtime.DeferredShutdown(false) - - // do it only after podman has already re-execed and running with uid==0. - if os.Geteuid() == 0 { - ownsCgroup, err := cgroups.UserOwnsCurrentSystemdCgroup() - if err != nil { - logrus.Warnf("Failed to detect the owner for the current cgroup: %v", err) - } - if !ownsCgroup { - conf, err := runtime.GetConfig() - if err != nil { - return err - } - unitName := fmt.Sprintf("podman-%d.scope", os.Getpid()) - if err := utils.RunUnderSystemdScope(os.Getpid(), "user.slice", unitName); err != nil { - if conf.Engine.CgroupManager == config.SystemdCgroupsManager { - logrus.Warnf("Failed to add podman to systemd sandbox cgroup: %v", err) - } else { - logrus.Debugf("Failed to add podman to systemd sandbox cgroup: %v", err) - } - } - } - } - - if !executeCommandInUserNS(cmd) { - return nil - } - - pausePidPath, err := util.GetRootlessPauseProcessPidPath() - if err != nil { - return errors.Wrapf(err, "could not get pause process pid file path") - } - - became, ret, err := rootless.TryJoinPauseProcess(pausePidPath) - if err != nil { - return err - } - if became { - os.Exit(ret) - } - - // if there is no pid file, try to join existing containers, and create a pause process. - ctrs, err := runtime.GetRunningContainers() - if err != nil { - logrus.Errorf(err.Error()) - os.Exit(1) - } - - paths := []string{} - for _, ctr := range ctrs { - paths = append(paths, ctr.Config().ConmonPidFile) - } - - became, ret, err = rootless.TryJoinFromFilePaths(pausePidPath, true, paths) - if err := movePauseProcessToScope(); err != nil { - conf, err := runtime.GetConfig() - if err != nil { - return err - } - if conf.Engine.CgroupManager == config.SystemdCgroupsManager { - logrus.Warnf("Failed to add pause process to systemd sandbox cgroup: %v", err) - } else { - logrus.Debugf("Failed to add pause process to systemd sandbox cgroup: %v", err) - } - } - if err != nil { - logrus.Errorf(err.Error()) - os.Exit(1) - } - if became { - os.Exit(ret) - } - return nil -} - -// Most podman commands when run in rootless mode, need to be executed in the -// users usernamespace. This function is updated with a list of commands that -// should NOT be run within the user namespace. -func executeCommandInUserNS(cmd *cobra.Command) bool { - if os.Geteuid() == 0 { - return false - } - switch cmd { - case _migrateCommand, - _mountCommand, - _renumberCommand, - _searchCommand, - _versionCommand: - return false - } - return true -} - -func setRLimits() error { - rlimits := new(syscall.Rlimit) - rlimits.Cur = 1048576 - rlimits.Max = 1048576 - if err := syscall.Setrlimit(syscall.RLIMIT_NOFILE, rlimits); err != nil { - if err := syscall.Getrlimit(syscall.RLIMIT_NOFILE, rlimits); err != nil { - return errors.Wrapf(err, "error getting rlimits") - } - rlimits.Cur = rlimits.Max - if err := syscall.Setrlimit(syscall.RLIMIT_NOFILE, rlimits); err != nil { - return errors.Wrapf(err, "error setting new rlimits") - } - } - return nil -} - -func setUMask() { - // Be sure we can create directories with 0755 mode. - syscall.Umask(0022) -} - -// checkInput can be used to verify any of the globalopt values -func checkInput() error { - return nil -} -func getCNIPluginsDir() string { - if rootless.IsRootless() { - return "" - } - - return defaultContainerConfig.Network.CNIPluginDirs[0] -} |