mirror of
https://github.com/containers/podman.git
synced 2025-08-23 17:22:30 +08:00

Two incomptable changes, they removed the BridgeNfIP6tables and BridgeNfIptables fields so we must drop them. As they are not important ones that should not cause problems. Second, they moved to using DockerOCIImageConfig from another new module. The json format did not chnage so this is not an external API break. Signed-off-by: Paul Holzinger <pholzing@redhat.com>
260 lines
8.2 KiB
Go
260 lines
8.2 KiB
Go
//go:build !remote
|
|
|
|
package compat
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"os"
|
|
goRuntime "runtime"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/containers/common/pkg/config"
|
|
"github.com/containers/common/pkg/sysinfo"
|
|
"github.com/containers/image/v5/pkg/sysregistriesv2"
|
|
"github.com/containers/podman/v5/libpod"
|
|
"github.com/containers/podman/v5/libpod/define"
|
|
"github.com/containers/podman/v5/pkg/api/handlers"
|
|
"github.com/containers/podman/v5/pkg/api/handlers/utils"
|
|
api "github.com/containers/podman/v5/pkg/api/types"
|
|
"github.com/containers/podman/v5/pkg/rootless"
|
|
"github.com/docker/docker/api/types/registry"
|
|
"github.com/docker/docker/api/types/swarm"
|
|
dockerSystem "github.com/docker/docker/api/types/system"
|
|
"github.com/google/uuid"
|
|
"github.com/opencontainers/selinux/go-selinux"
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
func GetInfo(w http.ResponseWriter, r *http.Request) {
|
|
// 200 ok
|
|
// 500 internal
|
|
runtime := r.Context().Value(api.RuntimeKey).(*libpod.Runtime)
|
|
|
|
infoData, err := runtime.Info()
|
|
if err != nil {
|
|
utils.Error(w, http.StatusInternalServerError, fmt.Errorf("failed to obtain system memory info: %w", err))
|
|
return
|
|
}
|
|
|
|
configInfo, err := runtime.GetConfig()
|
|
if err != nil {
|
|
utils.Error(w, http.StatusInternalServerError, fmt.Errorf("failed to obtain runtime config: %w", err))
|
|
return
|
|
}
|
|
versionInfo, err := define.GetVersion()
|
|
if err != nil {
|
|
utils.Error(w, http.StatusInternalServerError, fmt.Errorf("failed to obtain podman versions: %w", err))
|
|
return
|
|
}
|
|
stateInfo := getContainersState(runtime)
|
|
sysInfo := sysinfo.New(true)
|
|
|
|
// FIXME: Need to expose if runtime supports Checkpointing
|
|
// liveRestoreEnabled := criu.CheckForCriu() && configInfo.RuntimeSupportsCheckpoint()
|
|
info := &handlers.Info{
|
|
Info: dockerSystem.Info{
|
|
Architecture: goRuntime.GOARCH,
|
|
CPUCfsPeriod: sysInfo.CPUCfsPeriod,
|
|
CPUCfsQuota: sysInfo.CPUCfsQuota,
|
|
CPUSet: sysInfo.Cpuset,
|
|
CPUShares: sysInfo.CPUShares,
|
|
CgroupDriver: configInfo.Engine.CgroupManager,
|
|
ContainerdCommit: dockerSystem.Commit{},
|
|
Containers: infoData.Store.ContainerStore.Number,
|
|
ContainersPaused: stateInfo[define.ContainerStatePaused],
|
|
ContainersRunning: stateInfo[define.ContainerStateRunning],
|
|
ContainersStopped: stateInfo[define.ContainerStateStopped] + stateInfo[define.ContainerStateExited],
|
|
Debug: log.IsLevelEnabled(log.DebugLevel),
|
|
DefaultAddressPools: getDefaultAddressPools(configInfo),
|
|
DefaultRuntime: configInfo.Engine.OCIRuntime,
|
|
DockerRootDir: infoData.Store.GraphRoot,
|
|
Driver: infoData.Store.GraphDriverName,
|
|
DriverStatus: getGraphStatus(infoData.Store.GraphStatus),
|
|
ExperimentalBuild: true,
|
|
GenericResources: nil,
|
|
HTTPProxy: getEnv("http_proxy"),
|
|
HTTPSProxy: getEnv("https_proxy"),
|
|
ID: uuid.New().String(),
|
|
IPv4Forwarding: !sysInfo.IPv4ForwardingDisabled,
|
|
Images: infoData.Store.ImageStore.Number,
|
|
IndexServerAddress: "",
|
|
InitBinary: "",
|
|
InitCommit: dockerSystem.Commit{},
|
|
Isolation: "",
|
|
KernelMemoryTCP: false,
|
|
KernelVersion: infoData.Host.Kernel,
|
|
Labels: nil,
|
|
LiveRestoreEnabled: false,
|
|
LoggingDriver: "",
|
|
MemTotal: infoData.Host.MemTotal,
|
|
MemoryLimit: sysInfo.MemoryLimit,
|
|
NCPU: goRuntime.NumCPU(),
|
|
NEventsListener: 0,
|
|
NFd: getFdCount(),
|
|
NGoroutines: goRuntime.NumGoroutine(),
|
|
Name: infoData.Host.Hostname,
|
|
NoProxy: getEnv("no_proxy"),
|
|
OSType: goRuntime.GOOS,
|
|
OSVersion: infoData.Host.Distribution.Version,
|
|
OomKillDisable: sysInfo.OomKillDisable,
|
|
OperatingSystem: infoData.Host.Distribution.Distribution,
|
|
PidsLimit: sysInfo.PidsLimit,
|
|
Plugins: dockerSystem.PluginsInfo{
|
|
Volume: infoData.Plugins.Volume,
|
|
Network: infoData.Plugins.Network,
|
|
Log: infoData.Plugins.Log,
|
|
},
|
|
ProductLicense: "Apache-2.0",
|
|
RegistryConfig: getServiceConfig(runtime),
|
|
RuncCommit: dockerSystem.Commit{},
|
|
Runtimes: getRuntimes(configInfo),
|
|
SecurityOptions: getSecOpts(sysInfo),
|
|
ServerVersion: versionInfo.Version,
|
|
SwapLimit: sysInfo.SwapLimit,
|
|
Swarm: swarm.Info{
|
|
LocalNodeState: swarm.LocalNodeStateInactive,
|
|
},
|
|
SystemStatus: nil,
|
|
SystemTime: time.Now().Format(time.RFC3339Nano),
|
|
Warnings: []string{},
|
|
},
|
|
BuildahVersion: infoData.Host.BuildahVersion,
|
|
CPURealtimePeriod: sysInfo.CPURealtimePeriod,
|
|
CPURealtimeRuntime: sysInfo.CPURealtimeRuntime,
|
|
CgroupVersion: strings.TrimPrefix(infoData.Host.CgroupsVersion, "v"),
|
|
Rootless: rootless.IsRootless(),
|
|
SwapFree: infoData.Host.SwapFree,
|
|
SwapTotal: infoData.Host.SwapTotal,
|
|
Uptime: infoData.Host.Uptime,
|
|
}
|
|
utils.WriteResponse(w, http.StatusOK, info)
|
|
}
|
|
|
|
func getServiceConfig(runtime *libpod.Runtime) *registry.ServiceConfig {
|
|
var indexConfs map[string]*registry.IndexInfo
|
|
|
|
regs, err := sysregistriesv2.GetRegistries(runtime.SystemContext())
|
|
if err == nil {
|
|
indexConfs = make(map[string]*registry.IndexInfo, len(regs))
|
|
for _, reg := range regs {
|
|
mirrors := make([]string, len(reg.Mirrors))
|
|
for i, mirror := range reg.Mirrors {
|
|
mirrors[i] = mirror.Location
|
|
}
|
|
indexConfs[reg.Prefix] = ®istry.IndexInfo{
|
|
Name: reg.Prefix,
|
|
Mirrors: mirrors,
|
|
Secure: !reg.Insecure,
|
|
}
|
|
}
|
|
} else {
|
|
log.Warnf("failed to get registries configuration: %v", err)
|
|
indexConfs = make(map[string]*registry.IndexInfo)
|
|
}
|
|
|
|
return ®istry.ServiceConfig{
|
|
AllowNondistributableArtifactsCIDRs: make([]*registry.NetIPNet, 0),
|
|
AllowNondistributableArtifactsHostnames: make([]string, 0),
|
|
InsecureRegistryCIDRs: make([]*registry.NetIPNet, 0),
|
|
IndexConfigs: indexConfs,
|
|
Mirrors: make([]string, 0),
|
|
}
|
|
}
|
|
|
|
func getGraphStatus(storeInfo map[string]string) [][2]string {
|
|
graphStatus := make([][2]string, 0, len(storeInfo))
|
|
for k, v := range storeInfo {
|
|
graphStatus = append(graphStatus, [2]string{k, v})
|
|
}
|
|
return graphStatus
|
|
}
|
|
|
|
func getSecOpts(sysInfo *sysinfo.SysInfo) []string {
|
|
var secOpts []string
|
|
if sysInfo.AppArmor {
|
|
secOpts = append(secOpts, "name=apparmor")
|
|
}
|
|
if sysInfo.Seccomp {
|
|
// FIXME: get profile name...
|
|
secOpts = append(secOpts, fmt.Sprintf("name=seccomp,profile=%s", "default"))
|
|
}
|
|
if rootless.IsRootless() {
|
|
secOpts = append(secOpts, "name=rootless")
|
|
}
|
|
if selinux.GetEnabled() {
|
|
secOpts = append(secOpts, "name=selinux")
|
|
}
|
|
|
|
return secOpts
|
|
}
|
|
|
|
func getRuntimes(configInfo *config.Config) map[string]dockerSystem.RuntimeWithStatus {
|
|
runtimes := map[string]dockerSystem.RuntimeWithStatus{}
|
|
for name, paths := range configInfo.Engine.OCIRuntimes {
|
|
if len(paths) == 0 {
|
|
continue
|
|
}
|
|
runtime := dockerSystem.RuntimeWithStatus{}
|
|
runtime.Runtime = dockerSystem.Runtime{Path: paths[0], Args: nil}
|
|
runtimes[name] = runtime
|
|
}
|
|
return runtimes
|
|
}
|
|
|
|
func getFdCount() (count int) {
|
|
count = -1
|
|
if entries, err := os.ReadDir("/proc/self/fd"); err == nil {
|
|
count = len(entries)
|
|
}
|
|
return
|
|
}
|
|
|
|
// Just ignoring Container errors here...
|
|
func getContainersState(r *libpod.Runtime) map[define.ContainerStatus]int {
|
|
states := map[define.ContainerStatus]int{}
|
|
ctnrs, err := r.GetAllContainers()
|
|
if err == nil {
|
|
for _, ctnr := range ctnrs {
|
|
state, err := ctnr.State()
|
|
if err != nil {
|
|
continue
|
|
}
|
|
states[state]++
|
|
}
|
|
}
|
|
return states
|
|
}
|
|
|
|
func getEnv(value string) string {
|
|
if v, exists := os.LookupEnv(strings.ToUpper(value)); exists {
|
|
return v
|
|
}
|
|
if v, exists := os.LookupEnv(strings.ToLower(value)); exists {
|
|
return v
|
|
}
|
|
return ""
|
|
}
|
|
|
|
func getDefaultAddressPools(configInfo *config.Config) []dockerSystem.NetworkAddressPool {
|
|
// Convert DefaultSubnetPools to DefaultAddressPools
|
|
if len(configInfo.Network.DefaultSubnetPools) == 0 {
|
|
return nil
|
|
}
|
|
|
|
pools := make([]dockerSystem.NetworkAddressPool, 0, len(configInfo.Network.DefaultSubnetPools))
|
|
for _, pool := range configInfo.Network.DefaultSubnetPools {
|
|
if pool.Base == nil {
|
|
continue
|
|
}
|
|
|
|
pools = append(pools, dockerSystem.NetworkAddressPool{
|
|
Base: pool.Base.String(),
|
|
Size: pool.Size,
|
|
})
|
|
}
|
|
|
|
return pools
|
|
}
|