mirror of
https://github.com/containers/podman.git
synced 2025-06-04 04:56:32 +08:00

Since this option will also be used for netavark we should rename it to something more generic. It is important that --cni-config-dir still works otherwise we could break existing container cleanup commands. Signed-off-by: Paul Holzinger <pholzing@redhat.com>
137 lines
4.4 KiB
Python
137 lines
4.4 KiB
Python
import configparser
|
|
import json
|
|
import os
|
|
import shutil
|
|
import subprocess
|
|
import sys
|
|
import tempfile
|
|
|
|
|
|
class Podman:
|
|
"""
|
|
Instances hold the configuration and setup for running podman commands
|
|
"""
|
|
|
|
def __init__(self):
|
|
"""Initialize a Podman instance with global options"""
|
|
binary = os.getenv("PODMAN", "bin/podman")
|
|
self.cmd = [binary, "--storage-driver=vfs"]
|
|
|
|
cgroupfs = os.getenv("CGROUP_MANAGER", "systemd")
|
|
self.cmd.append(f"--cgroup-manager={cgroupfs}")
|
|
|
|
if os.getenv("DEBUG"):
|
|
self.cmd.append("--log-level=debug")
|
|
self.cmd.append("--syslog=true")
|
|
|
|
self.anchor_directory = tempfile.mkdtemp(prefix="podman_restapi_")
|
|
self.cmd.append("--root=" + os.path.join(self.anchor_directory, "crio"))
|
|
self.cmd.append("--runroot=" + os.path.join(self.anchor_directory, "crio-run"))
|
|
|
|
os.environ["CONTAINERS_REGISTRIES_CONF"] = os.path.join(
|
|
self.anchor_directory, "registry.conf"
|
|
)
|
|
p = configparser.ConfigParser()
|
|
p.read_dict(
|
|
{
|
|
"registries.search": {"registries": "['quay.io']"},
|
|
"registries.insecure": {"registries": "[]"},
|
|
"registries.block": {"registries": "[]"},
|
|
}
|
|
)
|
|
with open(os.environ["CONTAINERS_REGISTRIES_CONF"], "w") as w:
|
|
p.write(w)
|
|
|
|
os.environ["CNI_CONFIG_PATH"] = os.path.join(self.anchor_directory, "cni", "net.d")
|
|
os.makedirs(os.environ["CNI_CONFIG_PATH"], exist_ok=True)
|
|
self.cmd.append("--network-config-dir=" + os.environ["CNI_CONFIG_PATH"])
|
|
cni_cfg = os.path.join(os.environ["CNI_CONFIG_PATH"], "87-podman-bridge.conflist")
|
|
# json decoded and encoded to ensure legal json
|
|
buf = json.loads(
|
|
"""
|
|
{
|
|
"cniVersion": "0.3.0",
|
|
"name": "podman",
|
|
"plugins": [{
|
|
"type": "bridge",
|
|
"bridge": "cni0",
|
|
"isGateway": true,
|
|
"ipMasq": true,
|
|
"ipam": {
|
|
"type": "host-local",
|
|
"subnet": "10.88.0.0/16",
|
|
"routes": [{
|
|
"dst": "0.0.0.0/0"
|
|
}]
|
|
}
|
|
},
|
|
{
|
|
"type": "portmap",
|
|
"capabilities": {
|
|
"portMappings": true
|
|
}
|
|
}
|
|
]
|
|
}
|
|
"""
|
|
)
|
|
with open(cni_cfg, "w") as w:
|
|
json.dump(buf, w)
|
|
|
|
def open(self, command, *args, **kwargs):
|
|
"""Podman initialized instance to run a given command
|
|
|
|
:param self: Podman instance
|
|
:param command: podman sub-command to run
|
|
:param args: arguments and options for command
|
|
:param kwargs: See subprocess.Popen() for shell keyword
|
|
:return: subprocess.Popen() instance configured to run podman instance
|
|
"""
|
|
cmd = self.cmd.copy()
|
|
cmd.append(command)
|
|
cmd.extend(args)
|
|
|
|
shell = kwargs.get("shell", False)
|
|
|
|
return subprocess.Popen(
|
|
cmd,
|
|
shell=shell,
|
|
stdin=subprocess.DEVNULL,
|
|
stdout=subprocess.DEVNULL,
|
|
stderr=subprocess.DEVNULL,
|
|
)
|
|
|
|
def run(self, command, *args, **kwargs):
|
|
"""Run given podman command
|
|
|
|
:param self: Podman instance
|
|
:param command: podman sub-command to run
|
|
:param args: arguments and options for command
|
|
:param kwargs: See subprocess.Popen() for shell and check keywords
|
|
:return: subprocess.Popen() instance configured to run podman instance
|
|
"""
|
|
cmd = self.cmd.copy()
|
|
cmd.append(command)
|
|
cmd.extend(args)
|
|
|
|
check = kwargs.get("check", False)
|
|
shell = kwargs.get("shell", False)
|
|
|
|
try:
|
|
return subprocess.run(
|
|
cmd,
|
|
shell=shell,
|
|
check=check,
|
|
stdout=subprocess.PIPE,
|
|
stderr=subprocess.PIPE,
|
|
)
|
|
except subprocess.CalledProcessError as e:
|
|
if e.stdout:
|
|
sys.stdout.write("\nRun Stdout:\n" + e.stdout.decode("utf-8"))
|
|
if e.stderr:
|
|
sys.stderr.write("\nRun Stderr:\n" + e.stderr.decode("utf-8"))
|
|
raise
|
|
|
|
def tear_down(self):
|
|
shutil.rmtree(self.anchor_directory, ignore_errors=True)
|