Server IP : 127.0.0.2 / Your IP : 3.148.217.66 Web Server : Apache/2.4.18 (Ubuntu) System : User : www-data ( ) PHP Version : 7.0.33-0ubuntu0.16.04.16 Disable Function : disk_free_space,disk_total_space,diskfreespace,dl,exec,fpaththru,getmyuid,getmypid,highlight_file,ignore_user_abord,leak,listen,link,opcache_get_configuration,opcache_get_status,passthru,pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,php_uname,phpinfo,posix_ctermid,posix_getcwd,posix_getegid,posix_geteuid,posix_getgid,posix_getgrgid,posix_getgrnam,posix_getgroups,posix_getlogin,posix_getpgid,posix_getpgrp,posix_getpid,posix,_getppid,posix_getpwnam,posix_getpwuid,posix_getrlimit,posix_getsid,posix_getuid,posix_isatty,posix_kill,posix_mkfifo,posix_setegid,posix_seteuid,posix_setgid,posix_setpgid,posix_setsid,posix_setuid,posix_times,posix_ttyname,posix_uname,pclose,popen,proc_open,proc_close,proc_get_status,proc_nice,proc_terminate,shell_exec,source,show_source,system,virtual MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /usr/share/sosreport/sos/plugins/ |
Upload File : |
# Copyright (C) 2018 Red Hat, Inc. Daniel Walsh <dwalsh@redhat.com> # This file is part of the sos project: https://github.com/sosreport/sos # # This copyrighted material is made available to anyone wishing to use, # modify, copy, or redistribute it subject to the terms and conditions of # version 2 of the GNU General Public License. # # See the LICENSE file in the source distribution for further information. from sos.plugins import Plugin, RedHatPlugin, UbuntuPlugin class Podman(Plugin, RedHatPlugin, UbuntuPlugin): """Podman containers """ plugin_name = 'podman' profiles = ('container',) packages = ('podman') option_list = [ ("all", "enable capture for all containers, even containers " "that have terminated", 'fast', False), ("logs", "capture logs for running containers", 'fast', False), ("size", "capture image sizes for podman ps", 'slow', False) ] def setup(self): self.add_copy_spec([ "/etc/containers/registries.conf", "/etc/containers/storage.conf", "/etc/containers/mounts.conf", "/etc/containers/policy.json", ]) self.add_env_var([ 'HTTP_PROXY', 'HTTPS_PROXY', 'NO_PROXY', 'ALL_PROXY' ]) subcmds = [ 'info', 'images', 'pod ps', 'pod ps -a', 'port --all', 'ps', 'ps -a', 'stats --no-stream --all', 'version', 'volume ls' ] self.add_cmd_output(["podman %s" % s for s in subcmds]) # separately grab ps -s as this can take a *very* long time if self.get_option('size'): self.add_cmd_output('podman ps -as') self.add_cmd_output([ "ls -alhR /etc/cni", "ls -alhR /etc/containers" ]) pnets = self.collect_cmd_output('podman network ls') if pnets['status'] == 0: nets = [pn.split()[0] for pn in pnets['output'].splitlines()[1:]] self.add_cmd_output([ "podman network inspect %s" % net for net in nets ], subdir='networks') ps_cmd = 'podman ps -q' if self.get_option('all'): ps_cmd = "%s -a" % ps_cmd fmt = '{{lower .Repository}}:{{lower .Tag}} {{lower .ID}}' img_cmd = "podman images --format='%s'" % fmt vol_cmd = 'podman volume ls -q' containers = self._get_podman_list(ps_cmd) images = self._get_podman_list(img_cmd) volumes = self._get_podman_list(vol_cmd) for container in containers: self.add_cmd_output("podman inspect %s" % container, subdir='containers') for img in images: name, img_id = img.strip().split() insp = name if 'none' not in name else img_id self.add_cmd_output("podman inspect %s" % insp, subdir='images') for vol in volumes: self.add_cmd_output("podman volume inspect %s" % vol, subdir='volumes') if self.get_option('logs'): for con in containers: self.add_cmd_output("podman logs -t %s" % con, subdir='containers') def _get_podman_list(self, cmd): ret = [] result = self.exec_cmd(cmd) if result['status'] == 0: for ent in result['output'].splitlines(): ret.append(ent) return ret def postproc(self): # Attempts to match key=value pairs inside container inspect output # for potentially sensitive items like env vars that contain passwords. # Typically, these will be seen in env elements or similar, and look # like this: # "Env": [ # "mypassword=supersecret", # "container=oci" # ], # This will mask values when the variable name looks like it may be # something worth obfuscating. env_regexp = r'(?P<var>(pass|key|secret|PASS|KEY|SECRET).*?)=' \ '(?P<value>.*?)"' self.do_cmd_output_sub('*inspect*', env_regexp, r'\g<var>=********"') # vim: set et ts=4 sw=4 :