info.go 8.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225
  1. package system
  2. import (
  3. "fmt"
  4. "strings"
  5. "time"
  6. "golang.org/x/net/context"
  7. "github.com/docker/docker/api/client"
  8. "github.com/docker/docker/cli"
  9. "github.com/docker/docker/pkg/ioutils"
  10. "github.com/docker/docker/utils"
  11. "github.com/docker/engine-api/types/swarm"
  12. "github.com/docker/go-units"
  13. "github.com/spf13/cobra"
  14. )
  15. // NewInfoCommand creates a new cobra.Command for `docker info`
  16. func NewInfoCommand(dockerCli *client.DockerCli) *cobra.Command {
  17. cmd := &cobra.Command{
  18. Use: "info",
  19. Short: "Display system-wide information",
  20. Args: cli.NoArgs,
  21. RunE: func(cmd *cobra.Command, args []string) error {
  22. return runInfo(dockerCli)
  23. },
  24. }
  25. return cmd
  26. }
  27. func runInfo(dockerCli *client.DockerCli) error {
  28. ctx := context.Background()
  29. info, err := dockerCli.Client().Info(ctx)
  30. if err != nil {
  31. return err
  32. }
  33. fmt.Fprintf(dockerCli.Out(), "Containers: %d\n", info.Containers)
  34. fmt.Fprintf(dockerCli.Out(), " Running: %d\n", info.ContainersRunning)
  35. fmt.Fprintf(dockerCli.Out(), " Paused: %d\n", info.ContainersPaused)
  36. fmt.Fprintf(dockerCli.Out(), " Stopped: %d\n", info.ContainersStopped)
  37. fmt.Fprintf(dockerCli.Out(), "Images: %d\n", info.Images)
  38. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Server Version: %s\n", info.ServerVersion)
  39. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Storage Driver: %s\n", info.Driver)
  40. if info.DriverStatus != nil {
  41. for _, pair := range info.DriverStatus {
  42. fmt.Fprintf(dockerCli.Out(), " %s: %s\n", pair[0], pair[1])
  43. // print a warning if devicemapper is using a loopback file
  44. if pair[0] == "Data loop file" {
  45. fmt.Fprintln(dockerCli.Err(), " WARNING: Usage of loopback devices is strongly discouraged for production use. Use `--storage-opt dm.thinpooldev` to specify a custom block storage device.")
  46. }
  47. }
  48. }
  49. if info.SystemStatus != nil {
  50. for _, pair := range info.SystemStatus {
  51. fmt.Fprintf(dockerCli.Out(), "%s: %s\n", pair[0], pair[1])
  52. }
  53. }
  54. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Logging Driver: %s\n", info.LoggingDriver)
  55. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Cgroup Driver: %s\n", info.CgroupDriver)
  56. fmt.Fprintf(dockerCli.Out(), "Plugins: \n")
  57. fmt.Fprintf(dockerCli.Out(), " Volume:")
  58. fmt.Fprintf(dockerCli.Out(), " %s", strings.Join(info.Plugins.Volume, " "))
  59. fmt.Fprintf(dockerCli.Out(), "\n")
  60. fmt.Fprintf(dockerCli.Out(), " Network:")
  61. fmt.Fprintf(dockerCli.Out(), " %s", strings.Join(info.Plugins.Network, " "))
  62. fmt.Fprintf(dockerCli.Out(), "\n")
  63. if len(info.Plugins.Authorization) != 0 {
  64. fmt.Fprintf(dockerCli.Out(), " Authorization:")
  65. fmt.Fprintf(dockerCli.Out(), " %s", strings.Join(info.Plugins.Authorization, " "))
  66. fmt.Fprintf(dockerCli.Out(), "\n")
  67. }
  68. fmt.Fprintf(dockerCli.Out(), "Swarm: %v\n", info.Swarm.LocalNodeState)
  69. if info.Swarm.LocalNodeState != swarm.LocalNodeStateInactive {
  70. fmt.Fprintf(dockerCli.Out(), " NodeID: %s\n", info.Swarm.NodeID)
  71. if info.Swarm.Error != "" {
  72. fmt.Fprintf(dockerCli.Out(), " Error: %v\n", info.Swarm.Error)
  73. }
  74. fmt.Fprintf(dockerCli.Out(), " Is Manager: %v\n", info.Swarm.ControlAvailable)
  75. if info.Swarm.ControlAvailable {
  76. fmt.Fprintf(dockerCli.Out(), " ClusterID: %s\n", info.Swarm.Cluster.ID)
  77. fmt.Fprintf(dockerCli.Out(), " Managers: %d\n", info.Swarm.Managers)
  78. fmt.Fprintf(dockerCli.Out(), " Nodes: %d\n", info.Swarm.Nodes)
  79. fmt.Fprintf(dockerCli.Out(), " Orchestration:\n")
  80. fmt.Fprintf(dockerCli.Out(), " Task History Retention Limit: %d\n", info.Swarm.Cluster.Spec.Orchestration.TaskHistoryRetentionLimit)
  81. fmt.Fprintf(dockerCli.Out(), " Raft:\n")
  82. fmt.Fprintf(dockerCli.Out(), " Snapshot Interval: %d\n", info.Swarm.Cluster.Spec.Raft.SnapshotInterval)
  83. fmt.Fprintf(dockerCli.Out(), " Heartbeat Tick: %d\n", info.Swarm.Cluster.Spec.Raft.HeartbeatTick)
  84. fmt.Fprintf(dockerCli.Out(), " Election Tick: %d\n", info.Swarm.Cluster.Spec.Raft.ElectionTick)
  85. fmt.Fprintf(dockerCli.Out(), " Dispatcher:\n")
  86. fmt.Fprintf(dockerCli.Out(), " Heartbeat Period: %s\n", units.HumanDuration(time.Duration(info.Swarm.Cluster.Spec.Dispatcher.HeartbeatPeriod)))
  87. fmt.Fprintf(dockerCli.Out(), " CA Configuration:\n")
  88. fmt.Fprintf(dockerCli.Out(), " Expiry Duration: %s\n", units.HumanDuration(info.Swarm.Cluster.Spec.CAConfig.NodeCertExpiry))
  89. if len(info.Swarm.Cluster.Spec.CAConfig.ExternalCAs) > 0 {
  90. fmt.Fprintf(dockerCli.Out(), " External CAs:\n")
  91. for _, entry := range info.Swarm.Cluster.Spec.CAConfig.ExternalCAs {
  92. fmt.Fprintf(dockerCli.Out(), " %s: %s\n", entry.Protocol, entry.URL)
  93. }
  94. }
  95. }
  96. fmt.Fprintf(dockerCli.Out(), " Node Address: %s\n", info.Swarm.NodeAddr)
  97. }
  98. if len(info.Runtimes) > 0 {
  99. fmt.Fprintf(dockerCli.Out(), "Runtimes:")
  100. for name := range info.Runtimes {
  101. fmt.Fprintf(dockerCli.Out(), " %s", name)
  102. }
  103. fmt.Fprint(dockerCli.Out(), "\n")
  104. fmt.Fprintf(dockerCli.Out(), "Default Runtime: %s\n", info.DefaultRuntime)
  105. }
  106. fmt.Fprintf(dockerCli.Out(), "Security Options:")
  107. ioutils.FprintfIfNotEmpty(dockerCli.Out(), " %s", strings.Join(info.SecurityOptions, " "))
  108. fmt.Fprintf(dockerCli.Out(), "\n")
  109. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Kernel Version: %s\n", info.KernelVersion)
  110. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Operating System: %s\n", info.OperatingSystem)
  111. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "OSType: %s\n", info.OSType)
  112. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Architecture: %s\n", info.Architecture)
  113. fmt.Fprintf(dockerCli.Out(), "CPUs: %d\n", info.NCPU)
  114. fmt.Fprintf(dockerCli.Out(), "Total Memory: %s\n", units.BytesSize(float64(info.MemTotal)))
  115. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Name: %s\n", info.Name)
  116. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "ID: %s\n", info.ID)
  117. fmt.Fprintf(dockerCli.Out(), "Docker Root Dir: %s\n", info.DockerRootDir)
  118. fmt.Fprintf(dockerCli.Out(), "Debug Mode (client): %v\n", utils.IsDebugEnabled())
  119. fmt.Fprintf(dockerCli.Out(), "Debug Mode (server): %v\n", info.Debug)
  120. if info.Debug {
  121. fmt.Fprintf(dockerCli.Out(), " File Descriptors: %d\n", info.NFd)
  122. fmt.Fprintf(dockerCli.Out(), " Goroutines: %d\n", info.NGoroutines)
  123. fmt.Fprintf(dockerCli.Out(), " System Time: %s\n", info.SystemTime)
  124. fmt.Fprintf(dockerCli.Out(), " EventsListeners: %d\n", info.NEventsListener)
  125. }
  126. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Http Proxy: %s\n", info.HTTPProxy)
  127. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "Https Proxy: %s\n", info.HTTPSProxy)
  128. ioutils.FprintfIfNotEmpty(dockerCli.Out(), "No Proxy: %s\n", info.NoProxy)
  129. if info.IndexServerAddress != "" {
  130. u := dockerCli.ConfigFile().AuthConfigs[info.IndexServerAddress].Username
  131. if len(u) > 0 {
  132. fmt.Fprintf(dockerCli.Out(), "Username: %v\n", u)
  133. }
  134. fmt.Fprintf(dockerCli.Out(), "Registry: %v\n", info.IndexServerAddress)
  135. }
  136. // Only output these warnings if the server does not support these features
  137. if info.OSType != "windows" {
  138. if !info.MemoryLimit {
  139. fmt.Fprintln(dockerCli.Err(), "WARNING: No memory limit support")
  140. }
  141. if !info.SwapLimit {
  142. fmt.Fprintln(dockerCli.Err(), "WARNING: No swap limit support")
  143. }
  144. if !info.KernelMemory {
  145. fmt.Fprintln(dockerCli.Err(), "WARNING: No kernel memory limit support")
  146. }
  147. if !info.OomKillDisable {
  148. fmt.Fprintln(dockerCli.Err(), "WARNING: No oom kill disable support")
  149. }
  150. if !info.CPUCfsQuota {
  151. fmt.Fprintln(dockerCli.Err(), "WARNING: No cpu cfs quota support")
  152. }
  153. if !info.CPUCfsPeriod {
  154. fmt.Fprintln(dockerCli.Err(), "WARNING: No cpu cfs period support")
  155. }
  156. if !info.CPUShares {
  157. fmt.Fprintln(dockerCli.Err(), "WARNING: No cpu shares support")
  158. }
  159. if !info.CPUSet {
  160. fmt.Fprintln(dockerCli.Err(), "WARNING: No cpuset support")
  161. }
  162. if !info.IPv4Forwarding {
  163. fmt.Fprintln(dockerCli.Err(), "WARNING: IPv4 forwarding is disabled")
  164. }
  165. if !info.BridgeNfIptables {
  166. fmt.Fprintln(dockerCli.Err(), "WARNING: bridge-nf-call-iptables is disabled")
  167. }
  168. if !info.BridgeNfIP6tables {
  169. fmt.Fprintln(dockerCli.Err(), "WARNING: bridge-nf-call-ip6tables is disabled")
  170. }
  171. }
  172. if info.Labels != nil {
  173. fmt.Fprintln(dockerCli.Out(), "Labels:")
  174. for _, attribute := range info.Labels {
  175. fmt.Fprintf(dockerCli.Out(), " %s\n", attribute)
  176. }
  177. }
  178. ioutils.FprintfIfTrue(dockerCli.Out(), "Experimental: %v\n", info.ExperimentalBuild)
  179. if info.ClusterStore != "" {
  180. fmt.Fprintf(dockerCli.Out(), "Cluster Store: %s\n", info.ClusterStore)
  181. }
  182. if info.ClusterAdvertise != "" {
  183. fmt.Fprintf(dockerCli.Out(), "Cluster Advertise: %s\n", info.ClusterAdvertise)
  184. }
  185. if info.RegistryConfig != nil && (len(info.RegistryConfig.InsecureRegistryCIDRs) > 0 || len(info.RegistryConfig.IndexConfigs) > 0) {
  186. fmt.Fprintln(dockerCli.Out(), "Insecure Registries:")
  187. for _, registry := range info.RegistryConfig.IndexConfigs {
  188. if registry.Secure == false {
  189. fmt.Fprintf(dockerCli.Out(), " %s\n", registry.Name)
  190. }
  191. }
  192. for _, registry := range info.RegistryConfig.InsecureRegistryCIDRs {
  193. mask, _ := registry.Mask.Size()
  194. fmt.Fprintf(dockerCli.Out(), " %s/%d\n", registry.IP.String(), mask)
  195. }
  196. }
  197. fmt.Fprintf(dockerCli.Out(), "Live Restore Enabled: %v\n", info.LiveRestoreEnabled)
  198. return nil
  199. }