2014-08-08 03:01:55 +00:00
|
|
|
package daemon
|
|
|
|
|
|
|
|
import (
|
|
|
|
"os"
|
|
|
|
"runtime"
|
2015-03-10 18:25:47 +00:00
|
|
|
"time"
|
2014-08-08 03:01:55 +00:00
|
|
|
|
2015-03-26 22:22:04 +00:00
|
|
|
"github.com/Sirupsen/logrus"
|
2015-04-10 17:26:30 +00:00
|
|
|
"github.com/docker/docker/api/types"
|
2015-11-09 18:32:46 +00:00
|
|
|
"github.com/docker/docker/dockerversion"
|
2015-03-29 21:17:23 +00:00
|
|
|
"github.com/docker/docker/pkg/fileutils"
|
2014-08-08 03:01:55 +00:00
|
|
|
"github.com/docker/docker/pkg/parsers/kernel"
|
|
|
|
"github.com/docker/docker/pkg/parsers/operatingsystem"
|
2015-08-06 11:54:48 +00:00
|
|
|
"github.com/docker/docker/pkg/sysinfo"
|
2014-10-24 22:48:23 +00:00
|
|
|
"github.com/docker/docker/pkg/system"
|
2014-08-08 03:01:55 +00:00
|
|
|
"github.com/docker/docker/registry"
|
|
|
|
"github.com/docker/docker/utils"
|
|
|
|
)
|
|
|
|
|
2015-07-30 21:01:53 +00:00
|
|
|
// SystemInfo returns information about the host server the daemon is running on.
|
2015-09-29 17:51:40 +00:00
|
|
|
func (daemon *Daemon) SystemInfo() (*types.Info, error) {
|
2014-08-08 03:01:55 +00:00
|
|
|
kernelVersion := "<unknown>"
|
|
|
|
if kv, err := kernel.GetKernelVersion(); err == nil {
|
|
|
|
kernelVersion = kv.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
operatingSystem := "<unknown>"
|
|
|
|
if s, err := operatingsystem.GetOperatingSystem(); err == nil {
|
|
|
|
operatingSystem = s
|
|
|
|
}
|
2015-04-27 15:38:01 +00:00
|
|
|
|
|
|
|
// Don't do containerized check on Windows
|
|
|
|
if runtime.GOOS != "windows" {
|
|
|
|
if inContainer, err := operatingsystem.IsContainerized(); err != nil {
|
|
|
|
logrus.Errorf("Could not determine if daemon is containerized: %v", err)
|
|
|
|
operatingSystem += " (error determining if containerized)"
|
|
|
|
} else if inContainer {
|
|
|
|
operatingSystem += " (containerized)"
|
|
|
|
}
|
2014-08-08 03:01:55 +00:00
|
|
|
}
|
|
|
|
|
2014-10-24 22:48:23 +00:00
|
|
|
meminfo, err := system.ReadMemInfo()
|
|
|
|
if err != nil {
|
2015-03-26 22:22:04 +00:00
|
|
|
logrus.Errorf("Could not read system memory info: %v", err)
|
2014-10-24 22:48:23 +00:00
|
|
|
}
|
|
|
|
|
2015-07-30 21:01:53 +00:00
|
|
|
// if we still have the original dockerinit binary from before
|
|
|
|
// we copied it locally, let's return the path to that, since
|
|
|
|
// that's more intuitive (the copied path is trivial to derive
|
|
|
|
// by hand given VERSION)
|
2014-08-08 03:01:55 +00:00
|
|
|
initPath := utils.DockerInitPath("")
|
|
|
|
if initPath == "" {
|
|
|
|
// if that fails, we'll just return the path from the daemon
|
2015-07-30 21:01:53 +00:00
|
|
|
initPath = daemon.systemInitPath()
|
2014-08-08 03:01:55 +00:00
|
|
|
}
|
|
|
|
|
2015-10-09 06:57:47 +00:00
|
|
|
sysInfo := sysinfo.New(true)
|
2015-08-06 11:54:48 +00:00
|
|
|
|
2015-04-10 17:26:30 +00:00
|
|
|
v := &types.Info{
|
|
|
|
ID: daemon.ID,
|
2015-09-29 17:51:40 +00:00
|
|
|
Containers: len(daemon.List()),
|
2015-11-10 17:20:59 +00:00
|
|
|
Images: len(daemon.Graph().Map()),
|
2015-09-29 17:51:40 +00:00
|
|
|
Driver: daemon.GraphDriver().String(),
|
|
|
|
DriverStatus: daemon.GraphDriver().Status(),
|
2015-08-06 11:54:48 +00:00
|
|
|
IPv4Forwarding: !sysInfo.IPv4ForwardingDisabled,
|
|
|
|
BridgeNfIptables: !sysInfo.BridgeNfCallIptablesDisabled,
|
2015-07-23 09:40:54 +00:00
|
|
|
BridgeNfIP6tables: !sysInfo.BridgeNfCallIP6tablesDisabled,
|
2015-04-10 17:26:30 +00:00
|
|
|
Debug: os.Getenv("DEBUG") != "",
|
|
|
|
NFd: fileutils.GetTotalUsedFds(),
|
|
|
|
NGoroutines: runtime.NumGoroutine(),
|
|
|
|
SystemTime: time.Now().Format(time.RFC3339Nano),
|
2015-09-29 17:51:40 +00:00
|
|
|
ExecutionDriver: daemon.ExecutionDriver().Name(),
|
2015-04-10 17:26:30 +00:00
|
|
|
LoggingDriver: daemon.defaultLogConfig.Type,
|
|
|
|
NEventsListener: daemon.EventsService.SubscribersCount(),
|
|
|
|
KernelVersion: kernelVersion,
|
|
|
|
OperatingSystem: operatingSystem,
|
2015-07-21 19:40:36 +00:00
|
|
|
IndexServerAddress: registry.IndexServer,
|
2015-06-13 07:39:19 +00:00
|
|
|
OSType: runtime.GOOS,
|
|
|
|
Architecture: runtime.GOARCH,
|
2015-04-10 17:26:30 +00:00
|
|
|
RegistryConfig: daemon.RegistryService.Config,
|
2015-11-09 18:32:46 +00:00
|
|
|
InitSha1: dockerversion.InitSHA1,
|
2015-04-10 17:26:30 +00:00
|
|
|
InitPath: initPath,
|
|
|
|
NCPU: runtime.NumCPU(),
|
|
|
|
MemTotal: meminfo.MemTotal,
|
2015-07-30 21:01:53 +00:00
|
|
|
DockerRootDir: daemon.config().Root,
|
|
|
|
Labels: daemon.config().Labels,
|
2015-05-19 22:09:58 +00:00
|
|
|
ExperimentalBuild: utils.ExperimentalBuild(),
|
2015-11-09 18:32:46 +00:00
|
|
|
ServerVersion: dockerversion.Version,
|
2015-09-10 23:12:00 +00:00
|
|
|
ClusterStore: daemon.config().ClusterStore,
|
2015-10-26 00:12:22 +00:00
|
|
|
ClusterAdvertise: daemon.config().ClusterAdvertise,
|
2015-11-11 19:03:53 +00:00
|
|
|
HTTPProxy: os.Getenv("http_proxy"),
|
|
|
|
HTTPSProxy: os.Getenv("https_proxy"),
|
|
|
|
NoProxy: os.Getenv("no_proxy"),
|
2015-04-10 17:26:30 +00:00
|
|
|
}
|
|
|
|
|
2015-07-09 23:37:54 +00:00
|
|
|
// TODO Windows. Refactor this more once sysinfo is refactored into
|
|
|
|
// platform specific code. On Windows, sysinfo.cgroupMemInfo and
|
|
|
|
// sysinfo.cgroupCpuInfo will be nil otherwise and cause a SIGSEGV if
|
|
|
|
// an attempt is made to access through them.
|
|
|
|
if runtime.GOOS != "windows" {
|
2015-08-06 11:54:48 +00:00
|
|
|
v.MemoryLimit = sysInfo.MemoryLimit
|
|
|
|
v.SwapLimit = sysInfo.SwapLimit
|
|
|
|
v.OomKillDisable = sysInfo.OomKillDisable
|
2015-07-23 09:40:54 +00:00
|
|
|
v.CPUCfsPeriod = sysInfo.CPUCfsPeriod
|
|
|
|
v.CPUCfsQuota = sysInfo.CPUCfsQuota
|
2015-10-09 07:02:04 +00:00
|
|
|
v.CPUShares = sysInfo.CPUShares
|
|
|
|
v.CPUSet = sysInfo.Cpuset
|
2015-07-09 23:37:54 +00:00
|
|
|
}
|
|
|
|
|
2014-11-17 19:23:41 +00:00
|
|
|
if hostname, err := os.Hostname(); err == nil {
|
2015-04-10 17:26:30 +00:00
|
|
|
v.Name = hostname
|
2014-11-17 19:23:41 +00:00
|
|
|
}
|
2015-04-10 17:26:30 +00:00
|
|
|
|
|
|
|
return v, nil
|
2014-08-08 03:01:55 +00:00
|
|
|
}
|