2018-02-05 21:05:59 +00:00
|
|
|
package daemon // import "github.com/docker/docker/daemon"
|
2014-08-08 03:01:55 +00:00
|
|
|
|
|
|
|
import (
|
2023-06-23 00:33:17 +00:00
|
|
|
"context"
|
2016-11-16 21:30:29 +00:00
|
|
|
"fmt"
|
2014-08-08 03:01:55 +00:00
|
|
|
"os"
|
|
|
|
"runtime"
|
2017-05-16 23:56:56 +00:00
|
|
|
"strings"
|
2015-03-10 18:25:47 +00:00
|
|
|
"time"
|
2014-08-08 03:01:55 +00:00
|
|
|
|
2023-09-13 15:41:45 +00:00
|
|
|
"github.com/containerd/log"
|
2016-11-02 17:04:39 +00:00
|
|
|
"github.com/docker/docker/api"
|
2016-09-06 18:18:12 +00:00
|
|
|
"github.com/docker/docker/api/types"
|
2023-07-03 11:14:14 +00:00
|
|
|
"github.com/docker/docker/api/types/system"
|
2016-12-12 08:33:58 +00:00
|
|
|
"github.com/docker/docker/cli/debug"
|
2020-07-07 20:33:46 +00:00
|
|
|
"github.com/docker/docker/daemon/config"
|
2017-04-11 21:21:21 +00:00
|
|
|
"github.com/docker/docker/daemon/logger"
|
2015-11-09 18:32:46 +00:00
|
|
|
"github.com/docker/docker/dockerversion"
|
2015-03-29 21:17:23 +00:00
|
|
|
"github.com/docker/docker/pkg/fileutils"
|
2023-03-14 22:21:27 +00:00
|
|
|
"github.com/docker/docker/pkg/meminfo"
|
2014-08-08 03:01:55 +00:00
|
|
|
"github.com/docker/docker/pkg/parsers/kernel"
|
|
|
|
"github.com/docker/docker/pkg/parsers/operatingsystem"
|
2015-11-14 22:03:02 +00:00
|
|
|
"github.com/docker/docker/pkg/platform"
|
2015-08-06 11:54:48 +00:00
|
|
|
"github.com/docker/docker/pkg/sysinfo"
|
2014-08-08 03:01:55 +00:00
|
|
|
"github.com/docker/docker/registry"
|
2019-08-05 14:37:47 +00:00
|
|
|
metrics "github.com/docker/go-metrics"
|
2020-12-14 10:46:58 +00:00
|
|
|
"github.com/opencontainers/selinux/go-selinux"
|
2014-08-08 03:01:55 +00:00
|
|
|
)
|
|
|
|
|
2015-07-30 21:01:53 +00:00
|
|
|
// SystemInfo returns information about the host server the daemon is running on.
|
2023-07-03 11:14:14 +00:00
|
|
|
func (daemon *Daemon) SystemInfo() *system.Info {
|
2019-05-30 16:51:41 +00:00
|
|
|
defer metrics.StartTimer(hostInfoFunctions.WithValues("system_info"))()
|
|
|
|
|
2021-07-14 14:45:02 +00:00
|
|
|
sysInfo := daemon.RawSysInfo()
|
2022-08-17 21:13:49 +00:00
|
|
|
cfg := daemon.config()
|
2015-10-27 20:12:33 +00:00
|
|
|
|
2023-07-03 11:14:14 +00:00
|
|
|
v := &system.Info{
|
2022-03-02 10:43:33 +00:00
|
|
|
ID: daemon.id,
|
2018-02-02 22:18:46 +00:00
|
|
|
Images: daemon.imageService.CountImages(),
|
2015-08-06 11:54:48 +00:00
|
|
|
IPv4Forwarding: !sysInfo.IPv4ForwardingDisabled,
|
2016-02-26 18:47:43 +00:00
|
|
|
BridgeNfIptables: !sysInfo.BridgeNFCallIPTablesDisabled,
|
|
|
|
BridgeNfIP6tables: !sysInfo.BridgeNFCallIP6TablesDisabled,
|
2018-07-13 10:55:59 +00:00
|
|
|
Name: hostName(),
|
2015-04-10 17:26:30 +00:00
|
|
|
SystemTime: time.Now().Format(time.RFC3339Nano),
|
|
|
|
LoggingDriver: daemon.defaultLogConfig.Type,
|
2018-07-13 10:55:59 +00:00
|
|
|
KernelVersion: kernelVersion(),
|
|
|
|
OperatingSystem: operatingSystem(),
|
2019-05-30 16:51:41 +00:00
|
|
|
OSVersion: osVersion(),
|
2015-07-21 19:40:36 +00:00
|
|
|
IndexServerAddress: registry.IndexServer,
|
2023-04-08 12:40:57 +00:00
|
|
|
OSType: runtime.GOOS,
|
2015-11-14 22:03:02 +00:00
|
|
|
Architecture: platform.Architecture,
|
2022-03-02 10:43:33 +00:00
|
|
|
RegistryConfig: daemon.registryService.ServiceConfig(),
|
2016-06-25 14:26:00 +00:00
|
|
|
NCPU: sysinfo.NumCPU(),
|
2018-07-13 10:55:59 +00:00
|
|
|
MemTotal: memInfo().MemTotal,
|
2017-05-31 00:02:11 +00:00
|
|
|
GenericResources: daemon.genericResources,
|
2022-08-17 21:13:49 +00:00
|
|
|
DockerRootDir: cfg.Root,
|
|
|
|
Labels: cfg.Labels,
|
|
|
|
ExperimentalBuild: cfg.Experimental,
|
2015-11-09 18:32:46 +00:00
|
|
|
ServerVersion: dockerversion.Version,
|
2022-08-17 21:13:49 +00:00
|
|
|
HTTPProxy: config.MaskCredentials(getConfigOrEnv(cfg.HTTPProxy, "HTTP_PROXY", "http_proxy")),
|
|
|
|
HTTPSProxy: config.MaskCredentials(getConfigOrEnv(cfg.HTTPSProxy, "HTTPS_PROXY", "https_proxy")),
|
|
|
|
NoProxy: getConfigOrEnv(cfg.NoProxy, "NO_PROXY", "no_proxy"),
|
|
|
|
LiveRestoreEnabled: cfg.LiveRestoreEnabled,
|
2016-09-07 22:10:00 +00:00
|
|
|
Isolation: daemon.defaultIsolation,
|
2023-07-17 23:50:08 +00:00
|
|
|
CDISpecDirs: promoteNil(cfg.CDISpecDirs),
|
2015-04-10 17:26:30 +00:00
|
|
|
}
|
|
|
|
|
2022-02-15 18:19:30 +00:00
|
|
|
daemon.fillContainerStates(v)
|
2022-03-02 11:52:29 +00:00
|
|
|
daemon.fillDebugInfo(v)
|
2022-08-31 20:12:30 +00:00
|
|
|
daemon.fillAPIInfo(v, &cfg.Config)
|
2016-11-11 16:02:23 +00:00
|
|
|
// Retrieve platform specific info
|
2022-08-31 21:24:22 +00:00
|
|
|
daemon.fillPlatformInfo(v, sysInfo, cfg)
|
2018-07-13 10:55:59 +00:00
|
|
|
daemon.fillDriverInfo(v)
|
2022-08-31 20:12:30 +00:00
|
|
|
daemon.fillPluginsInfo(v, &cfg.Config)
|
|
|
|
daemon.fillSecurityOptions(v, sysInfo, &cfg.Config)
|
2018-08-18 00:05:21 +00:00
|
|
|
daemon.fillLicense(v)
|
2022-08-31 20:12:30 +00:00
|
|
|
daemon.fillDefaultAddressPools(v, &cfg.Config)
|
2015-04-10 17:26:30 +00:00
|
|
|
|
2019-08-28 23:44:39 +00:00
|
|
|
return v
|
2014-08-08 03:01:55 +00:00
|
|
|
}
|
2015-10-23 06:08:26 +00:00
|
|
|
|
2015-12-03 18:11:19 +00:00
|
|
|
// SystemVersion returns version information about the daemon.
|
|
|
|
func (daemon *Daemon) SystemVersion() types.Version {
|
2019-05-30 16:51:41 +00:00
|
|
|
defer metrics.StartTimer(hostInfoFunctions.WithValues("system_version"))()
|
|
|
|
|
2018-07-13 10:55:59 +00:00
|
|
|
kernelVersion := kernelVersion()
|
2022-08-17 21:13:49 +00:00
|
|
|
cfg := daemon.config()
|
2017-12-05 14:29:37 +00:00
|
|
|
|
2015-12-03 18:11:19 +00:00
|
|
|
v := types.Version{
|
2017-12-05 14:29:37 +00:00
|
|
|
Components: []types.ComponentVersion{
|
|
|
|
{
|
|
|
|
Name: "Engine",
|
|
|
|
Version: dockerversion.Version,
|
|
|
|
Details: map[string]string{
|
|
|
|
"GitCommit": dockerversion.GitCommit,
|
|
|
|
"ApiVersion": api.DefaultVersion,
|
|
|
|
"MinAPIVersion": api.MinVersion,
|
|
|
|
"GoVersion": runtime.Version(),
|
|
|
|
"Os": runtime.GOOS,
|
|
|
|
"Arch": runtime.GOARCH,
|
|
|
|
"BuildTime": dockerversion.BuildTime,
|
|
|
|
"KernelVersion": kernelVersion,
|
2022-08-17 21:13:49 +00:00
|
|
|
"Experimental": fmt.Sprintf("%t", cfg.Experimental),
|
2017-12-05 14:29:37 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
// Populate deprecated fields for older clients
|
2016-11-02 17:04:39 +00:00
|
|
|
Version: dockerversion.Version,
|
|
|
|
GitCommit: dockerversion.GitCommit,
|
2017-12-05 14:29:37 +00:00
|
|
|
APIVersion: api.DefaultVersion,
|
2016-11-02 17:04:39 +00:00
|
|
|
MinAPIVersion: api.MinVersion,
|
|
|
|
GoVersion: runtime.Version(),
|
|
|
|
Os: runtime.GOOS,
|
|
|
|
Arch: runtime.GOARCH,
|
|
|
|
BuildTime: dockerversion.BuildTime,
|
2017-12-05 14:29:37 +00:00
|
|
|
KernelVersion: kernelVersion,
|
2022-08-17 21:13:49 +00:00
|
|
|
Experimental: cfg.Experimental,
|
2015-12-03 18:11:19 +00:00
|
|
|
}
|
|
|
|
|
2017-12-05 14:29:37 +00:00
|
|
|
v.Platform.Name = dockerversion.PlatformName
|
2015-12-03 18:11:19 +00:00
|
|
|
|
2022-08-31 21:24:22 +00:00
|
|
|
daemon.fillPlatformVersion(&v, cfg)
|
2015-12-03 18:11:19 +00:00
|
|
|
return v
|
|
|
|
}
|
|
|
|
|
2023-07-03 11:14:14 +00:00
|
|
|
func (daemon *Daemon) fillDriverInfo(v *system.Info) {
|
2022-08-09 09:04:47 +00:00
|
|
|
v.Driver = daemon.imageService.StorageDriver()
|
|
|
|
v.DriverStatus = daemon.imageService.LayerStoreStatus()
|
|
|
|
|
daemon: require storage-driver to be set if the driver is deprecated
Previously, we only printed a warning if a storage driver was deprecated. The
intent was to continue supporting these drivers, to allow users to migrate
to a different storage driver.
This patch changes the behavior; if the user has no storage driver specified
in the daemon configuration (so if we try to detect the previous storage
driver based on what's present in /var/lib/docker), we now produce an error,
informing the user that the storage driver is deprecated (and to be removed),
as well as instructing them to change the daemon configuration to explicitly
select the storage driver (to allow them to migrate).
This should make the deprecation more visible; this will be disruptive, but
it's better to have the failure happening *now* (while the drivers are still
there), than for users to discover the storage driver is no longer there
(which would require them to *downgrade* the daemon in order to migrate
to a different driver).
With this change, `docker info` includes a link in the warnings that:
/ # docker info
Client:
Context: default
Debug Mode: false
Server:
...
Live Restore Enabled: false
WARNING: The overlay storage-driver is deprecated, and will be removed in a future release.
Refer to the documentation for more information: https://docs.docker.com/go/storage-driver/
When starting the daemon without a storage driver configured explicitly, but
previous state was using a deprecated driver, the error is both logged and
printed:
...
ERRO[2022-03-25T14:14:06.032014013Z] [graphdriver] prior storage driver overlay is deprecated and will be removed in a future release; update the the daemon configuration and explicitly choose this storage driver to continue using it; visit https://docs.docker.com/go/storage-driver/ for more information
...
failed to start daemon: error initializing graphdriver: prior storage driver overlay is deprecated and will be removed in a future release; update the the daemon configuration and explicitly choose this storage driver to continue using it; visit https://docs.docker.com/go/storage-driver/ for more information
When starting the daemon and explicitly configuring it with a deprecated storage
driver:
WARN[2022-03-25T14:15:59.042335412Z] [graphdriver] WARNING: the overlay storage-driver is deprecated and will be removed in a future release; visit https://docs.docker.com/go/storage-driver/ for more information
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2022-03-11 16:51:12 +00:00
|
|
|
const warnMsg = `
|
|
|
|
WARNING: The %s storage-driver is deprecated, and will be removed in a future release.
|
|
|
|
Refer to the documentation for more information: https://docs.docker.com/go/storage-driver/`
|
|
|
|
|
2022-08-09 09:04:47 +00:00
|
|
|
switch v.Driver {
|
2022-05-24 15:17:08 +00:00
|
|
|
case "overlay":
|
2022-08-09 09:04:47 +00:00
|
|
|
v.Warnings = append(v.Warnings, fmt.Sprintf(warnMsg, v.Driver))
|
2018-07-13 10:55:59 +00:00
|
|
|
}
|
2015-10-23 06:08:26 +00:00
|
|
|
|
2018-07-19 11:45:32 +00:00
|
|
|
fillDriverWarnings(v)
|
2018-07-13 10:55:59 +00:00
|
|
|
}
|
2015-12-29 21:10:23 +00:00
|
|
|
|
2023-07-03 11:14:14 +00:00
|
|
|
func (daemon *Daemon) fillPluginsInfo(v *system.Info, cfg *config.Config) {
|
|
|
|
v.Plugins = system.PluginsInfo{
|
2018-07-13 10:55:59 +00:00
|
|
|
Volume: daemon.volumes.GetDriverList(),
|
|
|
|
Network: daemon.GetNetworkDriverList(),
|
|
|
|
|
|
|
|
// The authorization plugins are returned in the order they are
|
|
|
|
// used as they constitute a request/response modification chain.
|
2022-08-17 21:13:49 +00:00
|
|
|
Authorization: cfg.AuthorizationPlugins,
|
2018-07-13 10:55:59 +00:00
|
|
|
Log: logger.ListDrivers(),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-03 11:14:14 +00:00
|
|
|
func (daemon *Daemon) fillSecurityOptions(v *system.Info, sysInfo *sysinfo.SysInfo, cfg *config.Config) {
|
2018-07-13 10:55:59 +00:00
|
|
|
var securityOptions []string
|
|
|
|
if sysInfo.AppArmor {
|
|
|
|
securityOptions = append(securityOptions, "name=apparmor")
|
|
|
|
}
|
|
|
|
if sysInfo.Seccomp && supportsSeccomp {
|
2021-07-07 11:09:54 +00:00
|
|
|
if daemon.seccompProfilePath != config.SeccompProfileDefault {
|
2021-06-07 16:41:21 +00:00
|
|
|
v.Warnings = append(v.Warnings, "WARNING: daemon is not using the default seccomp profile")
|
|
|
|
}
|
2021-07-07 11:09:54 +00:00
|
|
|
securityOptions = append(securityOptions, "name=seccomp,profile="+daemon.seccompProfilePath)
|
2018-07-13 10:55:59 +00:00
|
|
|
}
|
2020-12-14 10:46:58 +00:00
|
|
|
if selinux.GetEnabled() {
|
2018-07-13 10:55:59 +00:00
|
|
|
securityOptions = append(securityOptions, "name=selinux")
|
|
|
|
}
|
2017-11-16 06:20:33 +00:00
|
|
|
if rootIDs := daemon.idMapping.RootPair(); rootIDs.UID != 0 || rootIDs.GID != 0 {
|
2018-07-13 10:55:59 +00:00
|
|
|
securityOptions = append(securityOptions, "name=userns")
|
|
|
|
}
|
2022-08-17 21:13:49 +00:00
|
|
|
if Rootless(cfg) {
|
2018-10-15 07:52:53 +00:00
|
|
|
securityOptions = append(securityOptions, "name=rootless")
|
|
|
|
}
|
2022-08-17 21:13:49 +00:00
|
|
|
if cgroupNamespacesEnabled(sysInfo, cfg) {
|
2019-03-15 03:44:18 +00:00
|
|
|
securityOptions = append(securityOptions, "name=cgroupns")
|
|
|
|
}
|
2022-08-17 21:13:49 +00:00
|
|
|
if noNewPrivileges(cfg) {
|
2023-04-13 11:27:59 +00:00
|
|
|
securityOptions = append(securityOptions, "name=no-new-privileges")
|
|
|
|
}
|
2019-03-15 03:44:18 +00:00
|
|
|
|
2018-07-13 10:55:59 +00:00
|
|
|
v.SecurityOptions = securityOptions
|
|
|
|
}
|
|
|
|
|
2023-07-03 11:14:14 +00:00
|
|
|
func (daemon *Daemon) fillContainerStates(v *system.Info) {
|
2022-02-15 18:19:30 +00:00
|
|
|
cRunning, cPaused, cStopped := stateCtr.get()
|
|
|
|
v.Containers = cRunning + cPaused + cStopped
|
|
|
|
v.ContainersPaused = cPaused
|
|
|
|
v.ContainersRunning = cRunning
|
|
|
|
v.ContainersStopped = cStopped
|
|
|
|
}
|
|
|
|
|
2022-03-02 11:52:29 +00:00
|
|
|
// fillDebugInfo sets the current debugging state of the daemon, and additional
|
|
|
|
// debugging information, such as the number of Go-routines, and file descriptors.
|
|
|
|
//
|
|
|
|
// Note that this currently always collects the information, but the CLI only
|
|
|
|
// prints it if the daemon has debug enabled. We should consider to either make
|
|
|
|
// this information optional (cli to request "with debugging information"), or
|
|
|
|
// only collect it if the daemon has debug enabled. For the CLI code, see
|
|
|
|
// https://github.com/docker/cli/blob/v20.10.12/cli/command/system/info.go#L239-L244
|
2023-07-03 11:14:14 +00:00
|
|
|
func (daemon *Daemon) fillDebugInfo(v *system.Info) {
|
2022-03-02 11:52:29 +00:00
|
|
|
v.Debug = debug.IsEnabled()
|
|
|
|
v.NFd = fileutils.GetTotalUsedFds()
|
|
|
|
v.NGoroutines = runtime.NumGoroutine()
|
|
|
|
v.NEventsListener = daemon.EventsService.SubscribersCount()
|
|
|
|
}
|
|
|
|
|
2023-07-03 11:14:14 +00:00
|
|
|
func (daemon *Daemon) fillAPIInfo(v *system.Info, cfg *config.Config) {
|
2018-08-21 12:06:06 +00:00
|
|
|
const warn string = `
|
|
|
|
Access to the remote API is equivalent to root access on the host. Refer
|
|
|
|
to the 'Docker daemon attack surface' section in the documentation for
|
2021-02-25 11:11:50 +00:00
|
|
|
more information: https://docs.docker.com/go/attack-surface/`
|
2018-08-21 12:06:06 +00:00
|
|
|
|
|
|
|
for _, host := range cfg.Hosts {
|
|
|
|
// cnf.Hosts is normalized during startup, so should always have a scheme/proto
|
2022-11-01 11:52:44 +00:00
|
|
|
proto, addr, _ := strings.Cut(host, "://")
|
2018-08-21 12:06:06 +00:00
|
|
|
if proto != "tcp" {
|
|
|
|
continue
|
|
|
|
}
|
2020-07-28 23:01:08 +00:00
|
|
|
if cfg.TLS == nil || !*cfg.TLS {
|
2018-08-21 12:06:06 +00:00
|
|
|
v.Warnings = append(v.Warnings, fmt.Sprintf("WARNING: API is accessible on http://%s without encryption.%s", addr, warn))
|
|
|
|
continue
|
|
|
|
}
|
2020-07-28 23:01:08 +00:00
|
|
|
if cfg.TLSVerify == nil || !*cfg.TLSVerify {
|
2018-08-21 12:06:06 +00:00
|
|
|
v.Warnings = append(v.Warnings, fmt.Sprintf("WARNING: API is accessible on https://%s without TLS client verification.%s", addr, warn))
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2023-07-03 11:14:14 +00:00
|
|
|
func (daemon *Daemon) fillDefaultAddressPools(v *system.Info, cfg *config.Config) {
|
2022-08-17 21:13:49 +00:00
|
|
|
for _, pool := range cfg.DefaultAddressPools.Value() {
|
2023-07-03 11:14:14 +00:00
|
|
|
v.DefaultAddressPools = append(v.DefaultAddressPools, system.NetworkAddressPool{
|
2020-07-07 03:17:51 +00:00
|
|
|
Base: pool.Base,
|
|
|
|
Size: pool.Size,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-07-13 10:55:59 +00:00
|
|
|
func hostName() string {
|
|
|
|
hostname := ""
|
|
|
|
if hn, err := os.Hostname(); err != nil {
|
2023-06-23 00:33:17 +00:00
|
|
|
log.G(context.TODO()).Warnf("Could not get hostname: %v", err)
|
2018-07-13 10:55:59 +00:00
|
|
|
} else {
|
|
|
|
hostname = hn
|
|
|
|
}
|
|
|
|
return hostname
|
|
|
|
}
|
|
|
|
|
|
|
|
func kernelVersion() string {
|
2018-07-16 14:07:47 +00:00
|
|
|
var kernelVersion string
|
2018-07-13 10:55:59 +00:00
|
|
|
if kv, err := kernel.GetKernelVersion(); err != nil {
|
2023-06-23 00:33:17 +00:00
|
|
|
log.G(context.TODO()).Warnf("Could not get kernel version: %v", err)
|
2018-07-13 10:55:59 +00:00
|
|
|
} else {
|
|
|
|
kernelVersion = kv.String()
|
|
|
|
}
|
|
|
|
return kernelVersion
|
|
|
|
}
|
|
|
|
|
2023-03-14 22:21:27 +00:00
|
|
|
func memInfo() *meminfo.Memory {
|
|
|
|
memInfo, err := meminfo.Read()
|
2018-07-13 10:55:59 +00:00
|
|
|
if err != nil {
|
2023-06-23 00:33:17 +00:00
|
|
|
log.G(context.TODO()).Errorf("Could not read system memory info: %v", err)
|
2023-03-14 22:21:27 +00:00
|
|
|
memInfo = &meminfo.Memory{}
|
2018-07-13 10:55:59 +00:00
|
|
|
}
|
|
|
|
return memInfo
|
|
|
|
}
|
|
|
|
|
2019-05-30 16:51:41 +00:00
|
|
|
func operatingSystem() (operatingSystem string) {
|
|
|
|
defer metrics.StartTimer(hostInfoFunctions.WithValues("operating_system"))()
|
|
|
|
|
2018-07-13 10:55:59 +00:00
|
|
|
if s, err := operatingsystem.GetOperatingSystem(); err != nil {
|
2023-06-23 00:33:17 +00:00
|
|
|
log.G(context.TODO()).Warnf("Could not get operating system name: %v", err)
|
2018-07-13 10:55:59 +00:00
|
|
|
} else {
|
|
|
|
operatingSystem = s
|
|
|
|
}
|
2022-02-17 17:25:38 +00:00
|
|
|
if inContainer, err := operatingsystem.IsContainerized(); err != nil {
|
2023-06-23 00:33:17 +00:00
|
|
|
log.G(context.TODO()).Errorf("Could not determine if daemon is containerized: %v", err)
|
2022-02-17 17:25:38 +00:00
|
|
|
operatingSystem += " (error determining if containerized)"
|
|
|
|
} else if inContainer {
|
|
|
|
operatingSystem += " (containerized)"
|
2018-07-13 10:55:59 +00:00
|
|
|
}
|
2019-05-30 16:51:41 +00:00
|
|
|
|
2018-07-13 10:55:59 +00:00
|
|
|
return operatingSystem
|
2015-10-23 06:08:26 +00:00
|
|
|
}
|
2018-09-27 02:43:26 +00:00
|
|
|
|
2019-05-30 16:51:41 +00:00
|
|
|
func osVersion() (version string) {
|
|
|
|
defer metrics.StartTimer(hostInfoFunctions.WithValues("os_version"))()
|
|
|
|
|
|
|
|
version, err := operatingsystem.GetOperatingSystemVersion()
|
|
|
|
if err != nil {
|
2023-06-23 00:33:17 +00:00
|
|
|
log.G(context.TODO()).Warnf("Could not get operating system version: %v", err)
|
2019-05-30 16:51:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return version
|
|
|
|
}
|
|
|
|
|
2019-09-25 08:56:41 +00:00
|
|
|
func getEnvAny(names ...string) string {
|
|
|
|
for _, n := range names {
|
|
|
|
if val := os.Getenv(n); val != "" {
|
|
|
|
return val
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
2021-07-16 07:33:00 +00:00
|
|
|
|
|
|
|
func getConfigOrEnv(config string, env ...string) string {
|
|
|
|
if config != "" {
|
|
|
|
return config
|
|
|
|
}
|
|
|
|
return getEnvAny(env...)
|
|
|
|
}
|
2023-07-17 23:50:08 +00:00
|
|
|
|
|
|
|
// promoteNil converts a nil slice to an empty slice of that type.
|
|
|
|
// A non-nil slice is returned as is.
|
|
|
|
func promoteNil[S ~[]E, E any](s S) S {
|
|
|
|
if s == nil {
|
|
|
|
return S{}
|
|
|
|
}
|
|
|
|
return s
|
|
|
|
}
|