cleanup sysinfo package
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
This commit is contained in:
parent
ba8bb0c1d7
commit
d89616fb64
3 changed files with 139 additions and 76 deletions
|
@ -3,13 +3,22 @@ package sysinfo
|
||||||
// SysInfo stores information about which features a kernel supports.
|
// SysInfo stores information about which features a kernel supports.
|
||||||
// TODO Windows: Factor out platform specific capabilities.
|
// TODO Windows: Factor out platform specific capabilities.
|
||||||
type SysInfo struct {
|
type SysInfo struct {
|
||||||
MemoryLimit bool
|
|
||||||
SwapLimit bool
|
|
||||||
CpuCfsPeriod bool
|
|
||||||
CpuCfsQuota bool
|
|
||||||
IPv4ForwardingDisabled bool
|
|
||||||
AppArmor bool
|
AppArmor bool
|
||||||
OomKillDisable bool
|
*cgroupMemInfo
|
||||||
|
*cgroupCpuInfo
|
||||||
|
IPv4ForwardingDisabled bool
|
||||||
BridgeNfCallIptablesDisabled bool
|
BridgeNfCallIptablesDisabled bool
|
||||||
BridgeNfCallIp6tablesDisabled bool
|
BridgeNfCallIp6tablesDisabled bool
|
||||||
|
CgroupDevicesEnabled bool
|
||||||
|
}
|
||||||
|
|
||||||
|
type cgroupMemInfo struct {
|
||||||
|
MemoryLimit bool
|
||||||
|
SwapLimit bool
|
||||||
|
OomKillDisable bool
|
||||||
|
}
|
||||||
|
|
||||||
|
type cgroupCpuInfo struct {
|
||||||
|
CpuCfsPeriod bool
|
||||||
|
CpuCfsQuota bool
|
||||||
}
|
}
|
||||||
|
|
|
@ -4,7 +4,6 @@ import (
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"os"
|
"os"
|
||||||
"path"
|
"path"
|
||||||
"strconv"
|
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/Sirupsen/logrus"
|
"github.com/Sirupsen/logrus"
|
||||||
|
@ -14,81 +13,78 @@ import (
|
||||||
// New returns a new SysInfo, using the filesystem to detect which features the kernel supports.
|
// New returns a new SysInfo, using the filesystem to detect which features the kernel supports.
|
||||||
func New(quiet bool) *SysInfo {
|
func New(quiet bool) *SysInfo {
|
||||||
sysInfo := &SysInfo{}
|
sysInfo := &SysInfo{}
|
||||||
if cgroupMemoryMountpoint, err := cgroups.FindCgroupMountpoint("memory"); err != nil {
|
sysInfo.cgroupMemInfo = checkCgroupMem(quiet)
|
||||||
if !quiet {
|
sysInfo.cgroupCpuInfo = checkCgroupCpu(quiet)
|
||||||
logrus.Warnf("Your kernel does not support cgroup memory limit: %v", err)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
// If memory cgroup is mounted, MemoryLimit is always enabled.
|
|
||||||
sysInfo.MemoryLimit = true
|
|
||||||
|
|
||||||
_, err1 := ioutil.ReadFile(path.Join(cgroupMemoryMountpoint, "memory.memsw.limit_in_bytes"))
|
_, err := cgroups.FindCgroupMountpoint("devices")
|
||||||
sysInfo.SwapLimit = err1 == nil
|
sysInfo.CgroupDevicesEnabled = err == nil
|
||||||
if !sysInfo.SwapLimit && !quiet {
|
|
||||||
logrus.Warn("Your kernel does not support swap memory limit.")
|
|
||||||
}
|
|
||||||
|
|
||||||
_, err = ioutil.ReadFile(path.Join(cgroupMemoryMountpoint, "memory.oom_control"))
|
sysInfo.IPv4ForwardingDisabled = !readProcBool("/proc/sys/net/ipv4/ip_forward")
|
||||||
sysInfo.OomKillDisable = err == nil
|
sysInfo.BridgeNfCallIptablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-iptables")
|
||||||
if !sysInfo.OomKillDisable && !quiet {
|
sysInfo.BridgeNfCallIp6tablesDisabled = !readProcBool("/proc/sys/net/bridge/bridge-nf-call-ip6tables")
|
||||||
logrus.Warnf("Your kernel does not support oom control.")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if cgroupCpuMountpoint, err := cgroups.FindCgroupMountpoint("cpu"); err != nil {
|
|
||||||
if !quiet {
|
|
||||||
logrus.Warnf("%v", err)
|
|
||||||
}
|
|
||||||
} else {
|
|
||||||
_, err := ioutil.ReadFile(path.Join(cgroupCpuMountpoint, "cpu.cfs_period_us"))
|
|
||||||
sysInfo.CpuCfsPeriod = err == nil
|
|
||||||
if !sysInfo.CpuCfsPeriod && !quiet {
|
|
||||||
logrus.Warn("Your kernel does not support cgroup cfs period")
|
|
||||||
}
|
|
||||||
_, err = ioutil.ReadFile(path.Join(cgroupCpuMountpoint, "cpu.cfs_quota_us"))
|
|
||||||
sysInfo.CpuCfsQuota = err == nil
|
|
||||||
if !sysInfo.CpuCfsQuota && !quiet {
|
|
||||||
logrus.Warn("Your kernel does not support cgroup cfs quotas")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Checek if ipv4_forward is disabled.
|
|
||||||
if data, err := ioutil.ReadFile("/proc/sys/net/ipv4/ip_forward"); os.IsNotExist(err) {
|
|
||||||
sysInfo.IPv4ForwardingDisabled = true
|
|
||||||
} else {
|
|
||||||
if enabled, _ := strconv.Atoi(strings.TrimSpace(string(data))); enabled == 0 {
|
|
||||||
sysInfo.IPv4ForwardingDisabled = true
|
|
||||||
} else {
|
|
||||||
sysInfo.IPv4ForwardingDisabled = false
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if bridge-nf-call-iptables is disabled.
|
|
||||||
if data, err := ioutil.ReadFile("/proc/sys/net/bridge/bridge-nf-call-iptables"); os.IsNotExist(err) {
|
|
||||||
sysInfo.BridgeNfCallIptablesDisabled = true
|
|
||||||
} else {
|
|
||||||
enabled, _ := strconv.Atoi(strings.TrimSpace(string(data)))
|
|
||||||
sysInfo.BridgeNfCallIptablesDisabled = enabled == 0
|
|
||||||
}
|
|
||||||
// Check if bridge-nf-call-ip6tables is disabled.
|
|
||||||
if data, err := ioutil.ReadFile("/proc/sys/net/bridge/bridge-nf-call-ip6tables"); os.IsNotExist(err) {
|
|
||||||
sysInfo.BridgeNfCallIp6tablesDisabled = true
|
|
||||||
} else {
|
|
||||||
enabled, _ := strconv.Atoi(strings.TrimSpace(string(data)))
|
|
||||||
sysInfo.BridgeNfCallIp6tablesDisabled = enabled == 0
|
|
||||||
}
|
|
||||||
|
|
||||||
// Check if AppArmor is supported.
|
// Check if AppArmor is supported.
|
||||||
if _, err := os.Stat("/sys/kernel/security/apparmor"); os.IsNotExist(err) {
|
if _, err := os.Stat("/sys/kernel/security/apparmor"); !os.IsNotExist(err) {
|
||||||
sysInfo.AppArmor = false
|
|
||||||
} else {
|
|
||||||
sysInfo.AppArmor = true
|
sysInfo.AppArmor = true
|
||||||
}
|
}
|
||||||
|
|
||||||
// Check if Devices cgroup is mounted, it is hard requirement for container security.
|
|
||||||
if _, err := cgroups.FindCgroupMountpoint("devices"); err != nil {
|
|
||||||
logrus.Fatalf("Error mounting devices cgroup: %v", err)
|
|
||||||
}
|
|
||||||
|
|
||||||
return sysInfo
|
return sysInfo
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func checkCgroupMem(quiet bool) *cgroupMemInfo {
|
||||||
|
info := &cgroupMemInfo{}
|
||||||
|
mountPoint, err := cgroups.FindCgroupMountpoint("memory")
|
||||||
|
if err != nil {
|
||||||
|
if !quiet {
|
||||||
|
logrus.Warnf("Your kernel does not support cgroup memory limit: %v", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
info.MemoryLimit = true
|
||||||
|
|
||||||
|
info.SwapLimit = cgroupEnabled(mountPoint, "memory.memsw.limit_in_bytes")
|
||||||
|
if !quiet && !info.SwapLimit {
|
||||||
|
logrus.Warn("Your kernel does not support swap memory limit.")
|
||||||
|
}
|
||||||
|
info.OomKillDisable = cgroupEnabled(mountPoint, "memory.oom_control")
|
||||||
|
if !quiet && !info.OomKillDisable {
|
||||||
|
logrus.Warnf("Your kernel does not support oom control.")
|
||||||
|
}
|
||||||
|
|
||||||
|
return info
|
||||||
|
}
|
||||||
|
|
||||||
|
func checkCgroupCpu(quiet bool) *cgroupCpuInfo {
|
||||||
|
info := &cgroupCpuInfo{}
|
||||||
|
mountPoint, err := cgroups.FindCgroupMountpoint("cpu")
|
||||||
|
if err != nil {
|
||||||
|
if !quiet {
|
||||||
|
logrus.Warn(err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
info.CpuCfsPeriod = cgroupEnabled(mountPoint, "cpu.cfs_period_us")
|
||||||
|
if !quiet && !info.CpuCfsPeriod {
|
||||||
|
logrus.Warn("Your kernel does not support cgroup cfs period")
|
||||||
|
}
|
||||||
|
|
||||||
|
info.CpuCfsQuota = cgroupEnabled(mountPoint, "cpu.cfs_quota_us")
|
||||||
|
if !quiet && !info.CpuCfsQuota {
|
||||||
|
logrus.Warn("Your kernel does not support cgroup cfs quotas")
|
||||||
|
}
|
||||||
|
return info
|
||||||
|
}
|
||||||
|
|
||||||
|
func cgroupEnabled(mountPoint, name string) bool {
|
||||||
|
_, err := os.Stat(path.Join(mountPoint, name))
|
||||||
|
return err == nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func readProcBool(path string) bool {
|
||||||
|
val, err := ioutil.ReadFile(path)
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return strings.TrimSpace(string(val)) == "1"
|
||||||
|
}
|
||||||
|
|
58
sysinfo/sysinfo_linux_test.go
Normal file
58
sysinfo/sysinfo_linux_test.go
Normal file
|
@ -0,0 +1,58 @@
|
||||||
|
package sysinfo
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"path"
|
||||||
|
"path/filepath"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestReadProcBool(t *testing.T) {
|
||||||
|
tmpDir, err := ioutil.TempDir("", "test-sysinfo-proc")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(tmpDir)
|
||||||
|
|
||||||
|
procFile := filepath.Join(tmpDir, "read-proc-bool")
|
||||||
|
if err := ioutil.WriteFile(procFile, []byte("1"), 644); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !readProcBool(procFile) {
|
||||||
|
t.Fatal("expected proc bool to be true, got false")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := ioutil.WriteFile(procFile, []byte("0"), 644); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if readProcBool(procFile) {
|
||||||
|
t.Fatal("expected proc bool to be false, got false")
|
||||||
|
}
|
||||||
|
|
||||||
|
if readProcBool(path.Join(tmpDir, "no-exist")) {
|
||||||
|
t.Fatal("should be false for non-existent entry")
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCgroupEnabled(t *testing.T) {
|
||||||
|
cgroupDir, err := ioutil.TempDir("", "cgroup-test")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer os.RemoveAll(cgroupDir)
|
||||||
|
|
||||||
|
if cgroupEnabled(cgroupDir, "test") {
|
||||||
|
t.Fatal("cgroupEnabled should be false")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := ioutil.WriteFile(path.Join(cgroupDir, "test"), []byte{}, 644); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !cgroupEnabled(cgroupDir, "test") {
|
||||||
|
t.Fatal("cgroupEnabled should be true")
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in a new issue