providers/linux/container.go (28 lines of code) (raw):

// Licensed to Elasticsearch B.V. under one or more contributor // license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright // ownership. Elasticsearch B.V. licenses this file to you under // the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. package linux import ( "bufio" "bytes" "fmt" "os" ) const procOneCgroup = "/proc/1/cgroup" // IsContainerized returns true if this process is containerized. func IsContainerized() (bool, error) { data, err := os.ReadFile(procOneCgroup) if err != nil { if os.IsNotExist(err) { return false, nil } return false, fmt.Errorf("failed to read process cgroups: %w", err) } return isContainerizedCgroup(data) } func isContainerizedCgroup(data []byte) (bool, error) { s := bufio.NewScanner(bytes.NewReader(data)) for n := 0; s.Scan(); n++ { line := s.Bytes() // Following a suggestion on Stack Overflow on how to detect // being inside a container: https://stackoverflow.com/a/20012536/235203 if bytes.Contains(line, []byte("docker")) || bytes.Contains(line, []byte(".slice")) || bytes.Contains(line, []byte("lxc")) || bytes.Contains(line, []byte("kubepods")) { return true, nil } } return false, s.Err() }