Files
cloudron-box/src/sftp.js

150 lines
6.6 KiB
JavaScript
Raw Normal View History

2019-04-04 20:46:01 -07:00
'use strict';
exports = module.exports = {
start,
status,
DEFAULT_MEMORY_LIMIT: 256 * 1024 * 1024
2019-04-04 20:46:01 -07:00
};
2021-05-11 17:50:48 -07:00
const apps = require('./apps.js'),
assert = require('assert'),
2021-11-16 21:50:09 -08:00
blobs = require('./blobs.js'),
BoxError = require('./boxerror.js'),
debug = require('debug')('box:sftp'),
docker = require('./docker.js'),
2020-10-19 17:26:20 -07:00
hat = require('./hat.js'),
2019-04-04 20:46:01 -07:00
infra = require('./infra_version.js'),
2023-03-09 10:55:14 +01:00
path = require('path'),
paths = require('./paths.js'),
safe = require('safetydance'),
services = require('./services.js'),
shell = require('./shell.js'),
system = require('./system.js'),
volumes = require('./volumes.js');
2019-04-04 20:46:01 -07:00
2021-11-16 21:50:09 -08:00
async function ensureKeys() {
2023-03-09 10:55:14 +01:00
for (const keyType of [ 'rsa', 'ed25519' ]) {
const privateKey = await blobs.get(`sftp_${keyType}_private_key`);
const publicKey = await blobs.get(`sftp_${keyType}_public_key`);
const publicKeyFile = path.join(paths.SFTP_KEYS_DIR, `ssh_host_${keyType}_key.pub`);
const privateKeyFile = path.join(paths.SFTP_KEYS_DIR, `ssh_host_${keyType}_key`);
if (!privateKey || !publicKey) {
debug(`ensureSecrets: generating new sftp keys of type ${keyType}`);
safe.fs.unlinkSync(publicKeyFile);
safe.fs.unlinkSync(privateKeyFile);
2024-02-21 19:40:27 +01:00
const [error] = await safe(shell.exec('ensureKeys', `ssh-keygen -m PEM -t ${keyType} -f "${paths.SFTP_KEYS_DIR}/ssh_host_${keyType}_key" -q -N ""`, {}));
2024-02-20 22:57:36 +01:00
if (error) throw new BoxError(BoxError.OPENSSL_ERROR, `Could not generate sftp ${keyType} keys: ${error.message}`);
2023-03-09 10:55:14 +01:00
const newPublicKey = safe.fs.readFileSync(publicKeyFile);
await blobs.set(`sftp_${keyType}_public_key`, newPublicKey);
const newPrivateKey = safe.fs.readFileSync(privateKeyFile);
await blobs.set(`sftp_${keyType}_private_key`, newPrivateKey);
} else {
if (!safe.fs.writeFileSync(publicKeyFile, publicKey)) throw new BoxError(BoxError.FS_ERROR, `Could not save sftp public ${keyType} key: ${safe.error.message}`);
if (!safe.fs.writeFileSync(privateKeyFile, privateKey, { mode: 0o600 })) throw new BoxError(BoxError.FS_ERROR, `Could not save sftp private ${keyType} key: ${safe.error.message}`);
}
2021-11-16 21:50:09 -08:00
}
}
2021-09-26 22:48:14 -07:00
async function start(existingInfra) {
assert.strictEqual(typeof existingInfra, 'object');
2021-09-26 22:48:14 -07:00
debug('start: re-creating container');
2023-08-03 12:52:47 +05:30
const serviceConfig = await services.getServiceConfig('sftp');
const image = infra.images.sftp;
const memoryLimit = serviceConfig.memoryLimit || exports.DEFAULT_MEMORY_LIMIT;
2022-11-04 15:09:37 +01:00
const memory = await system.getMemoryAllocation(memoryLimit);
2020-10-19 17:26:20 -07:00
const cloudronToken = hat(8 * 128);
2019-04-04 20:46:01 -07:00
2021-11-16 21:50:09 -08:00
await ensureKeys();
2021-09-26 18:36:33 -07:00
const resolvedAppDataDir = safe.fs.realpathSync(paths.APPS_DATA_DIR);
if (!resolvedAppDataDir) throw new BoxError(BoxError.FS_ERROR, `Could not resolve apps data dir: ${safe.error.message}`);
2021-09-25 17:07:07 -07:00
const dataDirs = [{ hostDir: resolvedAppDataDir, mountDir: '/mnt/appsdata' }];
2021-08-25 19:41:46 -07:00
2021-09-25 17:07:07 -07:00
// custom app data directories
const allApps = await apps.list();
for (const app of allApps) {
2023-11-13 21:58:44 +01:00
if (!app.manifest.addons?.localstorage || !app.storageVolumeId) continue;
2021-08-25 19:41:46 -07:00
2022-06-01 22:44:52 -07:00
const hostDir = await apps.getStorageDir(app), mountDir = `/mnt/app-${app.id}`; // see also sftp:userSearchSftp
2021-08-25 19:41:46 -07:00
if (!safe.fs.existsSync(hostDir)) { // this can fail if external mount does not have permissions for yellowtent user
// do not create host path when cloudron is restoring. this will then create dir with root perms making restore logic fail
debug(`Ignoring app data dir ${hostDir} for ${app.id} since it does not exist`);
2021-09-25 17:07:07 -07:00
continue;
2021-08-25 19:41:46 -07:00
}
dataDirs.push({ hostDir, mountDir });
2021-09-25 17:07:07 -07:00
}
2021-08-25 19:41:46 -07:00
2021-09-25 17:07:07 -07:00
// volume directories
2021-12-23 22:35:20 -08:00
dataDirs.push({ hostDir: '/mnt/volumes', mountDir: '/mnt/volumes' }); // managed volumes
2021-09-25 17:07:07 -07:00
const allVolumes = await volumes.list();
for (const volume of allVolumes) {
2021-12-23 22:35:20 -08:00
if (volume.hostPath.startsWith('/mnt/volumes/')) continue; // skip managed volume
2021-08-25 19:41:46 -07:00
if (!safe.fs.existsSync(volume.hostPath)) {
debug(`Ignoring volume host path ${volume.hostPath} since it does not exist`);
2021-09-25 17:07:07 -07:00
continue;
2021-08-25 19:41:46 -07:00
}
dataDirs.push({ hostDir: volume.hostPath, mountDir: `/mnt/volume-${volume.id}` });
2021-09-25 17:07:07 -07:00
}
2021-08-25 19:41:46 -07:00
// mail data dir
2021-09-26 18:36:33 -07:00
const resolvedMailDataDir = safe.fs.realpathSync(paths.MAIL_DATA_DIR);
if (!resolvedMailDataDir) throw new BoxError(BoxError.FS_ERROR, `Could not resolve mail data dir: ${safe.error.message}`);
dataDirs.push({ hostDir: resolvedMailDataDir, mountDir: '/mnt/maildata' });
2021-10-01 12:09:13 -07:00
const readOnly = !serviceConfig.recoveryMode ? '--read-only' : '';
const cmd = serviceConfig.recoveryMode ? '/bin/bash -c \'echo "Debug mode. Sleeping" && sleep infinity\'' : '';
2021-09-25 17:07:07 -07:00
const mounts = dataDirs.map(v => `-v "${v.hostDir}:${v.mountDir}"`).join(' ');
const runCmd = `docker run --restart=always -d --name=sftp \
2021-08-25 19:41:46 -07:00
--hostname sftp \
--net cloudron \
--net-alias sftp \
--log-driver syslog \
--log-opt syslog-address=udp://127.0.0.1:2514 \
--log-opt syslog-format=rfc5424 \
--log-opt tag=sftp \
-m ${memory} \
--memory-swap ${memoryLimit} \
--dns 172.18.0.1 \
--dns-search=. \
-p 222:22 \
${mounts} \
-e CLOUDRON_SFTP_TOKEN=${cloudronToken} \
-v ${paths.SFTP_KEYS_DIR}:/etc/ssh:ro \
2021-08-25 19:41:46 -07:00
--label isCloudronManaged=true \
${readOnly} -v /tmp -v /run ${image} ${cmd}`;
2021-08-25 19:41:46 -07:00
// ignore error if container not found (and fail later) so that this code works across restarts
2024-02-21 19:40:27 +01:00
await safe(shell.exec('stopSftp', 'docker stop sftp', {})); // ignore error
await safe(shell.exec('removeSftp', 'docker rm -f sftp', {})); // ignore error
await shell.exec('startSftp', runCmd, { shell: '/bin/bash' });
2019-04-04 20:46:01 -07:00
}
async function status() {
const [error, container] = await safe(docker.inspect('sftp'));
if (error && error.reason === BoxError.NOT_FOUND) return { status: services.SERVICE_STATUS_STOPPED };
if (error) throw error;
const result = await docker.memoryUsage('sftp');
const status = container.State.Running
? (container.HostConfig.ReadonlyRootfs ? services.SERVICE_STATUS_ACTIVE : services.SERVICE_STATUS_STARTING)
: services.SERVICE_STATUS_STOPPED;
2022-11-24 00:40:40 +01:00
const stats = result.memory_stats || { usage: 0, limit: 1 };
return {
status,
2022-11-24 00:40:40 +01:00
memoryUsed: stats.usage,
memoryPercent: parseInt(100 * stats.usage / stats.limit)
};
}