Files
cloudron-box/src/mounts.js

252 lines
12 KiB
JavaScript
Raw Normal View History

2021-05-14 15:07:29 -07:00
'use strict';
exports = module.exports = {
2022-01-26 12:40:28 -08:00
isManagedProvider,
tryAddMount,
removeMount,
2021-05-14 15:07:29 -07:00
validateMountOptions,
getStatus,
2025-01-12 17:41:17 +01:00
remount,
2025-01-12 18:25:40 +01:00
MOUNT_TYPE_FILESYSTEM: 'filesystem',
2025-01-12 17:41:17 +01:00
MOUNT_TYPE_MOUNTPOINT: 'mountpoint',
MOUNT_TYPE_CIFS: 'cifs',
MOUNT_TYPE_NFS: 'nfs',
MOUNT_TYPE_SSHFS: 'sshfs',
MOUNT_TYPE_EXT4: 'ext4', // raw disk path
MOUNT_TYPE_XFS: 'xfs', // raw disk path
MOUNT_TYPE_DISK: 'disk', // this provides a selector of block devices
2021-05-14 15:07:29 -07:00
};
const assert = require('node:assert'),
2021-05-14 15:07:29 -07:00
BoxError = require('./boxerror.js'),
2021-05-17 16:23:24 -07:00
constants = require('./constants.js'),
2021-09-29 20:15:54 -07:00
debug = require('debug')('box:mounts'),
2021-05-14 15:07:29 -07:00
ejs = require('ejs'),
fs = require('node:fs'),
path = require('node:path'),
2021-05-18 16:49:39 +02:00
paths = require('./paths.js'),
2021-05-14 15:07:29 -07:00
safe = require('safetydance'),
2024-10-14 19:10:31 +02:00
shell = require('./shell.js')('mounts');
2021-05-14 15:07:29 -07:00
const ADD_MOUNT_CMD = path.join(__dirname, 'scripts/addmount.sh');
const RM_MOUNT_CMD = path.join(__dirname, 'scripts/rmmount.sh');
2021-10-11 15:51:16 +02:00
const REMOUNT_MOUNT_CMD = path.join(__dirname, 'scripts/remountmount.sh');
2024-02-29 11:51:57 +01:00
const SYSTEMD_MOUNT_EJS = fs.readFileSync(path.join(__dirname, 'systemd-mount.ejs'), { encoding: 'utf8' });
2021-05-14 15:07:29 -07:00
// https://man7.org/linux/man-pages/man8/mount.8.html
async function validateMountOptions(type, options) {
2021-05-14 15:07:29 -07:00
assert.strictEqual(typeof type, 'string');
assert.strictEqual(typeof options, 'object');
switch (type) {
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_FILESYSTEM:
case exports.MOUNT_TYPE_MOUNTPOINT:
if (typeof options.hostPath !== 'string') return new BoxError(BoxError.BAD_FIELD, 'hostPath is not a string');
2021-05-14 15:07:29 -07:00
return null;
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_CIFS:
2021-05-14 15:07:29 -07:00
if (typeof options.username !== 'string') return new BoxError(BoxError.BAD_FIELD, 'username is not a string');
if (typeof options.password !== 'string') return new BoxError(BoxError.BAD_FIELD, 'password is not a string');
if (typeof options.host !== 'string') return new BoxError(BoxError.BAD_FIELD, 'host is not a string');
if (typeof options.remoteDir !== 'string') return new BoxError(BoxError.BAD_FIELD, 'remoteDir is not a string');
if ('seal' in options && typeof options.seal !== 'boolean') return new BoxError(BoxError.BAD_FIELD, 'seal is not a boolean');
2021-05-14 15:07:29 -07:00
return null;
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_NFS:
2021-05-14 15:07:29 -07:00
if (typeof options.host !== 'string') return new BoxError(BoxError.BAD_FIELD, 'host is not a string');
if (typeof options.remoteDir !== 'string') return new BoxError(BoxError.BAD_FIELD, 'remoteDir is not a string');
return null;
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_SSHFS:
2021-05-18 16:49:39 +02:00
if (typeof options.user !== 'string') return new BoxError(BoxError.BAD_FIELD, 'user is not a string');
if (typeof options.privateKey !== 'string') return new BoxError(BoxError.BAD_FIELD, 'privateKey is not a string');
if (typeof options.port !== 'number') return new BoxError(BoxError.BAD_FIELD, 'port is not a number');
if (typeof options.host !== 'string') return new BoxError(BoxError.BAD_FIELD, 'host is not a string');
if (typeof options.remoteDir !== 'string') return new BoxError(BoxError.BAD_FIELD, 'remoteDir is not a string');
return null;
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_EXT4:
case exports.MOUNT_TYPE_XFS:
case exports.MOUNT_TYPE_DISK: {
2021-05-14 15:07:29 -07:00
if (typeof options.diskPath !== 'string') return new BoxError(BoxError.BAD_FIELD, 'diskPath is not a string');
const [error, output] = await safe(shell.spawn('lsblk', ['--paths', '--json', '--list', '--fs', options.diskPath ], { encoding: 'utf8' }));
if (error) return new BoxError(BoxError.BAD_FIELD, `Bad disk path: ${error.message}`);
const info = safe.JSON.parse(output);
if (!info) return new BoxError(BoxError.BAD_FIELD, `Bad disk path: ${safe.error.message}`);
for (const mountpoint of info.blockdevices[0].mountpoints) {
if (mountpoint === null) break; // [ null ] means not mounted anywhere
if (mountpoint === '/' || mountpoint.startsWith('/home') || mountpoint.startsWith('/boot')) return new BoxError(BoxError.BAD_FIELD, 'Disk is mounted in a protected location');
}
2021-05-14 15:07:29 -07:00
return null;
}
2021-05-14 15:07:29 -07:00
default:
return new BoxError(BoxError.BAD_FIELD, 'Bad mount type');
2021-05-14 15:07:29 -07:00
}
}
// managed providers are those for which we setup systemd mount file under /mnt/volumes
2022-01-26 12:40:28 -08:00
function isManagedProvider(provider) {
2025-01-12 17:41:17 +01:00
switch (provider) {
case exports.MOUNT_TYPE_SSHFS:
case exports.MOUNT_TYPE_CIFS:
case exports.MOUNT_TYPE_NFS:
case exports.MOUNT_TYPE_EXT4:
case exports.MOUNT_TYPE_XFS:
case exports.MOUNT_TYPE_DISK:
return true;
default:
return false;
}
2021-07-14 11:07:19 -07:00
}
// https://www.man7.org/linux/man-pages/man8/mount.8.html for various mount option flags
// nfs - no_root_squash is mode on server to map all root to 'nobody' user. all_squash does this for all users (making it like ftp)
// sshfs - supports users/permissions
// cifs - does not support permissions
2024-02-20 23:09:49 +01:00
async function renderMountFile(mount) {
assert.strictEqual(typeof mount, 'object');
2021-05-14 15:07:29 -07:00
const { description, hostPath, mountType, mountOptions } = mount;
2021-05-14 15:07:29 -07:00
2025-01-12 18:02:06 +01:00
let options, what, type, dependsOn;
2021-05-14 15:07:29 -07:00
switch (mountType) {
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_CIFS: {
2024-10-16 10:25:07 +02:00
const out = await shell.spawn('systemd-escape', [ '-p', hostPath ], { encoding: 'utf8' }); // this ensures uniqueness of creds file
const credentialsFilePath = path.join(paths.CIFS_CREDENTIALS_DIR, `${out.trim()}.cred`);
if (!safe.fs.writeFileSync(credentialsFilePath, `username=${mountOptions.username}\npassword=${mountOptions.password}\n`, { mode: 0o600 })) throw new BoxError(BoxError.FS_ERROR, `Could not write credentials file: ${safe.error.message}`);
2021-05-14 15:07:29 -07:00
type = 'cifs';
what = `//${mountOptions.host}` + path.join('/', mountOptions.remoteDir);
options = `credentials=${credentialsFilePath},rw,${mountOptions.seal ? 'seal,' : ''}iocharset=utf8,file_mode=0666,dir_mode=0777,uid=yellowtent,gid=yellowtent`;
2025-01-12 18:02:06 +01:00
dependsOn = 'network-online.target';
2021-05-14 15:07:29 -07:00
break;
}
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_NFS:
2021-05-14 15:07:29 -07:00
type = 'nfs';
what = `${mountOptions.host}:${mountOptions.remoteDir}`;
2021-06-18 23:48:39 -07:00
options = 'noauto'; // noauto means it is not a blocker for local-fs.target. _netdev is implicit. rw,hard,tcp,rsize=8192,wsize=8192,timeo=14
2025-01-12 18:02:06 +01:00
dependsOn = 'network-online.target';
2021-05-14 15:07:29 -07:00
break;
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_EXT4:
2021-05-14 15:07:29 -07:00
type = 'ext4';
what = mountOptions.diskPath; // like /dev/disk/by-uuid/uuid or /dev/disk/by-id/scsi-id
options = 'discard,defaults,noatime';
break;
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_XFS:
2022-06-08 10:32:25 -07:00
type = 'xfs';
what = mountOptions.diskPath; // like /dev/disk/by-uuid/uuid or /dev/disk/by-id/scsi-id
2025-01-12 17:33:19 +01:00
options = 'discard,defaults,noatime,pquota';
break;
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_DISK:
type = 'auto';
what = mountOptions.diskPath; // like /dev/disk/by-uuid/uuid or /dev/disk/by-id/scsi-id
2022-06-08 10:32:25 -07:00
options = 'discard,defaults,noatime';
break;
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_SSHFS: {
const keyFilePath = path.join(paths.SSHFS_KEYS_DIR, `identity_file_${path.basename(hostPath)}`);
if (!safe.fs.writeFileSync(keyFilePath, `${mount.mountOptions.privateKey}\n`, { mode: 0o600 })) throw new BoxError(BoxError.FS_ERROR, `Could not write private key: ${safe.error.message}`);
2021-05-18 16:49:39 +02:00
type = 'fuse.sshfs';
what = `${mountOptions.user}@${mountOptions.host}:${mountOptions.remoteDir}`;
options = `allow_other,port=${mountOptions.port},IdentityFile=${keyFilePath},StrictHostKeyChecking=no,reconnect`; // allow_other means non-root users can access it
2025-01-12 18:02:06 +01:00
dependsOn = 'network-online.target';
2021-05-18 16:49:39 +02:00
break;
2021-05-14 15:07:29 -07:00
}
2025-01-12 17:41:17 +01:00
case exports.MOUNT_TYPE_FILESYSTEM:
case exports.MOUNT_TYPE_MOUNTPOINT:
return;
}
2021-05-14 15:07:29 -07:00
return ejs.render(SYSTEMD_MOUNT_EJS, { description, what, where: hostPath, options, type, dependsOn });
2021-05-14 15:07:29 -07:00
}
async function removeMount(mount) {
assert.strictEqual(typeof mount, 'object');
const { hostPath, mountType } = mount;
2021-05-14 15:07:29 -07:00
2021-05-17 16:23:24 -07:00
if (constants.TEST) return;
await safe(shell.sudo([ RM_MOUNT_CMD, hostPath ], {}), { debug }); // ignore any error
2025-01-12 17:41:17 +01:00
if (mountType === exports.MOUNT_TYPE_SSHFS) {
const keyFilePath = path.join(paths.SSHFS_KEYS_DIR, `identity_file_${path.basename(hostPath)}`);
safe.fs.unlinkSync(keyFilePath);
2025-01-12 17:41:17 +01:00
} else if (mountType === exports.MOUNT_TYPE_CIFS) {
2024-10-16 10:25:07 +02:00
const out = await shell.spawn('systemd-escape', [ '-p', hostPath ], { encoding: 'utf8' });
const credentialsFilePath = path.join(paths.CIFS_CREDENTIALS_DIR, `${out.trim()}.cred`);
safe.fs.unlinkSync(credentialsFilePath);
}
2021-05-14 15:07:29 -07:00
}
async function getStatus(mountType, hostPath) {
assert.strictEqual(typeof mountType, 'string');
assert.strictEqual(typeof hostPath, 'string');
if (mountType === exports.MOUNT_TYPE_FILESYSTEM) {
const exists = safe.fs.existsSync(hostPath);
return { state: exists ? 'active' : 'inactive', message: exists ? '' : `${hostPath} not found` };
}
2025-04-09 15:48:45 +02:00
const [error] = await safe(shell.spawn('mountpoint', [ '-q', '--', hostPath ], { timeout: 5000, encoding: 'utf8' }));
const state = error ? 'inactive' : 'active';
if (mountType === 'mountpoint') return { state, message: state === 'active' ? '' : 'Not mounted' };
2021-05-14 15:07:29 -07:00
// we used to rely on "systemctl show -p ActiveState" output before but some mounts like sshfs.fuse show the status as "active" event though the mount commant failed (on ubuntu 18)
let message = '';
2021-05-14 15:07:29 -07:00
if (state !== 'active') { // find why it failed
2024-10-16 10:25:07 +02:00
const unitName = await shell.spawn('systemd-escape', ['-p', '--suffix=mount', hostPath], { encoding: 'utf8' });
const logsJson = await shell.spawn('journalctl', ['-u', unitName, '-n', '10', '--no-pager', '-o', 'json'], { encoding: 'utf8' });
2021-07-09 16:59:57 -07:00
if (logsJson) {
const lines = logsJson.trim().split('\n').map(l => JSON.parse(l)); // array of json
let start = -1, end = -1; // start and end of error message block
for (let idx = lines.length - 1; idx >= 0; idx--) { // reverse
const line = lines[idx];
const match = line['SYSLOG_IDENTIFIER'] === 'mount' || (line['_EXE'] && line['_EXE'].includes('mount')) || (line['_COMM'] && line['_COMM'].includes('mount'));
2021-07-09 16:59:57 -07:00
if (match) {
if (end === -1) end = idx;
start = idx;
continue;
}
if (end !== -1) break; // no match and we already found a block
}
if (end !== -1) message = lines.slice(start, end+1).map(line => line['MESSAGE']).join('\n');
2021-05-14 15:07:29 -07:00
}
2022-10-02 16:38:12 +02:00
if (!message) message = `Could not determine mount failure reason. ${safe.error ? safe.error.message : ''}`;
2021-05-14 15:07:29 -07:00
}
return { state, message };
}
async function tryAddMount(mount, options) {
assert.strictEqual(typeof mount, 'object'); // { description, hostPath, mountType, mountOptions }
assert.strictEqual(typeof options, 'object'); // { timeout, skipCleanup }
assert(isManagedProvider(mount.mountType));
if (constants.TEST) return;
2024-02-20 23:09:49 +01:00
const mountFileContents = await renderMountFile(mount);
const [error] = await safe(shell.sudo([ ADD_MOUNT_CMD, mountFileContents, options.timeout ], {}));
if (error && error.code === 2) throw new BoxError(BoxError.MOUNT_ERROR, 'Failed to unmount existing mount'); // at this point, the old mount config is still there
if (options.skipCleanup) return;
const status = await getStatus(mount.mountType, mount.hostPath);
if (status.state !== 'active') { // cleanup
await removeMount(mount);
2021-06-21 22:37:32 -07:00
throw new BoxError(BoxError.MOUNT_ERROR, `Failed to mount (${status.state}): ${status.message}`);
}
}
2021-10-11 15:51:16 +02:00
async function remount(hostPath) {
assert.strictEqual(typeof hostPath, 'string');
2021-10-11 15:51:16 +02:00
if (constants.TEST) return;
const [error] = await safe(shell.sudo([ REMOUNT_MOUNT_CMD, hostPath ], {}));
2021-10-11 15:51:16 +02:00
if (error && error.code === 2) throw new BoxError(BoxError.MOUNT_ERROR, 'Failed to remount existing mount'); // at this point, the old mount config is still there
}