2016-09-15 11:29:45 +02:00
'use strict' ;
exports = module . exports = {
2025-08-01 14:54:32 +02:00
setup ,
teardown ,
cleanup ,
testConfig ,
removePrivateFields ,
injectPrivateFields ,
2022-10-02 17:22:44 +02:00
getAvailableSize ,
2020-06-05 13:27:18 +02:00
2021-02-18 16:51:43 -08:00
upload ,
download ,
2017-09-23 14:27:35 -07:00
2021-02-18 16:51:43 -08:00
copy ,
2017-09-17 18:50:29 -07:00
2021-02-18 16:51:43 -08:00
exists ,
listDir ,
2018-07-27 14:29:07 -07:00
2021-02-18 16:51:43 -08:00
remove ,
removeDir ,
2016-09-15 11:29:45 +02:00
} ;
2021-05-17 15:58:38 -07:00
const assert = require ( 'assert' ) ,
2019-10-22 20:36:20 -07:00
BoxError = require ( '../boxerror.js' ) ,
2021-05-17 15:58:38 -07:00
constants = require ( '../constants.js' ) ,
2017-04-11 11:00:55 +02:00
debug = require ( 'debug' ) ( 'box:storage/filesystem' ) ,
2022-10-18 19:32:07 +02:00
df = require ( '../df.js' ) ,
2016-09-16 11:55:59 +02:00
fs = require ( 'fs' ) ,
2025-08-01 14:54:32 +02:00
mounts = require ( '../mounts.js' ) ,
2017-04-18 15:32:59 +02:00
path = require ( 'path' ) ,
2020-12-01 12:11:55 -08:00
paths = require ( '../paths.js' ) ,
2017-04-20 16:59:17 -07:00
safe = require ( 'safetydance' ) ,
2024-10-14 19:10:31 +02:00
shell = require ( '../shell.js' ) ( 'filesystem' ) ;
2016-09-16 11:55:59 +02:00
2022-10-02 17:22:44 +02:00
async function getAvailableSize ( apiConfig ) {
assert . strictEqual ( typeof apiConfig , 'object' ) ;
2020-06-08 16:25:00 +02:00
2024-11-06 14:53:41 +01:00
// note that df returns the disk size (as opposed to the apparent size)
2023-08-15 20:24:54 +05:30
const [ error , dfResult ] = await safe ( df . file ( apiConfig . rootPath ) ) ;
2022-10-02 17:22:44 +02:00
if ( error ) throw new BoxError ( BoxError . FS _ERROR , ` Error when checking for disk space: ${ error . message } ` ) ;
2020-06-08 16:25:00 +02:00
2022-10-02 17:22:44 +02:00
return dfResult . available ;
2020-06-08 16:25:00 +02:00
}
2021-07-10 08:36:30 -07:00
function hasChownSupportSync ( apiConfig ) {
switch ( apiConfig . provider ) {
2025-08-01 14:54:32 +02:00
case mounts . MOUNT _TYPE _NFS :
case mounts . MOUNT _TYPE _EXT4 :
case mounts . MOUNT _TYPE _XFS :
case mounts . MOUNT _TYPE _DISK :
case mounts . MOUNT _TYPE _FILESYSTEM :
2021-07-10 08:36:30 -07:00
return true ;
2025-08-01 14:54:32 +02:00
case mounts . MOUNT _TYPE _SSHFS :
2021-07-10 08:36:30 -07:00
// sshfs can be mounted as root or normal user. when mounted as root, we have to chown since we remove backups as the yellowtent user
// when mounted as non-root user, files are created as yellowtent user but they are still owned by the non-root user (thus del also works)
2021-07-10 11:13:12 -07:00
return apiConfig . mountOptions . user === 'root' ;
2025-08-01 14:54:32 +02:00
case mounts . MOUNT _TYPE _CIFS :
2021-07-10 08:36:30 -07:00
return true ;
2025-08-01 14:54:32 +02:00
case mounts . MOUNT _TYPE _MOUNTPOINT :
2021-07-10 08:36:30 -07:00
return apiConfig . chown ;
}
}
2024-07-05 17:53:35 +02:00
async function upload ( apiConfig , backupFilePath ) {
2016-09-15 11:29:45 +02:00
assert . strictEqual ( typeof apiConfig , 'object' ) ;
2017-09-19 20:40:38 -07:00
assert . strictEqual ( typeof backupFilePath , 'string' ) ;
2016-09-15 11:29:45 +02:00
2024-07-05 17:53:35 +02:00
const [ mkdirError ] = await safe ( fs . promises . mkdir ( path . dirname ( backupFilePath ) , { recursive : true } ) ) ;
if ( mkdirError ) throw new BoxError ( BoxError . FS _ERROR , ` Error creating directory ${ backupFilePath } : ${ mkdirError . message } ` ) ;
2016-09-16 11:21:08 +02:00
2024-09-08 15:25:49 +02:00
await safe ( fs . promises . unlink ( backupFilePath ) ) ; // remove any hardlink
2017-09-22 14:40:37 -07:00
2024-07-05 17:53:35 +02:00
return {
stream : fs . createWriteStream ( backupFilePath , { autoClose : true } ) ,
async finish ( ) {
2021-06-22 09:27:11 -07:00
const backupUid = parseInt ( process . env . SUDO _UID , 10 ) || process . getuid ( ) ; // in test, upload() may or may not be called via sudo script
2021-07-10 08:36:30 -07:00
if ( hasChownSupportSync ( apiConfig ) ) {
2024-07-05 17:53:35 +02:00
if ( ! safe . fs . chownSync ( backupFilePath , backupUid , backupUid ) ) throw new BoxError ( BoxError . EXTERNAL _ERROR , ` Unable to chown ${ backupFilePath } : ${ safe . error . message } ` ) ;
if ( ! safe . fs . chownSync ( path . dirname ( backupFilePath ) , backupUid , backupUid ) ) throw new BoxError ( BoxError . EXTERNAL _ERROR , ` Unable to chown parentdir ${ backupFilePath } : ${ safe . error . message } ` ) ;
2020-12-18 17:14:31 -08:00
}
2024-07-05 17:53:35 +02:00
}
} ;
2016-09-16 11:21:08 +02:00
}
2023-07-24 22:25:06 +05:30
async function download ( apiConfig , sourceFilePath ) {
2016-09-15 11:29:45 +02:00
assert . strictEqual ( typeof apiConfig , 'object' ) ;
2017-09-19 20:40:38 -07:00
assert . strictEqual ( typeof sourceFilePath , 'string' ) ;
2016-09-15 11:29:45 +02:00
2018-07-30 07:39:34 -07:00
debug ( ` download: ${ sourceFilePath } ` ) ;
2017-04-11 11:00:55 +02:00
2023-07-24 22:25:06 +05:30
if ( ! safe . fs . existsSync ( sourceFilePath ) ) throw new BoxError ( BoxError . NOT _FOUND , ` File not found: ${ sourceFilePath } ` ) ;
2017-09-28 14:26:39 -07:00
2023-07-24 22:25:06 +05:30
return fs . createReadStream ( sourceFilePath ) ;
2017-04-17 14:46:19 +02:00
}
2022-04-14 08:07:03 -05:00
async function exists ( apiConfig , sourceFilePath ) {
2021-02-18 16:51:43 -08:00
assert . strictEqual ( typeof apiConfig , 'object' ) ;
assert . strictEqual ( typeof sourceFilePath , 'string' ) ;
// do not use existsSync because it does not return EPERM etc
if ( ! safe . fs . statSync ( sourceFilePath ) ) {
2022-04-14 08:07:03 -05:00
if ( safe . error && safe . error . code === 'ENOENT' ) return false ;
if ( safe . error ) throw new BoxError ( BoxError . EXTERNAL _ERROR , ` Exists ${ sourceFilePath } : ${ safe . error . message } ` ) ;
2021-02-18 16:51:43 -08:00
}
2022-04-14 08:07:03 -05:00
return true ;
2021-02-18 16:51:43 -08:00
}
2025-02-12 18:46:54 +01:00
async function listDir ( apiConfig , dir , batchSize , marker ) {
2018-07-27 13:55:54 -07:00
assert . strictEqual ( typeof apiConfig , 'object' ) ;
assert . strictEqual ( typeof dir , 'string' ) ;
assert . strictEqual ( typeof batchSize , 'number' ) ;
2025-02-12 18:46:54 +01:00
assert ( typeof marker !== 'undefined' ) ;
const stack = marker ? marker . stack : [ dir ] ;
const fileStream = marker ? marker . fileStream : [ ] ;
if ( ! marker ) marker = { stack , fileStream } ;
while ( stack . length > 0 ) {
const currentDir = stack . pop ( ) ;
const dirents = await fs . promises . readdir ( currentDir , { withFileTypes : true } ) ;
for ( const dirent of dirents ) {
const fullPath = path . join ( currentDir , dirent . name ) ;
if ( dirent . isDirectory ( ) ) {
stack . push ( fullPath ) ;
} else if ( dirent . isFile ( ) ) { // does not include symlink
const stat = await fs . promises . lstat ( fullPath ) ;
fileStream . push ( { fullPath , size : stat . size } ) ;
}
}
if ( fileStream . length >= batchSize ) return { entries : fileStream . splice ( 0 , batchSize ) , marker } ; // note: splice also modifies the array
}
if ( fileStream . length === 0 ) return { entries : [ ] , marker : null } ;
return { entries : fileStream . splice ( 0 , batchSize ) , marker } ; // note: splice also modifies the array
2018-07-27 13:55:54 -07:00
}
2022-04-30 16:01:42 -07:00
async function copy ( apiConfig , oldFilePath , newFilePath , progressCallback ) {
2017-04-17 14:46:19 +02:00
assert . strictEqual ( typeof apiConfig , 'object' ) ;
2017-09-19 20:40:38 -07:00
assert . strictEqual ( typeof oldFilePath , 'string' ) ;
assert . strictEqual ( typeof newFilePath , 'string' ) ;
2022-04-30 16:01:42 -07:00
assert . strictEqual ( typeof progressCallback , 'function' ) ;
2017-04-17 14:46:19 +02:00
2022-04-30 16:01:42 -07:00
const [ mkdirError ] = await safe ( fs . promises . mkdir ( path . dirname ( newFilePath ) , { recursive : true } ) ) ;
if ( mkdirError ) throw new BoxError ( BoxError . EXTERNAL _ERROR , mkdirError . message ) ;
2017-10-04 11:00:30 -07:00
2022-04-30 16:01:42 -07:00
progressCallback ( { message : ` Copying ${ oldFilePath } to ${ newFilePath } ` } ) ;
2017-04-17 14:46:19 +02:00
2025-08-01 14:54:32 +02:00
let cpOptions = ( ( apiConfig . provider !== mounts . MOUNT _TYPE _MOUNTPOINT && apiConfig . provider !== mounts . MOUNT _TYPE _CIFS ) || apiConfig . preserveAttributes ) ? '-a' : '-dR' ;
2022-04-30 16:01:42 -07:00
cpOptions += apiConfig . noHardlinks ? '' : 'l' ; // this will hardlink backups saving space
2019-04-03 11:54:46 -07:00
2025-08-01 14:54:32 +02:00
if ( apiConfig . provider === mounts . MOUNT _TYPE _SSHFS ) {
2024-07-30 11:00:50 +02:00
const identityFilePath = path . join ( paths . SSHFS _KEYS _DIR , ` id_rsa_ ${ apiConfig . mountOptions . host } ` ) ;
2024-07-02 19:02:36 +02:00
2024-07-22 20:53:19 +02:00
const sshOptions = [ '-o' , '"StrictHostKeyChecking no"' , '-i' , identityFilePath , '-p' , apiConfig . mountOptions . port , ` ${ apiConfig . mountOptions . user } @ ${ apiConfig . mountOptions . host } ` ] ;
const sshArgs = sshOptions . concat ( [ 'cp' , cpOptions , oldFilePath . replace ( '/mnt/cloudronbackup/' , '' ) , newFilePath . replace ( '/mnt/cloudronbackup/' , '' ) ] ) ;
2024-10-15 10:10:15 +02:00
const [ remoteCopyError ] = await safe ( shell . spawn ( 'ssh' , sshArgs , { shell : true } ) ) ;
2024-07-22 20:53:19 +02:00
if ( ! remoteCopyError ) return ;
2024-07-22 21:24:27 +02:00
if ( remoteCopyError . code === 255 ) throw new BoxError ( BoxError . EXTERNAL _ERROR , ` SSH connection error: ${ remoteCopyError . message } ` ) ; // do not attempt fallback copy for ssh errors
2025-04-09 10:33:23 +02:00
debug ( 'SSH remote copy failed, trying sshfs copy' ) ; // this can happen for sshfs mounted windows server
2024-07-02 19:02:36 +02:00
}
2024-07-22 20:53:19 +02:00
2024-10-15 10:10:15 +02:00
const [ copyError ] = await safe ( shell . spawn ( 'cp' , [ cpOptions , oldFilePath , newFilePath ] , { } ) ) ;
2024-07-22 20:53:19 +02:00
if ( copyError ) throw new BoxError ( BoxError . EXTERNAL _ERROR , copyError . message ) ;
2016-09-15 11:29:45 +02:00
}
2022-04-14 16:07:01 -05:00
async function remove ( apiConfig , filename ) {
2017-09-27 17:34:49 -07:00
assert . strictEqual ( typeof apiConfig , 'object' ) ;
assert . strictEqual ( typeof filename , 'string' ) ;
2022-04-14 16:07:01 -05:00
const stat = safe . fs . statSync ( filename ) ;
if ( ! stat ) return ;
2017-09-27 17:34:49 -07:00
2017-09-28 20:55:39 -07:00
if ( stat . isFile ( ) ) {
2022-04-14 16:07:01 -05:00
if ( ! safe . fs . unlinkSync ( filename ) ) throw new BoxError ( BoxError . EXTERNAL _ERROR , safe . error . message ) ;
2017-09-28 20:55:39 -07:00
} else if ( stat . isDirectory ( ) ) {
2024-01-24 21:24:39 +01:00
if ( ! safe . fs . rmdirSync ( filename , { recursive : false } ) ) throw new BoxError ( BoxError . EXTERNAL _ERROR , safe . error . message ) ;
2017-09-28 20:55:39 -07:00
}
2017-09-27 17:34:49 -07:00
}
2022-04-14 16:07:01 -05:00
async function removeDir ( apiConfig , pathPrefix , progressCallback ) {
2017-04-17 15:45:58 +02:00
assert . strictEqual ( typeof apiConfig , 'object' ) ;
2017-09-23 11:09:36 -07:00
assert . strictEqual ( typeof pathPrefix , 'string' ) ;
2022-04-14 16:07:01 -05:00
assert . strictEqual ( typeof progressCallback , 'function' ) ;
2017-10-10 20:23:04 -07:00
2022-04-14 16:07:01 -05:00
progressCallback ( { message : ` Removing directory ${ pathPrefix } ` } ) ;
2017-10-10 20:23:04 -07:00
2025-08-01 14:54:32 +02:00
if ( apiConfig . provider === mounts . MOUNT _TYPE _SSHFS ) {
2025-04-09 10:33:23 +02:00
const identityFilePath = path . join ( paths . SSHFS _KEYS _DIR , ` id_rsa_ ${ apiConfig . mountOptions . host } ` ) ;
const sshOptions = [ '-o' , '"StrictHostKeyChecking no"' , '-i' , identityFilePath , '-p' , apiConfig . mountOptions . port , ` ${ apiConfig . mountOptions . user } @ ${ apiConfig . mountOptions . host } ` ] ;
const sshArgs = sshOptions . concat ( [ 'rm' , '-rf' , pathPrefix . replace ( '/mnt/cloudronbackup/' , '' ) ] ) ;
const [ remoteRmError ] = await safe ( shell . spawn ( 'ssh' , sshArgs , { shell : true } ) ) ;
if ( ! remoteRmError ) return ;
if ( remoteRmError . code === 255 ) throw new BoxError ( BoxError . EXTERNAL _ERROR , ` SSH connection error: ${ remoteRmError . message } ` ) ; // do not attempt fallback copy for ssh errors
debug ( 'SSH remote rm failed, trying sshfs rm' ) ; // this can happen for sshfs mounted windows server
}
2024-10-15 10:10:15 +02:00
const [ error ] = await safe ( shell . spawn ( 'rm' , [ '-rf' , pathPrefix ] , { } ) ) ;
2022-04-14 16:07:01 -05:00
if ( error ) throw new BoxError ( BoxError . EXTERNAL _ERROR , error . message ) ;
2017-04-17 15:45:58 +02:00
}
2025-08-01 14:54:32 +02:00
function validateDestPath ( folder ) {
2020-12-01 12:11:55 -08:00
assert . strictEqual ( typeof folder , 'string' ) ;
2022-02-07 13:19:59 -08:00
if ( path . normalize ( folder ) !== folder ) return new BoxError ( BoxError . BAD _FIELD , 'backupFolder/mountpoint must contain a normalized path' ) ;
if ( ! path . isAbsolute ( folder ) ) return new BoxError ( BoxError . BAD _FIELD , 'backupFolder/mountpoint must be an absolute path' ) ;
2020-12-01 12:11:55 -08:00
2022-02-07 13:19:59 -08:00
if ( folder === '/' ) return new BoxError ( BoxError . BAD _FIELD , 'backupFolder/mountpoint cannot be /' ) ;
2020-12-01 12:11:55 -08:00
if ( ! folder . endsWith ( '/' ) ) folder = folder + '/' ; // ensure trailing slash for the prefix matching to work
const PROTECTED _PREFIXES = [ '/boot/' , '/usr/' , '/bin/' , '/lib/' , '/root/' , '/var/lib/' , paths . baseDir ( ) ] ;
2022-02-07 13:19:59 -08:00
if ( PROTECTED _PREFIXES . some ( p => folder . startsWith ( p ) ) ) return new BoxError ( BoxError . BAD _FIELD , 'backupFolder path is protected' ) ;
2020-12-01 12:11:55 -08:00
return null ;
}
2025-02-13 11:08:00 +01:00
async function cleanup ( apiConfig , progressCallback ) {
assert . strictEqual ( typeof apiConfig , 'object' ) ;
assert . strictEqual ( typeof progressCallback , 'function' ) ;
}
2025-08-01 14:54:32 +02:00
async function setupManagedMount ( apiConfig , hostPath ) {
assert . strictEqual ( typeof apiConfig , 'object' ) ;
assert . strictEqual ( typeof hostPath , 'string' ) ;
assert ( mounts . isManagedProvider ( apiConfig . provider ) ) ;
if ( ! apiConfig . mountOptions || typeof apiConfig . mountOptions !== 'object' ) throw new BoxError ( BoxError . BAD _FIELD , 'mountOptions must be an object' ) ;
const error = mounts . validateMountOptions ( apiConfig . provider , apiConfig . mountOptions ) ;
if ( error ) throw error ;
debug ( ` setupManagedMount: setting up mount at ${ hostPath } with ${ apiConfig . provider } ` ) ;
const newMount = {
name : path . basename ( hostPath ) ,
hostPath ,
mountType : apiConfig . provider ,
mountOptions : apiConfig . mountOptions
} ;
await mounts . tryAddMount ( newMount , { timeout : 10 } ) ; // 10 seconds
return newMount ;
}
async function setup ( apiConfig ) {
assert . strictEqual ( typeof apiConfig , 'object' ) ;
debug ( 'setup: removing old storage configuration' ) ;
if ( ! mounts . isManagedProvider ( apiConfig . provider ) ) return ;
const oldMountObject = {
name : 'backup' ,
hostPath : paths . MANAGED _BACKUP _MOUNT _DIR ,
mountType : apiConfig . provider ,
mountOptions : apiConfig . mountOptions // must have already been validated
} ;
await safe ( mounts . removeMount ( oldMountObject ) , { debug } ) ; // ignore error
debug ( 'setup: setting up new storage configuration' ) ;
await setupManagedMount ( apiConfig , paths . MANAGED _BACKUP _MOUNT _DIR ) ;
}
async function teardown ( apiConfig ) {
assert . strictEqual ( typeof apiConfig , 'object' ) ;
if ( ! mounts . isManagedProvider ( apiConfig . provider ) ) return ;
const mountObject = {
name : 'backup' ,
hostPath : paths . MANAGED _BACKUP _MOUNT _DIR ,
mountType : apiConfig . provider ,
mountOptions : apiConfig . mountOptions
} ;
await safe ( mounts . removeMount ( mountObject ) , { debug } ) ; // ignore error
}
2022-04-14 07:59:50 -05:00
async function testConfig ( apiConfig ) {
2016-10-11 11:36:25 +02:00
assert . strictEqual ( typeof apiConfig , 'object' ) ;
2022-04-14 07:59:50 -05:00
if ( 'noHardlinks' in apiConfig && typeof apiConfig . noHardlinks !== 'boolean' ) throw new BoxError ( BoxError . BAD _FIELD , 'noHardlinks must be boolean' ) ;
if ( 'chown' in apiConfig && typeof apiConfig . chown !== 'boolean' ) throw new BoxError ( BoxError . BAD _FIELD , 'chown must be boolean' ) ;
2025-01-24 13:41:54 +01:00
if ( 'preserveAttributes' in apiConfig && typeof apiConfig . preserveAttributes !== 'boolean' ) throw new BoxError ( BoxError . BAD _FIELD , 'preserveAttributes must be boolean' ) ;
2021-05-17 15:58:38 -07:00
2025-08-01 14:54:32 +02:00
let rootPath , testMountObject ;
if ( apiConfig . provider === mounts . MOUNT _TYPE _FILESYSTEM ) {
2022-04-14 07:59:50 -05:00
if ( ! apiConfig . backupFolder || typeof apiConfig . backupFolder !== 'string' ) throw new BoxError ( BoxError . BAD _FIELD , 'backupFolder must be non-empty string' ) ;
2025-08-01 14:54:32 +02:00
const error = validateDestPath ( apiConfig . backupFolder ) ;
2022-04-14 07:59:50 -05:00
if ( error ) throw error ;
2024-04-09 13:53:15 +02:00
rootPath = apiConfig . backupFolder ;
2025-08-01 14:54:32 +02:00
} else {
2022-04-14 07:59:50 -05:00
if ( typeof apiConfig . prefix !== 'string' ) throw new BoxError ( BoxError . BAD _FIELD , 'prefix must be a string' ) ;
2020-12-18 14:41:59 -08:00
if ( apiConfig . prefix !== '' ) {
2022-04-14 07:59:50 -05:00
if ( path . isAbsolute ( apiConfig . prefix ) ) throw new BoxError ( BoxError . BAD _FIELD , 'prefix must be a relative path' ) ;
if ( path . normalize ( apiConfig . prefix ) !== apiConfig . prefix ) throw new BoxError ( BoxError . BAD _FIELD , 'prefix must contain a normalized relative path' ) ;
2020-12-18 14:41:59 -08:00
}
2017-10-16 15:15:15 -07:00
2025-08-01 14:54:32 +02:00
if ( mounts . isManagedProvider ( apiConfig . provider ) ) {
testMountObject = await setupManagedMount ( apiConfig , '/mnt/backup-storage-validation' ) ; // this validates mountOptions
rootPath = path . join ( '/mnt/backup-storage-validation' , apiConfig . prefix ) ;
} else if ( apiConfig . provider === mounts . MOUNT _TYPE _MOUNTPOINT ) {
if ( ! apiConfig . mountPoint || typeof apiConfig . mountPoint !== 'string' ) throw new BoxError ( BoxError . BAD _FIELD , 'mountPoint must be non-empty string' ) ;
const error = validateDestPath ( apiConfig . mountPoint ) ;
if ( error ) throw error ;
const [ mountError ] = await safe ( shell . spawn ( 'mountpoint' , [ '-q' , '--' , apiConfig . mountPoint ] , { timeout : 5000 } ) ) ;
if ( mountError ) throw new BoxError ( BoxError . BAD _FIELD , ` ${ apiConfig . mountPoint } is not mounted: ${ mountError . message } ` ) ;
2024-04-09 13:53:15 +02:00
rootPath = path . join ( apiConfig . mountPoint , apiConfig . prefix ) ;
} else {
2025-08-01 14:54:32 +02:00
throw new BoxError ( BoxError . BAD _FIELD , ` Unknown provider: ${ apiConfig . provider } ` ) ;
2024-04-09 13:53:15 +02:00
}
2021-06-22 15:28:48 -07:00
}
2023-08-15 20:24:54 +05:30
if ( ! safe . fs . mkdirSync ( path . join ( rootPath , 'snapshot' ) , { recursive : true } ) && safe . error . code !== 'EEXIST' ) {
2024-04-09 13:53:15 +02:00
if ( safe . error && safe . error . code === 'EACCES' ) throw new BoxError ( BoxError . BAD _FIELD , ` Access denied. Create ${ rootPath } /snapshot and run "chown yellowtent:yellowtent ${ rootPath } " on the server ` ) ;
throw new BoxError ( BoxError . BAD _FIELD , safe . error . message ) ;
2021-05-26 23:01:05 -07:00
}
2017-10-26 11:27:36 -07:00
2023-08-15 20:24:54 +05:30
if ( ! safe . fs . writeFileSync ( path . join ( rootPath , 'cloudron-testfile' ) , 'testcontent' ) ) {
2024-04-09 13:53:15 +02:00
throw new BoxError ( BoxError . BAD _FIELD , ` Unable to create test file as 'yellowtent' user in ${ rootPath } : ${ safe . error . message } . Check dir/mount permissions ` ) ;
2021-05-26 23:01:05 -07:00
}
2020-05-26 14:57:20 -07:00
2023-08-15 20:24:54 +05:30
if ( ! safe . fs . unlinkSync ( path . join ( rootPath , 'cloudron-testfile' ) ) ) {
2024-04-09 13:53:15 +02:00
throw new BoxError ( BoxError . BAD _FIELD , ` Unable to remove test file as 'yellowtent' user in ${ rootPath } : ${ safe . error . message } . Check dir/mount permissions ` ) ;
2020-05-26 14:57:20 -07:00
}
2025-08-01 14:54:32 +02:00
if ( testMountObject ) await mounts . removeMount ( testMountObject ) ;
2016-10-11 11:36:25 +02:00
}
2017-01-04 16:22:58 -08:00
2019-02-09 18:08:10 -08:00
function removePrivateFields ( apiConfig ) {
2021-05-17 15:58:38 -07:00
if ( apiConfig . mountOptions && apiConfig . mountOptions . password ) apiConfig . mountOptions . password = constants . SECRET _PLACEHOLDER ;
2021-07-09 15:29:29 -07:00
if ( apiConfig . mountOptions && apiConfig . mountOptions . privateKey ) apiConfig . mountOptions . privateKey = constants . SECRET _PLACEHOLDER ;
2019-02-09 18:08:10 -08:00
return apiConfig ;
}
2021-05-17 15:58:38 -07:00
function injectPrivateFields ( newConfig , currentConfig ) {
if ( newConfig . mountOptions && currentConfig . mountOptions && newConfig . mountOptions . password === constants . SECRET _PLACEHOLDER ) newConfig . mountOptions . password = currentConfig . mountOptions . password ;
2021-07-09 15:29:29 -07:00
if ( newConfig . mountOptions && currentConfig . mountOptions && newConfig . mountOptions . privateKey === constants . SECRET _PLACEHOLDER ) newConfig . mountOptions . privateKey = currentConfig . mountOptions . privateKey ;
2019-02-09 18:08:10 -08:00
}