// mountOptions configures the options from the command line flags func mountOptions(device string) (options []fuse.MountOption) { options = []fuse.MountOption{ fuse.MaxReadahead(uint32(maxReadAhead)), fuse.Subtype("rclone"), fuse.FSName(device), fuse.VolumeName(device), fuse.NoAppleDouble(), fuse.NoAppleXattr(), // Options from benchmarking in the fuse module //fuse.MaxReadahead(64 * 1024 * 1024), //fuse.AsyncRead(), - FIXME this causes // ReadFileHandle.Read error: read /home/files/ISOs/xubuntu-15.10-desktop-amd64.iso: bad file descriptor // which is probably related to errors people are having //fuse.WritebackCache(), } if allowNonEmpty { options = append(options, fuse.AllowNonEmptyMount()) } if allowOther { options = append(options, fuse.AllowOther()) } if allowRoot { options = append(options, fuse.AllowRoot()) } if defaultPermissions { options = append(options, fuse.DefaultPermissions()) } if readOnly { options = append(options, fuse.ReadOnly()) } if writebackCache { options = append(options, fuse.WritebackCache()) } return options }
func TestMountOptionDefaultPermissions(t *testing.T) { if runtime.GOOS == "freebsd" { t.Skip("FreeBSD does not support DefaultPermissions") } t.Parallel() mnt, err := fstestutil.MountedT(t, fstestutil.SimpleFS{ fstestutil.ChildMap{"child": unwritableFile{}}, }, fuse.DefaultPermissions(), ) if err != nil { t.Fatal(err) } defer mnt.Close() // This will be prevented by kernel-level access checking when // DefaultPermissions is used. f, err := os.OpenFile(mnt.Dir+"/child", os.O_WRONLY, 0000) if err == nil { f.Close() t.Fatal("expected an error") } if !os.IsPermission(err) { t.Fatalf("expected a permission error, got %T: %v", err, err) } }
func mountOptions(device string) (options []fuse.MountOption) { if svfs.AllowOther { options = append(options, fuse.AllowOther()) } if svfs.AllowRoot { options = append(options, fuse.AllowRoot()) } if svfs.DefaultPermissions { options = append(options, fuse.DefaultPermissions()) } if svfs.ReadOnly { options = append(options, fuse.ReadOnly()) } options = append(options, fuse.MaxReadahead(uint32(svfs.ReadAheadSize))) options = append(options, fuse.Subtype("svfs")) options = append(options, fuse.FSName(device)) return options }
func main() { // Process command line arguments var token string var acctNum string var fsNum string var serverAddr string app := cli.NewApp() app.Name = "cfs" app.Usage = "Client used to test filesysd" app.Version = "0.5.0" app.Flags = []cli.Flag{ cli.StringFlag{ Name: "token, T", Value: "", Usage: "Access token", EnvVar: "OOHHC_TOKEN_KEY", Destination: &token, }, } app.Commands = []cli.Command{ { Name: "show", Usage: "Show a File Systems", ArgsUsage: "<region>://<account uuid>/<file system uuid>", Action: func(c *cli.Context) { if !c.Args().Present() { fmt.Println("Invalid syntax for show.") os.Exit(1) } if token == "" { fmt.Println("Token is required") os.Exit(1) } serverAddr, acctNum, fsNum = parseurl(c.Args().Get(0), "8448") if fsNum == "" { fmt.Println("Missing file system id") os.Exit(1) } conn := setupWS(serverAddr) ws := mb.NewFileSystemAPIClient(conn) result, err := ws.ShowFS(context.Background(), &mb.ShowFSRequest{Acctnum: acctNum, FSid: fsNum, Token: token}) if err != nil { log.Fatalf("Bad Request: %v", err) conn.Close() os.Exit(1) } conn.Close() log.Printf("Result: %s\n", result.Status) log.Printf("SHOW Results: %s", result.Payload) }, }, { Name: "create", Usage: "Create a File Systems", ArgsUsage: "<region>://<account uuid> -N <file system name>", Flags: []cli.Flag{ cli.StringFlag{ Name: "name, N", Value: "", Usage: "Name of the file system", }, }, Action: func(c *cli.Context) { if !c.Args().Present() { fmt.Println("Invalid syntax for show.") os.Exit(1) } if token == "" { fmt.Println("Token is required") } // For create serverAddr and acctnum are required serverAddr, acctNum, _ = parseurl(c.Args().Get(0), "8448") if c.String("name") == "" { fmt.Println("File system name is a required field.") os.Exit(1) } conn := setupWS(serverAddr) ws := mb.NewFileSystemAPIClient(conn) result, err := ws.CreateFS(context.Background(), &mb.CreateFSRequest{Acctnum: acctNum, FSName: c.String("name"), Token: token}) if err != nil { log.Fatalf("Bad Request: %v", err) conn.Close() os.Exit(1) } conn.Close() log.Printf("Result: %s\n", result.Status) log.Printf("Create Results: %s", result.Payload) }, }, { Name: "list", Usage: "List File Systems for an account", ArgsUsage: "<region>://<account uuid>", Action: func(c *cli.Context) { if !c.Args().Present() { fmt.Println("Invalid syntax for list.") os.Exit(1) } if token == "" { fmt.Println("Token is required") os.Exit(1) } serverAddr, acctNum, _ = parseurl(c.Args().Get(0), "8448") conn := setupWS(serverAddr) ws := mb.NewFileSystemAPIClient(conn) result, err := ws.ListFS(context.Background(), &mb.ListFSRequest{Acctnum: acctNum, Token: token}) if err != nil { log.Fatalf("Bad Request: %v", err) conn.Close() os.Exit(1) } conn.Close() log.Printf("Result: %s\n", result.Status) log.Printf("LIST Results: %s", result.Payload) }, }, { Name: "delete", Usage: "Delete a File Systems", ArgsUsage: "<region>://<account uuid>/<file system uuid>", Action: func(c *cli.Context) { if !c.Args().Present() { fmt.Println("Invalid syntax for delete.") os.Exit(1) } if token == "" { fmt.Println("Token is required") } serverAddr, acctNum, fsNum = parseurl(c.Args().Get(0), "8448") if fsNum == "" { fmt.Println("Missing file system id") os.Exit(1) } conn := setupWS(serverAddr) ws := mb.NewFileSystemAPIClient(conn) result, err := ws.DeleteFS(context.Background(), &mb.DeleteFSRequest{Acctnum: acctNum, FSid: fsNum, Token: token}) if err != nil { log.Fatalf("Bad Request: %v", err) conn.Close() os.Exit(1) } conn.Close() log.Printf("Result: %s\n", result.Status) log.Printf("Delete Results: %s", result.Payload) }, }, { Name: "update", Usage: "Update a File Systems", ArgsUsage: "<region>://<account uuid>/<file system uuid> -o [OPTIONS]", Flags: []cli.Flag{ cli.StringFlag{ Name: "name, N", Value: "", Usage: "Name of the file system", }, cli.StringFlag{ Name: "S, status", Value: "", Usage: "Status of the file system", }, }, Action: func(c *cli.Context) { if !c.Args().Present() { fmt.Println("Invalid syntax for update.") os.Exit(1) } if token == "" { fmt.Println("Token is required") os.Exit(1) } serverAddr, acctNum, fsNum = parseurl(c.Args().Get(0), "8448") if fsNum == "" { fmt.Println("Missing file system id") os.Exit(1) } if c.String("name") != "" { fmt.Printf("Invalid File System String: %q\n", c.String("name")) os.Exit(1) } fsMod := &mb.ModFS{ Name: c.String("name"), Status: c.String("status"), } conn := setupWS(serverAddr) ws := mb.NewFileSystemAPIClient(conn) result, err := ws.UpdateFS(context.Background(), &mb.UpdateFSRequest{Acctnum: acctNum, FSid: fsNum, Token: token, Filesys: fsMod}) if err != nil { log.Fatalf("Bad Request: %v", err) conn.Close() os.Exit(1) } conn.Close() log.Printf("Result: %s\n", result.Status) log.Printf("Update Results: %s", result.Payload) }, }, { Name: "grant", Usage: "Grant an Addr access to a File Systems", ArgsUsage: "<region>://<account uuid>/<file system uuid> -addr <IP Address>", Flags: []cli.Flag{ cli.StringFlag{ Name: "addr", Value: "", Usage: "Address to Grant", }, }, Action: func(c *cli.Context) { if !c.Args().Present() { fmt.Println("Invalid syntax for delete.") os.Exit(1) } if token == "" { fmt.Println("Token is required") os.Exit(1) } if c.String("addr") == "" { fmt.Println("addr is required") os.Exit(1) } serverAddr, acctNum, fsNum = parseurl(c.Args().Get(0), "8448") if fsNum == "" { fmt.Println("Missing file system id") os.Exit(1) } conn := setupWS(serverAddr) ws := mb.NewFileSystemAPIClient(conn) result, err := ws.GrantAddrFS(context.Background(), &mb.GrantAddrFSRequest{Acctnum: acctNum, FSid: fsNum, Token: token, Addr: c.String("addr")}) if err != nil { log.Fatalf("Bad Request: %v", err) conn.Close() os.Exit(1) } conn.Close() log.Printf("Result: %s\n", result.Status) }, }, { Name: "revoke", Usage: "Revoke an Addr's access to a File Systems", ArgsUsage: "<region>://<account uuid>/<file system uuid> -addr <IP Address>", Flags: []cli.Flag{ cli.StringFlag{ Name: "addr", Value: "", Usage: "Address to Revoke", }, }, Action: func(c *cli.Context) { if !c.Args().Present() { fmt.Println("Invalid syntax for revoke.") os.Exit(1) } if token == "" { fmt.Println("Token is required") os.Exit(1) } if c.String("addr") == "" { fmt.Println("addr is required") os.Exit(1) } serverAddr, acctNum, fsNum = parseurl(c.Args().Get(0), "8448") if fsNum == "" { fmt.Println("Missing file system id") os.Exit(1) } conn := setupWS(serverAddr) ws := mb.NewFileSystemAPIClient(conn) result, err := ws.RevokeAddrFS(context.Background(), &mb.RevokeAddrFSRequest{Acctnum: acctNum, FSid: fsNum, Token: token, Addr: c.String("addr")}) if err != nil { log.Fatalf("Bad Request: %v", err) conn.Close() os.Exit(1) } conn.Close() log.Printf("Result: %s\n", result.Status) }, }, { Name: "verify", Usage: "Verify an Addr has access to a file system", ArgsUsage: "<region>://<account uuid>/<file system uuid> -addr <IP Address>", Flags: []cli.Flag{ cli.StringFlag{ Name: "addr", Value: "", Usage: "Address to check", }, }, Action: func(c *cli.Context) { if !c.Args().Present() { fmt.Println("Invalid syntax for revoke.") os.Exit(1) } if c.String("addr") == "" { fmt.Println("addr is required") os.Exit(1) } serverAddr, fsNum, _ = parseurl(c.Args().Get(0), "8448") conn := setupWS(serverAddr) ws := mb.NewFileSystemAPIClient(conn) result, err := ws.LookupAddrFS(context.Background(), &mb.LookupAddrFSRequest{FSid: fsNum, Addr: c.String("addr")}) if err != nil { log.Fatalf("Bad Request: %v", err) conn.Close() os.Exit(1) } conn.Close() log.Printf("Result: %s\n", result.Status) }, }, { Name: "mount", Usage: "mount a file system", ArgsUsage: "<region>://<file system uuid> <mount point> -o [OPTIONS]", Flags: []cli.Flag{ cli.StringFlag{ Name: "o", Value: "", Usage: "mount options", }, }, Action: func(c *cli.Context) { if !c.Args().Present() { fmt.Println("Invalid syntax for revoke.") os.Exit(1) } serverAddr, fsNum, _ = parseurl(c.Args().Get(0), "8445") fsnum, err := uuid.FromString(fsNum) if err != nil { fmt.Print("File System id is not valid: ", err) } mountpoint := c.Args().Get(1) // check mountpoint exists if _, ferr := os.Stat(mountpoint); os.IsNotExist(ferr) { log.Printf("Mount point %s does not exist\n\n", mountpoint) os.Exit(1) } fusermountPath() // process file system options if c.String("o") != "" { clargs := getArgs(c.String("o")) // crapy debug log handling :) if debug, ok := clargs["debug"]; ok { if debug == "false" { log.SetFlags(0) log.SetOutput(ioutil.Discard) } } else { log.SetFlags(0) log.SetOutput(ioutil.Discard) } } // Setup grpc var opts []grpc.DialOption creds := credentials.NewTLS(&tls.Config{ InsecureSkipVerify: true, }) opts = append(opts, grpc.WithTransportCredentials(creds)) conn, err := grpc.Dial(serverAddr, opts...) if err != nil { log.Fatalf("failed to dial: %v", err) } defer conn.Close() // Work with fuse cfs, err := fuse.Mount( mountpoint, fuse.FSName("cfs"), fuse.Subtype("cfs"), fuse.LocalVolume(), fuse.VolumeName("CFS"), fuse.AllowOther(), fuse.DefaultPermissions(), ) if err != nil { log.Fatal(err) } defer cfs.Close() rpc := newrpc(conn) fs := newfs(cfs, rpc, fsnum.String()) err = fs.InitFs() if err != nil { log.Fatal(err) } srv := newserver(fs) if err := srv.serve(); err != nil { log.Fatal(err) } <-cfs.Ready if err := cfs.MountError; err != nil { log.Fatal(err) } }, }, } app.Run(os.Args) }
func main() { allowOther := flag.Bool("allow-other", false, "allow all users access to the filesystem") allowRoot := flag.Bool("allow-root", false, "allow root to access the filesystem") debug := flag.Bool("debug", false, "enable debug output") gid := flag.Int("gid", os.Getgid(), "set the GID that should own all files") perm := flag.Int("perm", 0, "set the file permission flags for all files") ro := flag.Bool("ro", false, "mount the filesystem read-only") root := flag.String("root", "", "path in Consul to the root of the filesystem") timeout := flag.String("timeout", defaultTimeout, "timeout for Consul requests") uid := flag.Int("uid", os.Getuid(), "set the UID that should own all files") flag.Parse() logger := logrus.New() if *debug { logger.Level = logrus.DebugLevel } consulConfig := &consul.Config{} var mountPoint string switch flag.NArg() { case 1: mountPoint = flag.Arg(0) case 2: consulConfig.Address = flag.Arg(0) mountPoint = flag.Arg(1) default: flag.Usage() } // Initialize a Consul client. TODO: connection parameters client, err := consul.NewClient(consulConfig) if err != nil { logrus.NewEntry(logger).WithError(err).Error("could not initialize consul") os.Exit(1) } // Configure some mount options timeoutDuration, err := time.ParseDuration(*timeout) if err != nil { logrus.NewEntry(logger).WithError(err).Fatal("invalid -timeout value") } mountOptions := []fuse.MountOption{ fuse.DefaultPermissions(), fuse.DaemonTimeout(fmt.Sprint(int64(timeoutDuration.Seconds() + 1))), fuse.NoAppleDouble(), fuse.NoAppleXattr(), } if *allowOther { mountOptions = append(mountOptions, fuse.AllowOther()) } if *allowRoot { mountOptions = append(mountOptions, fuse.AllowRoot()) } if *ro { mountOptions = append(mountOptions, fuse.ReadOnly()) } // Mount the file system to start receiving FS events at the mount point. logger.WithField("location", mountPoint).Info("mounting kvfs") conn, err := fuse.Mount(mountPoint, mountOptions...) if err != nil { logrus.NewEntry(logger).WithError(err).Fatal("error mounting kvfs") } defer conn.Close() // Try to cleanly unmount the FS if SIGINT or SIGTERM is received sigs := make(chan os.Signal, 10) signal.Notify(sigs, os.Interrupt, syscall.SIGTERM) go func() { for sig := range sigs { logger.WithField("signal", sig).Info("attempting to unmount") err := fuse.Unmount(mountPoint) if err != nil { logrus.NewEntry(logger).WithError(err).Error("cannot unmount") } } }() // Create a file system object and start handing its requests server := fs.New(conn, &fs.Config{ Debug: func(m interface{}) { logger.Debug(m) }, WithContext: func(ctx context.Context, req fuse.Request) context.Context { // The returned cancel function doesn't matter: the request handler will // cancel the parent context at the end of the request. newCtx, _ := context.WithTimeout(ctx, timeoutDuration) return newCtx }, }) f := &consulfs.ConsulFS{ Consul: &consulfs.CancelConsulKV{ Client: client, Logger: logger, }, Logger: logger, UID: uint32(*uid), GID: uint32(*gid), Perms: os.FileMode(*perm), RootPath: *root, } err = server.Serve(f) if err != nil { // Not sure what would cause Serve() to exit with an error logrus.NewEntry(logger).WithError(err).Error("error serving filesystem") } // Wait for the FUSE connection to end <-conn.Ready if conn.MountError != nil { logrus.NewEntry(logger).WithError(conn.MountError).Error("unmount error") os.Exit(1) } else { logger.Info("file system exiting normally") } }
func run() error { flag.Usage = usage flag.Parse() if *debug { fuse.Debug = func(v interface{}) { log.Println("[fuse]", v) } } var subdir, mountpoint string switch flag.NArg() { case 1: subdir = "/" mountpoint = flag.Arg(0) case 2: subdir = path.Join("/", flag.Arg(0)) mountpoint = flag.Arg(1) default: usage() os.Exit(1) } var endpoints []string if ep := os.Getenv("ETCD_ENDPOINTS"); ep != "" { endpoints = strings.Split(ep, ",") } else { endpoints = []string{"localhost:4001"} } log.Printf("Using endpoints %v", endpoints) cfg := client.Config{ Endpoints: endpoints, } etcd, err := client.New(cfg) if err != nil { return err } var mountOpts []fuse.MountOption if *allowOther { mountOpts = append(mountOpts, fuse.AllowOther()) } if *allowRoot { mountOpts = append(mountOpts, fuse.AllowRoot()) } mountOpts = append(mountOpts, fuse.DefaultPermissions()) mountOpts = append(mountOpts, fuse.FSName("etcd:"+subdir)) mountOpts = append(mountOpts, fuse.ReadOnly()) mountOpts = append(mountOpts, fuse.Subtype("etcdFS")) log.Printf("Mounting etcd:%s to %s", subdir, mountpoint) c, err := fuse.Mount( mountpoint, mountOpts..., ) if err != nil { return err } defer c.Close() srv := fs.New(c, nil) filesys := &etcdFS{ etcd: client.NewKeysAPI(etcd), base: subdir, } errch := make(chan error) log.Printf("Start serving") go func() { errch <- srv.Serve(filesys) }() <-c.Ready if c.MountError != nil { return c.MountError } sigs := make(chan os.Signal) signal.Notify(sigs, syscall.SIGHUP, syscall.SIGINT, syscall.SIGKILL, syscall.SIGTERM) select { case err := <-errch: return err case s := <-sigs: log.Printf("Caught signal: %v", s) err := c.Close() log.Printf("Error: %v", err) return err } }