123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673 |
- package main
- import (
- "encoding/json"
- "errors"
- "io/ioutil"
- "log"
- "net/http"
- "os"
- "path/filepath"
- "strings"
- "time"
- "imuslab.com/arozos/mod/database"
- "imuslab.com/arozos/mod/permission"
- "imuslab.com/arozos/mod/storage/bridge"
- "github.com/tidwall/pretty"
- fs "imuslab.com/arozos/mod/filesystem"
- prout "imuslab.com/arozos/mod/prouter"
- storage "imuslab.com/arozos/mod/storage"
- )
- /*
- Storage Pool Handler
- author: tobychui
- This script handle the storage pool editing of different permission groups
- */
- func StoragePoolEditorInit() {
- adminRouter := prout.NewModuleRouter(prout.RouterOption{
- ModuleName: "System Settings",
- AdminOnly: true,
- UserHandler: userHandler,
- DeniedHandler: func(w http.ResponseWriter, r *http.Request) {
- sendErrorResponse(w, "Permission Denied")
- },
- })
- adminRouter.HandleFunc("/system/storage/pool/list", HandleListStoragePools)
- adminRouter.HandleFunc("/system/storage/pool/listraw", HandleListStoragePoolsConfig)
- adminRouter.HandleFunc("/system/storage/pool/newHandler", HandleStorageNewFsHandler)
- adminRouter.HandleFunc("/system/storage/pool/removeHandler", HandleStoragePoolRemove)
- adminRouter.HandleFunc("/system/storage/pool/reload", HandleStoragePoolReload)
- adminRouter.HandleFunc("/system/storage/pool/toggle", HandleFSHToggle)
- adminRouter.HandleFunc("/system/storage/pool/edit", HandleFSHEdit)
- adminRouter.HandleFunc("/system/storage/pool/bridge", HandleFSHBridging)
- adminRouter.HandleFunc("/system/storage/pool/checkBridge", HandleFSHBridgeCheck)
- }
- //Handle editing of a given File System Handler
- func HandleFSHEdit(w http.ResponseWriter, r *http.Request) {
- opr, _ := mv(r, "opr", false)
- uuid, err := mv(r, "uuid", false)
- if err != nil {
- sendErrorResponse(w, "Invalid UUID")
- return
- }
- group, err := mv(r, "group", false)
- if err != nil {
- sendErrorResponse(w, "Invalid group given")
- return
- }
- if opr == "get" {
- //Load
- fshOption, err := getFSHConfigFromGroupAndUUID(group, uuid)
- if err != nil {
- sendErrorResponse(w, err.Error())
- return
- }
- //Hide the password info
- fshOption.Username = ""
- fshOption.Password = ""
- //Return as JSON
- js, _ := json.Marshal(fshOption)
- sendJSONResponse(w, string(js))
- return
- } else if opr == "set" {
- //Set
- newFsOption := buildOptionFromRequestForm(r)
- //log.Println(newFsOption)
- //Read and remove the original settings from the config file
- err := setFSHConfigByGroupAndId(group, uuid, newFsOption)
- if err != nil {
- errmsg, _ := json.Marshal(err.Error())
- http.Redirect(w, r, "../../../SystemAO/storage/updateError.html#"+string(errmsg), 307)
- } else {
- http.Redirect(w, r, "../../../SystemAO/storage/updateComplete.html#"+group, 307)
- }
- } else {
- //Unknown
- sendErrorResponse(w, "Unknown opr given")
- return
- }
- }
- //Get the FSH configuration for the given group and uuid
- func getFSHConfigFromGroupAndUUID(group string, uuid string) (*fs.FileSystemOption, error) {
- //Spot the desired config file
- targerFile := ""
- if group == "system" {
- targerFile = "./system/storage.json"
- } else {
- targerFile = "./system/storage/" + group + ".json"
- }
- //Check if file exists.
- if !fileExists(targerFile) {
- log.Println("Config file not found: ", targerFile)
- return nil, errors.New("Configuration file not found")
- }
- if !fileExists(filepath.Dir(targerFile)) {
- os.MkdirAll(filepath.Dir(targerFile), 0775)
- }
- //Load and parse the file
- configContent, err := ioutil.ReadFile(targerFile)
- if err != nil {
- return nil, err
- }
- loadedConfig := []fs.FileSystemOption{}
- err = json.Unmarshal(configContent, &loadedConfig)
- if err != nil {
- log.Println("Request to parse config error: "+err.Error(), targerFile)
- return nil, err
- }
- //Look for the target fsh uuid
- for _, thisFshConfig := range loadedConfig {
- if thisFshConfig.Uuid == uuid {
- return &thisFshConfig, nil
- }
- }
- return nil, errors.New("No FSH config found with the uuid")
- }
- func setFSHConfigByGroupAndId(group string, uuid string, options fs.FileSystemOption) error {
- //Spot the desired config file
- targerFile := ""
- if group == "system" {
- targerFile = "./system/storage.json"
- } else {
- targerFile = "./system/storage/" + group + ".json"
- }
- //Check if file exists.
- if !fileExists(targerFile) {
- log.Println("Config file not found: ", targerFile)
- return errors.New("Configuration file not found")
- }
- if !fileExists(filepath.Dir(targerFile)) {
- os.MkdirAll(filepath.Dir(targerFile), 0775)
- }
- //Load and parse the file
- configContent, err := ioutil.ReadFile(targerFile)
- if err != nil {
- return err
- }
- loadedConfig := []fs.FileSystemOption{}
- err = json.Unmarshal(configContent, &loadedConfig)
- if err != nil {
- log.Println("Request to parse config error: "+err.Error(), targerFile)
- return err
- }
- //Filter the old fs handler option with given uuid
- newConfig := []fs.FileSystemOption{}
- for _, fso := range loadedConfig {
- if fso.Uuid != uuid {
- newConfig = append(newConfig, fso)
- }
- }
- //Append the new fso to config
- newConfig = append(newConfig, options)
- //Write config back to file
- js, _ := json.MarshalIndent(newConfig, "", " ")
- return ioutil.WriteFile(targerFile, js, 0775)
- }
- //Handle Storage Pool toggle on-off
- func HandleFSHToggle(w http.ResponseWriter, r *http.Request) {
- fsh, _ := mv(r, "fsh", true)
- if fsh == "" {
- sendErrorResponse(w, "Invalid File System Handler ID")
- return
- }
- group, _ := mv(r, "group", true)
- if group == "" {
- sendErrorResponse(w, "Invalid group ID")
- return
- }
- //Check if group exists
- if group != "system" && !permissionHandler.GroupExists(group) {
- sendErrorResponse(w, "Group not exists")
- return
- }
- //Not allow to modify system reserved fsh
- if fsh == "user" || fsh == "tmp" {
- sendErrorResponse(w, "Cannot toggle system reserved File System Handler")
- return
- }
- //Check if fsh exists
- var targetpg *permission.PermissionGroup
- var storagePool *storage.StoragePool
- if group == "system" {
- //System storage pool.
- storagePool = baseStoragePool
- } else {
- targetpg = permissionHandler.GetPermissionGroupByName(group)
- storagePool = targetpg.StoragePool
- }
- var targetFSH *fs.FileSystemHandler
- for _, thisFsh := range storagePool.Storages {
- if thisFsh.UUID == fsh {
- targetFSH = thisFsh
- }
- }
- //Target File System Handler not found
- if targetFSH == nil {
- sendErrorResponse(w, "Target File System Handler not found, given: "+fsh)
- return
- }
- if targetFSH.Closed == true {
- //Reopen the fsh database and set this to false
- aofsPath := filepath.ToSlash(filepath.Clean(targetFSH.Path)) + "/aofs.db"
- conn, err := database.NewDatabase(aofsPath, false)
- if err != nil {
- sendErrorResponse(w, "Filesystme database startup failed")
- return
- }
- targetFSH.FilesystemDatabase = conn
- targetFSH.Closed = false
- } else {
- //Close the fsh database and set this to true
- targetFSH.FilesystemDatabase.Close()
- targetFSH.Closed = true
- }
- //Give it some time to finish unloading
- time.Sleep(1 * time.Second)
- //Return ok
- sendOK(w)
- }
- //Handle reload of storage pool
- func HandleStoragePoolReload(w http.ResponseWriter, r *http.Request) {
- pool, _ := mv(r, "pool", true)
- //Basepool super long string just to prevent any typo
- if pool == "1eb201a3-d0f6-6630-5e6d-2f40480115c5" {
- //Reload ALL storage pools
- //Reload basepool
- baseStoragePool.Close()
- emptyPool := storage.StoragePool{}
- baseStoragePool = &emptyPool
- fsHandlers = []*fs.FileSystemHandler{}
- //Start BasePool again
- err := LoadBaseStoragePool()
- if err != nil {
- log.Println(err.Error())
- } else {
- //Update userHandler's basePool
- userHandler.UpdateStoragePool(baseStoragePool)
- }
- //Reload all permission group's pool
- for _, pg := range permissionHandler.PermissionGroups {
- log.Println("Reloading Storage Pool for: " + pg.Name)
- //Pool should be exists. Close it
- pg.StoragePool.Close()
- //Create an empty pool for this permission group
- newEmptyPool := storage.StoragePool{}
- pg.StoragePool = &newEmptyPool
- //Recreate a new pool for this permission group
- //If there is no handler in config, the empty one will be kept
- LoadStoragePoolForGroup(pg)
- }
- BridgeStoragePoolInit()
- } else {
- if pool == "system" {
- //Reload basepool
- baseStoragePool.Close()
- emptyPool := storage.StoragePool{}
- baseStoragePool = &emptyPool
- fsHandlers = []*fs.FileSystemHandler{}
- //Start BasePool again
- err := LoadBaseStoragePool()
- if err != nil {
- log.Println(err.Error())
- } else {
- //Update userHandler's basePool
- userHandler.UpdateStoragePool(baseStoragePool)
- }
- BridgeStoragePoolForGroup("system")
- } else {
- //Reload the given storage pool
- if !permissionHandler.GroupExists(pool) {
- sendErrorResponse(w, "Permission Pool owner not exists")
- return
- }
- log.Println("Reloading Storage Pool for: " + pool)
- //Pool should be exists. Close it
- pg := permissionHandler.GetPermissionGroupByName(pool)
- pg.StoragePool.Close()
- //Create an empty pool for this permission group
- newEmptyPool := storage.StoragePool{}
- pg.StoragePool = &newEmptyPool
- //Recreate a new pool for this permission group
- //If there is no handler in config, the empty one will be kept
- LoadStoragePoolForGroup(pg)
- BridgeStoragePoolForGroup(pg.Name)
- }
- }
- sendOK(w)
- }
- func HandleStoragePoolRemove(w http.ResponseWriter, r *http.Request) {
- groupname, err := mv(r, "group", true)
- if err != nil {
- sendErrorResponse(w, "group not defined")
- return
- }
- uuid, err := mv(r, "uuid", true)
- if err != nil {
- sendErrorResponse(w, "File system handler UUID not defined")
- return
- }
- targetConfigFile := "./system/storage.json"
- if groupname == "system" {
- if uuid == "user" || uuid == "tmp" {
- sendErrorResponse(w, "Cannot remove system reserved file system handlers")
- return
- }
- //Ok to continue
- } else {
- //Check group exists
- if !permissionHandler.GroupExists(groupname) {
- sendErrorResponse(w, "Group not exists")
- return
- }
- targetConfigFile = "./system/storage/" + groupname + ".json"
- if !fileExists(targetConfigFile) {
- //No config. Create an empty one
- initConfig := []fs.FileSystemOption{}
- js, _ := json.MarshalIndent(initConfig, "", " ")
- ioutil.WriteFile(targetConfigFile, js, 0775)
- }
- }
- //Check if this handler is bridged handler
- bridged, _ := bridgeManager.IsBridgedFSH(uuid, groupname)
- if bridged {
- //Bridged FSH. Remove it from bridge config
- basePool, err := GetStoragePoolByOwner(groupname)
- if err != nil {
- sendErrorResponse(w, err.Error())
- return
- }
- err = DebridgeFSHandlerFromGroup(uuid, basePool)
- if err != nil {
- sendErrorResponse(w, err.Error())
- return
- }
- //Remove it from the config
- bridgeManager.RemoveFromConfig(uuid, groupname)
- sendOK(w)
- return
- } else {
- //Remove it from the json file
- //Read and parse from old config
- oldConfigs := []fs.FileSystemOption{}
- originalConfigFile, _ := ioutil.ReadFile(targetConfigFile)
- err = json.Unmarshal(originalConfigFile, &oldConfigs)
- if err != nil {
- sendErrorResponse(w, "Failed to parse original config file")
- return
- }
- //Generate new confic by filtering
- newConfigs := []fs.FileSystemOption{}
- for _, config := range oldConfigs {
- if config.Uuid != uuid {
- newConfigs = append(newConfigs, config)
- }
- }
- //Parse and put it into file
- if len(newConfigs) > 0 {
- js, _ := json.Marshal(newConfigs)
- resultingJson := pretty.Pretty(js)
- ioutil.WriteFile(targetConfigFile, resultingJson, 0777)
- } else {
- os.Remove(targetConfigFile)
- }
- }
- sendOK(w)
- }
- //Constract a fsoption from form
- func buildOptionFromRequestForm(r *http.Request) fs.FileSystemOption {
- r.ParseForm()
- autoMount := (r.FormValue("automount") == "on")
- newFsOption := fs.FileSystemOption{
- Name: r.FormValue("name"),
- Uuid: r.FormValue("uuid"),
- Path: r.FormValue("path"),
- Access: r.FormValue("access"),
- Hierarchy: r.FormValue("hierarchy"),
- Automount: autoMount,
- Filesystem: r.FormValue("filesystem"),
- Mountdev: r.FormValue("mountdev"),
- Mountpt: r.FormValue("mountpt"),
- Parentuid: r.FormValue("parentuid"),
- BackupMode: r.FormValue("backupmode"),
- Username: r.FormValue("username"),
- Password: r.FormValue("password"),
- }
- return newFsOption
- }
- func HandleStorageNewFsHandler(w http.ResponseWriter, r *http.Request) {
- newFsOption := buildOptionFromRequestForm(r)
- type errorObject struct {
- Message string
- Source string
- }
- //Get group from form data
- groupName := r.FormValue("group")
- //Check if group exists
- if !permissionHandler.GroupExists(groupName) && groupName != "system" {
- js, _ := json.Marshal(errorObject{
- Message: "Group not exists: " + groupName,
- Source: "",
- })
- http.Redirect(w, r, "../../../SystemAO/storage/error.html#"+string(js), 307)
- }
- //Validate the config
- err := fs.ValidateOption(&newFsOption)
- if err != nil {
- //Serve an error page
- js, _ := json.Marshal(errorObject{
- Message: err.Error(),
- Source: groupName,
- })
- http.Redirect(w, r, "../../../SystemAO/storage/error.html#"+string(js), 307)
- return
- }
- //Ok. Append to the record
- configFile := "./system/storage.json"
- if groupName != "system" {
- configFile = "./system/storage/" + groupName + ".json"
- }
- //If file exists, merge it to
- oldConfigs := []fs.FileSystemOption{}
- if fileExists(configFile) {
- originalConfigFile, _ := ioutil.ReadFile(configFile)
- err := json.Unmarshal(originalConfigFile, &oldConfigs)
- if err != nil {
- log.Println(err)
- }
- }
- oldConfigs = append(oldConfigs, newFsOption)
- //Prepare the content to be written
- js, err := json.Marshal(oldConfigs)
- resultingJson := pretty.Pretty(js)
- err = ioutil.WriteFile(configFile, resultingJson, 0775)
- if err != nil {
- //Write Error. This could sometime happens on Windows host for unknown reason
- js, _ := json.Marshal(errorObject{
- Message: err.Error(),
- Source: groupName,
- })
- http.Redirect(w, r, "../../../SystemAO/storage/error.html#"+string(js), 307)
- return
- }
- w.Header().Set("Cache-Control", "no-store, no-cache, must-revalidate, post-check=0, pre-check=0")
- http.Redirect(w, r, "../../../SystemAO/storage/poolEditor.html#"+groupName, 307)
- }
- func HandleListStoragePoolsConfig(w http.ResponseWriter, r *http.Request) {
- target, _ := mv(r, "target", false)
- if target == "" {
- target = "system"
- }
- target = strings.ReplaceAll(filepath.ToSlash(target), "/", "")
- //List the target storage pool config
- targetFile := "./system/storage.json"
- if target != "system" {
- targetFile = "./system/storage/" + target + ".json"
- }
- if !fileExists(targetFile) {
- //Assume no storage.
- nofsh := []*fs.FileSystemOption{}
- js, _ := json.Marshal(nofsh)
- sendJSONResponse(w, string(js))
- return
- }
- //Read and serve it
- configContent, err := ioutil.ReadFile(targetFile)
- if err != nil {
- sendErrorResponse(w, err.Error())
- return
- } else {
- sendJSONResponse(w, string(configContent))
- }
- }
- //Return all storage pool mounted to the system, aka base pool + pg pools
- func HandleListStoragePools(w http.ResponseWriter, r *http.Request) {
- filter, _ := mv(r, "filter", false)
- storagePools := []*storage.StoragePool{}
- if filter != "" {
- if filter == "system" {
- storagePools = append(storagePools, baseStoragePool)
- } else {
- for _, pg := range userHandler.GetPermissionHandler().PermissionGroups {
- if pg.Name == filter {
- storagePools = append(storagePools, pg.StoragePool)
- }
- }
- }
- } else {
- //Add the base pool into the list
- storagePools = append(storagePools, baseStoragePool)
- for _, pg := range userHandler.GetPermissionHandler().PermissionGroups {
- storagePools = append(storagePools, pg.StoragePool)
- }
- }
- js, _ := json.Marshal(storagePools)
- sendJSONResponse(w, string(js))
- }
- //Handler for bridging two FSH, require admin permission
- func HandleFSHBridging(w http.ResponseWriter, r *http.Request) {
- //Get the target pool and fsh to bridge
- basePool, err := mv(r, "base", true)
- if err != nil {
- sendErrorResponse(w, "Invalid base pool")
- return
- }
- //Add the target FSH into the base pool
- basePoolObject, err := GetStoragePoolByOwner(basePool)
- if err != nil {
- log.Println("Bridge FSH failed: ", err.Error())
- sendErrorResponse(w, "Storage pool not found")
- return
- }
- targetFSH, err := mv(r, "fsh", true)
- if err != nil {
- sendErrorResponse(w, "Invalid fsh given")
- return
- }
- fsh, err := GetFsHandlerByUUID(targetFSH)
- if err != nil {
- sendErrorResponse(w, "Given FSH UUID does not exists")
- return
- }
- err = BridgeFSHandlerToGroup(fsh, basePoolObject)
- if err != nil {
- sendErrorResponse(w, err.Error())
- return
- }
- bridgeConfig := bridge.BridgeConfig{
- FSHUUID: fsh.UUID,
- SPOwner: basePoolObject.Owner,
- }
- //Write changes to file
- err = bridgeManager.AppendToConfig(&bridgeConfig)
- if err != nil {
- sendErrorResponse(w, err.Error())
- return
- }
- sendOK(w)
- }
- func HandleFSHBridgeCheck(w http.ResponseWriter, r *http.Request) {
- basePool, err := mv(r, "base", true)
- if err != nil {
- sendErrorResponse(w, "Invalid base pool")
- return
- }
- fsh, err := mv(r, "fsh", true)
- if err != nil {
- sendErrorResponse(w, "Invalid fsh UUID")
- return
- }
- isBridged, err := bridgeManager.IsBridgedFSH(fsh, basePool)
- if err != nil {
- sendErrorResponse(w, err.Error())
- return
- }
- js, _ := json.Marshal(isBridged)
- sendJSONResponse(w, string(js))
- }
|