]> git.proxmox.com Git - pve-storage.git/blob - PVE/Storage/CIFSPlugin.pm
cifs: negotiates the highest SMB2+ version supported by default
[pve-storage.git] / PVE / Storage / CIFSPlugin.pm
1 package PVE::Storage::CIFSPlugin;
2
3 use strict;
4 use warnings;
5 use Net::IP;
6 use PVE::Tools qw(run_command);
7 use PVE::ProcFSTools;
8 use File::Path;
9 use PVE::Storage::Plugin;
10 use PVE::JSONSchema qw(get_standard_option);
11
12 use base qw(PVE::Storage::Plugin);
13
14 # CIFS helper functions
15
16 sub cifs_is_mounted {
17 my ($server, $share, $mountpoint, $mountdata) = @_;
18
19 $server = "[$server]" if Net::IP::ip_is_ipv6($server);
20 my $source = "//${server}/$share";
21 $mountdata = PVE::ProcFSTools::parse_proc_mounts() if !$mountdata;
22
23 return $mountpoint if grep {
24 $_->[2] =~ /^cifs/ &&
25 $_->[0] =~ m|^\Q$source\E/?$| &&
26 $_->[1] eq $mountpoint
27 } @$mountdata;
28 return undef;
29 }
30
31 sub cifs_cred_file_name {
32 my ($storeid) = @_;
33 return "/etc/pve/priv/storage/${storeid}.pw";
34 }
35
36 sub cifs_delete_credentials {
37 my ($storeid) = @_;
38
39 if (my $cred_file = get_cred_file($storeid)) {
40 unlink($cred_file) or warn "removing cifs credientials '$cred_file' failed: $!\n";
41 }
42 }
43
44 sub cifs_set_credentials {
45 my ($password, $storeid) = @_;
46
47 my $cred_file = cifs_cred_file_name($storeid);
48 mkdir "/etc/pve/priv/storage";
49
50 PVE::Tools::file_set_contents($cred_file, "password=$password\n");
51
52 return $cred_file;
53 }
54
55 sub get_cred_file {
56 my ($storeid) = @_;
57
58 my $cred_file = cifs_cred_file_name($storeid);
59
60 if (-e $cred_file) {
61 return $cred_file;
62 }
63 return undef;
64 }
65
66 sub cifs_mount {
67 my ($server, $share, $mountpoint, $storeid, $smbver, $user, $domain) = @_;
68
69 $server = "[$server]" if Net::IP::ip_is_ipv6($server);
70 my $source = "//${server}/$share";
71
72 my $cmd = ['/bin/mount', '-t', 'cifs', $source, $mountpoint, '-o', 'soft', '-o'];
73
74 if (my $cred_file = get_cred_file($storeid)) {
75 push @$cmd, "username=$user", '-o', "credentials=$cred_file";
76 push @$cmd, '-o', "domain=$domain" if defined($domain);
77 } else {
78 push @$cmd, 'guest,username=guest';
79 }
80
81 push @$cmd, '-o', defined($smbver) ? "vers=$smbver" : "vers=default";
82
83 run_command($cmd, errmsg => "mount error");
84 }
85
86 # Configuration
87
88 sub type {
89 return 'cifs';
90 }
91
92 sub plugindata {
93 return {
94 content => [ { images => 1, rootdir => 1, vztmpl => 1, iso => 1,
95 backup => 1, snippets => 1}, { images => 1 }],
96 format => [ { raw => 1, qcow2 => 1, vmdk => 1 } , 'raw' ],
97 };
98 }
99
100 sub properties {
101 return {
102 share => {
103 description => "CIFS share.",
104 type => 'string',
105 },
106 password => {
107 description => "Password for accessing the share/datastore.",
108 type => 'string',
109 maxLength => 256,
110 },
111 domain => {
112 description => "CIFS domain.",
113 type => 'string',
114 optional => 1,
115 maxLength => 256,
116 },
117 smbversion => {
118 description => "SMB protocol version. 'default' if not set, negotiates the highest SMB2+"
119 ." version supported by both the client and server.",
120 type => 'string',
121 default => 'default',
122 enum => ['default', '2.0', '2.1', '3', '3.0', '3.11'],
123 optional => 1,
124 },
125 };
126 }
127
128 sub options {
129 return {
130 path => { fixed => 1 },
131 server => { fixed => 1 },
132 share => { fixed => 1 },
133 nodes => { optional => 1 },
134 disable => { optional => 1 },
135 maxfiles => { optional => 1 },
136 'prune-backups' => { optional => 1 },
137 content => { optional => 1 },
138 format => { optional => 1 },
139 username => { optional => 1 },
140 password => { optional => 1},
141 domain => { optional => 1},
142 smbversion => { optional => 1},
143 mkdir => { optional => 1 },
144 bwlimit => { optional => 1 },
145 };
146 }
147
148
149 sub check_config {
150 my ($class, $sectionId, $config, $create, $skipSchemaCheck) = @_;
151
152 $config->{path} = "/mnt/pve/$sectionId" if $create && !$config->{path};
153
154 return $class->SUPER::check_config($sectionId, $config, $create, $skipSchemaCheck);
155 }
156
157 # Storage implementation
158
159 sub on_add_hook {
160 my ($class, $storeid, $scfg, %sensitive) = @_;
161
162 if (defined($sensitive{password})) {
163 cifs_set_credentials($sensitive{password}, $storeid);
164 if (!exists($scfg->{username})) {
165 warn "storage $storeid: ignoring password parameter, no user set\n";
166 }
167 } else {
168 cifs_delete_credentials($storeid);
169 }
170
171 return;
172 }
173
174 sub on_update_hook {
175 my ($class, $storeid, $scfg, %sensitive) = @_;
176
177 return if !exists($sensitive{password});
178
179 if (defined($sensitive{password})) {
180 cifs_set_credentials($sensitive{password}, $storeid);
181 if (!exists($scfg->{username})) {
182 warn "storage $storeid: ignoring password parameter, no user set\n";
183 }
184 } else {
185 cifs_delete_credentials($storeid);
186 }
187
188 return;
189 }
190
191 sub on_delete_hook {
192 my ($class, $storeid, $scfg) = @_;
193
194 cifs_delete_credentials($storeid);
195
196 return;
197 }
198
199 sub status {
200 my ($class, $storeid, $scfg, $cache) = @_;
201
202 $cache->{mountdata} = PVE::ProcFSTools::parse_proc_mounts()
203 if !$cache->{mountdata};
204
205 my $path = $scfg->{path};
206 my $server = $scfg->{server};
207 my $share = $scfg->{share};
208
209 return undef
210 if !cifs_is_mounted($server, $share, $path, $cache->{mountdata});
211
212 return $class->SUPER::status($storeid, $scfg, $cache);
213 }
214
215 sub activate_storage {
216 my ($class, $storeid, $scfg, $cache) = @_;
217
218 $cache->{mountdata} = PVE::ProcFSTools::parse_proc_mounts()
219 if !$cache->{mountdata};
220
221 my $path = $scfg->{path};
222 my $server = $scfg->{server};
223 my $share = $scfg->{share};
224
225 if (!cifs_is_mounted($server, $share, $path, $cache->{mountdata})) {
226
227 mkpath $path if !(defined($scfg->{mkdir}) && !$scfg->{mkdir});
228
229 die "unable to activate storage '$storeid' - " .
230 "directory '$path' does not exist\n" if ! -d $path;
231
232 cifs_mount($server, $share, $path, $storeid, $scfg->{smbversion},
233 $scfg->{username}, $scfg->{domain});
234 }
235
236 $class->SUPER::activate_storage($storeid, $scfg, $cache);
237 }
238
239 sub deactivate_storage {
240 my ($class, $storeid, $scfg, $cache) = @_;
241
242 $cache->{mountdata} = PVE::ProcFSTools::parse_proc_mounts()
243 if !$cache->{mountdata};
244
245 my $path = $scfg->{path};
246 my $server = $scfg->{server};
247 my $share = $scfg->{share};
248
249 if (cifs_is_mounted($server, $share, $path, $cache->{mountdata})) {
250 my $cmd = ['/bin/umount', $path];
251 run_command($cmd, errmsg => 'umount error');
252 }
253 }
254
255 sub check_connection {
256 my ($class, $storeid, $scfg) = @_;
257
258 my $servicename = '//'.$scfg->{server}.'/'.$scfg->{share};
259
260 my $cmd = ['/usr/bin/smbclient', $servicename, '-d', '0'];
261
262 if (defined($scfg->{smbversion}) && $scfg->{smbversion} ne 'default') {
263 # max-protocol version, so basically only relevant for smb2 vs smb3
264 push @$cmd, '-m', "smb" . int($scfg->{smbversion});
265 }
266
267 if (my $cred_file = get_cred_file($storeid)) {
268 push @$cmd, '-U', $scfg->{username}, '-A', $cred_file;
269 push @$cmd, '-W', $scfg->{domain} if defined($scfg->{domain});
270 } else {
271 push @$cmd, '-U', 'Guest','-N';
272 }
273 push @$cmd, '-c', 'echo 1 0';
274
275 my $out_str;
276 my $out = sub { $out_str .= shift };
277
278 eval { run_command($cmd, timeout => 10, outfunc => $out, errfunc => sub {}) };
279
280 if (my $err = $@) {
281 die "$out_str\n" if defined($out_str) &&
282 ($out_str =~ m/NT_STATUS_ACCESS_DENIED/);
283 return 0;
284 }
285
286 return 1;
287 }
288
289 sub get_volume_notes {
290 my $class = shift;
291 PVE::Storage::DirPlugin::get_volume_notes($class, @_);
292 }
293 sub update_volume_notes {
294 my $class = shift;
295 PVE::Storage::DirPlugin::update_volume_notes($class, @_);
296 }
297
298 1;