2016-05-07 00:42:50 +00:00
|
|
|
// Copyright (c) 2016-present, Facebook, Inc. All rights reserved.
|
2017-07-15 23:03:42 +00:00
|
|
|
// This source code is licensed under both the GPLv2 (found in the
|
|
|
|
// COPYING file in the root directory) and Apache 2.0 License
|
|
|
|
// (found in the LICENSE.Apache file in the root directory).
|
2016-05-07 00:42:50 +00:00
|
|
|
|
2023-01-27 21:14:19 +00:00
|
|
|
#if !defined(OS_WIN)
|
2016-05-07 00:42:50 +00:00
|
|
|
|
2017-04-06 02:02:00 +00:00
|
|
|
#include "env/env_chroot.h"
|
2016-05-07 00:42:50 +00:00
|
|
|
|
Make backups openable as read-only DBs (#8142)
Summary:
A current limitation of backups is that you don't know the
exact database state of when the backup was taken. With this new
feature, you can at least inspect the backup's DB state without
restoring it by opening it as a read-only DB.
Rather than add something like OpenAsReadOnlyDB to the BackupEngine API,
which would inhibit opening stackable DB implementations read-only
(if/when their APIs support it), we instead provide a DB name and Env
that can be used to open as a read-only DB.
Possible follow-up work:
* Add a version of GetBackupInfo for a single backup.
* Let CreateNewBackup return the BackupID of the newly-created backup.
Implementation details:
Refactored ChrootFileSystem to split off new base class RemapFileSystem,
which allows more general remapping of files. We use this base class to
implement BackupEngineImpl::RemapSharedFileSystem.
To minimize API impact, I decided to just add these fields `name_for_open`
and `env_for_open` to those set by GetBackupInfo when
include_file_details=true. Creating the RemapSharedFileSystem adds a bit
to the memory consumption, perhaps unnecessarily in some cases, but this
has been mitigated by (a) only initialize the RemapSharedFileSystem
lazily when GetBackupInfo with include_file_details=true is called, and
(b) using the existing `shared_ptr<FileInfo>` objects to hold most of the
mapping data.
To enhance API safety, RemapSharedFileSystem is wrapped by new
ReadOnlyFileSystem which rejects any attempts to write. This uncovered a
couple of places in which DB::OpenForReadOnly would write to the
filesystem, so I fixed these. Added a release note because this affects
logging.
Additional minor refactoring in backupable_db.cc to support the new
functionality.
Pull Request resolved: https://github.com/facebook/rocksdb/pull/8142
Test Plan:
new test (run with ASAN and UBSAN), added to stress test and
ran it for a while with amplified backup_one_in
Reviewed By: ajkr
Differential Revision: D27535408
Pulled By: pdillinger
fbshipit-source-id: 04666d310aa0261ef6b2385c43ca793ce1dfd148
2021-04-06 21:36:45 +00:00
|
|
|
#include <errno.h> // errno
|
|
|
|
#include <stdlib.h> // realpath, free
|
|
|
|
#include <unistd.h> // geteuid
|
2016-05-07 00:42:50 +00:00
|
|
|
|
2021-03-16 02:48:36 +00:00
|
|
|
#include "env/composite_env_wrapper.h"
|
Make backups openable as read-only DBs (#8142)
Summary:
A current limitation of backups is that you don't know the
exact database state of when the backup was taken. With this new
feature, you can at least inspect the backup's DB state without
restoring it by opening it as a read-only DB.
Rather than add something like OpenAsReadOnlyDB to the BackupEngine API,
which would inhibit opening stackable DB implementations read-only
(if/when their APIs support it), we instead provide a DB name and Env
that can be used to open as a read-only DB.
Possible follow-up work:
* Add a version of GetBackupInfo for a single backup.
* Let CreateNewBackup return the BackupID of the newly-created backup.
Implementation details:
Refactored ChrootFileSystem to split off new base class RemapFileSystem,
which allows more general remapping of files. We use this base class to
implement BackupEngineImpl::RemapSharedFileSystem.
To minimize API impact, I decided to just add these fields `name_for_open`
and `env_for_open` to those set by GetBackupInfo when
include_file_details=true. Creating the RemapSharedFileSystem adds a bit
to the memory consumption, perhaps unnecessarily in some cases, but this
has been mitigated by (a) only initialize the RemapSharedFileSystem
lazily when GetBackupInfo with include_file_details=true is called, and
(b) using the existing `shared_ptr<FileInfo>` objects to hold most of the
mapping data.
To enhance API safety, RemapSharedFileSystem is wrapped by new
ReadOnlyFileSystem which rejects any attempts to write. This uncovered a
couple of places in which DB::OpenForReadOnly would write to the
filesystem, so I fixed these. Added a release note because this affects
logging.
Additional minor refactoring in backupable_db.cc to support the new
functionality.
Pull Request resolved: https://github.com/facebook/rocksdb/pull/8142
Test Plan:
new test (run with ASAN and UBSAN), added to stress test and
ran it for a while with amplified backup_one_in
Reviewed By: ajkr
Differential Revision: D27535408
Pulled By: pdillinger
fbshipit-source-id: 04666d310aa0261ef6b2385c43ca793ce1dfd148
2021-04-06 21:36:45 +00:00
|
|
|
#include "env/fs_remap.h"
|
2021-11-02 16:06:02 +00:00
|
|
|
#include "rocksdb/utilities/options_type.h"
|
Make backups openable as read-only DBs (#8142)
Summary:
A current limitation of backups is that you don't know the
exact database state of when the backup was taken. With this new
feature, you can at least inspect the backup's DB state without
restoring it by opening it as a read-only DB.
Rather than add something like OpenAsReadOnlyDB to the BackupEngine API,
which would inhibit opening stackable DB implementations read-only
(if/when their APIs support it), we instead provide a DB name and Env
that can be used to open as a read-only DB.
Possible follow-up work:
* Add a version of GetBackupInfo for a single backup.
* Let CreateNewBackup return the BackupID of the newly-created backup.
Implementation details:
Refactored ChrootFileSystem to split off new base class RemapFileSystem,
which allows more general remapping of files. We use this base class to
implement BackupEngineImpl::RemapSharedFileSystem.
To minimize API impact, I decided to just add these fields `name_for_open`
and `env_for_open` to those set by GetBackupInfo when
include_file_details=true. Creating the RemapSharedFileSystem adds a bit
to the memory consumption, perhaps unnecessarily in some cases, but this
has been mitigated by (a) only initialize the RemapSharedFileSystem
lazily when GetBackupInfo with include_file_details=true is called, and
(b) using the existing `shared_ptr<FileInfo>` objects to hold most of the
mapping data.
To enhance API safety, RemapSharedFileSystem is wrapped by new
ReadOnlyFileSystem which rejects any attempts to write. This uncovered a
couple of places in which DB::OpenForReadOnly would write to the
filesystem, so I fixed these. Added a release note because this affects
logging.
Additional minor refactoring in backupable_db.cc to support the new
functionality.
Pull Request resolved: https://github.com/facebook/rocksdb/pull/8142
Test Plan:
new test (run with ASAN and UBSAN), added to stress test and
ran it for a while with amplified backup_one_in
Reviewed By: ajkr
Differential Revision: D27535408
Pulled By: pdillinger
fbshipit-source-id: 04666d310aa0261ef6b2385c43ca793ce1dfd148
2021-04-06 21:36:45 +00:00
|
|
|
#include "util/string_util.h" // errnoStr
|
2016-05-07 00:42:50 +00:00
|
|
|
|
2020-02-20 20:07:53 +00:00
|
|
|
namespace ROCKSDB_NAMESPACE {
|
2021-03-16 02:48:36 +00:00
|
|
|
namespace {
|
2021-11-02 16:06:02 +00:00
|
|
|
static std::unordered_map<std::string, OptionTypeInfo> chroot_fs_type_info = {
|
|
|
|
{"chroot_dir", {0, OptionType::kString}}};
|
|
|
|
} // namespace
|
|
|
|
ChrootFileSystem::ChrootFileSystem(const std::shared_ptr<FileSystem>& base,
|
|
|
|
const std::string& chroot_dir)
|
|
|
|
: RemapFileSystem(base), chroot_dir_(chroot_dir) {
|
|
|
|
RegisterOptions("chroot_dir", &chroot_dir_, &chroot_fs_type_info);
|
|
|
|
}
|
|
|
|
|
|
|
|
Status ChrootFileSystem::PrepareOptions(const ConfigOptions& options) {
|
|
|
|
Status s = FileSystemWrapper::PrepareOptions(options);
|
|
|
|
if (!s.ok()) {
|
|
|
|
return s;
|
|
|
|
} else if (chroot_dir_.empty()) {
|
|
|
|
s = Status::InvalidArgument("ChRootFileSystem requires a chroot dir");
|
|
|
|
} else {
|
|
|
|
s = target_->FileExists(chroot_dir_, IOOptions(), nullptr);
|
|
|
|
}
|
|
|
|
if (s.ok()) {
|
2017-04-22 03:41:37 +00:00
|
|
|
#if defined(OS_AIX)
|
|
|
|
char resolvedName[PATH_MAX];
|
2021-11-02 16:06:02 +00:00
|
|
|
char* real_chroot_dir = realpath(chroot_dir_.c_str(), resolvedName);
|
2017-04-22 03:41:37 +00:00
|
|
|
#else
|
2021-11-02 16:06:02 +00:00
|
|
|
char* real_chroot_dir = realpath(chroot_dir_.c_str(), nullptr);
|
2017-04-22 03:41:37 +00:00
|
|
|
#endif
|
2016-05-10 16:53:52 +00:00
|
|
|
// chroot_dir must exist so realpath() returns non-nullptr.
|
|
|
|
assert(real_chroot_dir != nullptr);
|
|
|
|
chroot_dir_ = real_chroot_dir;
|
2017-04-22 03:41:37 +00:00
|
|
|
#if !defined(OS_AIX)
|
2016-05-10 16:53:52 +00:00
|
|
|
free(real_chroot_dir);
|
2017-04-22 03:41:37 +00:00
|
|
|
#endif
|
2016-05-10 16:53:52 +00:00
|
|
|
}
|
2021-11-02 16:06:02 +00:00
|
|
|
return s;
|
|
|
|
}
|
2016-05-07 00:42:50 +00:00
|
|
|
|
2021-11-02 16:06:02 +00:00
|
|
|
IOStatus ChrootFileSystem::GetTestDirectory(const IOOptions& options,
|
|
|
|
std::string* path,
|
|
|
|
IODebugContext* dbg) {
|
|
|
|
// Adapted from PosixEnv's implementation since it doesn't provide a way to
|
|
|
|
// create directory in the chroot.
|
|
|
|
char buf[256];
|
|
|
|
snprintf(buf, sizeof(buf), "/rocksdbtest-%d", static_cast<int>(geteuid()));
|
|
|
|
*path = buf;
|
|
|
|
|
|
|
|
// Directory may already exist, so ignore return
|
|
|
|
return CreateDirIfMissing(*path, options, dbg);
|
|
|
|
}
|
2016-05-07 00:42:50 +00:00
|
|
|
|
2022-10-25 00:54:14 +00:00
|
|
|
// Returns status and expanded absolute path including the chroot directory.
|
|
|
|
// Checks whether the provided path breaks out of the chroot. If it returns
|
|
|
|
// non-OK status, the returned path should not be used.
|
2021-11-02 16:06:02 +00:00
|
|
|
std::pair<IOStatus, std::string> ChrootFileSystem::EncodePath(
|
|
|
|
const std::string& path) {
|
|
|
|
if (path.empty() || path[0] != '/') {
|
|
|
|
return {IOStatus::InvalidArgument(path, "Not an absolute path"), ""};
|
|
|
|
}
|
|
|
|
std::pair<IOStatus, std::string> res;
|
|
|
|
res.second = chroot_dir_ + path;
|
2017-04-22 03:41:37 +00:00
|
|
|
#if defined(OS_AIX)
|
2022-10-25 00:54:14 +00:00
|
|
|
char resolvedName[PATH_MAX];
|
|
|
|
char* normalized_path = realpath(res.second.c_str(), resolvedName);
|
2017-04-22 03:41:37 +00:00
|
|
|
#else
|
2022-10-25 00:54:14 +00:00
|
|
|
char* normalized_path = realpath(res.second.c_str(), nullptr);
|
2017-04-22 03:41:37 +00:00
|
|
|
#endif
|
2022-10-25 00:54:14 +00:00
|
|
|
if (normalized_path == nullptr) {
|
|
|
|
res.first = IOStatus::NotFound(res.second, errnoStr(errno).c_str());
|
|
|
|
} else if (strlen(normalized_path) < chroot_dir_.size() ||
|
|
|
|
strncmp(normalized_path, chroot_dir_.c_str(),
|
|
|
|
chroot_dir_.size()) != 0) {
|
|
|
|
res.first = IOStatus::IOError(res.second,
|
|
|
|
"Attempted to access path outside chroot");
|
|
|
|
} else {
|
|
|
|
res.first = IOStatus::OK();
|
|
|
|
}
|
2017-04-22 03:41:37 +00:00
|
|
|
#if !defined(OS_AIX)
|
2022-10-25 00:54:14 +00:00
|
|
|
free(normalized_path);
|
2017-04-22 03:41:37 +00:00
|
|
|
#endif
|
2022-10-25 00:54:14 +00:00
|
|
|
return res;
|
2021-11-02 16:06:02 +00:00
|
|
|
}
|
2016-05-07 00:42:50 +00:00
|
|
|
|
2022-10-25 00:54:14 +00:00
|
|
|
// Similar to EncodePath() except assumes the basename in the path hasn't been
|
|
|
|
// created yet.
|
2021-11-02 16:06:02 +00:00
|
|
|
std::pair<IOStatus, std::string> ChrootFileSystem::EncodePathWithNewBasename(
|
|
|
|
const std::string& path) {
|
|
|
|
if (path.empty() || path[0] != '/') {
|
|
|
|
return {IOStatus::InvalidArgument(path, "Not an absolute path"), ""};
|
|
|
|
}
|
|
|
|
// Basename may be followed by trailing slashes
|
|
|
|
size_t final_idx = path.find_last_not_of('/');
|
|
|
|
if (final_idx == std::string::npos) {
|
|
|
|
// It's only slashes so no basename to extract
|
|
|
|
return EncodePath(path);
|
2016-05-07 00:42:50 +00:00
|
|
|
}
|
|
|
|
|
2021-11-02 16:06:02 +00:00
|
|
|
// Pull off the basename temporarily since realname(3) (used by
|
|
|
|
// EncodePath()) requires a path that exists
|
|
|
|
size_t base_sep = path.rfind('/', final_idx);
|
|
|
|
auto status_and_enc_path = EncodePath(path.substr(0, base_sep + 1));
|
|
|
|
status_and_enc_path.second.append(path.substr(base_sep + 1));
|
|
|
|
return status_and_enc_path;
|
|
|
|
}
|
2021-03-16 02:48:36 +00:00
|
|
|
|
|
|
|
std::shared_ptr<FileSystem> NewChrootFileSystem(
|
|
|
|
const std::shared_ptr<FileSystem>& base, const std::string& chroot_dir) {
|
2021-11-02 16:06:02 +00:00
|
|
|
auto chroot_fs = std::make_shared<ChrootFileSystem>(base, chroot_dir);
|
|
|
|
Status s = chroot_fs->PrepareOptions(ConfigOptions());
|
|
|
|
if (s.ok()) {
|
|
|
|
return chroot_fs;
|
|
|
|
} else {
|
|
|
|
return nullptr;
|
|
|
|
}
|
2021-03-16 02:48:36 +00:00
|
|
|
}
|
2016-05-07 00:42:50 +00:00
|
|
|
|
|
|
|
Env* NewChrootEnv(Env* base_env, const std::string& chroot_dir) {
|
|
|
|
if (!base_env->FileExists(chroot_dir).ok()) {
|
|
|
|
return nullptr;
|
|
|
|
}
|
2021-11-02 16:06:02 +00:00
|
|
|
auto chroot_fs = NewChrootFileSystem(base_env->GetFileSystem(), chroot_dir);
|
|
|
|
if (chroot_fs != nullptr) {
|
|
|
|
return new CompositeEnvWrapper(base_env, chroot_fs);
|
|
|
|
} else {
|
|
|
|
return nullptr;
|
|
|
|
}
|
2016-05-07 00:42:50 +00:00
|
|
|
}
|
|
|
|
|
2020-02-20 20:07:53 +00:00
|
|
|
} // namespace ROCKSDB_NAMESPACE
|
2016-05-07 00:42:50 +00:00
|
|
|
|
2023-01-27 21:14:19 +00:00
|
|
|
#endif // !defined(OS_WIN)
|