/* _____ _____ _____ ____ ______ _____ ------ | | | | | | | | | | | | | | | | | | | | | | | | | | | --- | | | | |-----| |---- | | |-----| |----- ------ | | | | | | | | | | | | | | ____| |_____ | ____| | ____| | |_____| _____| |_____ |_____ Licensed under the MIT License . Copyright © 2020-2024 Microsoft Corporation. All rights reserved. Author : Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE */ package cmd import ( "bytes" "context" "errors" "fmt" "net/http" _ "net/http/pprof" "os" "os/signal" "path/filepath" "runtime" "runtime/debug" "runtime/pprof" "strconv" "strings" "syscall" "time" "github.com/Azure/azure-storage-fuse/v2/common" "github.com/Azure/azure-storage-fuse/v2/common/config" "github.com/Azure/azure-storage-fuse/v2/common/log" "github.com/Azure/azure-storage-fuse/v2/internal" "github.com/sevlyar/go-daemon" "github.com/spf13/cobra" ) type LogOptions struct { Type string `config:"type" yaml:"type,omitempty"` LogLevel string `config:"level" yaml:"level,omitempty"` LogFilePath string `config:"file-path" yaml:"file-path,omitempty"` MaxLogFileSize uint64 `config:"max-file-size-mb" yaml:"max-file-size-mb,omitempty"` LogFileCount uint64 `config:"file-count" yaml:"file-count,omitempty"` TimeTracker bool `config:"track-time" yaml:"track-time,omitempty"` } type mountOptions struct { MountPath string ConfigFile string Logging LogOptions `config:"logging"` Components []string `config:"components"` Foreground bool `config:"foreground"` NonEmpty bool `config:"nonempty"` DefaultWorkingDir string `config:"default-working-dir"` CPUProfile string `config:"cpu-profile"` MemProfile string `config:"mem-profile"` PassPhrase string `config:"passphrase"` SecureConfig bool `config:"secure-config"` DynamicProfiler bool `config:"dynamic-profile"` ProfilerPort int `config:"profiler-port"` ProfilerIP string `config:"profiler-ip"` MonitorOpt monitorOptions `config:"health_monitor"` WaitForMount time.Duration `config:"wait-for-mount"` LazyWrite bool `config:"lazy-write"` // v1 support Streaming bool `config:"streaming"` AttrCache bool `config:"use-attr-cache"` LibfuseOptions []string `config:"libfuse-options"` BlockCache bool `config:"block-cache"` } var options mountOptions func (opt *mountOptions) validate(skipNonEmptyMount bool) error { if opt.MountPath == "" { return fmt.Errorf("mount path not provided") } if _, err := os.Stat(opt.MountPath); os.IsNotExist(err) { return fmt.Errorf("mount directory does not exists") } else if common.IsDirectoryMounted(opt.MountPath) { // Try to cleanup the stale mount log.Info("Mount::validate : Mount directory is already mounted, trying to cleanup") active, err := common.IsMountActive(opt.MountPath) if active || err != nil { // Previous mount is still active so we need to fail this mount return fmt.Errorf("directory is already mounted") } else { // Previous mount is in stale state so lets cleanup the state log.Info("Mount::validate : Cleaning up stale mount") if err = unmountBlobfuse2(opt.MountPath); err != nil { return fmt.Errorf("directory is already mounted, unmount manually before remount [%v]", err.Error()) } // Clean up the file-cache temp directory if any var tempCachePath string _ = config.UnmarshalKey("file_cache.path", &tempCachePath) var cleanupOnStart bool _ = config.UnmarshalKey("file_cache.cleanup-on-start", &cleanupOnStart) if tempCachePath != "" && !cleanupOnStart { if err = common.TempCacheCleanup(tempCachePath); err != nil { return fmt.Errorf("failed to cleanup file cache [%s]", err.Error()) } } } } else if !skipNonEmptyMount && !common.IsDirectoryEmpty(opt.MountPath) { return fmt.Errorf("mount directory is not empty") } if err := common.ELogLevel.Parse(opt.Logging.LogLevel); err != nil { return fmt.Errorf("invalid log level [%s]", err.Error()) } if opt.DefaultWorkingDir != "" { common.DefaultWorkDir = opt.DefaultWorkingDir if opt.Logging.LogFilePath == common.DefaultLogFilePath { // If default-working-dir is set then default log path shall be set to that path // Ignore if specific log-path is provided by user opt.Logging.LogFilePath = filepath.Join(common.DefaultWorkDir, "blobfuse2.log") } common.DefaultLogFilePath = filepath.Join(common.DefaultWorkDir, "blobfuse2.log") } f, err := os.Stat(common.ExpandPath(common.DefaultWorkDir)) if err == nil && !f.IsDir() { return fmt.Errorf("default work dir '%s' is not a directory", common.DefaultWorkDir) } if err != nil && os.IsNotExist(err) { // create the default work dir if err = os.MkdirAll(common.ExpandPath(common.DefaultWorkDir), 0777); err != nil { return fmt.Errorf("failed to create default work dir [%s]", err.Error()) } } opt.Logging.LogFilePath = common.ExpandPath(opt.Logging.LogFilePath) if !common.DirectoryExists(filepath.Dir(opt.Logging.LogFilePath)) { err := os.MkdirAll(filepath.Dir(opt.Logging.LogFilePath), os.FileMode(0776)|os.ModeDir) if err != nil { return fmt.Errorf("invalid log file path [%s]", err.Error()) } } // A user provided value of 0 doesn't make sense for MaxLogFileSize or LogFileCount. if opt.Logging.MaxLogFileSize == 0 { opt.Logging.MaxLogFileSize = common.DefaultMaxLogFileSize } if opt.Logging.LogFileCount == 0 { opt.Logging.LogFileCount = common.DefaultLogFileCount } return nil } func OnConfigChange() { newLogOptions := &LogOptions{} err := config.UnmarshalKey("logging", newLogOptions) if err != nil { log.Err("Mount::OnConfigChange : Invalid logging options [%s]", err.Error()) } var logLevel common.LogLevel err = logLevel.Parse(newLogOptions.LogLevel) if err != nil { log.Err("Mount::OnConfigChange : Invalid log level [%s]", newLogOptions.LogLevel) } err = log.SetConfig(common.LogConfig{ Level: logLevel, FilePath: common.ExpandPath(newLogOptions.LogFilePath), MaxFileSize: newLogOptions.MaxLogFileSize, FileCount: newLogOptions.LogFileCount, TimeTracker: newLogOptions.TimeTracker, }) if err != nil { log.Err("Mount::OnConfigChange : Unable to reset Logging options [%s]", err.Error()) } } // parseConfig : Based on config file or encrypted data parse the provided config func parseConfig() error { options.ConfigFile = common.ExpandPath(options.ConfigFile) // Based on extension decide file is encrypted or not if options.SecureConfig || filepath.Ext(options.ConfigFile) == SecureConfigExtension { // Validate config is to be secured on write or not if options.PassPhrase == "" { options.PassPhrase = os.Getenv(SecureConfigEnvName) } if options.PassPhrase == "" { return fmt.Errorf("no passphrase provided to decrypt the config file.\n Either use --passphrase cli option or store passphrase in BLOBFUSE2_SECURE_CONFIG_PASSPHRASE environment variable") } cipherText, err := os.ReadFile(options.ConfigFile) if err != nil { return fmt.Errorf("failed to read encrypted config file %s [%s]", options.ConfigFile, err.Error()) } plainText, err := common.DecryptData(cipherText, []byte(options.PassPhrase)) if err != nil { return fmt.Errorf("failed to decrypt config file %s [%s]", options.ConfigFile, err.Error()) } config.SetConfigFile(options.ConfigFile) config.SetSecureConfigOptions(options.PassPhrase) err = config.ReadFromConfigBuffer(plainText) if err != nil { return fmt.Errorf("invalid decrypted config file [%s]", err.Error()) } } else { err := config.ReadFromConfigFile(options.ConfigFile) if err != nil { return fmt.Errorf("invalid config file [%s]", err.Error()) } } return nil } var mountCmd = &cobra.Command{ Use: "mount [path]", Short: "Mounts the azure container as a filesystem", Long: "Mounts the azure container as a filesystem", SuggestFor: []string{"mnt", "mout"}, Args: cobra.ExactArgs(1), FlagErrorHandling: cobra.ExitOnError, RunE: func(_ *cobra.Command, args []string) error { options.MountPath = common.ExpandPath(args[0]) common.MountPath = options.MountPath configFileExists := true if options.ConfigFile == "" { // Config file is not set in cli parameters // Blobfuse2 defaults to config.yaml in current directory // If the file does not exists then user might have configured required things in env variables // Fall back to defaults and let components fail if all required env variables are not set. _, err := os.Stat(common.DefaultConfigFilePath) if err != nil && os.IsNotExist(err) { configFileExists = false } else { options.ConfigFile = common.DefaultConfigFilePath } } if configFileExists { err := parseConfig() if err != nil { return err } } err := config.Unmarshal(&options) if err != nil { return fmt.Errorf("failed to unmarshal config [%s]", err.Error()) } if !configFileExists || len(options.Components) == 0 { pipeline := []string{"libfuse"} if config.IsSet("streaming") && options.Streaming { pipeline = append(pipeline, "stream") } else if config.IsSet("block-cache") && options.BlockCache { pipeline = append(pipeline, "block_cache") } else { pipeline = append(pipeline, "file_cache") } // by default attr-cache is enable in v2 // only way to disable is to pass cli param and set it to false if options.AttrCache { pipeline = append(pipeline, "attr_cache") } pipeline = append(pipeline, "azstorage") options.Components = pipeline } if config.IsSet("libfuse-options") { for _, v := range options.LibfuseOptions { parameter := strings.Split(v, "=") if len(parameter) > 2 || len(parameter) <= 0 { return errors.New(common.FuseAllowedFlags) } v = strings.TrimSpace(v) if ignoreFuseOptions(v) { continue } else if v == "allow_other" || v == "allow_other=true" { config.Set("allow-other", "true") } else if strings.HasPrefix(v, "attr_timeout=") { config.Set("lfuse.attribute-expiration-sec", parameter[1]) } else if strings.HasPrefix(v, "entry_timeout=") { config.Set("lfuse.entry-expiration-sec", parameter[1]) } else if strings.HasPrefix(v, "negative_timeout=") { config.Set("lfuse.negative-entry-expiration-sec", parameter[1]) } else if v == "ro" || v == "ro=true" { config.Set("read-only", "true") } else if v == "allow_root" || v == "allow_root=true" { config.Set("allow-root", "true") } else if v == "nonempty" || v == "nonempty=true" { // For fuse3, -o nonempty mount option has been removed and // mounting over non-empty directories is now always allowed. // For fuse2, this option is supported. options.NonEmpty = true config.Set("nonempty", "true") } else if strings.HasPrefix(v, "umask=") { umask, err := strconv.ParseUint(parameter[1], 10, 32) if err != nil { return fmt.Errorf("failed to parse umask [%s]", err.Error()) } config.Set("lfuse.umask", fmt.Sprint(umask)) } else if strings.HasPrefix(v, "uid=") { val, err := strconv.ParseUint(parameter[1], 10, 32) if err != nil { return fmt.Errorf("failed to parse uid [%s]", err.Error()) } config.Set("lfuse.uid", fmt.Sprint(val)) } else if strings.HasPrefix(v, "gid=") { val, err := strconv.ParseUint(parameter[1], 10, 32) if err != nil { return fmt.Errorf("failed to parse gid [%s]", err.Error()) } config.Set("lfuse.gid", fmt.Sprint(val)) } else if v == "direct_io" || v == "direct_io=true" { config.Set("lfuse.direct-io", "true") } else { return errors.New(common.FuseAllowedFlags) } } } if !config.IsSet("logging.file-path") { options.Logging.LogFilePath = common.DefaultLogFilePath } if !config.IsSet("logging.level") { options.Logging.LogLevel = "LOG_WARNING" } err = options.validate(options.NonEmpty) if err != nil { return err } var logLevel common.LogLevel err = logLevel.Parse(options.Logging.LogLevel) if err != nil { return fmt.Errorf("invalid log level [%s]", err.Error()) } err = log.SetDefaultLogger(options.Logging.Type, common.LogConfig{ FilePath: options.Logging.LogFilePath, MaxFileSize: options.Logging.MaxLogFileSize, FileCount: options.Logging.LogFileCount, Level: logLevel, TimeTracker: options.Logging.TimeTracker, }) if err != nil { return fmt.Errorf("failed to initialize logger [%s]", err.Error()) } if !disableVersionCheck { err := VersionCheck() if err != nil { log.Err(err.Error()) } } if config.IsSet("invalidate-on-sync") { log.Warn("mount: unsupported v1 CLI parameter: invalidate-on-sync is always true in blobfuse2.") } if config.IsSet("pre-mount-validate") { log.Warn("mount: unsupported v1 CLI parameter: pre-mount-validate is always true in blobfuse2.") } if config.IsSet("basic-remount-check") { log.Warn("mount: unsupported v1 CLI parameter: basic-remount-check is always true in blobfuse2.") } common.EnableMonitoring = options.MonitorOpt.EnableMon // check if blobfuse stats monitor is added in the disable list for _, mon := range options.MonitorOpt.DisableList { if mon == common.BfuseStats { common.BfsDisabled = true break } } config.Set("mount-path", options.MountPath) var pipeline *internal.Pipeline log.Crit("Starting Blobfuse2 Mount : %s on [%s]", common.Blobfuse2Version, common.GetCurrentDistro()) log.Info("Mount Command: %s", os.Args) log.Crit("Logging level set to : %s", logLevel.String()) log.Debug("Mount allowed on nonempty path : %v", options.NonEmpty) pipeline, err = internal.NewPipeline(options.Components, !daemon.WasReborn()) if err != nil { if err.Error() == "Azure CLI not found on path" { log.Err("mount : failed to initialize new pipeline :: To authenticate using MSI with object-ID, ensure Azure CLI is installed. Alternatively, use app/client ID or resource ID for authentication. [%v]", err) return Destroy(fmt.Sprintf("failed to initialize new pipeline :: To authenticate using MSI with object-ID, ensure Azure CLI is installed. Alternatively, use app/client ID or resource ID for authentication. [%s]", err.Error())) } else { log.Err("mount : failed to initialize new pipeline [%v]", err) return Destroy(fmt.Sprintf("failed to initialize new pipeline [%s]", err.Error())) } } common.ForegroundMount = options.Foreground log.Info("mount: Mounting blobfuse2 on %s", options.MountPath) if !options.Foreground { pidFile := strings.Replace(options.MountPath, "/", "_", -1) + ".pid" pidFileName := filepath.Join(os.ExpandEnv(common.DefaultWorkDir), pidFile) pid := os.Getpid() fname := fmt.Sprintf("/tmp/blobfuse2.%v", pid) dmnCtx := &daemon.Context{ PidFileName: pidFileName, PidFilePerm: 0644, Umask: 022, LogFileName: fname, // this will redirect stderr of child to given file } ctx, _ := context.WithCancel(context.Background()) //nolint // Signal handlers for parent and child to communicate success or failures in mount var sigusr2, sigchild chan os.Signal if !daemon.WasReborn() { // execute in parent only sigusr2 = make(chan os.Signal, 1) signal.Notify(sigusr2, syscall.SIGUSR2) sigchild = make(chan os.Signal, 1) signal.Notify(sigchild, syscall.SIGCHLD) } else { // execute in child only daemon.SetSigHandler(sigusrHandler(pipeline, ctx), syscall.SIGUSR1, syscall.SIGUSR2) go func() { _ = daemon.ServeSignals() }() } child, err := dmnCtx.Reborn() if err != nil { log.Err("mount : failed to daemonize application [%v]", err) return Destroy(fmt.Sprintf("failed to daemonize application [%s]", err.Error())) } log.Debug("mount: foreground disabled, child = %v", daemon.WasReborn()) if child == nil { // execute in child only defer dmnCtx.Release() // nolint setGOConfig() go startDynamicProfiler() // In case of failure stderr will have the error emitted by child and parent will read // those logs from the file set in daemon context return runPipeline(pipeline, ctx) } else { // execute in parent only defer os.Remove(fname) select { case <-sigusr2: log.Info("mount: Child [%v] mounted successfully at %s", child.Pid, options.MountPath) case <-sigchild: // Get error string from the child, stderr or child was redirected to a file log.Info("mount: Child [%v] terminated from %s", child.Pid, options.MountPath) buff, err := os.ReadFile(dmnCtx.LogFileName) if err != nil { log.Err("mount: failed to read child [%v] failure logs [%s]", child.Pid, err.Error()) return Destroy(fmt.Sprintf("failed to mount, please check logs [%s]", err.Error())) } else { return Destroy(string(buff)) } case <-time.After(options.WaitForMount): log.Info("mount: Child [%v : %s] status check timeout", child.Pid, options.MountPath) } _ = log.Destroy() } } else { if options.CPUProfile != "" { os.Remove(options.CPUProfile) f, err := os.Create(options.CPUProfile) if err != nil { fmt.Printf("Error opening file for cpuprofile [%s]", err.Error()) } defer f.Close() if err := pprof.StartCPUProfile(f); err != nil { fmt.Printf("Failed to start cpuprofile [%s]", err.Error()) } defer pprof.StopCPUProfile() } setGOConfig() go startDynamicProfiler() log.Debug("mount: foreground enabled") err = runPipeline(pipeline, context.Background()) if err != nil { return err } if options.MemProfile != "" { os.Remove(options.MemProfile) f, err := os.Create(options.MemProfile) if err != nil { fmt.Printf("Error opening file for memprofile [%s]", err.Error()) } defer f.Close() runtime.GC() if err = pprof.WriteHeapProfile(f); err != nil { fmt.Printf("Error memory profiling [%s]", err.Error()) } } } return nil }, ValidArgsFunction: func(cmd *cobra.Command, args []string, toComplete string) ([]string, cobra.ShellCompDirective) { return nil, cobra.ShellCompDirectiveDefault }, } func ignoreFuseOptions(opt string) bool { for _, o := range common.FuseIgnoredFlags() { // Flags like uid and gid come with value so exact string match is not correct in that case. if strings.HasPrefix(opt, o) { return true } } return false } func runPipeline(pipeline *internal.Pipeline, ctx context.Context) error { pid := fmt.Sprintf("%v", os.Getpid()) common.TransferPipe += "_" + pid common.PollingPipe += "_" + pid log.Debug("Mount::runPipeline : blobfuse2 pid = %v, transfer pipe = %v, polling pipe = %v", pid, common.TransferPipe, common.PollingPipe) go startMonitor(os.Getpid()) err := pipeline.Start(ctx) if err != nil { log.Err("mount: error unable to start pipeline [%s]", err.Error()) return Destroy(fmt.Sprintf("unable to start pipeline [%s]", err.Error())) } err = pipeline.Stop() if err != nil { log.Err("mount: error unable to stop pipeline [%s]", err.Error()) return Destroy(fmt.Sprintf("unable to stop pipeline [%s]", err.Error())) } _ = log.Destroy() return nil } func startMonitor(pid int) { if common.EnableMonitoring { log.Debug("Mount::startMonitor : pid = %v, config-file = %v", pid, options.ConfigFile) buf := new(bytes.Buffer) rootCmd.SetOut(buf) rootCmd.SetErr(buf) rootCmd.SetArgs([]string{"health-monitor", fmt.Sprintf("--pid=%v", pid), fmt.Sprintf("--config-file=%s", options.ConfigFile)}) err := rootCmd.Execute() if err != nil { common.EnableMonitoring = false log.Err("Mount::startMonitor : [%s]", err.Error()) } } } func sigusrHandler(pipeline *internal.Pipeline, ctx context.Context) daemon.SignalHandlerFunc { return func(sig os.Signal) error { log.Crit("Mount::sigusrHandler : Signal %d received", sig) var err error if sig == syscall.SIGUSR1 { log.Crit("Mount::sigusrHandler : SIGUSR1 received") config.OnConfigChange() } return err } } func setGOConfig() { // Ensure we always have more than 1 OS thread running goroutines, since there are issues with having just 1. isOnlyOne := runtime.GOMAXPROCS(0) == 1 if isOnlyOne { runtime.GOMAXPROCS(2) } // Golang's default behaviour is to GC when new objects = (100% of) total of objects surviving previous GC. // Set it to lower level so that memory if freed up early debug.SetGCPercent(80) } func startDynamicProfiler() { if !options.DynamicProfiler { return } if options.ProfilerIP == "" { // By default enable profiler on 127.0.0.1 options.ProfilerIP = "localhost" } if options.ProfilerPort == 0 { // This is default go profiler port options.ProfilerPort = 6060 } connStr := fmt.Sprintf("%s:%d", options.ProfilerIP, options.ProfilerPort) log.Info("Mount::startDynamicProfiler : Staring profiler on [%s]", connStr) // To check dynamic profiling info http://:/debug/pprof // for e.g. for default config use http://localhost:6060/debug/pprof // Also CLI based profiler can be used // e.g. go tool pprof http://localhost:6060/debug/pprof/heap // go tool pprof http://localhost:6060/debug/pprof/profile?seconds=30 // go tool pprof http://localhost:6060/debug/pprof/block // err := http.ListenAndServe(connStr, nil) if err != nil { log.Err("Mount::startDynamicProfiler : Failed to start dynamic profiler [%s]", err.Error()) } } func init() { rootCmd.AddCommand(mountCmd) options = mountOptions{} mountCmd.AddCommand(mountListCmd) mountCmd.AddCommand(mountAllCmd) mountCmd.PersistentFlags().StringVar(&options.ConfigFile, "config-file", "", "Configures the path for the file where the account credentials are provided. Default is config.yaml in current directory.") _ = mountCmd.MarkPersistentFlagFilename("config-file", "yaml") mountCmd.PersistentFlags().BoolVar(&options.SecureConfig, "secure-config", false, "Encrypt auto generated config file for each container") mountCmd.PersistentFlags().StringVar(&options.PassPhrase, "passphrase", "", "Key to decrypt config file. Can also be specified by env-variable BLOBFUSE2_SECURE_CONFIG_PASSPHRASE.\nKey length shall be 16 (AES-128), 24 (AES-192), or 32 (AES-256) bytes in length.") mountCmd.PersistentFlags().String("log-type", "syslog", "Type of logger to be used by the system. Set to syslog by default. Allowed values are silent|syslog|base.") config.BindPFlag("logging.type", mountCmd.PersistentFlags().Lookup("log-type")) _ = mountCmd.RegisterFlagCompletionFunc("log-type", func(cmd *cobra.Command, args []string, toComplete string) ([]string, cobra.ShellCompDirective) { return []string{"silent", "base", "syslog"}, cobra.ShellCompDirectiveNoFileComp }) mountCmd.PersistentFlags().String("log-level", "LOG_WARNING", "Enables logs written to syslog. Set to LOG_WARNING by default. Allowed values are LOG_OFF|LOG_CRIT|LOG_ERR|LOG_WARNING|LOG_INFO|LOG_DEBUG") config.BindPFlag("logging.level", mountCmd.PersistentFlags().Lookup("log-level")) _ = mountCmd.RegisterFlagCompletionFunc("log-level", func(cmd *cobra.Command, args []string, toComplete string) ([]string, cobra.ShellCompDirective) { return []string{"LOG_OFF", "LOG_CRIT", "LOG_ERR", "LOG_WARNING", "LOG_INFO", "LOG_TRACE", "LOG_DEBUG"}, cobra.ShellCompDirectiveNoFileComp }) mountCmd.PersistentFlags().String("log-file-path", common.DefaultLogFilePath, "Configures the path for log files. Default is "+common.DefaultLogFilePath) config.BindPFlag("logging.file-path", mountCmd.PersistentFlags().Lookup("log-file-path")) _ = mountCmd.MarkPersistentFlagDirname("log-file-path") mountCmd.PersistentFlags().Bool("foreground", false, "Mount the system in foreground mode. Default value false.") config.BindPFlag("foreground", mountCmd.PersistentFlags().Lookup("foreground")) mountCmd.PersistentFlags().Bool("read-only", false, "Mount the system in read only mode. Default value false.") config.BindPFlag("read-only", mountCmd.PersistentFlags().Lookup("read-only")) mountCmd.PersistentFlags().Bool("lazy-write", false, "Async write to storage container after file handle is closed.") config.BindPFlag("lazy-write", mountCmd.PersistentFlags().Lookup("lazy-write")) mountCmd.PersistentFlags().String("default-working-dir", "", "Default working directory for storing log files and other blobfuse2 information") mountCmd.PersistentFlags().Lookup("default-working-dir").Hidden = true config.BindPFlag("default-working-dir", mountCmd.PersistentFlags().Lookup("default-working-dir")) _ = mountCmd.MarkPersistentFlagDirname("default-working-dir") mountCmd.Flags().BoolVar(&options.Streaming, "streaming", false, "Enable Streaming.") config.BindPFlag("streaming", mountCmd.Flags().Lookup("streaming")) mountCmd.Flags().Lookup("streaming").Hidden = true mountCmd.Flags().BoolVar(&options.BlockCache, "block-cache", false, "Enable Block-Cache.") config.BindPFlag("block-cache", mountCmd.Flags().Lookup("block-cache")) mountCmd.Flags().Lookup("block-cache").Hidden = true mountCmd.Flags().BoolVar(&options.AttrCache, "use-attr-cache", true, "Use attribute caching.") config.BindPFlag("use-attr-cache", mountCmd.Flags().Lookup("use-attr-cache")) mountCmd.Flags().Lookup("use-attr-cache").Hidden = true mountCmd.Flags().Bool("invalidate-on-sync", true, "Invalidate file/dir on sync/fsync.") config.BindPFlag("invalidate-on-sync", mountCmd.Flags().Lookup("invalidate-on-sync")) mountCmd.Flags().Lookup("invalidate-on-sync").Hidden = true mountCmd.Flags().Bool("pre-mount-validate", true, "Validate blobfuse2 is mounted.") config.BindPFlag("pre-mount-validate", mountCmd.Flags().Lookup("pre-mount-validate")) mountCmd.Flags().Lookup("pre-mount-validate").Hidden = true mountCmd.Flags().Bool("basic-remount-check", true, "Validate blobfuse2 is mounted by reading /etc/mtab.") config.BindPFlag("basic-remount-check", mountCmd.Flags().Lookup("basic-remount-check")) mountCmd.Flags().Lookup("basic-remount-check").Hidden = true mountCmd.PersistentFlags().StringSliceVarP(&options.LibfuseOptions, "o", "o", []string{}, "FUSE options.") config.BindPFlag("libfuse-options", mountCmd.PersistentFlags().ShorthandLookup("o")) mountCmd.PersistentFlags().ShorthandLookup("o").Hidden = true mountCmd.PersistentFlags().DurationVar(&options.WaitForMount, "wait-for-mount", 5*time.Second, "Let parent process wait for given timeout before exit") config.AttachToFlagSet(mountCmd.PersistentFlags()) config.AttachFlagCompletions(mountCmd) config.AddConfigChangeEventListener(config.ConfigChangeEventHandlerFunc(OnConfigChange)) } func Destroy(message string) error { _ = log.Destroy() return fmt.Errorf("%s", message) }