@@ -6,6 +6,8 @@ use std::fs::create_dir_all;
6
6
use std:: fs:: File ;
7
7
use std:: io:: Read ;
8
8
use std:: os:: unix:: fs:: PermissionsExt ;
9
+ use std:: path:: PathBuf ;
10
+ use std:: process:: Command ;
9
11
10
12
use serde:: Deserialize ;
11
13
use serde_xml_rs:: from_str;
@@ -66,18 +68,85 @@ fn default_preprov_type() -> String {
66
68
"None" . to_owned ( )
67
69
}
68
70
69
- pub fn make_temp_directory ( ) -> Result < ( ) , Box < dyn std :: error :: Error > > {
70
- let file_path = "/run/azure-init/tmp /" ;
71
+ pub const PATH_MOUNT_DEVICE : & str = "/dev/sr0" ;
72
+ pub const PATH_MOUNT_POINT : & str = "/run/azure-init/media /" ;
71
73
72
- create_dir_all ( file_path) ?;
74
+ // Some zero-sized structs that just provide states for our state machine
75
+ pub struct Mounted ;
76
+ pub struct Unmounted ;
73
77
74
- let metadata = fs:: metadata ( file_path) ?;
75
- let permissions = metadata. permissions ( ) ;
76
- let mut new_permissions = permissions. clone ( ) ;
77
- new_permissions. set_mode ( 0o700 ) ;
78
- fs:: set_permissions ( file_path, new_permissions) ?;
78
+ pub struct Media < State = Unmounted > {
79
+ device_path : PathBuf ,
80
+ mount_path : PathBuf ,
81
+ state : std:: marker:: PhantomData < State > ,
82
+ }
83
+
84
+ impl Media < Unmounted > {
85
+ pub fn new ( device_path : PathBuf , mount_path : PathBuf ) -> Media < Unmounted > {
86
+ Media {
87
+ device_path,
88
+ mount_path,
89
+ state : std:: marker:: PhantomData ,
90
+ }
91
+ }
92
+
93
+ // The only thing you can do with the Media struct is call mount which, if it succeeds,
94
+ // moves it into the Mounted state. From there the only thing you can do with it is
95
+ // call unmount(), but you could make other functionality available by adding to the
96
+ // impl Media<Mounted> block.
97
+ pub fn mount ( self ) -> Result < Media < Mounted > , Error > {
98
+ create_dir_all ( & self . mount_path ) ?;
99
+
100
+ let metadata = fs:: metadata ( & self . mount_path ) ?;
101
+ let permissions = metadata. permissions ( ) ;
102
+ let mut new_permissions = permissions. clone ( ) ;
103
+ new_permissions. set_mode ( 0o700 ) ;
104
+ fs:: set_permissions ( & self . mount_path , new_permissions) ?;
105
+
106
+ let mount_status = Command :: new ( "mount" )
107
+ . arg ( "-o" )
108
+ . arg ( "ro" )
109
+ . arg ( & self . device_path )
110
+ . arg ( & self . mount_path )
111
+ . status ( ) ?;
79
112
80
- Ok ( ( ) )
113
+ if !mount_status. success ( ) {
114
+ Err ( Error :: SubprocessFailed {
115
+ command : "mount" . to_string ( ) ,
116
+ status : mount_status,
117
+ } )
118
+ } else {
119
+ Ok ( Media {
120
+ device_path : self . device_path ,
121
+ mount_path : self . mount_path ,
122
+ state : std:: marker:: PhantomData ,
123
+ } )
124
+ }
125
+ }
126
+ }
127
+
128
+ impl Media < Mounted > {
129
+ pub fn unmount ( self ) -> Result < ( ) , Error > {
130
+ let umount_status =
131
+ Command :: new ( "umount" ) . arg ( self . mount_path ) . status ( ) ?;
132
+ if !umount_status. success ( ) {
133
+ return Err ( Error :: SubprocessFailed {
134
+ command : "umount" . to_string ( ) ,
135
+ status : umount_status,
136
+ } ) ;
137
+ }
138
+
139
+ let eject_status =
140
+ Command :: new ( "eject" ) . arg ( self . device_path ) . status ( ) ?;
141
+ if !eject_status. success ( ) {
142
+ Err ( Error :: SubprocessFailed {
143
+ command : "eject" . to_string ( ) ,
144
+ status : eject_status,
145
+ } )
146
+ } else {
147
+ Ok ( ( ) )
148
+ }
149
+ }
81
150
}
82
151
83
152
pub fn read_ovf_env_to_string ( ) -> Result < String , Error > {
0 commit comments