Fixed: Mount handling logic of net namespaces as seen on QNAP.

fixes #1483
pull/2/head
Taloth Saldono 8 years ago
parent 9519f3137c
commit 0411b82e65

@ -74,7 +74,7 @@ namespace NzbDrone.Mono.Disk
{ {
_logger.Debug(ex, "Failed to get filesystem types from {0}, using default set.", PROC_FILESYSTEMS_FILENAME); _logger.Debug(ex, "Failed to get filesystem types from {0}, using default set.", PROC_FILESYSTEMS_FILENAME);
} }
if (result.Empty()) if (result.Empty())
{ {
foreach (var type in _fixedTypes) foreach (var type in _fixedTypes)
@ -96,6 +96,7 @@ namespace NzbDrone.Mono.Disk
if (split.Length != 6) if (split.Length != 6)
{ {
_logger.Debug("Unable to parse {0} line: {1}", PROC_MOUNTS_FILENAME, line); _logger.Debug("Unable to parse {0} line: {1}", PROC_MOUNTS_FILENAME, line);
return null;
} }
var name = split[0]; var name = split[0];
@ -103,6 +104,13 @@ namespace NzbDrone.Mono.Disk
var type = split[2]; var type = split[2];
var options = ParseOptions(split[3]); var options = ParseOptions(split[3]);
if (!mount.StartsWith("/"))
{
// Possible a namespace like 'net:[1234]'.
// But we just filter anything not starting with /, we're not interested in anything that isn't mounted somewhere.
return null;
}
var driveType = FindDriveType.Find(type); var driveType = FindDriveType.Find(type);
if (name.StartsWith("/dev/") || GetFileSystems().GetValueOrDefault(type, false)) if (name.StartsWith("/dev/") || GetFileSystems().GetValueOrDefault(type, false))

Loading…
Cancel
Save