1 //! Datastore Management
3 use std
::collections
::HashSet
;
5 use std
::os
::unix
::ffi
::OsStrExt
;
6 use std
::path
::PathBuf
;
9 use anyhow
::{bail, format_err, Error}
;
11 use hyper
::http
::request
::Parts
;
12 use hyper
::{header, Body, Response, StatusCode}
;
13 use serde
::Deserialize
;
14 use serde_json
::{json, Value}
;
15 use tokio_stream
::wrappers
::ReceiverStream
;
17 use proxmox_async
::blocking
::WrappedReaderStream
;
18 use proxmox_async
::{io::AsyncChannelWriter, stream::AsyncReaderStream}
;
19 use proxmox_compression
::zstd
::ZstdEncoder
;
21 http_err
, list_subdirs_api_method
, ApiHandler
, ApiMethod
, ApiResponseFuture
, Permission
,
22 Router
, RpcEnvironment
, RpcEnvironmentType
, SubdirMap
,
24 use proxmox_schema
::*;
25 use proxmox_sys
::fs
::{
26 file_read_firstline
, file_read_optional_string
, replace_file
, CreateOptions
,
28 use proxmox_sys
::sortable
;
29 use proxmox_sys
::{task_log, task_warn}
;
31 use pxar
::accessor
::aio
::Accessor
;
35 print_ns_and_snapshot
, Authid
, BackupContent
, BackupNamespace
, BackupType
, Counts
, CryptMode
,
36 DataStoreListItem
, DataStoreStatus
, DatastoreWithNamespace
, GarbageCollectionStatus
,
37 GroupListItem
, Operation
, PruneOptions
, RRDMode
, RRDTimeFrame
, SnapshotListItem
,
38 SnapshotVerifyState
, BACKUP_ARCHIVE_NAME_SCHEMA
, BACKUP_ID_SCHEMA
, BACKUP_NAMESPACE_SCHEMA
,
39 BACKUP_TIME_SCHEMA
, BACKUP_TYPE_SCHEMA
, DATASTORE_SCHEMA
, IGNORE_VERIFIED_BACKUPS_SCHEMA
,
40 MAX_NAMESPACE_DEPTH
, NS_MAX_DEPTH_SCHEMA
, PRIV_DATASTORE_AUDIT
, PRIV_DATASTORE_BACKUP
,
41 PRIV_DATASTORE_MODIFY
, PRIV_DATASTORE_PRUNE
, PRIV_DATASTORE_READ
, PRIV_DATASTORE_VERIFY
,
42 UPID_SCHEMA
, VERIFICATION_OUTDATED_AFTER_SCHEMA
,
44 use pbs_client
::pxar
::{create_tar, create_zip}
;
45 use pbs_config
::CachedUserInfo
;
46 use pbs_datastore
::backup_info
::BackupInfo
;
47 use pbs_datastore
::cached_chunk_reader
::CachedChunkReader
;
48 use pbs_datastore
::catalog
::{ArchiveEntry, CatalogReader}
;
49 use pbs_datastore
::data_blob
::DataBlob
;
50 use pbs_datastore
::data_blob_reader
::DataBlobReader
;
51 use pbs_datastore
::dynamic_index
::{BufferedDynamicReader, DynamicIndexReader, LocalDynamicReadAt}
;
52 use pbs_datastore
::fixed_index
::FixedIndexReader
;
53 use pbs_datastore
::index
::IndexFile
;
54 use pbs_datastore
::manifest
::{BackupManifest, CLIENT_LOG_BLOB_NAME, MANIFEST_BLOB_NAME}
;
55 use pbs_datastore
::prune
::compute_prune_info
;
57 check_backup_owner
, task_tracking
, BackupDir
, BackupGroup
, DataStore
, LocalChunkReader
,
58 StoreProgress
, CATALOG_NAME
,
60 use pbs_tools
::json
::required_string_param
;
61 use proxmox_rest_server
::{formatter, WorkerTask}
;
63 use crate::api2
::backup
::optional_ns_param
;
64 use crate::api2
::node
::rrd
::create_value_from_rrd
;
66 verify_all_backups
, verify_backup_dir
, verify_backup_group
, verify_filter
,
67 ListAccessibleBackupGroups
,
70 use crate::server
::jobstate
::Job
;
72 const GROUP_NOTES_FILE_NAME
: &str = "notes";
74 fn get_group_note_path(
77 group
: &pbs_api_types
::BackupGroup
,
79 let mut note_path
= store
.group_path(ns
, group
);
80 note_path
.push(GROUP_NOTES_FILE_NAME
);
84 // TODO: move somewhere we can reuse it from (namespace has its own copy atm.)
85 fn get_ns_privs(store_with_ns
: &DatastoreWithNamespace
, auth_id
: &Authid
) -> Result
<u64, Error
> {
86 let user_info
= CachedUserInfo
::new()?
;
88 Ok(user_info
.lookup_privs(auth_id
, &store_with_ns
.acl_path()))
91 // asserts that either either `full_access_privs` or `partial_access_privs` are fulfilled,
92 // returning value indicates whether further checks like group ownerships are required
97 full_access_privs
: u64,
98 partial_access_privs
: u64,
99 ) -> Result
<bool
, Error
> {
100 let store_with_ns
= DatastoreWithNamespace
{
101 store
: store
.to_string(),
104 let privs
= get_ns_privs(&store_with_ns
, auth_id
)?
;
106 if full_access_privs
!= 0 && (privs
& full_access_privs
) != 0 {
109 if partial_access_privs
!= 0 && (privs
& partial_access_privs
) != 0 {
113 proxmox_router
::http_bail
!(FORBIDDEN
, "permission check failed");
116 // helper to unify common sequence of checks:
117 // 1. check privs on NS (full or limited access)
119 // 3. if needed (only limited access), check owner of group
120 fn check_privs_and_load_store(
122 ns
: &BackupNamespace
,
124 full_access_privs
: u64,
125 partial_access_privs
: u64,
126 operation
: Option
<Operation
>,
127 backup_group
: &pbs_api_types
::BackupGroup
,
128 ) -> Result
<Arc
<DataStore
>, Error
> {
129 let limited
= check_ns_privs(store
, ns
, auth_id
, full_access_privs
, partial_access_privs
)?
;
131 let datastore
= DataStore
::lookup_datastore(&store
, operation
)?
;
134 let owner
= datastore
.get_owner(&ns
, backup_group
)?
;
135 check_backup_owner(&owner
, &auth_id
)?
;
141 fn read_backup_index(
142 backup_dir
: &BackupDir
,
143 ) -> Result
<(BackupManifest
, Vec
<BackupContent
>), Error
> {
144 let (manifest
, index_size
) = backup_dir
.load_manifest()?
;
146 let mut result
= Vec
::new();
147 for item
in manifest
.files() {
148 result
.push(BackupContent
{
149 filename
: item
.filename
.clone(),
150 crypt_mode
: Some(item
.crypt_mode
),
151 size
: Some(item
.size
),
155 result
.push(BackupContent
{
156 filename
: MANIFEST_BLOB_NAME
.to_string(),
157 crypt_mode
: match manifest
.signature
{
158 Some(_
) => Some(CryptMode
::SignOnly
),
159 None
=> Some(CryptMode
::None
),
161 size
: Some(index_size
),
164 Ok((manifest
, result
))
167 fn get_all_snapshot_files(
169 ) -> Result
<(BackupManifest
, Vec
<BackupContent
>), Error
> {
170 let (manifest
, mut files
) = read_backup_index(&info
.backup_dir
)?
;
172 let file_set
= files
.iter().fold(HashSet
::new(), |mut acc
, item
| {
173 acc
.insert(item
.filename
.clone());
177 for file
in &info
.files
{
178 if file_set
.contains(file
) {
181 files
.push(BackupContent
{
182 filename
: file
.to_string(),
188 Ok((manifest
, files
))
195 schema
: DATASTORE_SCHEMA
,
198 type: BackupNamespace
,
203 returns
: pbs_api_types
::ADMIN_DATASTORE_LIST_GROUPS_RETURN_TYPE
,
205 permission
: &Permission
::Anybody
,
206 description
: "Requires DATASTORE_AUDIT for all or DATASTORE_BACKUP for owned groups on \
207 /datastore/{store}[/{namespace}]",
210 /// List backup groups.
213 ns
: Option
<BackupNamespace
>,
214 rpcenv
: &mut dyn RpcEnvironment
,
215 ) -> Result
<Vec
<GroupListItem
>, Error
> {
216 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
218 let ns
= ns
.unwrap_or_default();
219 let list_all
= !check_ns_privs(
223 PRIV_DATASTORE_AUDIT
,
224 PRIV_DATASTORE_BACKUP
,
227 let datastore
= DataStore
::lookup_datastore(&store
, Some(Operation
::Read
))?
;
228 let store_with_ns
= DatastoreWithNamespace
{
229 store
: store
.to_owned(),
234 .iter_backup_groups(ns
.clone())?
// FIXME: Namespaces and recursion parameters!
235 .try_fold(Vec
::new(), |mut group_info
, group
| {
238 let owner
= match datastore
.get_owner(&ns
, group
.as_ref()) {
239 Ok(auth_id
) => auth_id
,
242 "Failed to get owner of group '{}' in {} - {}",
247 return Ok(group_info
);
250 if !list_all
&& check_backup_owner(&owner
, &auth_id
).is_err() {
251 return Ok(group_info
);
254 let snapshots
= match group
.list_backups() {
255 Ok(snapshots
) => snapshots
,
256 Err(_
) => return Ok(group_info
),
259 let backup_count
: u64 = snapshots
.len() as u64;
260 if backup_count
== 0 {
261 return Ok(group_info
);
264 let last_backup
= snapshots
266 .fold(&snapshots
[0], |a
, b
| {
267 if a
.is_finished() && a
.backup_dir
.backup_time() > b
.backup_dir
.backup_time() {
275 let note_path
= get_group_note_path(&datastore
, &ns
, group
.as_ref());
276 let comment
= file_read_firstline(¬e_path
).ok();
278 group_info
.push(GroupListItem
{
279 backup
: group
.into(),
280 last_backup
: last_backup
.backup_dir
.backup_time(),
283 files
: last_backup
.files
,
294 store
: { schema: DATASTORE_SCHEMA }
,
296 type: BackupNamespace
,
300 type: pbs_api_types
::BackupGroup
,
306 permission
: &Permission
::Anybody
,
307 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_MODIFY for any\
308 or DATASTORE_PRUNE and being the owner of the group",
311 /// Delete backup group including all snapshots.
314 ns
: Option
<BackupNamespace
>,
315 group
: pbs_api_types
::BackupGroup
,
317 rpcenv
: &mut dyn RpcEnvironment
,
318 ) -> Result
<Value
, Error
> {
319 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
321 let ns
= ns
.unwrap_or_default();
323 let datastore
= check_privs_and_load_store(
327 PRIV_DATASTORE_MODIFY
,
328 PRIV_DATASTORE_PRUNE
,
329 Some(Operation
::Write
),
333 if !datastore
.remove_backup_group(&ns
, &group
)?
{
334 bail
!("group only partially deleted due to protected snapshots");
343 store
: { schema: DATASTORE_SCHEMA }
,
345 type: BackupNamespace
,
349 type: pbs_api_types
::BackupDir
,
354 returns
: pbs_api_types
::ADMIN_DATASTORE_LIST_SNAPSHOT_FILES_RETURN_TYPE
,
356 permission
: &Permission
::Anybody
,
357 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_AUDIT or \
358 DATASTORE_READ for any or DATASTORE_BACKUP and being the owner of the group",
361 /// List snapshot files.
362 pub fn list_snapshot_files(
364 ns
: Option
<BackupNamespace
>,
365 backup_dir
: pbs_api_types
::BackupDir
,
367 rpcenv
: &mut dyn RpcEnvironment
,
368 ) -> Result
<Vec
<BackupContent
>, Error
> {
369 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
371 let ns
= ns
.unwrap_or_default();
373 let datastore
= check_privs_and_load_store(
377 PRIV_DATASTORE_AUDIT
| PRIV_DATASTORE_READ
,
378 PRIV_DATASTORE_BACKUP
,
379 Some(Operation
::Read
),
383 let snapshot
= datastore
.backup_dir(ns
, backup_dir
)?
;
385 let info
= BackupInfo
::new(snapshot
)?
;
387 let (_manifest
, files
) = get_all_snapshot_files(&info
)?
;
395 store
: { schema: DATASTORE_SCHEMA }
,
397 type: BackupNamespace
,
401 type: pbs_api_types
::BackupDir
,
407 permission
: &Permission
::Anybody
,
408 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_MODIFY for any\
409 or DATASTORE_PRUNE and being the owner of the group",
412 /// Delete backup snapshot.
413 pub fn delete_snapshot(
415 ns
: Option
<BackupNamespace
>,
416 backup_dir
: pbs_api_types
::BackupDir
,
418 rpcenv
: &mut dyn RpcEnvironment
,
419 ) -> Result
<Value
, Error
> {
420 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
422 let ns
= ns
.unwrap_or_default();
423 let datastore
= check_privs_and_load_store(
427 PRIV_DATASTORE_MODIFY
,
428 PRIV_DATASTORE_PRUNE
,
429 Some(Operation
::Write
),
433 let snapshot
= datastore
.backup_dir(ns
, backup_dir
)?
;
435 snapshot
.destroy(false)?
;
444 store
: { schema: DATASTORE_SCHEMA }
,
446 type: BackupNamespace
,
455 schema
: BACKUP_ID_SCHEMA
,
459 returns
: pbs_api_types
::ADMIN_DATASTORE_LIST_SNAPSHOTS_RETURN_TYPE
,
461 permission
: &Permission
::Anybody
,
462 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_AUDIT for any \
463 or DATASTORE_BACKUP and being the owner of the group",
466 /// List backup snapshots.
467 pub fn list_snapshots(
469 ns
: Option
<BackupNamespace
>,
470 backup_type
: Option
<BackupType
>,
471 backup_id
: Option
<String
>,
474 rpcenv
: &mut dyn RpcEnvironment
,
475 ) -> Result
<Vec
<SnapshotListItem
>, Error
> {
476 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
478 let ns
= ns
.unwrap_or_default();
480 let list_all
= !check_ns_privs(
484 PRIV_DATASTORE_AUDIT
,
485 PRIV_DATASTORE_BACKUP
,
488 let datastore
= DataStore
::lookup_datastore(&store
, Some(Operation
::Read
))?
;
489 let store_with_ns
= DatastoreWithNamespace
{
490 store
: store
.to_owned(),
494 // FIXME: filter also owner before collecting, for doing that nicely the owner should move into
495 // backup group and provide an error free (Err -> None) accessor
496 let groups
= match (backup_type
, backup_id
) {
497 (Some(backup_type
), Some(backup_id
)) => {
498 vec
![datastore
.backup_group_from_parts(ns
, backup_type
, backup_id
)]
501 (Some(backup_type
), None
) => datastore
502 .iter_backup_groups_ok(ns
)?
503 .filter(|group
| group
.backup_type() == backup_type
)
506 (None
, Some(backup_id
)) => datastore
507 .iter_backup_groups_ok(ns
)?
508 .filter(|group
| group
.backup_id() == backup_id
)
511 (None
, None
) => datastore
.list_backup_groups(ns
)?
,
514 let info_to_snapshot_list_item
= |group
: &BackupGroup
, owner
, info
: BackupInfo
| {
515 let backup
= pbs_api_types
::BackupDir
{
517 time
: info
.backup_dir
.backup_time(),
519 let protected
= info
.backup_dir
.is_protected();
521 match get_all_snapshot_files(&info
) {
522 Ok((manifest
, files
)) => {
523 // extract the first line from notes
524 let comment
: Option
<String
> = manifest
.unprotected
["notes"]
526 .and_then(|notes
| notes
.lines().next())
529 let fingerprint
= match manifest
.fingerprint() {
532 eprintln
!("error parsing fingerprint: '{}'", err
);
537 let verification
= manifest
.unprotected
["verify_state"].clone();
538 let verification
: Option
<SnapshotVerifyState
> =
539 match serde_json
::from_value(verification
) {
540 Ok(verify
) => verify
,
542 eprintln
!("error parsing verification state : '{}'", err
);
547 let size
= Some(files
.iter().map(|x
| x
.size
.unwrap_or(0)).sum());
561 eprintln
!("error during snapshot file listing: '{}'", err
);
565 .map(|filename
| BackupContent
{
586 groups
.iter().try_fold(Vec
::new(), |mut snapshots
, group
| {
587 let owner
= match group
.get_owner() {
588 Ok(auth_id
) => auth_id
,
591 "Failed to get owner of group '{}' in {} - {}",
596 return Ok(snapshots
);
600 if !list_all
&& check_backup_owner(&owner
, &auth_id
).is_err() {
601 return Ok(snapshots
);
604 let group_backups
= group
.list_backups()?
;
609 .map(|info
| info_to_snapshot_list_item(group
, Some(owner
.clone()), info
)),
616 fn get_snapshots_count(store
: &Arc
<DataStore
>, owner
: Option
<&Authid
>) -> Result
<Counts
, Error
> {
617 let root_ns
= Default
::default();
618 ListAccessibleBackupGroups
::new_with_privs(
622 Some(PRIV_DATASTORE_AUDIT
| PRIV_DATASTORE_READ
),
626 .try_fold(Counts
::default(), |mut counts
, group
| {
627 let group
= match group
{
629 Err(_
) => return Ok(counts
), // TODO: add this as error counts?
631 let snapshot_count
= group
.list_backups()?
.len() as u64;
633 // only include groups with snapshots, counting/displaying emtpy groups can confuse
634 if snapshot_count
> 0 {
635 let type_count
= match group
.backup_type() {
636 BackupType
::Ct
=> counts
.ct
.get_or_insert(Default
::default()),
637 BackupType
::Vm
=> counts
.vm
.get_or_insert(Default
::default()),
638 BackupType
::Host
=> counts
.host
.get_or_insert(Default
::default()),
641 type_count
.groups
+= 1;
642 type_count
.snapshots
+= snapshot_count
;
653 schema
: DATASTORE_SCHEMA
,
659 description
: "Include additional information like snapshot counts and GC status.",
665 type: DataStoreStatus
,
668 permission
: &Permission
::Privilege(
669 &["datastore", "{store}"], PRIV_DATASTORE_AUDIT
| PRIV_DATASTORE_BACKUP
, true),
672 /// Get datastore status.
677 rpcenv
: &mut dyn RpcEnvironment
,
678 ) -> Result
<DataStoreStatus
, Error
> {
679 let datastore
= DataStore
::lookup_datastore(&store
, Some(Operation
::Read
))?
;
680 let storage
= crate::tools
::disks
::disk_usage(&datastore
.base_path())?
;
681 let (counts
, gc_status
) = if verbose
{
682 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
683 let user_info
= CachedUserInfo
::new()?
;
685 let store_privs
= user_info
.lookup_privs(&auth_id
, &["datastore", &store
]);
686 let filter_owner
= if store_privs
& PRIV_DATASTORE_AUDIT
!= 0 {
692 let counts
= Some(get_snapshots_count(&datastore
, filter_owner
)?
);
693 let gc_status
= Some(datastore
.last_gc_status());
701 total
: storage
.total
,
703 avail
: storage
.avail
,
713 schema
: DATASTORE_SCHEMA
,
716 type: BackupNamespace
,
724 schema
: BACKUP_ID_SCHEMA
,
728 schema
: IGNORE_VERIFIED_BACKUPS_SCHEMA
,
732 schema
: VERIFICATION_OUTDATED_AFTER_SCHEMA
,
736 schema
: BACKUP_TIME_SCHEMA
,
740 schema
: NS_MAX_DEPTH_SCHEMA
,
749 permission
: &Permission
::Anybody
,
750 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_VERIFY for any \
751 or DATASTORE_BACKUP and being the owner of the group",
756 /// This function can verify a single backup snapshot, all backup from a backup group,
757 /// or all backups in the datastore.
760 ns
: Option
<BackupNamespace
>,
761 backup_type
: Option
<BackupType
>,
762 backup_id
: Option
<String
>,
763 backup_time
: Option
<i64>,
764 ignore_verified
: Option
<bool
>,
765 outdated_after
: Option
<i64>,
766 max_depth
: Option
<usize>,
767 rpcenv
: &mut dyn RpcEnvironment
,
768 ) -> Result
<Value
, Error
> {
769 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
770 let ns
= ns
.unwrap_or_default();
771 let owner_check_required
= check_ns_privs(
775 PRIV_DATASTORE_VERIFY
,
776 PRIV_DATASTORE_BACKUP
,
779 let datastore
= DataStore
::lookup_datastore(&store
, Some(Operation
::Read
))?
;
780 let ignore_verified
= ignore_verified
.unwrap_or(true);
784 let mut backup_dir
= None
;
785 let mut backup_group
= None
;
786 let mut worker_type
= "verify";
788 match (backup_type
, backup_id
, backup_time
) {
789 (Some(backup_type
), Some(backup_id
), Some(backup_time
)) => {
791 "{}:{}/{}/{}/{:08X}",
793 ns
.display_as_path(),
799 datastore
.backup_dir_from_parts(ns
.clone(), backup_type
, backup_id
, backup_time
)?
;
801 if owner_check_required
{
802 let owner
= datastore
.get_owner(dir
.backup_ns(), dir
.as_ref())?
;
803 check_backup_owner(&owner
, &auth_id
)?
;
806 backup_dir
= Some(dir
);
807 worker_type
= "verify_snapshot";
809 (Some(backup_type
), Some(backup_id
), None
) => {
813 ns
.display_as_path(),
817 let group
= pbs_api_types
::BackupGroup
::from((backup_type
, backup_id
));
819 if owner_check_required
{
820 let owner
= datastore
.get_owner(&ns
, &group
)?
;
821 check_backup_owner(&owner
, &auth_id
)?
;
824 backup_group
= Some(datastore
.backup_group(ns
.clone(), group
));
825 worker_type
= "verify_group";
827 (None
, None
, None
) => {
828 worker_id
= if ns
.is_root() {
831 format
!("{store}:{}", ns
.display_as_path())
834 _
=> bail
!("parameters do not specify a backup group or snapshot"),
837 let to_stdout
= rpcenv
.env_type() == RpcEnvironmentType
::CLI
;
839 let upid_str
= WorkerTask
::new_thread(
845 let verify_worker
= crate::backup
::VerifyWorker
::new(worker
.clone(), datastore
);
846 let failed_dirs
= if let Some(backup_dir
) = backup_dir
{
847 let mut res
= Vec
::new();
848 if !verify_backup_dir(
851 worker
.upid().clone(),
852 Some(&move |manifest
| verify_filter(ignore_verified
, outdated_after
, manifest
)),
854 res
.push(print_ns_and_snapshot(
855 backup_dir
.backup_ns(),
860 } else if let Some(backup_group
) = backup_group
{
861 let failed_dirs
= verify_backup_group(
864 &mut StoreProgress
::new(1),
866 Some(&move |manifest
| verify_filter(ignore_verified
, outdated_after
, manifest
)),
870 let owner
= if owner_check_required
{
882 Some(&move |manifest
| verify_filter(ignore_verified
, outdated_after
, manifest
)),
885 if !failed_dirs
.is_empty() {
886 task_log
!(worker
, "Failed to verify the following snapshots/groups:");
887 for dir
in failed_dirs
{
888 task_log
!(worker
, "\t{}", dir
);
890 bail
!("verification failed - please check the log for details");
903 type: BackupNamespace
,
907 type: pbs_api_types
::BackupGroup
,
914 description
: "Just show what prune would do, but do not delete anything.",
921 schema
: DATASTORE_SCHEMA
,
925 returns
: pbs_api_types
::ADMIN_DATASTORE_PRUNE_RETURN_TYPE
,
927 permission
: &Permission
::Anybody
,
928 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_MODIFY for any\
929 or DATASTORE_PRUNE and being the owner of the group",
932 /// Prune a group on the datastore
934 ns
: Option
<BackupNamespace
>,
935 group
: pbs_api_types
::BackupGroup
,
937 prune_options
: PruneOptions
,
940 rpcenv
: &mut dyn RpcEnvironment
,
941 ) -> Result
<Value
, Error
> {
942 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
943 let ns
= ns
.unwrap_or_default();
944 let datastore
= check_privs_and_load_store(
948 PRIV_DATASTORE_MODIFY
,
949 PRIV_DATASTORE_PRUNE
,
950 Some(Operation
::Write
),
953 let store_with_ns
= DatastoreWithNamespace
{
954 store
: store
.to_owned(),
958 let worker_id
= format
!("{}:{}:{}", store
, ns
, group
);
959 let group
= datastore
.backup_group(ns
, group
);
961 let mut prune_result
= Vec
::new();
963 let list
= group
.list_backups()?
;
965 let mut prune_info
= compute_prune_info(list
, &prune_options
)?
;
967 prune_info
.reverse(); // delete older snapshots first
969 let keep_all
= !pbs_datastore
::prune
::keeps_something(&prune_options
);
972 for (info
, mark
) in prune_info
{
973 let keep
= keep_all
|| mark
.keep();
975 let mut result
= json
!({
976 "backup-type": info
.backup_dir
.backup_type(),
977 "backup-id": info
.backup_dir
.backup_id(),
978 "backup-time": info
.backup_dir
.backup_time(),
980 "protected": mark
.protected(),
982 let prune_ns
= info
.backup_dir
.backup_ns();
983 if !prune_ns
.is_root() {
984 result
["ns"] = serde_json
::to_value(prune_ns
)?
;
986 prune_result
.push(result
);
988 return Ok(json
!(prune_result
));
991 // We use a WorkerTask just to have a task log, but run synchrounously
992 let worker
= WorkerTask
::new("prune", Some(worker_id
), auth_id
.to_string(), true)?
;
995 task_log
!(worker
, "No prune selection - keeping all files.");
999 "retention options: {}",
1000 pbs_datastore
::prune
::cli_options_string(&prune_options
)
1004 "Starting prune on {} group \"{}\"",
1010 for (info
, mark
) in prune_info
{
1011 let keep
= keep_all
|| mark
.keep();
1013 let backup_time
= info
.backup_dir
.backup_time();
1014 let timestamp
= info
.backup_dir
.backup_time_string();
1015 let group
: &pbs_api_types
::BackupGroup
= info
.backup_dir
.as_ref();
1017 let msg
= format
!("{}/{}/{} {}", group
.ty
, group
.id
, timestamp
, mark
,);
1019 task_log
!(worker
, "{}", msg
);
1021 prune_result
.push(json
!({
1022 "backup-type": group
.ty
,
1023 "backup-id": group
.id
,
1024 "backup-time": backup_time
,
1026 "protected": mark
.protected(),
1029 if !(dry_run
|| keep
) {
1030 if let Err(err
) = info
.backup_dir
.destroy(false) {
1033 "failed to remove dir {:?}: {}",
1034 info
.backup_dir
.relative_path(),
1041 worker
.log_result(&Ok(()));
1043 Ok(json
!(prune_result
))
1053 description
: "Just show what prune would do, but do not delete anything.",
1060 schema
: DATASTORE_SCHEMA
,
1063 type: BackupNamespace
,
1067 schema
: NS_MAX_DEPTH_SCHEMA
,
1073 schema
: UPID_SCHEMA
,
1076 permission
: &Permission
::Privilege(
1077 &["datastore", "{store}"], PRIV_DATASTORE_MODIFY
| PRIV_DATASTORE_PRUNE
, true),
1080 /// Prune the datastore
1081 pub fn prune_datastore(
1083 prune_options
: PruneOptions
,
1085 ns
: Option
<BackupNamespace
>,
1086 max_depth
: Option
<usize>,
1088 rpcenv
: &mut dyn RpcEnvironment
,
1089 ) -> Result
<String
, Error
> {
1090 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1092 let datastore
= DataStore
::lookup_datastore(&store
, Some(Operation
::Write
))?
;
1093 let ns
= ns
.unwrap_or_default();
1094 let worker_id
= format
!("{}:{}", store
, ns
);
1096 let to_stdout
= rpcenv
.env_type() == RpcEnvironmentType
::CLI
;
1098 let upid_str
= WorkerTask
::new_thread(
1101 auth_id
.to_string(),
1104 crate::server
::prune_datastore(
1110 max_depth
.unwrap_or(MAX_NAMESPACE_DEPTH
), // canoot rely on schema default
1123 schema
: DATASTORE_SCHEMA
,
1128 schema
: UPID_SCHEMA
,
1131 permission
: &Permission
::Privilege(&["datastore", "{store}"], PRIV_DATASTORE_MODIFY
, false),
1134 /// Start garbage collection.
1135 pub fn start_garbage_collection(
1138 rpcenv
: &mut dyn RpcEnvironment
,
1139 ) -> Result
<Value
, Error
> {
1140 let datastore
= DataStore
::lookup_datastore(&store
, Some(Operation
::Write
))?
;
1141 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1143 let job
= Job
::new("garbage_collection", &store
)
1144 .map_err(|_
| format_err
!("garbage collection already running"))?
;
1146 let to_stdout
= rpcenv
.env_type() == RpcEnvironmentType
::CLI
;
1149 crate::server
::do_garbage_collection_job(job
, datastore
, &auth_id
, None
, to_stdout
)
1152 "unable to start garbage collection job on datastore {} - {}",
1165 schema
: DATASTORE_SCHEMA
,
1170 type: GarbageCollectionStatus
,
1173 permission
: &Permission
::Privilege(&["datastore", "{store}"], PRIV_DATASTORE_AUDIT
, false),
1176 /// Garbage collection status.
1177 pub fn garbage_collection_status(
1180 _rpcenv
: &mut dyn RpcEnvironment
,
1181 ) -> Result
<GarbageCollectionStatus
, Error
> {
1182 let datastore
= DataStore
::lookup_datastore(&store
, Some(Operation
::Read
))?
;
1184 let status
= datastore
.last_gc_status();
1189 fn can_access_any_ns(store
: Arc
<DataStore
>, auth_id
: &Authid
, user_info
: &CachedUserInfo
) -> bool
{
1190 // NOTE: traversing the datastore could be avoided if we had an "ACL tree: is there any priv
1191 // below /datastore/{store}" helper
1193 if let Ok(iter
) = store
.recursive_iter_backup_ns_ok(BackupNamespace
::root(), None
) {
1199 PRIV_DATASTORE_AUDIT
| PRIV_DATASTORE_MODIFY
| PRIV_DATASTORE_READ
| PRIV_DATASTORE_BACKUP
;
1200 let name
= store
.name();
1201 iter
.any(|ns
| -> bool
{
1202 let store_with_ns
= DatastoreWithNamespace
{
1203 store
: name
.to_string(),
1206 let user_privs
= user_info
.lookup_privs(&auth_id
, &store_with_ns
.acl_path());
1207 user_privs
& wanted
!= 0
1213 description
: "List the accessible datastores.",
1215 items
: { type: DataStoreListItem }
,
1218 permission
: &Permission
::Anybody
,
1222 pub fn get_datastore_list(
1225 rpcenv
: &mut dyn RpcEnvironment
,
1226 ) -> Result
<Vec
<DataStoreListItem
>, Error
> {
1227 let (config
, _digest
) = pbs_config
::datastore
::config()?
;
1229 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1230 let user_info
= CachedUserInfo
::new()?
;
1232 let mut list
= Vec
::new();
1234 for (store
, (_
, data
)) in &config
.sections
{
1235 let user_privs
= user_info
.lookup_privs(&auth_id
, &["datastore", store
]);
1236 let allowed
= (user_privs
& (PRIV_DATASTORE_AUDIT
| PRIV_DATASTORE_BACKUP
)) != 0;
1238 let mut allow_id
= false;
1240 let scfg
: pbs_api_types
::DataStoreConfig
= serde_json
::from_value(data
.to_owned())?
;
1241 // safety: we just cannot go through lookup as we must avoid an operation check
1242 if let Ok(datastore
) = unsafe { DataStore::open_from_config(scfg, None) }
{
1243 allow_id
= can_access_any_ns(datastore
, &auth_id
, &user_info
);
1247 if allowed
|| allow_id
{
1248 list
.push(DataStoreListItem
{
1249 store
: store
.clone(),
1250 comment
: if !allowed
{
1253 data
["comment"].as_str().map(String
::from
)
1255 maintenance
: data
["maintenance-mode"].as_str().map(String
::from
),
1264 pub const API_METHOD_DOWNLOAD_FILE
: ApiMethod
= ApiMethod
::new(
1265 &ApiHandler
::AsyncHttp(&download_file
),
1267 "Download single raw file from backup snapshot.",
1269 ("store", false, &DATASTORE_SCHEMA
),
1270 ("ns", true, &BACKUP_NAMESPACE_SCHEMA
),
1271 ("backup-type", false, &BACKUP_TYPE_SCHEMA
),
1272 ("backup-id", false, &BACKUP_ID_SCHEMA
),
1273 ("backup-time", false, &BACKUP_TIME_SCHEMA
),
1274 ("file-name", false, &BACKUP_ARCHIVE_NAME_SCHEMA
),
1280 "Requires on /datastore/{store}[/{namespace}] either DATASTORE_READ for any or \
1281 DATASTORE_BACKUP and being the owner of the group",
1283 &Permission
::Anybody
,
1286 pub fn download_file(
1291 rpcenv
: Box
<dyn RpcEnvironment
>,
1292 ) -> ApiResponseFuture
{
1294 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1295 let store
= required_string_param(¶m
, "store")?
;
1296 let backup_ns
= optional_ns_param(¶m
)?
;
1298 let store_with_ns
= DatastoreWithNamespace
{
1299 store
: store
.to_owned(),
1300 ns
: backup_ns
.clone(),
1302 let backup_dir
: pbs_api_types
::BackupDir
= Deserialize
::deserialize(¶m
)?
;
1303 let datastore
= check_privs_and_load_store(
1307 PRIV_DATASTORE_READ
,
1308 PRIV_DATASTORE_BACKUP
,
1309 Some(Operation
::Read
),
1313 let file_name
= required_string_param(¶m
, "file-name")?
.to_owned();
1316 "Download {} from {} ({}/{})",
1317 file_name
, store_with_ns
, backup_dir
, file_name
1320 let backup_dir
= datastore
.backup_dir(backup_ns
, backup_dir
)?
;
1322 let mut path
= datastore
.base_path();
1323 path
.push(backup_dir
.relative_path());
1324 path
.push(&file_name
);
1326 let file
= tokio
::fs
::File
::open(&path
)
1328 .map_err(|err
| http_err
!(BAD_REQUEST
, "File open failed: {}", err
))?
;
1331 tokio_util
::codec
::FramedRead
::new(file
, tokio_util
::codec
::BytesCodec
::new())
1332 .map_ok(|bytes
| bytes
.freeze())
1333 .map_err(move |err
| {
1334 eprintln
!("error during streaming of '{:?}' - {}", &path
, err
);
1337 let body
= Body
::wrap_stream(payload
);
1339 // fixme: set other headers ?
1340 Ok(Response
::builder()
1341 .status(StatusCode
::OK
)
1342 .header(header
::CONTENT_TYPE
, "application/octet-stream")
1350 pub const API_METHOD_DOWNLOAD_FILE_DECODED
: ApiMethod
= ApiMethod
::new(
1351 &ApiHandler
::AsyncHttp(&download_file_decoded
),
1353 "Download single decoded file from backup snapshot. Only works if it's not encrypted.",
1355 ("store", false, &DATASTORE_SCHEMA
),
1356 ("ns", true, &BACKUP_NAMESPACE_SCHEMA
),
1357 ("backup-type", false, &BACKUP_TYPE_SCHEMA
),
1358 ("backup-id", false, &BACKUP_ID_SCHEMA
),
1359 ("backup-time", false, &BACKUP_TIME_SCHEMA
),
1360 ("file-name", false, &BACKUP_ARCHIVE_NAME_SCHEMA
),
1366 "Requires on /datastore/{store}[/{namespace}] either DATASTORE_READ for any or \
1367 DATASTORE_BACKUP and being the owner of the group",
1369 &Permission
::Anybody
,
1372 pub fn download_file_decoded(
1377 rpcenv
: Box
<dyn RpcEnvironment
>,
1378 ) -> ApiResponseFuture
{
1380 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1381 let store
= required_string_param(¶m
, "store")?
;
1382 let backup_ns
= optional_ns_param(¶m
)?
;
1383 let store_with_ns
= DatastoreWithNamespace
{
1384 store
: store
.to_owned(),
1385 ns
: backup_ns
.clone(),
1387 let backup_dir_api
: pbs_api_types
::BackupDir
= Deserialize
::deserialize(¶m
)?
;
1388 let datastore
= check_privs_and_load_store(
1392 PRIV_DATASTORE_READ
,
1393 PRIV_DATASTORE_BACKUP
,
1394 Some(Operation
::Read
),
1395 &backup_dir_api
.group
,
1398 let file_name
= required_string_param(¶m
, "file-name")?
.to_owned();
1399 let backup_dir
= datastore
.backup_dir(backup_ns
, backup_dir_api
.clone())?
;
1401 let (manifest
, files
) = read_backup_index(&backup_dir
)?
;
1403 if file
.filename
== file_name
&& file
.crypt_mode
== Some(CryptMode
::Encrypt
) {
1404 bail
!("cannot decode '{}' - is encrypted", file_name
);
1409 "Download {} from {} ({}/{})",
1410 file_name
, store_with_ns
, backup_dir_api
, file_name
1413 let mut path
= datastore
.base_path();
1414 path
.push(backup_dir
.relative_path());
1415 path
.push(&file_name
);
1417 let extension
= file_name
.rsplitn(2, '
.'
).next().unwrap();
1419 let body
= match extension
{
1421 let index
= DynamicIndexReader
::open(&path
).map_err(|err
| {
1422 format_err
!("unable to read dynamic index '{:?}' - {}", &path
, err
)
1424 let (csum
, size
) = index
.compute_csum();
1425 manifest
.verify_file(&file_name
, &csum
, size
)?
;
1427 let chunk_reader
= LocalChunkReader
::new(datastore
, None
, CryptMode
::None
);
1428 let reader
= CachedChunkReader
::new(chunk_reader
, index
, 1).seekable();
1429 Body
::wrap_stream(AsyncReaderStream
::new(reader
).map_err(move |err
| {
1430 eprintln
!("error during streaming of '{:?}' - {}", path
, err
);
1435 let index
= FixedIndexReader
::open(&path
).map_err(|err
| {
1436 format_err
!("unable to read fixed index '{:?}' - {}", &path
, err
)
1439 let (csum
, size
) = index
.compute_csum();
1440 manifest
.verify_file(&file_name
, &csum
, size
)?
;
1442 let chunk_reader
= LocalChunkReader
::new(datastore
, None
, CryptMode
::None
);
1443 let reader
= CachedChunkReader
::new(chunk_reader
, index
, 1).seekable();
1445 AsyncReaderStream
::with_buffer_size(reader
, 4 * 1024 * 1024).map_err(
1447 eprintln
!("error during streaming of '{:?}' - {}", path
, err
);
1454 let file
= std
::fs
::File
::open(&path
)
1455 .map_err(|err
| http_err
!(BAD_REQUEST
, "File open failed: {}", err
))?
;
1457 // FIXME: load full blob to verify index checksum?
1460 WrappedReaderStream
::new(DataBlobReader
::new(file
, None
)?
).map_err(
1462 eprintln
!("error during streaming of '{:?}' - {}", path
, err
);
1469 bail
!("cannot download '{}' files", extension
);
1473 // fixme: set other headers ?
1474 Ok(Response
::builder()
1475 .status(StatusCode
::OK
)
1476 .header(header
::CONTENT_TYPE
, "application/octet-stream")
1484 pub const API_METHOD_UPLOAD_BACKUP_LOG
: ApiMethod
= ApiMethod
::new(
1485 &ApiHandler
::AsyncHttp(&upload_backup_log
),
1487 "Upload the client backup log file into a backup snapshot ('client.log.blob').",
1489 ("store", false, &DATASTORE_SCHEMA
),
1490 ("ns", true, &BACKUP_NAMESPACE_SCHEMA
),
1491 ("backup-type", false, &BACKUP_TYPE_SCHEMA
),
1492 ("backup-id", false, &BACKUP_ID_SCHEMA
),
1493 ("backup-time", false, &BACKUP_TIME_SCHEMA
),
1498 Some("Only the backup creator/owner is allowed to do this."),
1499 &Permission
::Anybody
,
1502 pub fn upload_backup_log(
1507 rpcenv
: Box
<dyn RpcEnvironment
>,
1508 ) -> ApiResponseFuture
{
1510 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1511 let store
= required_string_param(¶m
, "store")?
;
1512 let backup_ns
= optional_ns_param(¶m
)?
;
1513 let store_with_ns
= DatastoreWithNamespace
{
1514 store
: store
.to_owned(),
1515 ns
: backup_ns
.clone(),
1517 let backup_dir_api
: pbs_api_types
::BackupDir
= Deserialize
::deserialize(¶m
)?
;
1519 let datastore
= check_privs_and_load_store(
1524 PRIV_DATASTORE_BACKUP
,
1525 Some(Operation
::Write
),
1526 &backup_dir_api
.group
,
1528 let backup_dir
= datastore
.backup_dir(backup_ns
, backup_dir_api
.clone())?
;
1530 let file_name
= CLIENT_LOG_BLOB_NAME
;
1532 let mut path
= backup_dir
.full_path();
1533 path
.push(&file_name
);
1536 bail
!("backup already contains a log.");
1539 println
!("Upload backup log to {store_with_ns} {backup_dir_api}/{file_name}");
1542 .map_err(Error
::from
)
1543 .try_fold(Vec
::new(), |mut acc
, chunk
| {
1544 acc
.extend_from_slice(&*chunk
);
1545 future
::ok
::<_
, Error
>(acc
)
1549 // always verify blob/CRC at server side
1550 let blob
= DataBlob
::load_from_reader(&mut &data
[..])?
;
1552 replace_file(&path
, blob
.raw_data(), CreateOptions
::new(), false)?
;
1554 // fixme: use correct formatter
1555 Ok(formatter
::JSON_FORMATTER
.format_data(Value
::Null
, &*rpcenv
))
1563 store
: { schema: DATASTORE_SCHEMA }
,
1565 type: BackupNamespace
,
1569 type: pbs_api_types
::BackupDir
,
1573 description
: "Base64 encoded path.",
1579 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_READ for any or \
1580 DATASTORE_BACKUP and being the owner of the group",
1581 permission
: &Permission
::Anybody
,
1584 /// Get the entries of the given path of the catalog
1587 ns
: Option
<BackupNamespace
>,
1588 backup_dir
: pbs_api_types
::BackupDir
,
1590 rpcenv
: &mut dyn RpcEnvironment
,
1591 ) -> Result
<Vec
<ArchiveEntry
>, Error
> {
1592 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1593 let ns
= ns
.unwrap_or_default();
1594 let datastore
= check_privs_and_load_store(
1598 PRIV_DATASTORE_READ
,
1599 PRIV_DATASTORE_BACKUP
,
1600 Some(Operation
::Read
),
1604 let backup_dir
= datastore
.backup_dir(ns
, backup_dir
)?
;
1606 let file_name
= CATALOG_NAME
;
1608 let (manifest
, files
) = read_backup_index(&backup_dir
)?
;
1610 if file
.filename
== file_name
&& file
.crypt_mode
== Some(CryptMode
::Encrypt
) {
1611 bail
!("cannot decode '{}' - is encrypted", file_name
);
1615 let mut path
= datastore
.base_path();
1616 path
.push(backup_dir
.relative_path());
1617 path
.push(file_name
);
1619 let index
= DynamicIndexReader
::open(&path
)
1620 .map_err(|err
| format_err
!("unable to read dynamic index '{:?}' - {}", &path
, err
))?
;
1622 let (csum
, size
) = index
.compute_csum();
1623 manifest
.verify_file(file_name
, &csum
, size
)?
;
1625 let chunk_reader
= LocalChunkReader
::new(datastore
, None
, CryptMode
::None
);
1626 let reader
= BufferedDynamicReader
::new(index
, chunk_reader
);
1628 let mut catalog_reader
= CatalogReader
::new(reader
);
1630 let path
= if filepath
!= "root" && filepath
!= "/" {
1631 base64
::decode(filepath
)?
1636 catalog_reader
.list_dir_contents(&path
)
1640 pub const API_METHOD_PXAR_FILE_DOWNLOAD
: ApiMethod
= ApiMethod
::new(
1641 &ApiHandler
::AsyncHttp(&pxar_file_download
),
1643 "Download single file from pxar file of a backup snapshot. Only works if it's not encrypted.",
1645 ("store", false, &DATASTORE_SCHEMA
),
1646 ("ns", true, &BACKUP_NAMESPACE_SCHEMA
),
1647 ("backup-type", false, &BACKUP_TYPE_SCHEMA
),
1648 ("backup-id", false, &BACKUP_ID_SCHEMA
),
1649 ("backup-time", false, &BACKUP_TIME_SCHEMA
),
1650 ("filepath", false, &StringSchema
::new("Base64 encoded path").schema()),
1651 ("tar", true, &BooleanSchema
::new("Download as .tar.zst").schema()),
1656 "Requires on /datastore/{store}[/{namespace}] either DATASTORE_READ for any or \
1657 DATASTORE_BACKUP and being the owner of the group",
1659 &Permission
::Anybody
,
1662 pub fn pxar_file_download(
1667 rpcenv
: Box
<dyn RpcEnvironment
>,
1668 ) -> ApiResponseFuture
{
1670 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1671 let store
= required_string_param(¶m
, "store")?
;
1672 let ns
= optional_ns_param(¶m
)?
;
1673 let backup_dir
: pbs_api_types
::BackupDir
= Deserialize
::deserialize(¶m
)?
;
1674 let datastore
= check_privs_and_load_store(
1678 PRIV_DATASTORE_READ
,
1679 PRIV_DATASTORE_BACKUP
,
1680 Some(Operation
::Read
),
1684 let backup_dir
= datastore
.backup_dir(ns
, backup_dir
)?
;
1686 let filepath
= required_string_param(¶m
, "filepath")?
.to_owned();
1688 let tar
= param
["tar"].as_bool().unwrap_or(false);
1690 let mut components
= base64
::decode(&filepath
)?
;
1691 if !components
.is_empty() && components
[0] == b'
/'
{
1692 components
.remove(0);
1695 let mut split
= components
.splitn(2, |c
| *c
== b'
/'
);
1696 let pxar_name
= std
::str::from_utf8(split
.next().unwrap())?
;
1697 let file_path
= split
.next().unwrap_or(b
"/");
1698 let (manifest
, files
) = read_backup_index(&backup_dir
)?
;
1700 if file
.filename
== pxar_name
&& file
.crypt_mode
== Some(CryptMode
::Encrypt
) {
1701 bail
!("cannot decode '{}' - is encrypted", pxar_name
);
1705 let mut path
= datastore
.base_path();
1706 path
.push(backup_dir
.relative_path());
1707 path
.push(pxar_name
);
1709 let index
= DynamicIndexReader
::open(&path
)
1710 .map_err(|err
| format_err
!("unable to read dynamic index '{:?}' - {}", &path
, err
))?
;
1712 let (csum
, size
) = index
.compute_csum();
1713 manifest
.verify_file(pxar_name
, &csum
, size
)?
;
1715 let chunk_reader
= LocalChunkReader
::new(datastore
, None
, CryptMode
::None
);
1716 let reader
= BufferedDynamicReader
::new(index
, chunk_reader
);
1717 let archive_size
= reader
.archive_size();
1718 let reader
= LocalDynamicReadAt
::new(reader
);
1720 let decoder
= Accessor
::new(reader
, archive_size
).await?
;
1721 let root
= decoder
.open_root().await?
;
1722 let path
= OsStr
::from_bytes(file_path
).to_os_string();
1726 .ok_or_else(|| format_err
!("error opening '{:?}'", path
))?
;
1728 let body
= match file
.kind() {
1729 EntryKind
::File { .. }
=> Body
::wrap_stream(
1730 AsyncReaderStream
::new(file
.contents().await?
).map_err(move |err
| {
1731 eprintln
!("error during streaming of file '{:?}' - {}", filepath
, err
);
1735 EntryKind
::Hardlink(_
) => Body
::wrap_stream(
1736 AsyncReaderStream
::new(decoder
.follow_hardlink(&file
).await?
.contents().await?
)
1737 .map_err(move |err
| {
1738 eprintln
!("error during streaming of hardlink '{:?}' - {}", path
, err
);
1742 EntryKind
::Directory
=> {
1743 let (sender
, receiver
) = tokio
::sync
::mpsc
::channel
::<Result
<_
, Error
>>(100);
1744 let channelwriter
= AsyncChannelWriter
::new(sender
, 1024 * 1024);
1746 proxmox_rest_server
::spawn_internal_task(create_tar(
1752 let zstdstream
= ZstdEncoder
::new(ReceiverStream
::new(receiver
))?
;
1753 Body
::wrap_stream(zstdstream
.map_err(move |err
| {
1754 eprintln
!("error during streaming of tar.zst '{:?}' - {}", path
, err
);
1758 proxmox_rest_server
::spawn_internal_task(create_zip(
1764 Body
::wrap_stream(ReceiverStream
::new(receiver
).map_err(move |err
| {
1765 eprintln
!("error during streaming of zip '{:?}' - {}", path
, err
);
1770 other
=> bail
!("cannot download file of type {:?}", other
),
1773 // fixme: set other headers ?
1774 Ok(Response
::builder()
1775 .status(StatusCode
::OK
)
1776 .header(header
::CONTENT_TYPE
, "application/octet-stream")
1787 schema
: DATASTORE_SCHEMA
,
1798 permission
: &Permission
::Privilege(
1799 &["datastore", "{store}"], PRIV_DATASTORE_AUDIT
| PRIV_DATASTORE_BACKUP
, true),
1802 /// Read datastore stats
1803 pub fn get_rrd_stats(
1805 timeframe
: RRDTimeFrame
,
1808 ) -> Result
<Value
, Error
> {
1809 let datastore
= DataStore
::lookup_datastore(&store
, Some(Operation
::Read
))?
;
1810 let disk_manager
= crate::tools
::disks
::DiskManage
::new();
1812 let mut rrd_fields
= vec
![
1821 // we do not have io_ticks for zpools, so don't include them
1822 match disk_manager
.find_mounted_device(&datastore
.base_path()) {
1823 Ok(Some((fs_type
, _
, _
))) if fs_type
.as_str() == "zfs" => {}
1824 _
=> rrd_fields
.push("io_ticks"),
1827 create_value_from_rrd(&format
!("datastore/{}", store
), &rrd_fields
, timeframe
, cf
)
1834 schema
: DATASTORE_SCHEMA
,
1839 permission
: &Permission
::Privilege(&["datastore", "{store}"], PRIV_DATASTORE_AUDIT
, true),
1842 /// Read datastore stats
1843 pub fn get_active_operations(store
: String
, _param
: Value
) -> Result
<Value
, Error
> {
1844 let active_operations
= task_tracking
::get_active_operations(&store
)?
;
1846 "read": active_operations
.read
,
1847 "write": active_operations
.write
,
1854 store
: { schema: DATASTORE_SCHEMA }
,
1856 type: BackupNamespace
,
1860 type: pbs_api_types
::BackupGroup
,
1866 permission
: &Permission
::Anybody
,
1867 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_AUDIT for any \
1868 or DATASTORE_BACKUP and being the owner of the group",
1871 /// Get "notes" for a backup group
1872 pub fn get_group_notes(
1874 ns
: Option
<BackupNamespace
>,
1875 backup_group
: pbs_api_types
::BackupGroup
,
1876 rpcenv
: &mut dyn RpcEnvironment
,
1877 ) -> Result
<String
, Error
> {
1878 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1879 let ns
= ns
.unwrap_or_default();
1880 let datastore
= check_privs_and_load_store(
1884 PRIV_DATASTORE_AUDIT
,
1885 PRIV_DATASTORE_BACKUP
,
1886 Some(Operation
::Read
),
1890 let note_path
= get_group_note_path(&datastore
, &ns
, &backup_group
);
1891 Ok(file_read_optional_string(note_path
)?
.unwrap_or_else(|| "".to_owned()))
1897 store
: { schema: DATASTORE_SCHEMA }
,
1899 type: BackupNamespace
,
1903 type: pbs_api_types
::BackupGroup
,
1907 description
: "A multiline text.",
1912 permission
: &Permission
::Anybody
,
1913 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_MODIFY for any \
1914 or DATASTORE_BACKUP and being the owner of the group",
1917 /// Set "notes" for a backup group
1918 pub fn set_group_notes(
1920 ns
: Option
<BackupNamespace
>,
1921 backup_group
: pbs_api_types
::BackupGroup
,
1923 rpcenv
: &mut dyn RpcEnvironment
,
1924 ) -> Result
<(), Error
> {
1925 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1926 let ns
= ns
.unwrap_or_default();
1927 let datastore
= check_privs_and_load_store(
1931 PRIV_DATASTORE_MODIFY
,
1932 PRIV_DATASTORE_BACKUP
,
1933 Some(Operation
::Write
),
1937 let note_path
= get_group_note_path(&datastore
, &ns
, &backup_group
);
1938 replace_file(note_path
, notes
.as_bytes(), CreateOptions
::new(), false)?
;
1946 store
: { schema: DATASTORE_SCHEMA }
,
1948 type: BackupNamespace
,
1952 type: pbs_api_types
::BackupDir
,
1958 permission
: &Permission
::Anybody
,
1959 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_AUDIT for any \
1960 or DATASTORE_BACKUP and being the owner of the group",
1963 /// Get "notes" for a specific backup
1966 ns
: Option
<BackupNamespace
>,
1967 backup_dir
: pbs_api_types
::BackupDir
,
1968 rpcenv
: &mut dyn RpcEnvironment
,
1969 ) -> Result
<String
, Error
> {
1970 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
1971 let ns
= ns
.unwrap_or_default();
1972 let datastore
= check_privs_and_load_store(
1976 PRIV_DATASTORE_AUDIT
,
1977 PRIV_DATASTORE_BACKUP
,
1978 Some(Operation
::Read
),
1982 let backup_dir
= datastore
.backup_dir(ns
, backup_dir
)?
;
1984 let (manifest
, _
) = backup_dir
.load_manifest()?
;
1986 let notes
= manifest
.unprotected
["notes"].as_str().unwrap_or("");
1988 Ok(String
::from(notes
))
1994 store
: { schema: DATASTORE_SCHEMA }
,
1996 type: BackupNamespace
,
2000 type: pbs_api_types
::BackupDir
,
2004 description
: "A multiline text.",
2009 permission
: &Permission
::Anybody
,
2010 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_MODIFY for any \
2011 or DATASTORE_BACKUP and being the owner of the group",
2014 /// Set "notes" for a specific backup
2017 ns
: Option
<BackupNamespace
>,
2018 backup_dir
: pbs_api_types
::BackupDir
,
2020 rpcenv
: &mut dyn RpcEnvironment
,
2021 ) -> Result
<(), Error
> {
2022 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
2023 let ns
= ns
.unwrap_or_default();
2024 let datastore
= check_privs_and_load_store(
2028 PRIV_DATASTORE_MODIFY
,
2029 PRIV_DATASTORE_BACKUP
,
2030 Some(Operation
::Write
),
2034 let backup_dir
= datastore
.backup_dir(ns
, backup_dir
)?
;
2037 .update_manifest(|manifest
| {
2038 manifest
.unprotected
["notes"] = notes
.into();
2040 .map_err(|err
| format_err
!("unable to update manifest blob - {}", err
))?
;
2048 store
: { schema: DATASTORE_SCHEMA }
,
2050 type: BackupNamespace
,
2054 type: pbs_api_types
::BackupDir
,
2060 permission
: &Permission
::Anybody
,
2061 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_AUDIT for any \
2062 or DATASTORE_BACKUP and being the owner of the group",
2065 /// Query protection for a specific backup
2066 pub fn get_protection(
2068 ns
: Option
<BackupNamespace
>,
2069 backup_dir
: pbs_api_types
::BackupDir
,
2070 rpcenv
: &mut dyn RpcEnvironment
,
2071 ) -> Result
<bool
, Error
> {
2072 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
2073 let ns
= ns
.unwrap_or_default();
2074 let datastore
= check_privs_and_load_store(
2078 PRIV_DATASTORE_AUDIT
,
2079 PRIV_DATASTORE_BACKUP
,
2080 Some(Operation
::Read
),
2084 let backup_dir
= datastore
.backup_dir(ns
, backup_dir
)?
;
2086 Ok(backup_dir
.is_protected())
2092 store
: { schema: DATASTORE_SCHEMA }
,
2094 type: BackupNamespace
,
2098 type: pbs_api_types
::BackupDir
,
2102 description
: "Enable/disable protection.",
2107 permission
: &Permission
::Anybody
,
2108 description
: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_MODIFY for any \
2109 or DATASTORE_BACKUP and being the owner of the group",
2112 /// En- or disable protection for a specific backup
2113 pub fn set_protection(
2115 ns
: Option
<BackupNamespace
>,
2116 backup_dir
: pbs_api_types
::BackupDir
,
2118 rpcenv
: &mut dyn RpcEnvironment
,
2119 ) -> Result
<(), Error
> {
2120 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
2121 let ns
= ns
.unwrap_or_default();
2122 let datastore
= check_privs_and_load_store(
2126 PRIV_DATASTORE_MODIFY
,
2127 PRIV_DATASTORE_BACKUP
,
2128 Some(Operation
::Write
),
2132 let backup_dir
= datastore
.backup_dir(ns
, backup_dir
)?
;
2134 datastore
.update_protection(&backup_dir
, protected
)
2140 store
: { schema: DATASTORE_SCHEMA }
,
2142 type: BackupNamespace
,
2146 type: pbs_api_types
::BackupGroup
,
2155 permission
: &Permission
::Anybody
,
2156 description
: "Datastore.Modify on whole datastore, or changing ownership between user and \
2157 a user's token for owned backups with Datastore.Backup"
2160 /// Change owner of a backup group
2161 pub fn set_backup_owner(
2163 ns
: Option
<BackupNamespace
>,
2164 backup_group
: pbs_api_types
::BackupGroup
,
2166 rpcenv
: &mut dyn RpcEnvironment
,
2167 ) -> Result
<(), Error
> {
2168 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
2169 let ns
= ns
.unwrap_or_default();
2170 let owner_check_required
= check_ns_privs(
2174 PRIV_DATASTORE_MODIFY
,
2175 PRIV_DATASTORE_BACKUP
,
2178 let datastore
= DataStore
::lookup_datastore(&store
, Some(Operation
::Write
))?
;
2180 let backup_group
= datastore
.backup_group(ns
, backup_group
);
2182 if owner_check_required
{
2183 let owner
= backup_group
.get_owner()?
;
2185 let allowed
= match (owner
.is_token(), new_owner
.is_token()) {
2187 // API token to API token, owned by same user
2188 let owner
= owner
.user();
2189 let new_owner
= new_owner
.user();
2190 owner
== new_owner
&& Authid
::from(owner
.clone()) == auth_id
2193 // API token to API token owner
2194 Authid
::from(owner
.user().clone()) == auth_id
&& new_owner
== auth_id
2197 // API token owner to API token
2198 owner
== auth_id
&& Authid
::from(new_owner
.user().clone()) == auth_id
2201 // User to User, not allowed for unprivileged users
2207 return Err(http_err
!(
2209 "{} does not have permission to change owner of backup group '{}' to {}",
2211 backup_group
.group(),
2217 let user_info
= CachedUserInfo
::new()?
;
2219 if !user_info
.is_active_auth_id(&new_owner
) {
2221 "{} '{}' is inactive or non-existent",
2222 if new_owner
.is_token() {
2223 "API token".to_string()
2231 backup_group
.set_owner(&new_owner
, true)?
;
2237 const DATASTORE_INFO_SUBDIRS
: SubdirMap
= &[
2239 "active-operations",
2240 &Router
::new().get(&API_METHOD_GET_ACTIVE_OPERATIONS
),
2242 ("catalog", &Router
::new().get(&API_METHOD_CATALOG
)),
2245 &Router
::new().post(&API_METHOD_SET_BACKUP_OWNER
),
2249 &Router
::new().download(&API_METHOD_DOWNLOAD_FILE
),
2253 &Router
::new().download(&API_METHOD_DOWNLOAD_FILE_DECODED
),
2255 ("files", &Router
::new().get(&API_METHOD_LIST_SNAPSHOT_FILES
)),
2259 .get(&API_METHOD_GARBAGE_COLLECTION_STATUS
)
2260 .post(&API_METHOD_START_GARBAGE_COLLECTION
),
2265 .get(&API_METHOD_GET_GROUP_NOTES
)
2266 .put(&API_METHOD_SET_GROUP_NOTES
),
2271 .get(&API_METHOD_LIST_GROUPS
)
2272 .delete(&API_METHOD_DELETE_GROUP
),
2276 // FIXME: move into datastore:: sub-module?!
2277 &crate::api2
::admin
::namespace
::ROUTER
,
2282 .get(&API_METHOD_GET_NOTES
)
2283 .put(&API_METHOD_SET_NOTES
),
2288 .get(&API_METHOD_GET_PROTECTION
)
2289 .put(&API_METHOD_SET_PROTECTION
),
2291 ("prune", &Router
::new().post(&API_METHOD_PRUNE
)),
2294 &Router
::new().post(&API_METHOD_PRUNE_DATASTORE
),
2297 "pxar-file-download",
2298 &Router
::new().download(&API_METHOD_PXAR_FILE_DOWNLOAD
),
2300 ("rrd", &Router
::new().get(&API_METHOD_GET_RRD_STATS
)),
2304 .get(&API_METHOD_LIST_SNAPSHOTS
)
2305 .delete(&API_METHOD_DELETE_SNAPSHOT
),
2307 ("status", &Router
::new().get(&API_METHOD_STATUS
)),
2309 "upload-backup-log",
2310 &Router
::new().upload(&API_METHOD_UPLOAD_BACKUP_LOG
),
2312 ("verify", &Router
::new().post(&API_METHOD_VERIFY
)),
2315 const DATASTORE_INFO_ROUTER
: Router
= Router
::new()
2316 .get(&list_subdirs_api_method
!(DATASTORE_INFO_SUBDIRS
))
2317 .subdirs(DATASTORE_INFO_SUBDIRS
);
2319 pub const ROUTER
: Router
= Router
::new()
2320 .get(&API_METHOD_GET_DATASTORE_LIST
)
2321 .match_all("store", &DATASTORE_INFO_ROUTER
);