1 use anyhow
::{bail, Error}
;
2 use ::serde
::{Deserialize, Serialize}
;
10 schema
::parse_property_string
,
14 Authid
, ScsiTapeChanger
, ScsiTapeChangerUpdater
, LtoTapeDrive
,
15 PROXMOX_CONFIG_DIGEST_SCHEMA
, CHANGER_NAME_SCHEMA
, SLOT_ARRAY_SCHEMA
,
16 PRIV_TAPE_AUDIT
, PRIV_TAPE_MODIFY
,
20 config
::cached_user_info
::CachedUserInfo
,
22 linux_tape_changer_list
,
32 type: ScsiTapeChanger
,
38 permission
: &Permission
::Privilege(&["tape", "device"], PRIV_TAPE_MODIFY
, false),
41 /// Create a new changer device
42 pub fn create_changer(config
: ScsiTapeChanger
) -> Result
<(), Error
> {
44 let _lock
= pbs_config
::drive
::lock()?
;
46 let (mut section_config
, _digest
) = pbs_config
::drive
::config()?
;
48 let linux_changers
= linux_tape_changer_list();
50 check_drive_path(&linux_changers
, &config
.path
)?
;
52 let existing
: Vec
<ScsiTapeChanger
> = section_config
.convert_to_typed_array("changer")?
;
54 for changer
in existing
{
55 if changer
.name
== config
.name
{
56 bail
!("Entry '{}' already exists", config
.name
);
59 if changer
.path
== config
.path
{
60 bail
!("Path '{}' already in use by '{}'", config
.path
, changer
.name
);
64 section_config
.set_data(&config
.name
, "changer", &config
)?
;
66 pbs_config
::drive
::save_config(§ion_config
)?
;
75 schema
: CHANGER_NAME_SCHEMA
,
80 type: ScsiTapeChanger
,
83 permission
: &Permission
::Privilege(&["tape", "device", "{name}"], PRIV_TAPE_AUDIT
, false),
86 /// Get tape changer configuration
90 mut rpcenv
: &mut dyn RpcEnvironment
,
91 ) -> Result
<ScsiTapeChanger
, Error
> {
93 let (config
, digest
) = pbs_config
::drive
::config()?
;
95 let data
: ScsiTapeChanger
= config
.lookup("changer", &name
)?
;
97 rpcenv
["digest"] = proxmox
::tools
::digest_to_hex(&digest
).into();
107 description
: "The list of configured changers (with config digest).",
110 type: ScsiTapeChanger
,
114 description
: "List configured tape changer filtered by Tape.Audit privileges",
115 permission
: &Permission
::Anybody
,
119 pub fn list_changers(
121 mut rpcenv
: &mut dyn RpcEnvironment
,
122 ) -> Result
<Vec
<ScsiTapeChanger
>, Error
> {
123 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
124 let user_info
= CachedUserInfo
::new()?
;
126 let (config
, digest
) = pbs_config
::drive
::config()?
;
128 let list
: Vec
<ScsiTapeChanger
> = config
.convert_to_typed_array("changer")?
;
133 let privs
= user_info
.lookup_privs(&auth_id
, &["tape", "device", &changer
.name
]);
134 privs
& PRIV_TAPE_AUDIT
!= 0
138 rpcenv
["digest"] = proxmox
::tools
::digest_to_hex(&digest
).into();
143 #[derive(Serialize, Deserialize)]
144 #[allow(non_camel_case_types)]
145 #[serde(rename_all = "kebab-case")]
146 /// Deletable property name
147 pub enum DeletableProperty
{
148 /// Delete export-slots.
157 schema
: CHANGER_NAME_SCHEMA
,
160 type: ScsiTapeChangerUpdater
,
164 description
: "List of properties to delete.",
168 type: DeletableProperty
,
172 schema
: PROXMOX_CONFIG_DIGEST_SCHEMA
,
178 permission
: &Permission
::Privilege(&["tape", "device", "{name}"], PRIV_TAPE_MODIFY
, false),
181 /// Update a tape changer configuration
182 pub fn update_changer(
184 update
: ScsiTapeChangerUpdater
,
185 delete
: Option
<Vec
<DeletableProperty
>>,
186 digest
: Option
<String
>,
188 ) -> Result
<(), Error
> {
190 let _lock
= pbs_config
::drive
::lock()?
;
192 let (mut config
, expected_digest
) = pbs_config
::drive
::config()?
;
194 if let Some(ref digest
) = digest
{
195 let digest
= proxmox
::tools
::hex_to_digest(digest
)?
;
196 crate::tools
::detect_modified_configuration_file(&digest
, &expected_digest
)?
;
199 let mut data
: ScsiTapeChanger
= config
.lookup("changer", &name
)?
;
201 if let Some(delete
) = delete
{
202 for delete_prop
in delete
{
204 DeletableProperty
::export_slots
=> {
205 data
.export_slots
= None
;
211 if let Some(path
) = update
.path
{
212 let changers
= linux_tape_changer_list();
213 check_drive_path(&changers
, &path
)?
;
217 if let Some(export_slots
) = update
.export_slots
{
218 let slots
: Value
= parse_property_string(
219 &export_slots
, &SLOT_ARRAY_SCHEMA
221 let mut slots
: Vec
<String
> = slots
225 .map(|v
| v
.to_string())
229 if slots
.is_empty() {
230 data
.export_slots
= None
;
232 let slots
= slots
.join(",");
233 data
.export_slots
= Some(slots
);
237 config
.set_data(&name
, "changer", &data
)?
;
239 pbs_config
::drive
::save_config(&config
)?
;
249 schema
: CHANGER_NAME_SCHEMA
,
254 permission
: &Permission
::Privilege(&["tape", "device", "{name}"], PRIV_TAPE_MODIFY
, false),
257 /// Delete a tape changer configuration
258 pub fn delete_changer(name
: String
, _param
: Value
) -> Result
<(), Error
> {
260 let _lock
= pbs_config
::drive
::lock()?
;
262 let (mut config
, _digest
) = pbs_config
::drive
::config()?
;
264 match config
.sections
.get(&name
) {
265 Some((section_type
, _
)) => {
266 if section_type
!= "changer" {
267 bail
!("Entry '{}' exists, but is not a changer device", name
);
269 config
.sections
.remove(&name
);
271 None
=> bail
!("Delete changer '{}' failed - no such entry", name
),
274 let drive_list
: Vec
<LtoTapeDrive
> = config
.convert_to_typed_array("lto")?
;
275 for drive
in drive_list
{
276 if let Some(changer
) = drive
.changer
{
278 bail
!("Delete changer '{}' failed - used by drive '{}'", name
, drive
.name
);
283 pbs_config
::drive
::save_config(&config
)?
;
288 const ITEM_ROUTER
: Router
= Router
::new()
289 .get(&API_METHOD_GET_CONFIG
)
290 .put(&API_METHOD_UPDATE_CHANGER
)
291 .delete(&API_METHOD_DELETE_CHANGER
);
294 pub const ROUTER
: Router
= Router
::new()
295 .get(&API_METHOD_LIST_CHANGERS
)
296 .post(&API_METHOD_CREATE_CHANGER
)
297 .match_all("name", &ITEM_ROUTER
);