1 use anyhow
::{bail, Error}
;
2 use ::serde
::{Deserialize, Serialize}
;
6 use proxmox_router
::{Router, RpcEnvironment, Permission}
;
7 use proxmox_schema
::api
;
10 Authid
, ScsiTapeChanger
, ScsiTapeChangerUpdater
, LtoTapeDrive
,
11 PROXMOX_CONFIG_DIGEST_SCHEMA
, CHANGER_NAME_SCHEMA
, SLOT_ARRAY_SCHEMA
,
12 PRIV_TAPE_AUDIT
, PRIV_TAPE_MODIFY
,
14 use pbs_config
::CachedUserInfo
;
15 use pbs_tape
::linux_list_drives
::{linux_tape_changer_list, check_drive_path}
;
22 type: ScsiTapeChanger
,
28 permission
: &Permission
::Privilege(&["tape", "device"], PRIV_TAPE_MODIFY
, false),
31 /// Create a new changer device
32 pub fn create_changer(config
: ScsiTapeChanger
) -> Result
<(), Error
> {
34 let _lock
= pbs_config
::drive
::lock()?
;
36 let (mut section_config
, _digest
) = pbs_config
::drive
::config()?
;
38 let linux_changers
= linux_tape_changer_list();
40 check_drive_path(&linux_changers
, &config
.path
)?
;
42 let existing
: Vec
<ScsiTapeChanger
> = section_config
.convert_to_typed_array("changer")?
;
44 for changer
in existing
{
45 if changer
.name
== config
.name
{
46 bail
!("Entry '{}' already exists", config
.name
);
49 if changer
.path
== config
.path
{
50 bail
!("Path '{}' already in use by '{}'", config
.path
, changer
.name
);
54 section_config
.set_data(&config
.name
, "changer", &config
)?
;
56 pbs_config
::drive
::save_config(§ion_config
)?
;
65 schema
: CHANGER_NAME_SCHEMA
,
70 type: ScsiTapeChanger
,
73 permission
: &Permission
::Privilege(&["tape", "device", "{name}"], PRIV_TAPE_AUDIT
, false),
76 /// Get tape changer configuration
80 mut rpcenv
: &mut dyn RpcEnvironment
,
81 ) -> Result
<ScsiTapeChanger
, Error
> {
83 let (config
, digest
) = pbs_config
::drive
::config()?
;
85 let data
: ScsiTapeChanger
= config
.lookup("changer", &name
)?
;
87 rpcenv
["digest"] = hex
::encode(&digest
).into();
97 description
: "The list of configured changers (with config digest).",
100 type: ScsiTapeChanger
,
104 description
: "List configured tape changer filtered by Tape.Audit privileges",
105 permission
: &Permission
::Anybody
,
109 pub fn list_changers(
111 mut rpcenv
: &mut dyn RpcEnvironment
,
112 ) -> Result
<Vec
<ScsiTapeChanger
>, Error
> {
113 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
114 let user_info
= CachedUserInfo
::new()?
;
116 let (config
, digest
) = pbs_config
::drive
::config()?
;
118 let list
: Vec
<ScsiTapeChanger
> = config
.convert_to_typed_array("changer")?
;
123 let privs
= user_info
.lookup_privs(&auth_id
, &["tape", "device", &changer
.name
]);
124 privs
& PRIV_TAPE_AUDIT
!= 0
128 rpcenv
["digest"] = hex
::encode(&digest
).into();
133 #[derive(Serialize, Deserialize)]
134 #[allow(non_camel_case_types)]
135 #[serde(rename_all = "kebab-case")]
136 /// Deletable property name
137 pub enum DeletableProperty
{
138 /// Delete export-slots.
147 schema
: CHANGER_NAME_SCHEMA
,
150 type: ScsiTapeChangerUpdater
,
154 description
: "List of properties to delete.",
158 type: DeletableProperty
,
162 schema
: PROXMOX_CONFIG_DIGEST_SCHEMA
,
168 permission
: &Permission
::Privilege(&["tape", "device", "{name}"], PRIV_TAPE_MODIFY
, false),
171 /// Update a tape changer configuration
172 pub fn update_changer(
174 update
: ScsiTapeChangerUpdater
,
175 delete
: Option
<Vec
<DeletableProperty
>>,
176 digest
: Option
<String
>,
178 ) -> Result
<(), Error
> {
180 let _lock
= pbs_config
::drive
::lock()?
;
182 let (mut config
, expected_digest
) = pbs_config
::drive
::config()?
;
184 if let Some(ref digest
) = digest
{
185 let digest
= <[u8; 32]>::from_hex(digest
)?
;
186 crate::tools
::detect_modified_configuration_file(&digest
, &expected_digest
)?
;
189 let mut data
: ScsiTapeChanger
= config
.lookup("changer", &name
)?
;
191 if let Some(delete
) = delete
{
192 for delete_prop
in delete
{
194 DeletableProperty
::export_slots
=> {
195 data
.export_slots
= None
;
201 if let Some(path
) = update
.path
{
202 let changers
= linux_tape_changer_list();
203 check_drive_path(&changers
, &path
)?
;
207 if let Some(export_slots
) = update
.export_slots
{
208 let slots
: Value
= SLOT_ARRAY_SCHEMA
.parse_property_string(&export_slots
)?
;
209 let mut slots
: Vec
<String
> = slots
213 .map(|v
| v
.to_string())
217 if slots
.is_empty() {
218 data
.export_slots
= None
;
220 let slots
= slots
.join(",");
221 data
.export_slots
= Some(slots
);
225 config
.set_data(&name
, "changer", &data
)?
;
227 pbs_config
::drive
::save_config(&config
)?
;
237 schema
: CHANGER_NAME_SCHEMA
,
242 permission
: &Permission
::Privilege(&["tape", "device", "{name}"], PRIV_TAPE_MODIFY
, false),
245 /// Delete a tape changer configuration
246 pub fn delete_changer(name
: String
, _param
: Value
) -> Result
<(), Error
> {
248 let _lock
= pbs_config
::drive
::lock()?
;
250 let (mut config
, _digest
) = pbs_config
::drive
::config()?
;
252 match config
.sections
.get(&name
) {
253 Some((section_type
, _
)) => {
254 if section_type
!= "changer" {
255 bail
!("Entry '{}' exists, but is not a changer device", name
);
257 config
.sections
.remove(&name
);
259 None
=> bail
!("Delete changer '{}' failed - no such entry", name
),
262 let drive_list
: Vec
<LtoTapeDrive
> = config
.convert_to_typed_array("lto")?
;
263 for drive
in drive_list
{
264 if let Some(changer
) = drive
.changer
{
266 bail
!("Delete changer '{}' failed - used by drive '{}'", name
, drive
.name
);
271 pbs_config
::drive
::save_config(&config
)?
;
276 const ITEM_ROUTER
: Router
= Router
::new()
277 .get(&API_METHOD_GET_CONFIG
)
278 .put(&API_METHOD_UPDATE_CHANGER
)
279 .delete(&API_METHOD_DELETE_CHANGER
);
282 pub const ROUTER
: Router
= Router
::new()
283 .get(&API_METHOD_LIST_CHANGERS
)
284 .post(&API_METHOD_CREATE_CHANGER
)
285 .match_all("name", &ITEM_ROUTER
);