use std::path::PathBuf;
-use failure::*;
-use serde_json::{json, Value};
+use anyhow::{bail, Error};
+use serde_json::Value;
+use ::serde::{Deserialize, Serialize};
-use proxmox::api::{ApiHandler, ApiMethod, Router, RpcEnvironment};
-use proxmox::api::schema::*;
+use proxmox::api::{api, Router, RpcEnvironment, Permission};
+use proxmox::tools::fs::open_file_locked;
use crate::api2::types::*;
use crate::backup::*;
-use crate::config::datastore;
+use crate::config::cached_user_info::CachedUserInfo;
+use crate::config::datastore::{self, DataStoreConfig, DIR_NAME_SCHEMA};
+use crate::config::acl::{PRIV_DATASTORE_ALLOCATE, PRIV_DATASTORE_AUDIT, PRIV_DATASTORE_MODIFY};
+use crate::server::jobstate;
-pub const GET: ApiMethod = ApiMethod::new(
- &ApiHandler::Sync(&get_datastore_list),
- &ObjectSchema::new("Directory index.", &[])
-);
-
-fn get_datastore_list(
+#[api(
+ input: {
+ properties: {},
+ },
+ returns: {
+ description: "List the configured datastores (with config digest).",
+ type: Array,
+ items: { type: datastore::DataStoreConfig },
+ },
+ access: {
+ permission: &Permission::Anybody,
+ },
+)]
+/// List all datastores
+pub fn list_datastores(
_param: Value,
- _info: &ApiMethod,
- _rpcenv: &mut dyn RpcEnvironment,
-) -> Result<Value, Error> {
+ mut rpcenv: &mut dyn RpcEnvironment,
+) -> Result<Vec<DataStoreConfig>, Error> {
+
+ let (config, digest) = datastore::config()?;
+
+ let userid: Userid = rpcenv.get_user().unwrap().parse()?;
+ let user_info = CachedUserInfo::new()?;
- let config = datastore::config()?;
+ rpcenv["digest"] = proxmox::tools::digest_to_hex(&digest).into();
- Ok(config.convert_to_array("name"))
+ let list:Vec<DataStoreConfig> = config.convert_to_typed_array("datastore")?;
+ let filter_by_privs = |store: &DataStoreConfig| {
+ let user_privs = user_info.lookup_privs(&userid, &["datastore", &store.name]);
+ (user_privs & PRIV_DATASTORE_AUDIT) != 0
+ };
+
+ Ok(list.into_iter().filter(filter_by_privs).collect())
}
-pub const POST: ApiMethod = ApiMethod::new(
- &ApiHandler::Sync(&create_datastore),
- &ObjectSchema::new(
- "Create new datastore.",
- &[
- ("name", false, &DATASTORE_SCHEMA),
- ("path", false, &StringSchema::new("Directory path (must exist).").schema()),
- ],
- )
-);
-fn create_datastore(
- param: Value,
- _info: &ApiMethod,
- _rpcenv: &mut dyn RpcEnvironment,
-) -> Result<Value, Error> {
+// fixme: impl. const fn get_object_schema(datastore::DataStoreConfig::API_SCHEMA),
+// but this need support for match inside const fn
+// see: https://github.com/rust-lang/rust/issues/49146
+
+#[api(
+ protected: true,
+ input: {
+ properties: {
+ name: {
+ schema: DATASTORE_SCHEMA,
+ },
+ path: {
+ schema: DIR_NAME_SCHEMA,
+ },
+ comment: {
+ optional: true,
+ schema: SINGLE_LINE_COMMENT_SCHEMA,
+ },
+ "gc-schedule": {
+ optional: true,
+ schema: GC_SCHEDULE_SCHEMA,
+ },
+ "prune-schedule": {
+ optional: true,
+ schema: PRUNE_SCHEDULE_SCHEMA,
+ },
+ "keep-last": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_LAST,
+ },
+ "keep-hourly": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_HOURLY,
+ },
+ "keep-daily": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_DAILY,
+ },
+ "keep-weekly": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_WEEKLY,
+ },
+ "keep-monthly": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_MONTHLY,
+ },
+ "keep-yearly": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_YEARLY,
+ },
+ },
+ },
+ access: {
+ permission: &Permission::Privilege(&["datastore"], PRIV_DATASTORE_ALLOCATE, false),
+ },
+)]
+/// Create new datastore config.
+pub fn create_datastore(param: Value) -> Result<(), Error> {
- // fixme: locking ?
+ let _lock = open_file_locked(datastore::DATASTORE_CFG_LOCKFILE, std::time::Duration::new(10, 0), true)?;
- let mut config = datastore::config()?;
+ let datastore: datastore::DataStoreConfig = serde_json::from_value(param.clone())?;
- let name = param["name"].as_str().unwrap();
+ let (mut config, _digest) = datastore::config()?;
- if let Some(_) = config.sections.get(name) {
- bail!("datastore '{}' already exists.", name);
+ if let Some(_) = config.sections.get(&datastore.name) {
+ bail!("datastore '{}' already exists.", datastore.name);
}
- let path: PathBuf = param["path"].as_str().unwrap().into();
- let _store = ChunkStore::create(name, path)?;
+ let path: PathBuf = datastore.path.clone().into();
- let datastore = json!({
- "path": param["path"]
- });
+ let backup_user = crate::backup::backup_user()?;
+ let _store = ChunkStore::create(&datastore.name, path, backup_user.uid, backup_user.gid)?;
- config.set_data(name, "datastore", datastore);
+ config.set_data(&datastore.name, "datastore", &datastore)?;
datastore::save_config(&config)?;
- Ok(Value::Null)
+ jobstate::create_state_file("prune", &datastore.name)?;
+ jobstate::create_state_file("garbage_collection", &datastore.name)?;
+
+ Ok(())
+}
+
+#[api(
+ input: {
+ properties: {
+ name: {
+ schema: DATASTORE_SCHEMA,
+ },
+ },
+ },
+ returns: {
+ description: "The datastore configuration (with config digest).",
+ type: datastore::DataStoreConfig,
+ },
+ access: {
+ permission: &Permission::Privilege(&["datastore", "{name}"], PRIV_DATASTORE_AUDIT, false),
+ },
+)]
+/// Read a datastore configuration.
+pub fn read_datastore(
+ name: String,
+ mut rpcenv: &mut dyn RpcEnvironment,
+) -> Result<DataStoreConfig, Error> {
+ let (config, digest) = datastore::config()?;
+
+ let store_config = config.lookup("datastore", &name)?;
+ rpcenv["digest"] = proxmox::tools::digest_to_hex(&digest).into();
+
+ Ok(store_config)
}
-pub const DELETE: ApiMethod = ApiMethod::new(
- &ApiHandler::Sync(&delete_datastore),
- &ObjectSchema::new(
- "Remove a datastore configuration.",
- &[
- ("name", false, &DATASTORE_SCHEMA),
- ],
- )
-);
+#[api()]
+#[derive(Serialize, Deserialize)]
+#[serde(rename_all="kebab-case")]
+#[allow(non_camel_case_types)]
+/// Deletable property name
+pub enum DeletableProperty {
+ /// Delete the comment property.
+ comment,
+ /// Delete the garbage collection schedule.
+ gc_schedule,
+ /// Delete the prune job schedule.
+ prune_schedule,
+ /// Delete the keep-last property
+ keep_last,
+ /// Delete the keep-hourly property
+ keep_hourly,
+ /// Delete the keep-daily property
+ keep_daily,
+ /// Delete the keep-weekly property
+ keep_weekly,
+ /// Delete the keep-monthly property
+ keep_monthly,
+ /// Delete the keep-yearly property
+ keep_yearly,
+}
+
+#[api(
+ protected: true,
+ input: {
+ properties: {
+ name: {
+ schema: DATASTORE_SCHEMA,
+ },
+ comment: {
+ optional: true,
+ schema: SINGLE_LINE_COMMENT_SCHEMA,
+ },
+ "gc-schedule": {
+ optional: true,
+ schema: GC_SCHEDULE_SCHEMA,
+ },
+ "prune-schedule": {
+ optional: true,
+ schema: PRUNE_SCHEDULE_SCHEMA,
+ },
+ "keep-last": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_LAST,
+ },
+ "keep-hourly": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_HOURLY,
+ },
+ "keep-daily": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_DAILY,
+ },
+ "keep-weekly": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_WEEKLY,
+ },
+ "keep-monthly": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_MONTHLY,
+ },
+ "keep-yearly": {
+ optional: true,
+ schema: PRUNE_SCHEMA_KEEP_YEARLY,
+ },
+ delete: {
+ description: "List of properties to delete.",
+ type: Array,
+ optional: true,
+ items: {
+ type: DeletableProperty,
+ }
+ },
+ digest: {
+ optional: true,
+ schema: PROXMOX_CONFIG_DIGEST_SCHEMA,
+ },
+ },
+ },
+ access: {
+ permission: &Permission::Privilege(&["datastore", "{name}"], PRIV_DATASTORE_MODIFY, false),
+ },
+)]
+/// Update datastore config.
+pub fn update_datastore(
+ name: String,
+ comment: Option<String>,
+ gc_schedule: Option<String>,
+ prune_schedule: Option<String>,
+ keep_last: Option<u64>,
+ keep_hourly: Option<u64>,
+ keep_daily: Option<u64>,
+ keep_weekly: Option<u64>,
+ keep_monthly: Option<u64>,
+ keep_yearly: Option<u64>,
+ delete: Option<Vec<DeletableProperty>>,
+ digest: Option<String>,
+) -> Result<(), Error> {
+
+ let _lock = open_file_locked(datastore::DATASTORE_CFG_LOCKFILE, std::time::Duration::new(10, 0), true)?;
+
+ // pass/compare digest
+ let (mut config, expected_digest) = datastore::config()?;
+
+ if let Some(ref digest) = digest {
+ let digest = proxmox::tools::hex_to_digest(digest)?;
+ crate::tools::detect_modified_configuration_file(&digest, &expected_digest)?;
+ }
+
+ let mut data: datastore::DataStoreConfig = config.lookup("datastore", &name)?;
+
+ if let Some(delete) = delete {
+ for delete_prop in delete {
+ match delete_prop {
+ DeletableProperty::comment => { data.comment = None; },
+ DeletableProperty::gc_schedule => { data.gc_schedule = None; },
+ DeletableProperty::prune_schedule => { data.prune_schedule = None; },
+ DeletableProperty::keep_last => { data.keep_last = None; },
+ DeletableProperty::keep_hourly => { data.keep_hourly = None; },
+ DeletableProperty::keep_daily => { data.keep_daily = None; },
+ DeletableProperty::keep_weekly => { data.keep_weekly = None; },
+ DeletableProperty::keep_monthly => { data.keep_monthly = None; },
+ DeletableProperty::keep_yearly => { data.keep_yearly = None; },
+ }
+ }
+ }
+
+ if let Some(comment) = comment {
+ let comment = comment.trim().to_string();
+ if comment.is_empty() {
+ data.comment = None;
+ } else {
+ data.comment = Some(comment);
+ }
+ }
+
+ let mut gc_schedule_changed = false;
+ if gc_schedule.is_some() {
+ gc_schedule_changed = data.gc_schedule != gc_schedule;
+ data.gc_schedule = gc_schedule;
+ }
+
+ let mut prune_schedule_changed = false;
+ if prune_schedule.is_some() {
+ prune_schedule_changed = data.prune_schedule != prune_schedule;
+ data.prune_schedule = prune_schedule;
+ }
-fn delete_datastore(
- param: Value,
- _info: &ApiMethod,
- _rpcenv: &mut dyn RpcEnvironment,
-) -> Result<Value, Error> {
- println!("This is a test {}", param);
+ if keep_last.is_some() { data.keep_last = keep_last; }
+ if keep_hourly.is_some() { data.keep_hourly = keep_hourly; }
+ if keep_daily.is_some() { data.keep_daily = keep_daily; }
+ if keep_weekly.is_some() { data.keep_weekly = keep_weekly; }
+ if keep_monthly.is_some() { data.keep_monthly = keep_monthly; }
+ if keep_yearly.is_some() { data.keep_yearly = keep_yearly; }
- // fixme: locking ?
- // fixme: check digest ?
+ config.set_data(&name, "datastore", &data)?;
- let mut config = datastore::config()?;
+ datastore::save_config(&config)?;
- let name = param["name"].as_str().unwrap();
+ // we want to reset the statefiles, to avoid an immediate action in some cases
+ // (e.g. going from monthly to weekly in the second week of the month)
+ if gc_schedule_changed {
+ jobstate::create_state_file("garbage_collection", &name)?;
+ }
+
+ if prune_schedule_changed {
+ jobstate::create_state_file("prune", &name)?;
+ }
- match config.sections.get(name) {
- Some(_) => { config.sections.remove(name); },
+ Ok(())
+}
+
+#[api(
+ protected: true,
+ input: {
+ properties: {
+ name: {
+ schema: DATASTORE_SCHEMA,
+ },
+ digest: {
+ optional: true,
+ schema: PROXMOX_CONFIG_DIGEST_SCHEMA,
+ },
+ },
+ },
+ access: {
+ permission: &Permission::Privilege(&["datastore", "{name}"], PRIV_DATASTORE_ALLOCATE, false),
+ },
+)]
+/// Remove a datastore configuration.
+pub fn delete_datastore(name: String, digest: Option<String>) -> Result<(), Error> {
+
+ let _lock = open_file_locked(datastore::DATASTORE_CFG_LOCKFILE, std::time::Duration::new(10, 0), true)?;
+
+ let (mut config, expected_digest) = datastore::config()?;
+
+ if let Some(ref digest) = digest {
+ let digest = proxmox::tools::hex_to_digest(digest)?;
+ crate::tools::detect_modified_configuration_file(&digest, &expected_digest)?;
+ }
+
+ match config.sections.get(&name) {
+ Some(_) => { config.sections.remove(&name); },
None => bail!("datastore '{}' does not exist.", name),
}
datastore::save_config(&config)?;
- Ok(Value::Null)
+ // ignore errors
+ let _ = jobstate::remove_state_file("prune", &name);
+ let _ = jobstate::remove_state_file("garbage_collection", &name);
+
+ Ok(())
}
+const ITEM_ROUTER: Router = Router::new()
+ .get(&API_METHOD_READ_DATASTORE)
+ .put(&API_METHOD_UPDATE_DATASTORE)
+ .delete(&API_METHOD_DELETE_DATASTORE);
+
pub const ROUTER: Router = Router::new()
- .get(&GET)
- .post(&POST)
- .delete(&DELETE);
+ .get(&API_METHOD_LIST_DATASTORES)
+ .post(&API_METHOD_CREATE_DATASTORE)
+ .match_all("name", &ITEM_ROUTER);