]> git.proxmox.com Git - proxmox-backup.git/blobdiff - src/bin/proxmox-backup-api.rs
proxmox-rest-server: allow to catch SIGINT and SIGHUP separately
[proxmox-backup.git] / src / bin / proxmox-backup-api.rs
index 22e35b2e6afa15ddefd8b5658e4de1197e8354ff..35cfc5f06a052403f728d9b96a338d0685828b44 100644 (file)
@@ -1,29 +1,46 @@
-extern crate proxmox_backup;
+use anyhow::{bail, Error};
+use futures::*;
+use http::request::Parts;
+use http::Response;
+use hyper::{Body, StatusCode};
+use hyper::header;
 
-//use proxmox_backup::tools;
-use proxmox_backup::api_schema::router::*;
-use proxmox_backup::api_schema::config::*;
-use proxmox_backup::server::rest::*;
-use proxmox_backup::auth_helpers::*;
-use proxmox_backup::config;
+use proxmox::try_block;
+use proxmox::api::RpcEnvironmentType;
+use proxmox::tools::fs::CreateOptions;
 
-use failure::*;
-use lazy_static::lazy_static;
+use proxmox_rest_server::{daemon, ApiConfig, RestServer};
 
-use futures::future::Future;
-
-use hyper;
+use proxmox_backup::server::auth::default_api_auth;
+use proxmox_backup::auth_helpers::*;
+use proxmox_backup::config;
 
 fn main() {
+    proxmox_backup::tools::setup_safe_path_env();
 
-    if let Err(err) = run() {
+    if let Err(err) = pbs_runtime::main(run()) {
         eprintln!("Error: {}", err);
         std::process::exit(-1);
     }
 }
 
-fn run() -> Result<(), Error> {
+fn get_index(
+    _auth_id: Option<String>,
+    _language: Option<String>,
+    _api: &ApiConfig,
+    _parts: Parts,
+) -> Response<Body> {
+
+    let index = "<center><h1>Proxmox Backup API Server</h1></center>";
+
+    Response::builder()
+        .status(StatusCode::OK)
+        .header(header::CONTENT_TYPE, "text/html")
+        .body(index.into())
+        .unwrap()
+}
 
+async fn run() -> Result<(), Error> {
     if let Err(err) = syslog::init(
         syslog::Facility::LOG_DAEMON,
         log::LevelFilter::Info,
@@ -33,6 +50,17 @@ fn run() -> Result<(), Error> {
 
     config::create_configdir()?;
 
+    config::update_self_signed_cert(false)?;
+
+    proxmox_backup::server::create_run_dir()?;
+
+    proxmox_backup::rrd::create_rrdb_dir()?;
+    proxmox_backup::server::jobstate::create_jobstate_dir()?;
+    proxmox_backup::tape::create_tape_status_dir()?;
+    proxmox_backup::tape::create_drive_state_dir()?;
+    proxmox_backup::tape::create_changer_state_dir()?;
+    proxmox_backup::tape::create_drive_lock_dir()?;
+
     if let Err(err) = generate_auth_key() {
         bail!("unable to generate auth key - {}", err);
     }
@@ -43,23 +71,76 @@ fn run() -> Result<(), Error> {
     }
     let _ = csrf_secret(); // load with lazy_static
 
-    let addr = ([127,0,0,1], 82).into();
+    let mut config = ApiConfig::new(
+        pbs_buildcfg::JS_DIR,
+        &proxmox_backup::api2::ROUTER,
+        RpcEnvironmentType::PRIVILEGED,
+        default_api_auth(),
+        get_index,
+    )?;
 
-    lazy_static!{
-       static ref ROUTER: Router = proxmox_backup::api2::router();
-    }
+    let backup_user = pbs_config::backup_user()?;
+    let mut commando_sock = proxmox_rest_server::CommandoSocket::new(proxmox_rest_server::our_ctrl_sock(), backup_user.gid);
+
+    let dir_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
+    let file_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
+
+    config.enable_file_log(
+        pbs_buildcfg::API_ACCESS_LOG_FN,
+        Some(dir_opts.clone()),
+        Some(file_opts.clone()),
+        &mut commando_sock,
+    )?;
+
+    config.enable_auth_log(
+        pbs_buildcfg::API_AUTH_LOG_FN,
+        Some(dir_opts.clone()),
+        Some(file_opts.clone()),
+        &mut commando_sock,
+    )?;
 
-    let config = ApiConfig::new(
-        env!("PROXMOX_JSDIR"), &ROUTER, RpcEnvironmentType::PRIVILEDGED);
 
     let rest_server = RestServer::new(config);
+    proxmox_rest_server::init_worker_tasks(pbs_buildcfg::PROXMOX_BACKUP_LOG_DIR_M!().into(), file_opts.clone())?;
+
+    // http server future:
+    let server = daemon::create_daemon(
+        ([127,0,0,1], 82).into(),
+        move |listener| {
+            let incoming = hyper::server::conn::AddrIncoming::from_listener(listener)?;
+
+            Ok(async {
+                daemon::systemd_notify(daemon::SystemdNotify::Ready)?;
+
+                hyper::Server::builder(incoming)
+                    .serve(rest_server)
+                    .with_graceful_shutdown(proxmox_rest_server::shutdown_future())
+                    .map_err(Error::from)
+                    .await
+            })
+        },
+        "proxmox-backup.service",
+    );
+
+    proxmox_rest_server::write_pid(pbs_buildcfg::PROXMOX_BACKUP_API_PID_FN)?;
+
+    let init_result: Result<(), Error> = try_block!({
+        proxmox_rest_server::register_task_control_commands(&mut commando_sock)?;
+        commando_sock.spawn()?;
+        proxmox_rest_server::catch_shutdown_signal()?;
+        proxmox_rest_server::catch_reload_signal()?;
+        Ok(())
+    });
+
+    if let Err(err) = init_result {
+        bail!("unable to start daemon - {}", err);
+    }
 
-    let server = hyper::Server::bind(&addr)
-        .serve(rest_server)
-        .map_err(|e| eprintln!("server error: {}", e));
+    server.await?;
+    log::info!("server shutting down, waiting for active workers to complete");
+    proxmox_rest_server::last_worker_future().await?;
 
-    // Run this server for... forever!
-    hyper::rt::run(server);
+    log::info!("done - exit server");
 
     Ok(())
 }