-extern crate proxmox_backup;
-
use std::sync::Arc;
-use proxmox_backup::api::schema::*;
-use proxmox_backup::api::router::*;
-use proxmox_backup::api::config::*;
-use proxmox_backup::server::rest::*;
-use proxmox_backup::getopts;
-use proxmox_backup::auth_helpers::*;
-
-//use failure::*;
-use lazy_static::lazy_static;
+use failure::*;
+use futures::*;
+use hyper;
+use openssl::ssl::{SslMethod, SslAcceptor, SslFiletype};
-use futures::future::Future;
+use proxmox::try_block;
+use proxmox::api::RpcEnvironmentType;
-use hyper;
+use proxmox_backup::configdir;
+use proxmox_backup::buildcfg;
+use proxmox_backup::server;
+use proxmox_backup::tools::daemon;
+use proxmox_backup::server::{ApiConfig, rest::*};
+use proxmox_backup::auth_helpers::*;
fn main() {
+ if let Err(err) = proxmox_backup::tools::runtime::main(run()) {
+ eprintln!("Error: {}", err);
+ std::process::exit(-1);
+ }
+}
+async fn run() -> Result<(), Error> {
if let Err(err) = syslog::init(
syslog::Facility::LOG_DAEMON,
log::LevelFilter::Info,
Some("proxmox-backup-proxy")) {
- eprintln!("unable to inititialize syslog: {}", err);
- std::process::exit(-1);
+ bail!("unable to inititialize syslog - {}", err);
}
let _ = public_auth_key(); // load with lazy_static
let _ = csrf_secret(); // load with lazy_static
- let command : Arc<Schema> = StringSchema::new("Command.")
- .format(Arc::new(ApiStringFormat::Enum(vec![
- "start".into(),
- "status".into(),
- "stop".into()
- ])))
- .into();
-
- let schema = ObjectSchema::new("Parameters.")
- .required("command", command);
-
- let args: Vec<String> = std::env::args().skip(1).collect();
-
- let options = match getopts::parse_arguments(&args, &vec!["command"], &schema) {
- Ok((options, rest)) => {
- if !rest.is_empty() {
- eprintln!("Error: got additional arguments: {:?}", rest);
- std::process::exit(-1);
- }
- options
- }
- Err(err) => {
- eprintln!("Error: unable to parse arguments:\n{}", err);
- std::process::exit(-1);
- }
- };
-
- let command = options["command"].as_str().unwrap();
-
- match command {
- "start" => {
- println!("Starting server.");
- },
- "stop" => {
- println!("Stopping server.");
- std::process::exit(0);
- },
- "status" => {
- println!("Server status.");
- std::process::exit(0);
- },
- _ => {
- eprintln!("got unexpected command {}", command);
- std::process::exit(-1);
- },
- }
-
- let addr = ([0,0,0,0,0,0,0,0], 8007).into();
-
- lazy_static!{
- static ref ROUTER: Router = proxmox_backup::api2::router();
- }
-
let mut config = ApiConfig::new(
- "/usr/share/javascript/proxmox-backup", &ROUTER, RpcEnvironmentType::PUBLIC);
+ buildcfg::JS_DIR, &proxmox_backup::api2::ROUTER, RpcEnvironmentType::PUBLIC);
// add default dirs which includes jquery and bootstrap
// my $base = '/usr/share/libpve-http-server-perl';
config.add_alias("fontawesome", "/usr/share/fonts-font-awesome");
config.add_alias("xtermjs", "/usr/share/pve-xtermjs");
config.add_alias("widgettoolkit", "/usr/share/javascript/proxmox-widget-toolkit");
+ config.add_alias("css", "/usr/share/javascript/proxmox-backup/css");
+ config.add_alias("docs", "/usr/share/doc/proxmox-backup/html");
let rest_server = RestServer::new(config);
- let server = hyper::Server::bind(&addr)
- .serve(rest_server)
- .map_err(|e| eprintln!("server error: {}", e));
+ //openssl req -x509 -newkey rsa:4096 -keyout /etc/proxmox-backup/proxy.key -out /etc/proxmox-backup/proxy.pem -nodes
+ let key_path = configdir!("/proxy.key");
+ let cert_path = configdir!("/proxy.pem");
+
+ let mut acceptor = SslAcceptor::mozilla_intermediate(SslMethod::tls()).unwrap();
+ acceptor.set_private_key_file(key_path, SslFiletype::PEM)
+ .map_err(|err| format_err!("unable to read proxy key {} - {}", key_path, err))?;
+ acceptor.set_certificate_chain_file(cert_path)
+ .map_err(|err| format_err!("unable to read proxy cert {} - {}", cert_path, err))?;
+ acceptor.check_private_key().unwrap();
+
+ let acceptor = Arc::new(acceptor.build());
+
+ let server = daemon::create_daemon(
+ ([0,0,0,0,0,0,0,0], 8007).into(),
+ |listener, ready| {
+ let connections = proxmox_backup::tools::async_io::StaticIncoming::from(listener)
+ .map_err(Error::from)
+ .try_filter_map(move |(sock, _addr)| {
+ let acceptor = Arc::clone(&acceptor);
+ async move {
+ sock.set_nodelay(true).unwrap();
+ sock.set_send_buffer_size(1024*1024).unwrap();
+ sock.set_recv_buffer_size(1024*1024).unwrap();
+ Ok(tokio_openssl::accept(&acceptor, sock)
+ .await
+ .ok() // handshake errors aren't be fatal, so return None to filter
+ )
+ }
+ });
+ let connections = proxmox_backup::tools::async_io::HyperAccept(connections);
+
+ Ok(ready
+ .and_then(|_| hyper::Server::builder(connections)
+ .serve(rest_server)
+ .with_graceful_shutdown(server::shutdown_future())
+ .map_err(Error::from)
+ )
+ .map_err(|err| eprintln!("server error: {}", err))
+ .map(|_| ())
+ )
+ },
+ );
+
+ daemon::systemd_notify(daemon::SystemdNotify::Ready)?;
+
+ let init_result: Result<(), Error> = try_block!({
+ server::create_task_control_socket()?;
+ server::server_state_init()?;
+ Ok(())
+ });
+
+ if let Err(err) = init_result {
+ bail!("unable to start daemon - {}", err);
+ }
+ server.await?;
+ log::info!("server shutting down, waiting for active workers to complete");
+ proxmox_backup::server::last_worker_future().await?;
+ log::info!("done - exit server");
- // Run this server for... forever!
- hyper::rt::run(server);
+ Ok(())
}