]> git.proxmox.com Git - proxmox-backup.git/blame - src/bin/proxmox-backup-proxy.rs
rename src/api to src/api_schema
[proxmox-backup.git] / src / bin / proxmox-backup-proxy.rs
CommitLineData
9d02e5c3 1#[macro_use]
02c7a755
DM
2extern crate proxmox_backup;
3
4223d9f8 4use proxmox_backup::tools;
dc9a007b
DM
5use proxmox_backup::api_schema::router::*;
6use proxmox_backup::api_schema::config::*;
02c7a755 7use proxmox_backup::server::rest::*;
d01e2420 8use proxmox_backup::auth_helpers::*;
02c7a755 9
0d176f36 10use failure::*;
02c7a755
DM
11use lazy_static::lazy_static;
12
13use futures::future::Future;
0d176f36 14use futures::stream::Stream;
02c7a755
DM
15
16use hyper;
17
18fn main() {
19
4223d9f8
DM
20 if let Err(err) = run() {
21 eprintln!("Error: {}", err);
22 std::process::exit(-1);
23 }
24}
25
26fn run() -> Result<(), Error> {
27
02c7a755
DM
28 if let Err(err) = syslog::init(
29 syslog::Facility::LOG_DAEMON,
30 log::LevelFilter::Info,
31 Some("proxmox-backup-proxy")) {
4223d9f8 32 bail!("unable to inititialize syslog - {}", err);
02c7a755
DM
33 }
34
d01e2420
DM
35 let _ = public_auth_key(); // load with lazy_static
36 let _ = csrf_secret(); // load with lazy_static
37
02c7a755
DM
38 lazy_static!{
39 static ref ROUTER: Router = proxmox_backup::api2::router();
40 }
41
42 let mut config = ApiConfig::new(
6285b251 43 env!("PROXMOX_JSDIR"), &ROUTER, RpcEnvironmentType::PUBLIC);
02c7a755
DM
44
45 // add default dirs which includes jquery and bootstrap
46 // my $base = '/usr/share/libpve-http-server-perl';
47 // add_dirs($self->{dirs}, '/css/' => "$base/css/");
48 // add_dirs($self->{dirs}, '/js/' => "$base/js/");
49 // add_dirs($self->{dirs}, '/fonts/' => "$base/fonts/");
50 config.add_alias("novnc", "/usr/share/novnc-pve");
51 config.add_alias("extjs", "/usr/share/javascript/extjs");
52 config.add_alias("fontawesome", "/usr/share/fonts-font-awesome");
53 config.add_alias("xtermjs", "/usr/share/pve-xtermjs");
54 config.add_alias("widgettoolkit", "/usr/share/javascript/proxmox-widget-toolkit");
55
56 let rest_server = RestServer::new(config);
57
4223d9f8 58 let cert_path = configdir!("/proxy.pfx");
a8f268af 59 let raw_cert = tools::file_get_contents(cert_path)?;
4223d9f8
DM
60
61 let identity = match native_tls::Identity::from_pkcs12(&raw_cert, "") {
62 Ok(data) => data,
63 Err(err) => bail!("unabled to decode pkcs12 identity {} - {}", cert_path, err),
64 };
0d176f36
WB
65
66 let addr = ([0,0,0,0,0,0,0,0], 8007).into();
4223d9f8
DM
67 let listener = tokio::net::TcpListener::bind(&addr)?;
68 let acceptor = native_tls::TlsAcceptor::new(identity)?;
0d176f36
WB
69 let acceptor = std::sync::Arc::new(tokio_tls::TlsAcceptor::from(acceptor));
70 let connections = listener
71 .incoming()
72 .map_err(|e| Error::from(e))
73 .and_then(move |sock| acceptor.accept(sock).map_err(|e| e.into()))
74 .then(|r| match r {
75 // accept()s can fail here with an Err() when eg. the client rejects
76 // the cert and closes the connection, so we follow up with mapping
77 // it to an option and then filtering None with filter_map
78 Ok(c) => Ok::<_, Error>(Some(c)),
79 Err(_) => Ok(None),
80 })
81 .filter_map(|r| {
82 // Filter out the Nones
83 r
84 });
85
86 let server = hyper::Server::builder(connections)
02c7a755
DM
87 .serve(rest_server)
88 .map_err(|e| eprintln!("server error: {}", e));
89
02c7a755
DM
90 // Run this server for... forever!
91 hyper::rt::run(server);
4223d9f8
DM
92
93 Ok(())
02c7a755 94}