1 use std
::collections
::{HashSet, HashMap}
;
3 use chrono
::{TimeZone, Local}
;
6 use hyper
::http
::request
::Parts
;
7 use hyper
::{header, Body, Response, StatusCode}
;
8 use serde_json
::{json, Value}
;
10 use proxmox
::{sortable, identity}
;
11 use proxmox
::api
::{http_err, list_subdirs_api_method}
;
12 use proxmox
::api
::{ApiFuture, ApiHandler, ApiMethod, Router, RpcEnvironment, RpcEnvironmentType}
;
13 use proxmox
::api
::router
::SubdirMap
;
14 use proxmox
::api
::schema
::*;
15 use proxmox
::tools
::{try_block, fs::file_get_contents, fs::file_set_contents}
;
17 use crate::api2
::types
::*;
19 use crate::config
::datastore
;
20 use crate::server
::WorkerTask
;
23 fn read_backup_index(store
: &DataStore
, backup_dir
: &BackupDir
) -> Result
<Value
, Error
> {
25 let mut path
= store
.base_path();
26 path
.push(backup_dir
.relative_path());
27 path
.push("index.json.blob");
29 let raw_data
= file_get_contents(&path
)?
;
30 let data
= DataBlob
::from_raw(raw_data
)?
.decode(None
)?
;
31 let index_size
= data
.len();
32 let mut result
: Value
= serde_json
::from_reader(&mut &data
[..])?
;
34 let mut result
= result
["files"].take();
36 if result
== Value
::Null
{
37 bail
!("missing 'files' property in backup index {:?}", path
);
40 result
.as_array_mut().unwrap().push(json
!({
41 "filename": "index.json.blob",
48 fn group_backups(backup_list
: Vec
<BackupInfo
>) -> HashMap
<String
, Vec
<BackupInfo
>> {
50 let mut group_hash
= HashMap
::new();
52 for info
in backup_list
{
53 let group_id
= info
.backup_dir
.group().group_path().to_str().unwrap().to_owned();
54 let time_list
= group_hash
.entry(group_id
).or_insert(vec
![]);
64 _rpcenv
: &mut dyn RpcEnvironment
,
65 ) -> Result
<Value
, Error
> {
67 let store
= param
["store"].as_str().unwrap();
69 let datastore
= DataStore
::lookup_datastore(store
)?
;
71 let backup_list
= BackupInfo
::list_backups(&datastore
.base_path())?
;
73 let group_hash
= group_backups(backup_list
);
75 let mut groups
= vec
![];
77 for (_group_id
, mut list
) in group_hash
{
79 BackupInfo
::sort_list(&mut list
, false);
82 let group
= info
.backup_dir
.group();
85 "backup-type": group
.backup_type(),
86 "backup-id": group
.backup_id(),
87 "last-backup": info
.backup_dir
.backup_time().timestamp(),
88 "backup-count": list
.len() as u64,
96 fn list_snapshot_files (
99 _rpcenv
: &mut dyn RpcEnvironment
,
100 ) -> Result
<Value
, Error
> {
102 let store
= tools
::required_string_param(¶m
, "store")?
;
103 let backup_type
= tools
::required_string_param(¶m
, "backup-type")?
;
104 let backup_id
= tools
::required_string_param(¶m
, "backup-id")?
;
105 let backup_time
= tools
::required_integer_param(¶m
, "backup-time")?
;
107 let datastore
= DataStore
::lookup_datastore(store
)?
;
108 let snapshot
= BackupDir
::new(backup_type
, backup_id
, backup_time
);
110 let mut files
= read_backup_index(&datastore
, &snapshot
)?
;
112 let info
= BackupInfo
::new(&datastore
.base_path(), snapshot
)?
;
114 let file_set
= files
.as_array().unwrap().iter().fold(HashSet
::new(), |mut acc
, item
| {
115 acc
.insert(item
["filename"].as_str().unwrap().to_owned());
119 for file
in info
.files
{
120 if file_set
.contains(&file
) { continue; }
121 files
.as_array_mut().unwrap().push(json
!({ "filename": file }
));
127 fn delete_snapshots (
130 _rpcenv
: &mut dyn RpcEnvironment
,
131 ) -> Result
<Value
, Error
> {
133 let store
= tools
::required_string_param(¶m
, "store")?
;
134 let backup_type
= tools
::required_string_param(¶m
, "backup-type")?
;
135 let backup_id
= tools
::required_string_param(¶m
, "backup-id")?
;
136 let backup_time
= tools
::required_integer_param(¶m
, "backup-time")?
;
138 let snapshot
= BackupDir
::new(backup_type
, backup_id
, backup_time
);
140 let datastore
= DataStore
::lookup_datastore(store
)?
;
142 datastore
.remove_backup_dir(&snapshot
)?
;
150 _rpcenv
: &mut dyn RpcEnvironment
,
151 ) -> Result
<Value
, Error
> {
153 let store
= tools
::required_string_param(¶m
, "store")?
;
154 let backup_type
= param
["backup-type"].as_str();
155 let backup_id
= param
["backup-id"].as_str();
157 let datastore
= DataStore
::lookup_datastore(store
)?
;
159 let base_path
= datastore
.base_path();
161 let backup_list
= BackupInfo
::list_backups(&base_path
)?
;
163 let mut snapshots
= vec
![];
165 for info
in backup_list
{
166 let group
= info
.backup_dir
.group();
167 if let Some(backup_type
) = backup_type
{
168 if backup_type
!= group
.backup_type() { continue; }
170 if let Some(backup_id
) = backup_id
{
171 if backup_id
!= group
.backup_id() { continue; }
174 let mut result_item
= json
!({
175 "backup-type": group
.backup_type(),
176 "backup-id": group
.backup_id(),
177 "backup-time": info
.backup_dir
.backup_time().timestamp(),
181 if let Ok(index
) = read_backup_index(&datastore
, &info
.backup_dir
) {
182 let mut backup_size
= 0;
183 for item
in index
.as_array().unwrap().iter() {
184 if let Some(item_size
) = item
["size"].as_u64() {
185 backup_size
+= item_size
;
188 result_item
["size"] = backup_size
.into();
191 snapshots
.push(result_item
);
200 _rpcenv
: &mut dyn RpcEnvironment
,
201 ) -> Result
<Value
, Error
> {
203 let store
= param
["store"].as_str().unwrap();
205 let datastore
= DataStore
::lookup_datastore(store
)?
;
207 let base_path
= datastore
.base_path();
209 let mut stat
: libc
::statfs64
= unsafe { std::mem::zeroed() }
;
213 let res
= base_path
.with_nix_path(|cstr
| unsafe { libc::statfs64(cstr.as_ptr(), &mut stat) }
)?
;
214 nix
::errno
::Errno
::result(res
)?
;
216 let bsize
= stat
.f_bsize
as u64;
218 "total": stat
.f_blocks
*bsize
,
219 "used": (stat
.f_blocks
-stat
.f_bfree
)*bsize
,
220 "avail": stat
.f_bavail
*bsize
,
225 macro_rules
! add_common_prune_prameters
{
226 ( [ $
( $list1
:tt
)* ] ) => {
227 add_common_prune_prameters
!([$
( $list1
)* ] , [])
229 ( [ $
( $list1
:tt
)* ] , [ $
( $list2
:tt
)* ] ) => {
235 &IntegerSchema
::new("Number of daily backups to keep.")
242 &IntegerSchema
::new("Number of backups to keep.")
249 &IntegerSchema
::new("Number of monthly backups to keep.")
256 &IntegerSchema
::new("Number of weekly backups to keep.")
263 &IntegerSchema
::new("Number of yearly backups to keep.")
272 const API_METHOD_STATUS
: ApiMethod
= ApiMethod
::new(
273 &ApiHandler
::Sync(&status
),
275 "Get datastore status.",
276 &add_common_prune_prameters
!([],[
277 ("store", false, &StringSchema
::new("Datastore name.").schema()),
285 _rpcenv
: &mut dyn RpcEnvironment
,
286 ) -> Result
<Value
, Error
> {
288 let store
= param
["store"].as_str().unwrap();
290 let backup_type
= tools
::required_string_param(¶m
, "backup-type")?
;
291 let backup_id
= tools
::required_string_param(¶m
, "backup-id")?
;
293 let group
= BackupGroup
::new(backup_type
, backup_id
);
295 let datastore
= DataStore
::lookup_datastore(store
)?
;
297 let prune_options
= PruneOptions
{
298 keep_last
: param
["keep-last"].as_u64(),
299 keep_daily
: param
["keep-daily"].as_u64(),
300 keep_weekly
: param
["keep-weekly"].as_u64(),
301 keep_monthly
: param
["keep-monthly"].as_u64(),
302 keep_yearly
: param
["keep-yearly"].as_u64(),
305 let worker
= WorkerTask
::new("prune", Some(store
.to_owned()), "root@pam", true)?
;
306 let result
= try_block
! {
307 if !prune_options
.keeps_something() {
308 worker
.log("No prune selection - keeping all files.");
311 worker
.log(format
!("Starting prune on store {}", store
));
314 let list
= group
.list_backups(&datastore
.base_path())?
;
316 let mut prune_info
= compute_prune_info(list
, &prune_options
)?
;
318 prune_info
.reverse(); // delete older snapshots first
320 for (info
, keep
) in prune_info
{
322 worker
.log(format
!("keep {:?}", info
.backup_dir
.relative_path()));
324 worker
.log(format
!("remove {:?}", info
.backup_dir
.relative_path()));
325 datastore
.remove_backup_dir(&info
.backup_dir
)?
;
332 worker
.log_result(&result
);
334 if let Err(err
) = result
{
335 bail
!("prune failed - {}", err
);
341 const API_METHOD_PRUNE
: ApiMethod
= ApiMethod
::new(
342 &ApiHandler
::Sync(&prune
),
344 "Prune the datastore.",
345 &add_common_prune_prameters
!([
346 ("backup-id", false, &BACKUP_ID_SCHEMA
),
347 ("backup-type", false, &BACKUP_TYPE_SCHEMA
),
349 ("store", false, &StringSchema
::new("Datastore name.").schema()),
354 fn start_garbage_collection(
357 rpcenv
: &mut dyn RpcEnvironment
,
358 ) -> Result
<Value
, Error
> {
360 let store
= param
["store"].as_str().unwrap().to_string();
362 let datastore
= DataStore
::lookup_datastore(&store
)?
;
364 println
!("Starting garbage collection on store {}", store
);
366 let to_stdout
= if rpcenv
.env_type() == RpcEnvironmentType
::CLI { true }
else { false }
;
368 let upid_str
= WorkerTask
::new_thread(
369 "garbage_collection", Some(store
.clone()), "root@pam", to_stdout
, move |worker
|
371 worker
.log(format
!("starting garbage collection on store {}", store
));
372 datastore
.garbage_collection(worker
)
379 pub const API_METHOD_START_GARBAGE_COLLECTION
: ApiMethod
= ApiMethod
::new(
380 &ApiHandler
::Sync(&start_garbage_collection
),
382 "Start garbage collection.",
384 ("store", false, &StringSchema
::new("Datastore name.").schema()),
389 fn garbage_collection_status(
392 _rpcenv
: &mut dyn RpcEnvironment
,
393 ) -> Result
<Value
, Error
> {
395 let store
= param
["store"].as_str().unwrap();
397 let datastore
= DataStore
::lookup_datastore(&store
)?
;
399 println
!("Garbage collection status on store {}", store
);
401 let status
= datastore
.last_gc_status();
403 Ok(serde_json
::to_value(&status
)?
)
407 pub const API_METHOD_GARBAGE_COLLECTION_STATUS
: ApiMethod
= ApiMethod
::new(
408 &ApiHandler
::Sync(&garbage_collection_status
),
410 "Garbage collection status.",
412 ("store", false, &StringSchema
::new("Datastore name.").schema()),
417 fn get_datastore_list(
420 _rpcenv
: &mut dyn RpcEnvironment
,
421 ) -> Result
<Value
, Error
> {
423 let config
= datastore
::config()?
;
425 Ok(config
.convert_to_array("store"))
434 _rpcenv
: Box
<dyn RpcEnvironment
>,
438 let store
= tools
::required_string_param(¶m
, "store")?
;
440 let datastore
= DataStore
::lookup_datastore(store
)?
;
442 let file_name
= tools
::required_string_param(¶m
, "file-name")?
.to_owned();
444 let backup_type
= tools
::required_string_param(¶m
, "backup-type")?
;
445 let backup_id
= tools
::required_string_param(¶m
, "backup-id")?
;
446 let backup_time
= tools
::required_integer_param(¶m
, "backup-time")?
;
448 println
!("Download {} from {} ({}/{}/{}/{})", file_name
, store
,
449 backup_type
, backup_id
, Local
.timestamp(backup_time
, 0), file_name
);
451 let backup_dir
= BackupDir
::new(backup_type
, backup_id
, backup_time
);
453 let mut path
= datastore
.base_path();
454 path
.push(backup_dir
.relative_path());
455 path
.push(&file_name
);
457 let file
= tokio
::fs
::File
::open(path
)
458 .map_err(|err
| http_err
!(BAD_REQUEST
, format
!("File open failed: {}", err
)))
461 let payload
= tokio
::codec
::FramedRead
::new(file
, tokio
::codec
::BytesCodec
::new())
462 .map_ok(|bytes
| hyper
::Chunk
::from(bytes
.freeze()));
463 let body
= Body
::wrap_stream(payload
);
465 // fixme: set other headers ?
466 Ok(Response
::builder()
467 .status(StatusCode
::OK
)
468 .header(header
::CONTENT_TYPE
, "application/octet-stream")
475 pub const API_METHOD_DOWNLOAD_FILE
: ApiMethod
= ApiMethod
::new(
476 &ApiHandler
::AsyncHttp(&download_file
),
478 "Download single raw file from backup snapshot.",
480 ("store", false, &StringSchema
::new("Datastore name.").schema()),
481 ("backup-type", false, &BACKUP_TYPE_SCHEMA
),
482 ("backup-id", false, &BACKUP_ID_SCHEMA
),
483 ("backup-time", false, &BACKUP_TIME_SCHEMA
),
484 ("file-name", false, &StringSchema
::new("Raw file name.")
485 .format(&FILENAME_FORMAT
)
492 fn upload_backup_log(
497 _rpcenv
: Box
<dyn RpcEnvironment
>,
501 let store
= tools
::required_string_param(¶m
, "store")?
;
503 let datastore
= DataStore
::lookup_datastore(store
)?
;
505 let file_name
= "client.log.blob";
507 let backup_type
= tools
::required_string_param(¶m
, "backup-type")?
;
508 let backup_id
= tools
::required_string_param(¶m
, "backup-id")?
;
509 let backup_time
= tools
::required_integer_param(¶m
, "backup-time")?
;
511 let backup_dir
= BackupDir
::new(backup_type
, backup_id
, backup_time
);
513 let mut path
= datastore
.base_path();
514 path
.push(backup_dir
.relative_path());
515 path
.push(&file_name
);
518 bail
!("backup already contains a log.");
521 println
!("Upload backup log to {}/{}/{}/{}/{}", store
,
522 backup_type
, backup_id
, BackupDir
::backup_time_to_string(backup_dir
.backup_time()), file_name
);
525 .map_err(Error
::from
)
526 .try_fold(Vec
::new(), |mut acc
, chunk
| {
527 acc
.extend_from_slice(&*chunk
);
528 future
::ok
::<_
, Error
>(acc
)
532 let blob
= DataBlob
::from_raw(data
)?
;
533 // always verify CRC at server side
535 let raw_data
= blob
.raw_data();
536 file_set_contents(&path
, raw_data
, None
)?
;
538 // fixme: use correct formatter
539 Ok(crate::server
::formatter
::json_response(Ok(Value
::Null
)))
544 pub const API_METHOD_UPLOAD_BACKUP_LOG
: ApiMethod
= ApiMethod
::new(
545 &ApiHandler
::AsyncHttp(&upload_backup_log
),
547 "Download single raw file from backup snapshot.",
549 ("store", false, &StringSchema
::new("Datastore name.").schema()),
550 ("backup-type", false, &BACKUP_TYPE_SCHEMA
),
551 ("backup-id", false, &BACKUP_ID_SCHEMA
),
552 ("backup-time", false, &BACKUP_TIME_SCHEMA
),
557 const STORE_SCHEMA
: Schema
= StringSchema
::new("Datastore name.").schema();
560 const DATASTORE_INFO_SUBDIRS
: SubdirMap
= &[
564 .download(&API_METHOD_DOWNLOAD_FILE
)
571 &ApiHandler
::Sync(&list_snapshot_files
),
573 "List snapshot files.",
575 ("store", false, &STORE_SCHEMA
),
576 ("backup-type", false, &BACKUP_TYPE_SCHEMA
),
577 ("backup-id", false, &BACKUP_ID_SCHEMA
),
578 ("backup-time", false, &BACKUP_TIME_SCHEMA
),
587 .get(&API_METHOD_GARBAGE_COLLECTION_STATUS
)
588 .post(&API_METHOD_START_GARBAGE_COLLECTION
)
595 &ApiHandler
::Sync(&list_groups
),
597 "List backup groups.",
598 &sorted
!([ ("store", false, &STORE_SCHEMA
) ]),
606 .post(&API_METHOD_PRUNE
)
613 &ApiHandler
::Sync(&list_snapshots
),
615 "List backup groups.",
617 ("store", false, &STORE_SCHEMA
),
618 ("backup-type", true, &BACKUP_TYPE_SCHEMA
),
619 ("backup-id", true, &BACKUP_ID_SCHEMA
),
626 &ApiHandler
::Sync(&delete_snapshots
),
628 "Delete backup snapshot.",
630 ("store", false, &STORE_SCHEMA
),
631 ("backup-type", false, &BACKUP_TYPE_SCHEMA
),
632 ("backup-id", false, &BACKUP_ID_SCHEMA
),
633 ("backup-time", false, &BACKUP_TIME_SCHEMA
),
642 .get(&API_METHOD_STATUS
)
647 .upload(&API_METHOD_UPLOAD_BACKUP_LOG
)
651 const DATASTORE_INFO_ROUTER
: Router
= Router
::new()
652 .get(&list_subdirs_api_method
!(DATASTORE_INFO_SUBDIRS
))
653 .subdirs(DATASTORE_INFO_SUBDIRS
);
656 pub const ROUTER
: Router
= Router
::new()
659 &ApiHandler
::Sync(&get_datastore_list
),
660 &ObjectSchema
::new("Directory index.", &[])
663 .match_all("store", &DATASTORE_INFO_ROUTER
);