1 use anyhow
::{bail, Error}
;
2 use ::serde
::{Deserialize, Serialize}
;
6 use proxmox_router
::{Router, RpcEnvironment, Permission}
;
7 use proxmox_schema
::api
;
10 Authid
, LtoTapeDrive
, LtoTapeDriveUpdater
, ScsiTapeChanger
,
11 PROXMOX_CONFIG_DIGEST_SCHEMA
, DRIVE_NAME_SCHEMA
, PRIV_TAPE_AUDIT
, PRIV_TAPE_MODIFY
,
13 use pbs_config
::CachedUserInfo
;
15 use pbs_tape
::linux_list_drives
::{lto_tape_device_list, check_drive_path}
;
28 permission
: &Permission
::Privilege(&["tape", "device"], PRIV_TAPE_MODIFY
, false),
31 /// Create a new drive
32 pub fn create_drive(config
: LtoTapeDrive
) -> Result
<(), Error
> {
34 let _lock
= pbs_config
::drive
::lock()?
;
36 let (mut section_config
, _digest
) = pbs_config
::drive
::config()?
;
38 let lto_drives
= lto_tape_device_list();
40 check_drive_path(<o_drives
, &config
.path
)?
;
42 let existing
: Vec
<LtoTapeDrive
> = section_config
.convert_to_typed_array("lto")?
;
44 for drive
in existing
{
45 if drive
.name
== config
.name
{
46 bail
!("Entry '{}' already exists", config
.name
);
48 if drive
.path
== config
.path
{
49 bail
!("Path '{}' already used in drive '{}'", config
.path
, drive
.name
);
53 section_config
.set_data(&config
.name
, "lto", &config
)?
;
55 pbs_config
::drive
::save_config(§ion_config
)?
;
64 schema
: DRIVE_NAME_SCHEMA
,
72 permission
: &Permission
::Privilege(&["tape", "device", "{name}"], PRIV_TAPE_AUDIT
, false),
75 /// Get drive configuration
79 mut rpcenv
: &mut dyn RpcEnvironment
,
80 ) -> Result
<LtoTapeDrive
, Error
> {
82 let (config
, digest
) = pbs_config
::drive
::config()?
;
84 let data
: LtoTapeDrive
= config
.lookup("lto", &name
)?
;
86 rpcenv
["digest"] = hex
::encode(&digest
).into();
96 description
: "The list of configured drives (with config digest).",
103 description
: "List configured tape drives filtered by Tape.Audit privileges",
104 permission
: &Permission
::Anybody
,
110 mut rpcenv
: &mut dyn RpcEnvironment
,
111 ) -> Result
<Vec
<LtoTapeDrive
>, Error
> {
112 let auth_id
: Authid
= rpcenv
.get_auth_id().unwrap().parse()?
;
113 let user_info
= CachedUserInfo
::new()?
;
115 let (config
, digest
) = pbs_config
::drive
::config()?
;
117 let drive_list
: Vec
<LtoTapeDrive
> = config
.convert_to_typed_array("lto")?
;
119 let drive_list
= drive_list
122 let privs
= user_info
.lookup_privs(&auth_id
, &["tape", "device", &drive
.name
]);
123 privs
& PRIV_TAPE_AUDIT
!= 0
127 rpcenv
["digest"] = hex
::encode(&digest
).into();
133 #[derive(Serialize, Deserialize)]
134 #[allow(non_camel_case_types)]
135 #[serde(rename_all = "kebab-case")]
136 /// Deletable property name
137 pub enum DeletableProperty
{
138 /// Delete the changer property.
140 /// Delete the changer-drivenum property.
149 schema
: DRIVE_NAME_SCHEMA
,
152 type: LtoTapeDriveUpdater
,
156 description
: "List of properties to delete.",
160 type: DeletableProperty
,
164 schema
: PROXMOX_CONFIG_DIGEST_SCHEMA
,
170 permission
: &Permission
::Privilege(&["tape", "device", "{name}"], PRIV_TAPE_MODIFY
, false),
173 /// Update a drive configuration
176 update
: LtoTapeDriveUpdater
,
177 delete
: Option
<Vec
<DeletableProperty
>>,
178 digest
: Option
<String
>,
180 ) -> Result
<(), Error
> {
182 let _lock
= pbs_config
::drive
::lock()?
;
184 let (mut config
, expected_digest
) = pbs_config
::drive
::config()?
;
186 if let Some(ref digest
) = digest
{
187 let digest
= <[u8; 32]>::from_hex(digest
)?
;
188 crate::tools
::detect_modified_configuration_file(&digest
, &expected_digest
)?
;
191 let mut data
: LtoTapeDrive
= config
.lookup("lto", &name
)?
;
193 if let Some(delete
) = delete
{
194 for delete_prop
in delete
{
196 DeletableProperty
::changer
=> {
198 data
.changer_drivenum
= None
;
200 DeletableProperty
::changer_drivenum
=> { data.changer_drivenum = None; }
,
205 if let Some(path
) = update
.path
{
206 let lto_drives
= lto_tape_device_list();
207 check_drive_path(<o_drives
, &path
)?
;
211 if let Some(changer
) = update
.changer
{
212 let _
: ScsiTapeChanger
= config
.lookup("changer", &changer
)?
;
213 data
.changer
= Some(changer
);
216 if let Some(changer_drivenum
) = update
.changer_drivenum
{
217 if changer_drivenum
== 0 {
218 data
.changer_drivenum
= None
;
220 if data
.changer
.is_none() {
221 bail
!("Option 'changer-drivenum' requires option 'changer'.");
223 data
.changer_drivenum
= Some(changer_drivenum
);
227 config
.set_data(&name
, "lto", &data
)?
;
229 pbs_config
::drive
::save_config(&config
)?
;
239 schema
: DRIVE_NAME_SCHEMA
,
244 permission
: &Permission
::Privilege(&["tape", "device", "{name}"], PRIV_TAPE_MODIFY
, false),
247 /// Delete a drive configuration
248 pub fn delete_drive(name
: String
, _param
: Value
) -> Result
<(), Error
> {
250 let _lock
= pbs_config
::drive
::lock()?
;
252 let (mut config
, _digest
) = pbs_config
::drive
::config()?
;
254 match config
.sections
.get(&name
) {
255 Some((section_type
, _
)) => {
256 if section_type
!= "lto" {
257 bail
!("Entry '{}' exists, but is not a lto tape drive", name
);
259 config
.sections
.remove(&name
);
261 None
=> bail
!("Delete drive '{}' failed - no such drive", name
),
264 pbs_config
::drive
::save_config(&config
)?
;
269 const ITEM_ROUTER
: Router
= Router
::new()
270 .get(&API_METHOD_GET_CONFIG
)
271 .put(&API_METHOD_UPDATE_DRIVE
)
272 .delete(&API_METHOD_DELETE_DRIVE
);
275 pub const ROUTER
: Router
= Router
::new()
276 .get(&API_METHOD_LIST_DRIVES
)
277 .post(&API_METHOD_CREATE_DRIVE
)
278 .match_all("name", &ITEM_ROUTER
);