1 use anyhow
::{bail, Error}
;
3 use http
::request
::Parts
;
5 use hyper
::{Body, StatusCode}
;
8 use proxmox
::try_block
;
9 use proxmox
::api
::RpcEnvironmentType
;
10 use proxmox
::tools
::fs
::CreateOptions
;
12 use pbs_tools
::auth
::private_auth_key
;
13 use proxmox_rest_server
::ApiConfig
;
15 use proxmox_backup
::server
::{
17 auth
::default_api_auth
,
20 use proxmox_rest_server
::daemon
;
22 use proxmox_backup
::auth_helpers
::*;
23 use proxmox_backup
::config
;
26 proxmox_backup
::tools
::setup_safe_path_env();
28 if let Err(err
) = pbs_runtime
::main(run()) {
29 eprintln
!("Error: {}", err
);
30 std
::process
::exit(-1);
35 _auth_id
: Option
<String
>,
36 _language
: Option
<String
>,
41 let index
= "<center><h1>Proxmox Backup API Server</h1></center>";
44 .status(StatusCode
::OK
)
45 .header(header
::CONTENT_TYPE
, "text/html")
50 async
fn run() -> Result
<(), Error
> {
51 if let Err(err
) = syslog
::init(
52 syslog
::Facility
::LOG_DAEMON
,
53 log
::LevelFilter
::Info
,
54 Some("proxmox-backup-api")) {
55 bail
!("unable to inititialize syslog - {}", err
);
58 server
::create_task_log_dirs()?
;
60 config
::create_configdir()?
;
62 config
::update_self_signed_cert(false)?
;
64 proxmox_backup
::server
::create_run_dir()?
;
66 proxmox_backup
::rrd
::create_rrdb_dir()?
;
67 proxmox_backup
::server
::jobstate
::create_jobstate_dir()?
;
68 proxmox_backup
::tape
::create_tape_status_dir()?
;
69 proxmox_backup
::tape
::create_drive_state_dir()?
;
70 proxmox_backup
::tape
::create_changer_state_dir()?
;
71 proxmox_backup
::tape
::create_drive_lock_dir()?
;
73 if let Err(err
) = generate_auth_key() {
74 bail
!("unable to generate auth key - {}", err
);
76 let _
= private_auth_key(); // load with lazy_static
78 if let Err(err
) = generate_csrf_key() {
79 bail
!("unable to generate csrf key - {}", err
);
81 let _
= csrf_secret(); // load with lazy_static
83 let mut config
= ApiConfig
::new(
85 &proxmox_backup
::api2
::ROUTER
,
86 RpcEnvironmentType
::PRIVILEGED
,
91 let backup_user
= pbs_config
::backup_user()?
;
92 let mut commando_sock
= proxmox_rest_server
::CommandoSocket
::new(crate::server
::our_ctrl_sock(), backup_user
.gid
);
94 let dir_opts
= CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
);
95 let file_opts
= CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
);
97 config
.enable_file_log(
98 pbs_buildcfg
::API_ACCESS_LOG_FN
,
99 Some(dir_opts
.clone()),
100 Some(file_opts
.clone()),
104 config
.enable_auth_log(
105 pbs_buildcfg
::API_AUTH_LOG_FN
,
112 let rest_server
= RestServer
::new(config
);
114 // http server future:
115 let server
= daemon
::create_daemon(
116 ([127,0,0,1], 82).into(),
117 move |listener
, ready
| {
118 let incoming
= proxmox_backup
::tools
::async_io
::StaticIncoming
::from(listener
);
120 .and_then(|_
| hyper
::Server
::builder(incoming
)
122 .with_graceful_shutdown(proxmox_rest_server
::shutdown_future())
123 .map_err(Error
::from
)
127 eprintln
!("server error: {}", e
);
132 "proxmox-backup.service",
135 server
::write_pid(pbs_buildcfg
::PROXMOX_BACKUP_API_PID_FN
)?
;
136 daemon
::systemd_notify(daemon
::SystemdNotify
::Ready
)?
;
138 let init_result
: Result
<(), Error
> = try_block
!({
139 server
::register_task_control_commands(&mut commando_sock
)?
;
140 commando_sock
.spawn()?
;
141 proxmox_rest_server
::server_state_init()?
;
145 if let Err(err
) = init_result
{
146 bail
!("unable to start daemon - {}", err
);
150 log
::info
!("server shutting down, waiting for active workers to complete");
151 proxmox_rest_server
::last_worker_future().await?
;
153 log
::info
!("done - exit server");