1 use std
::future
::Future
;
4 use anyhow
::{bail, Error}
;
6 use http
::request
::Parts
;
8 use hyper
::{Body, StatusCode}
;
11 use proxmox
::try_block
;
12 use proxmox
::api
::RpcEnvironmentType
;
13 use proxmox
::tools
::fs
::CreateOptions
;
15 use proxmox_rest_server
::{daemon, ApiConfig, RestServer, RestEnvironment}
;
17 use proxmox_backup
::server
::auth
::default_api_auth
;
18 use proxmox_backup
::auth_helpers
::*;
19 use proxmox_backup
::config
;
22 proxmox_backup
::tools
::setup_safe_path_env();
24 if let Err(err
) = pbs_runtime
::main(run()) {
25 eprintln
!("Error: {}", err
);
26 std
::process
::exit(-1);
31 _env
: RestEnvironment
,
33 ) -> Pin
<Box
<dyn Future
<Output
= Response
<Body
>> + Send
+ 'a
>> {
36 let index
= "<center><h1>Proxmox Backup API Server</h1></center>";
39 .status(StatusCode
::OK
)
40 .header(header
::CONTENT_TYPE
, "text/html")
46 async
fn run() -> Result
<(), Error
> {
47 if let Err(err
) = syslog
::init(
48 syslog
::Facility
::LOG_DAEMON
,
49 log
::LevelFilter
::Info
,
50 Some("proxmox-backup-api")) {
51 bail
!("unable to inititialize syslog - {}", err
);
54 config
::create_configdir()?
;
56 config
::update_self_signed_cert(false)?
;
58 proxmox_backup
::server
::create_run_dir()?
;
60 proxmox_backup
::rrd
::create_rrdb_dir()?
;
61 proxmox_backup
::server
::jobstate
::create_jobstate_dir()?
;
62 proxmox_backup
::tape
::create_tape_status_dir()?
;
63 proxmox_backup
::tape
::create_drive_state_dir()?
;
64 proxmox_backup
::tape
::create_changer_state_dir()?
;
65 proxmox_backup
::tape
::create_drive_lock_dir()?
;
67 if let Err(err
) = generate_auth_key() {
68 bail
!("unable to generate auth key - {}", err
);
70 let _
= private_auth_key(); // load with lazy_static
72 if let Err(err
) = generate_csrf_key() {
73 bail
!("unable to generate csrf key - {}", err
);
75 let _
= csrf_secret(); // load with lazy_static
77 let mut config
= ApiConfig
::new(
79 &proxmox_backup
::api2
::ROUTER
,
80 RpcEnvironmentType
::PRIVILEGED
,
85 let backup_user
= pbs_config
::backup_user()?
;
86 let mut commando_sock
= proxmox_rest_server
::CommandSocket
::new(proxmox_rest_server
::our_ctrl_sock(), backup_user
.gid
);
88 let dir_opts
= CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
);
89 let file_opts
= CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
);
91 config
.enable_access_log(
92 pbs_buildcfg
::API_ACCESS_LOG_FN
,
93 Some(dir_opts
.clone()),
94 Some(file_opts
.clone()),
98 config
.enable_auth_log(
99 pbs_buildcfg
::API_AUTH_LOG_FN
,
100 Some(dir_opts
.clone()),
101 Some(file_opts
.clone()),
106 let rest_server
= RestServer
::new(config
);
107 proxmox_rest_server
::init_worker_tasks(pbs_buildcfg
::PROXMOX_BACKUP_LOG_DIR_M
!().into(), file_opts
.clone())?
;
109 // http server future:
110 let server
= daemon
::create_daemon(
111 ([127,0,0,1], 82).into(),
113 let incoming
= hyper
::server
::conn
::AddrIncoming
::from_listener(listener
)?
;
116 daemon
::systemd_notify(daemon
::SystemdNotify
::Ready
)?
;
118 hyper
::Server
::builder(incoming
)
120 .with_graceful_shutdown(proxmox_rest_server
::shutdown_future())
121 .map_err(Error
::from
)
127 proxmox_rest_server
::write_pid(pbs_buildcfg
::PROXMOX_BACKUP_API_PID_FN
)?
;
129 let init_result
: Result
<(), Error
> = try_block
!({
130 proxmox_rest_server
::register_task_control_commands(&mut commando_sock
)?
;
131 commando_sock
.spawn()?
;
132 proxmox_rest_server
::catch_shutdown_signal()?
;
133 proxmox_rest_server
::catch_reload_signal()?
;
137 if let Err(err
) = init_result
{
138 bail
!("unable to start daemon - {}", err
);
142 log
::info
!("server shutting down, waiting for active workers to complete");
143 proxmox_rest_server
::last_worker_future().await?
;
145 log
::info
!("done - exit server");