]> git.proxmox.com Git - proxmox-backup.git/blob - src/bin/proxmox-backup-api.rs
move RRD code into proxmox-rrd crate
[proxmox-backup.git] / src / bin / proxmox-backup-api.rs
1 use std::future::Future;
2 use std::pin::Pin;
3
4 use anyhow::{bail, Error};
5 use futures::*;
6 use http::request::Parts;
7 use http::Response;
8 use hyper::{Body, Method, StatusCode};
9 use http::HeaderMap;
10
11 use proxmox::try_block;
12 use proxmox::api::RpcEnvironmentType;
13 use proxmox::tools::fs::CreateOptions;
14 use proxmox::api::UserInformation;
15
16 use proxmox_rest_server::{daemon, AuthError, ApiConfig, RestServer, RestEnvironment, ServerAdapter};
17
18 use proxmox_backup::server::auth::check_pbs_auth;
19 use proxmox_backup::auth_helpers::*;
20 use proxmox_backup::RRD_CACHE;
21 use proxmox_backup::config;
22
23 fn main() {
24 proxmox_backup::tools::setup_safe_path_env();
25
26 if let Err(err) = pbs_runtime::main(run()) {
27 eprintln!("Error: {}", err);
28 std::process::exit(-1);
29 }
30 }
31
32 struct ProxmoxBackupApiAdapter;
33
34 impl ServerAdapter for ProxmoxBackupApiAdapter {
35
36 fn get_index(
37 &self,
38 _env: RestEnvironment,
39 _parts: Parts,
40 ) -> Pin<Box<dyn Future<Output = Response<Body>> + Send>> {
41 Box::pin(async move {
42
43 let index = "<center><h1>Proxmox Backup API Server</h1></center>";
44
45 Response::builder()
46 .status(StatusCode::OK)
47 .header(hyper::header::CONTENT_TYPE, "text/html")
48 .body(index.into())
49 .unwrap()
50 })
51 }
52
53 fn check_auth<'a>(
54 &'a self,
55 headers: &'a HeaderMap,
56 method: &'a Method,
57 ) -> Pin<Box<dyn Future<Output = Result<(String, Box<dyn UserInformation + Sync + Send>), AuthError>> + Send + 'a>> {
58 Box::pin(async move {
59 check_pbs_auth(headers, method).await
60 })
61 }
62 }
63
64 async fn run() -> Result<(), Error> {
65 if let Err(err) = syslog::init(
66 syslog::Facility::LOG_DAEMON,
67 log::LevelFilter::Info,
68 Some("proxmox-backup-api")) {
69 bail!("unable to inititialize syslog - {}", err);
70 }
71
72 config::create_configdir()?;
73
74 config::update_self_signed_cert(false)?;
75
76 proxmox_backup::server::create_run_dir()?;
77
78 RRD_CACHE.create_rrdb_dir()?;
79
80 proxmox_backup::server::jobstate::create_jobstate_dir()?;
81 proxmox_backup::tape::create_tape_status_dir()?;
82 proxmox_backup::tape::create_drive_state_dir()?;
83 proxmox_backup::tape::create_changer_state_dir()?;
84 proxmox_backup::tape::create_drive_lock_dir()?;
85
86 if let Err(err) = generate_auth_key() {
87 bail!("unable to generate auth key - {}", err);
88 }
89 let _ = private_auth_key(); // load with lazy_static
90
91 if let Err(err) = generate_csrf_key() {
92 bail!("unable to generate csrf key - {}", err);
93 }
94 let _ = csrf_secret(); // load with lazy_static
95
96 let mut config = ApiConfig::new(
97 pbs_buildcfg::JS_DIR,
98 &proxmox_backup::api2::ROUTER,
99 RpcEnvironmentType::PRIVILEGED,
100 ProxmoxBackupApiAdapter,
101 )?;
102
103 let backup_user = pbs_config::backup_user()?;
104 let mut commando_sock = proxmox_rest_server::CommandSocket::new(proxmox_rest_server::our_ctrl_sock(), backup_user.gid);
105
106 let dir_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
107 let file_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
108
109 config.enable_access_log(
110 pbs_buildcfg::API_ACCESS_LOG_FN,
111 Some(dir_opts.clone()),
112 Some(file_opts.clone()),
113 &mut commando_sock,
114 )?;
115
116 config.enable_auth_log(
117 pbs_buildcfg::API_AUTH_LOG_FN,
118 Some(dir_opts.clone()),
119 Some(file_opts.clone()),
120 &mut commando_sock,
121 )?;
122
123
124 let rest_server = RestServer::new(config);
125 proxmox_rest_server::init_worker_tasks(pbs_buildcfg::PROXMOX_BACKUP_LOG_DIR_M!().into(), file_opts.clone())?;
126
127 // http server future:
128 let server = daemon::create_daemon(
129 ([127,0,0,1], 82).into(),
130 move |listener| {
131 let incoming = hyper::server::conn::AddrIncoming::from_listener(listener)?;
132
133 Ok(async {
134 daemon::systemd_notify(daemon::SystemdNotify::Ready)?;
135
136 hyper::Server::builder(incoming)
137 .serve(rest_server)
138 .with_graceful_shutdown(proxmox_rest_server::shutdown_future())
139 .map_err(Error::from)
140 .await
141 })
142 },
143 );
144
145 proxmox_rest_server::write_pid(pbs_buildcfg::PROXMOX_BACKUP_API_PID_FN)?;
146
147 let init_result: Result<(), Error> = try_block!({
148 proxmox_rest_server::register_task_control_commands(&mut commando_sock)?;
149 commando_sock.spawn()?;
150 proxmox_rest_server::catch_shutdown_signal()?;
151 proxmox_rest_server::catch_reload_signal()?;
152 Ok(())
153 });
154
155 if let Err(err) = init_result {
156 bail!("unable to start daemon - {}", err);
157 }
158
159 server.await?;
160 log::info!("server shutting down, waiting for active workers to complete");
161 proxmox_rest_server::last_worker_future().await?;
162
163 log::info!("done - exit server");
164
165 Ok(())
166 }