1 use std
::future
::Future
;
4 use anyhow
::{bail, Error}
;
6 use http
::request
::Parts
;
8 use hyper
::{Body, StatusCode}
;
11 use proxmox
::try_block
;
12 use proxmox
::api
::RpcEnvironmentType
;
13 use proxmox
::tools
::fs
::CreateOptions
;
15 use proxmox_rest_server
::{daemon, ApiConfig, RestServer}
;
17 use proxmox_backup
::server
::auth
::default_api_auth
;
18 use proxmox_backup
::auth_helpers
::*;
19 use proxmox_backup
::config
;
22 proxmox_backup
::tools
::setup_safe_path_env();
24 if let Err(err
) = pbs_runtime
::main(run()) {
25 eprintln
!("Error: {}", err
);
26 std
::process
::exit(-1);
31 _auth_id
: Option
<String
>,
32 _language
: Option
<String
>,
35 ) -> Pin
<Box
<dyn Future
<Output
= Response
<Body
>> + Send
+ 'a
>> {
38 let index
= "<center><h1>Proxmox Backup API Server</h1></center>";
41 .status(StatusCode
::OK
)
42 .header(header
::CONTENT_TYPE
, "text/html")
48 async
fn run() -> Result
<(), Error
> {
49 if let Err(err
) = syslog
::init(
50 syslog
::Facility
::LOG_DAEMON
,
51 log
::LevelFilter
::Info
,
52 Some("proxmox-backup-api")) {
53 bail
!("unable to inititialize syslog - {}", err
);
56 config
::create_configdir()?
;
58 config
::update_self_signed_cert(false)?
;
60 proxmox_backup
::server
::create_run_dir()?
;
62 proxmox_backup
::rrd
::create_rrdb_dir()?
;
63 proxmox_backup
::server
::jobstate
::create_jobstate_dir()?
;
64 proxmox_backup
::tape
::create_tape_status_dir()?
;
65 proxmox_backup
::tape
::create_drive_state_dir()?
;
66 proxmox_backup
::tape
::create_changer_state_dir()?
;
67 proxmox_backup
::tape
::create_drive_lock_dir()?
;
69 if let Err(err
) = generate_auth_key() {
70 bail
!("unable to generate auth key - {}", err
);
72 let _
= private_auth_key(); // load with lazy_static
74 if let Err(err
) = generate_csrf_key() {
75 bail
!("unable to generate csrf key - {}", err
);
77 let _
= csrf_secret(); // load with lazy_static
79 let mut config
= ApiConfig
::new(
81 &proxmox_backup
::api2
::ROUTER
,
82 RpcEnvironmentType
::PRIVILEGED
,
87 let backup_user
= pbs_config
::backup_user()?
;
88 let mut commando_sock
= proxmox_rest_server
::CommandSocket
::new(proxmox_rest_server
::our_ctrl_sock(), backup_user
.gid
);
90 let dir_opts
= CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
);
91 let file_opts
= CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
);
93 config
.enable_access_log(
94 pbs_buildcfg
::API_ACCESS_LOG_FN
,
95 Some(dir_opts
.clone()),
96 Some(file_opts
.clone()),
100 config
.enable_auth_log(
101 pbs_buildcfg
::API_AUTH_LOG_FN
,
102 Some(dir_opts
.clone()),
103 Some(file_opts
.clone()),
108 let rest_server
= RestServer
::new(config
);
109 proxmox_rest_server
::init_worker_tasks(pbs_buildcfg
::PROXMOX_BACKUP_LOG_DIR_M
!().into(), file_opts
.clone())?
;
111 // http server future:
112 let server
= daemon
::create_daemon(
113 ([127,0,0,1], 82).into(),
115 let incoming
= hyper
::server
::conn
::AddrIncoming
::from_listener(listener
)?
;
118 daemon
::systemd_notify(daemon
::SystemdNotify
::Ready
)?
;
120 hyper
::Server
::builder(incoming
)
122 .with_graceful_shutdown(proxmox_rest_server
::shutdown_future())
123 .map_err(Error
::from
)
129 proxmox_rest_server
::write_pid(pbs_buildcfg
::PROXMOX_BACKUP_API_PID_FN
)?
;
131 let init_result
: Result
<(), Error
> = try_block
!({
132 proxmox_rest_server
::register_task_control_commands(&mut commando_sock
)?
;
133 commando_sock
.spawn()?
;
134 proxmox_rest_server
::catch_shutdown_signal()?
;
135 proxmox_rest_server
::catch_reload_signal()?
;
139 if let Err(err
) = init_result
{
140 bail
!("unable to start daemon - {}", err
);
144 log
::info
!("server shutting down, waiting for active workers to complete");
145 proxmox_rest_server
::last_worker_future().await?
;
147 log
::info
!("done - exit server");