1 use anyhow
::{bail, Error}
;
3 use http
::request
::Parts
;
5 use hyper
::{Body, StatusCode}
;
8 use proxmox
::try_block
;
9 use proxmox
::api
::RpcEnvironmentType
;
10 use proxmox
::tools
::fs
::CreateOptions
;
12 use pbs_tools
::auth
::private_auth_key
;
13 use proxmox_rest_server
::{ApiConfig, RestServer}
;
15 use proxmox_backup
::server
::{
17 auth
::default_api_auth
,
19 use proxmox_rest_server
::daemon
;
21 use proxmox_backup
::auth_helpers
::*;
22 use proxmox_backup
::config
;
25 proxmox_backup
::tools
::setup_safe_path_env();
27 if let Err(err
) = pbs_runtime
::main(run()) {
28 eprintln
!("Error: {}", err
);
29 std
::process
::exit(-1);
34 _auth_id
: Option
<String
>,
35 _language
: Option
<String
>,
40 let index
= "<center><h1>Proxmox Backup API Server</h1></center>";
43 .status(StatusCode
::OK
)
44 .header(header
::CONTENT_TYPE
, "text/html")
49 async
fn run() -> Result
<(), Error
> {
50 if let Err(err
) = syslog
::init(
51 syslog
::Facility
::LOG_DAEMON
,
52 log
::LevelFilter
::Info
,
53 Some("proxmox-backup-api")) {
54 bail
!("unable to inititialize syslog - {}", err
);
57 server
::create_task_log_dirs()?
;
59 config
::create_configdir()?
;
61 config
::update_self_signed_cert(false)?
;
63 proxmox_backup
::server
::create_run_dir()?
;
65 proxmox_backup
::rrd
::create_rrdb_dir()?
;
66 proxmox_backup
::server
::jobstate
::create_jobstate_dir()?
;
67 proxmox_backup
::tape
::create_tape_status_dir()?
;
68 proxmox_backup
::tape
::create_drive_state_dir()?
;
69 proxmox_backup
::tape
::create_changer_state_dir()?
;
70 proxmox_backup
::tape
::create_drive_lock_dir()?
;
72 if let Err(err
) = generate_auth_key() {
73 bail
!("unable to generate auth key - {}", err
);
75 let _
= private_auth_key(); // load with lazy_static
77 if let Err(err
) = generate_csrf_key() {
78 bail
!("unable to generate csrf key - {}", err
);
80 let _
= csrf_secret(); // load with lazy_static
82 let mut config
= ApiConfig
::new(
84 &proxmox_backup
::api2
::ROUTER
,
85 RpcEnvironmentType
::PRIVILEGED
,
90 let backup_user
= pbs_config
::backup_user()?
;
91 let mut commando_sock
= proxmox_rest_server
::CommandoSocket
::new(crate::server
::our_ctrl_sock(), backup_user
.gid
);
93 let dir_opts
= CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
);
94 let file_opts
= CreateOptions
::new().owner(backup_user
.uid
).group(backup_user
.gid
);
96 config
.enable_file_log(
97 pbs_buildcfg
::API_ACCESS_LOG_FN
,
98 Some(dir_opts
.clone()),
99 Some(file_opts
.clone()),
103 config
.enable_auth_log(
104 pbs_buildcfg
::API_AUTH_LOG_FN
,
111 let rest_server
= RestServer
::new(config
);
113 // http server future:
114 let server
= daemon
::create_daemon(
115 ([127,0,0,1], 82).into(),
116 move |listener
, ready
| {
117 let incoming
= proxmox_backup
::tools
::async_io
::StaticIncoming
::from(listener
);
119 .and_then(|_
| hyper
::Server
::builder(incoming
)
121 .with_graceful_shutdown(proxmox_rest_server
::shutdown_future())
122 .map_err(Error
::from
)
126 eprintln
!("server error: {}", e
);
131 "proxmox-backup.service",
134 server
::write_pid(pbs_buildcfg
::PROXMOX_BACKUP_API_PID_FN
)?
;
135 daemon
::systemd_notify(daemon
::SystemdNotify
::Ready
)?
;
137 let init_result
: Result
<(), Error
> = try_block
!({
138 server
::register_task_control_commands(&mut commando_sock
)?
;
139 commando_sock
.spawn()?
;
140 proxmox_rest_server
::server_state_init()?
;
144 if let Err(err
) = init_result
{
145 bail
!("unable to start daemon - {}", err
);
149 log
::info
!("server shutting down, waiting for active workers to complete");
150 proxmox_rest_server
::last_worker_future().await?
;
152 log
::info
!("done - exit server");