]> git.proxmox.com Git - proxmox-backup.git/blob - src/bin/proxmox-backup-api.rs
move src/tools/daemon.rs to proxmox-rest-server workspace
[proxmox-backup.git] / src / bin / proxmox-backup-api.rs
1 use anyhow::{bail, Error};
2 use futures::*;
3
4 use proxmox::try_block;
5 use proxmox::api::RpcEnvironmentType;
6 use proxmox::tools::fs::CreateOptions;
7
8 use pbs_tools::auth::private_auth_key;
9 use proxmox_rest_server::ApiConfig;
10
11 use proxmox_backup::server::{
12 self,
13 auth::default_api_auth,
14 rest::*,
15 };
16 use proxmox_rest_server::daemon;
17
18 use proxmox_backup::auth_helpers::*;
19 use proxmox_backup::config;
20
21 fn main() {
22 proxmox_backup::tools::setup_safe_path_env();
23
24 if let Err(err) = pbs_runtime::main(run()) {
25 eprintln!("Error: {}", err);
26 std::process::exit(-1);
27 }
28 }
29
30 async fn run() -> Result<(), Error> {
31 if let Err(err) = syslog::init(
32 syslog::Facility::LOG_DAEMON,
33 log::LevelFilter::Info,
34 Some("proxmox-backup-api")) {
35 bail!("unable to inititialize syslog - {}", err);
36 }
37
38 server::create_task_log_dirs()?;
39
40 config::create_configdir()?;
41
42 config::update_self_signed_cert(false)?;
43
44 proxmox_backup::server::create_run_dir()?;
45
46 proxmox_backup::rrd::create_rrdb_dir()?;
47 proxmox_backup::server::jobstate::create_jobstate_dir()?;
48 proxmox_backup::tape::create_tape_status_dir()?;
49 proxmox_backup::tape::create_drive_state_dir()?;
50 proxmox_backup::tape::create_changer_state_dir()?;
51 proxmox_backup::tape::create_drive_lock_dir()?;
52
53 if let Err(err) = generate_auth_key() {
54 bail!("unable to generate auth key - {}", err);
55 }
56 let _ = private_auth_key(); // load with lazy_static
57
58 if let Err(err) = generate_csrf_key() {
59 bail!("unable to generate csrf key - {}", err);
60 }
61 let _ = csrf_secret(); // load with lazy_static
62
63 let mut config = ApiConfig::new(
64 pbs_buildcfg::JS_DIR,
65 &proxmox_backup::api2::ROUTER,
66 RpcEnvironmentType::PRIVILEGED,
67 default_api_auth(),
68 )?;
69
70 let backup_user = pbs_config::backup_user()?;
71 let mut commando_sock = proxmox_rest_server::CommandoSocket::new(crate::server::our_ctrl_sock(), backup_user.gid);
72
73 let dir_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
74 let file_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
75
76 config.enable_file_log(
77 pbs_buildcfg::API_ACCESS_LOG_FN,
78 Some(dir_opts),
79 Some(file_opts),
80 &mut commando_sock,
81 )?;
82
83 let rest_server = RestServer::new(config);
84
85 // http server future:
86 let server = daemon::create_daemon(
87 ([127,0,0,1], 82).into(),
88 move |listener, ready| {
89 let incoming = proxmox_backup::tools::async_io::StaticIncoming::from(listener);
90 Ok(ready
91 .and_then(|_| hyper::Server::builder(incoming)
92 .serve(rest_server)
93 .with_graceful_shutdown(proxmox_rest_server::shutdown_future())
94 .map_err(Error::from)
95 )
96 .map(|e| {
97 if let Err(e) = e {
98 eprintln!("server error: {}", e);
99 }
100 })
101 )
102 },
103 "proxmox-backup.service",
104 );
105
106 server::write_pid(pbs_buildcfg::PROXMOX_BACKUP_API_PID_FN)?;
107 daemon::systemd_notify(daemon::SystemdNotify::Ready)?;
108
109 let init_result: Result<(), Error> = try_block!({
110 server::register_task_control_commands(&mut commando_sock)?;
111 commando_sock.spawn()?;
112 proxmox_rest_server::server_state_init()?;
113 Ok(())
114 });
115
116 if let Err(err) = init_result {
117 bail!("unable to start daemon - {}", err);
118 }
119
120 server.await?;
121 log::info!("server shutting down, waiting for active workers to complete");
122 proxmox_rest_server::last_worker_future().await?;
123
124 log::info!("done - exit server");
125
126 Ok(())
127 }