]> git.proxmox.com Git - proxmox-backup.git/blob - src/bin/proxmox-backup-proxy.rs
update to tokio 0.2.0-alpha.4
[proxmox-backup.git] / src / bin / proxmox-backup-proxy.rs
1 use proxmox_backup::configdir;
2 use proxmox_backup::server;
3 use proxmox_backup::tools::daemon;
4 use proxmox_backup::api_schema::router::*;
5 use proxmox_backup::api_schema::config::*;
6 use proxmox_backup::server::rest::*;
7 use proxmox_backup::auth_helpers::*;
8
9 use failure::*;
10 use proxmox::tools::try_block;
11 use lazy_static::lazy_static;
12
13 use futures::*;
14
15 use openssl::ssl::{SslMethod, SslAcceptor, SslFiletype};
16 use std::sync::Arc;
17
18 use hyper;
19
20 #[tokio::main]
21 async fn main() {
22 if let Err(err) = run().await {
23 eprintln!("Error: {}", err);
24 std::process::exit(-1);
25 }
26 }
27
28 async fn run() -> Result<(), Error> {
29 if let Err(err) = syslog::init(
30 syslog::Facility::LOG_DAEMON,
31 log::LevelFilter::Info,
32 Some("proxmox-backup-proxy")) {
33 bail!("unable to inititialize syslog - {}", err);
34 }
35
36 let _ = public_auth_key(); // load with lazy_static
37 let _ = csrf_secret(); // load with lazy_static
38
39 lazy_static!{
40 static ref ROUTER: Router = proxmox_backup::api2::router();
41 }
42
43 let mut config = ApiConfig::new(
44 env!("PROXMOX_JSDIR"), &ROUTER, RpcEnvironmentType::PUBLIC);
45
46 // add default dirs which includes jquery and bootstrap
47 // my $base = '/usr/share/libpve-http-server-perl';
48 // add_dirs($self->{dirs}, '/css/' => "$base/css/");
49 // add_dirs($self->{dirs}, '/js/' => "$base/js/");
50 // add_dirs($self->{dirs}, '/fonts/' => "$base/fonts/");
51 config.add_alias("novnc", "/usr/share/novnc-pve");
52 config.add_alias("extjs", "/usr/share/javascript/extjs");
53 config.add_alias("fontawesome", "/usr/share/fonts-font-awesome");
54 config.add_alias("xtermjs", "/usr/share/pve-xtermjs");
55 config.add_alias("widgettoolkit", "/usr/share/javascript/proxmox-widget-toolkit");
56
57 let rest_server = RestServer::new(config);
58
59 //openssl req -x509 -newkey rsa:4096 -keyout /etc/proxmox-backup/proxy.key -out /etc/proxmox-backup/proxy.pem -nodes
60 let key_path = configdir!("/proxy.key");
61 let cert_path = configdir!("/proxy.pem");
62
63 let mut acceptor = SslAcceptor::mozilla_intermediate(SslMethod::tls()).unwrap();
64 acceptor.set_private_key_file(key_path, SslFiletype::PEM)
65 .map_err(|err| format_err!("unable to read proxy key {} - {}", key_path, err))?;
66 acceptor.set_certificate_chain_file(cert_path)
67 .map_err(|err| format_err!("unable to read proxy cert {} - {}", cert_path, err))?;
68 acceptor.check_private_key().unwrap();
69
70 let acceptor = Arc::new(acceptor.build());
71
72 let server = daemon::create_daemon(
73 ([0,0,0,0,0,0,0,0], 8007).into(),
74 |listener, ready| {
75 let connections = listener
76 .incoming()
77 .map_err(Error::from)
78 .try_filter_map(move |sock| {
79 let acceptor = Arc::clone(&acceptor);
80 async move {
81 sock.set_nodelay(true).unwrap();
82 sock.set_send_buffer_size(1024*1024).unwrap();
83 sock.set_recv_buffer_size(1024*1024).unwrap();
84 Ok(tokio_openssl::accept(&acceptor, sock)
85 .await
86 .ok() // handshake errors aren't be fatal, so return None to filter
87 )
88 }
89 });
90
91 Ok(ready
92 .and_then(|_| hyper::Server::builder(connections)
93 .serve(rest_server)
94 .with_graceful_shutdown(server::shutdown_future())
95 .map_err(Error::from)
96 )
97 .map_err(|err| eprintln!("server error: {}", err))
98 .map(|_| ())
99 )
100 },
101 );
102
103 daemon::systemd_notify(daemon::SystemdNotify::Ready)?;
104
105 let init_result: Result<(), Error> = try_block!({
106 server::create_task_control_socket()?;
107 server::server_state_init()?;
108 Ok(())
109 });
110
111 if let Err(err) = init_result {
112 bail!("unable to start daemon - {}", err);
113 }
114
115 server.await?;
116 log::info!("done - exit server");
117
118 Ok(())
119 }