X-Git-Url: https://git.proxmox.com/?p=proxmox-backup.git;a=blobdiff_plain;f=src%2Fbin%2Fproxmox-backup-api.rs;h=ee037a3bb30574df163fdd9310d9ad4845bd1611;hp=22e35b2e6afa15ddefd8b5658e4de1197e8354ff;hb=d91a0f9fc90aecabc4f359d968f716a14562ce78;hpb=dc9a007b115328237732d639cd451db2d67fdaa3 diff --git a/src/bin/proxmox-backup-api.rs b/src/bin/proxmox-backup-api.rs index 22e35b2e..ee037a3b 100644 --- a/src/bin/proxmox-backup-api.rs +++ b/src/bin/proxmox-backup-api.rs @@ -1,29 +1,67 @@ -extern crate proxmox_backup; +use std::future::Future; +use std::pin::Pin; -//use proxmox_backup::tools; -use proxmox_backup::api_schema::router::*; -use proxmox_backup::api_schema::config::*; -use proxmox_backup::server::rest::*; -use proxmox_backup::auth_helpers::*; -use proxmox_backup::config; +use anyhow::{bail, Error}; +use futures::*; +use http::request::Parts; +use http::Response; +use hyper::{Body, Method, StatusCode}; +use http::HeaderMap; -use failure::*; -use lazy_static::lazy_static; +use proxmox_lang::try_block; +use proxmox_router::{RpcEnvironmentType, UserInformation}; +use proxmox_sys::fs::CreateOptions; -use futures::future::Future; +use proxmox_rest_server::{daemon, AuthError, ApiConfig, RestServer, RestEnvironment, ServerAdapter}; -use hyper; +use proxmox_backup::server::auth::check_pbs_auth; +use proxmox_backup::auth_helpers::*; +use proxmox_backup::config; fn main() { + pbs_tools::setup_libc_malloc_opts(); + + proxmox_backup::tools::setup_safe_path_env(); - if let Err(err) = run() { + if let Err(err) = proxmox_async::runtime::main(run()) { eprintln!("Error: {}", err); std::process::exit(-1); } } -fn run() -> Result<(), Error> { +struct ProxmoxBackupApiAdapter; + +impl ServerAdapter for ProxmoxBackupApiAdapter { + + fn get_index( + &self, + _env: RestEnvironment, + _parts: Parts, + ) -> Pin> + Send>> { + Box::pin(async move { + + let index = "

Proxmox Backup API Server

"; + + Response::builder() + .status(StatusCode::OK) + .header(hyper::header::CONTENT_TYPE, "text/html") + .body(index.into()) + .unwrap() + }) + } + + fn check_auth<'a>( + &'a self, + headers: &'a HeaderMap, + method: &'a Method, + ) -> Pin), AuthError>> + Send + 'a>> { + Box::pin(async move { + check_pbs_auth(headers, method).await + }) + } +} +async fn run() -> Result<(), Error> { if let Err(err) = syslog::init( syslog::Facility::LOG_DAEMON, log::LevelFilter::Info, @@ -33,6 +71,16 @@ fn run() -> Result<(), Error> { config::create_configdir()?; + config::update_self_signed_cert(false)?; + + proxmox_backup::server::create_run_dir()?; + proxmox_backup::server::create_state_dir()?; + proxmox_backup::server::jobstate::create_jobstate_dir()?; + proxmox_backup::tape::create_tape_status_dir()?; + proxmox_backup::tape::create_drive_state_dir()?; + proxmox_backup::tape::create_changer_state_dir()?; + proxmox_backup::tape::create_drive_lock_dir()?; + if let Err(err) = generate_auth_key() { bail!("unable to generate auth key - {}", err); } @@ -43,23 +91,74 @@ fn run() -> Result<(), Error> { } let _ = csrf_secret(); // load with lazy_static - let addr = ([127,0,0,1], 82).into(); + let mut config = ApiConfig::new( + pbs_buildcfg::JS_DIR, + &proxmox_backup::api2::ROUTER, + RpcEnvironmentType::PRIVILEGED, + ProxmoxBackupApiAdapter, + )?; - lazy_static!{ - static ref ROUTER: Router = proxmox_backup::api2::router(); - } + let backup_user = pbs_config::backup_user()?; + let mut commando_sock = proxmox_rest_server::CommandSocket::new(proxmox_rest_server::our_ctrl_sock(), backup_user.gid); + + let dir_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid); + let file_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid); + + config.enable_access_log( + pbs_buildcfg::API_ACCESS_LOG_FN, + Some(dir_opts.clone()), + Some(file_opts.clone()), + &mut commando_sock, + )?; + + config.enable_auth_log( + pbs_buildcfg::API_AUTH_LOG_FN, + Some(dir_opts.clone()), + Some(file_opts.clone()), + &mut commando_sock, + )?; - let config = ApiConfig::new( - env!("PROXMOX_JSDIR"), &ROUTER, RpcEnvironmentType::PRIVILEDGED); let rest_server = RestServer::new(config); + proxmox_rest_server::init_worker_tasks(pbs_buildcfg::PROXMOX_BACKUP_LOG_DIR_M!().into(), file_opts.clone())?; + + // http server future: + let server = daemon::create_daemon( + ([127,0,0,1], 82).into(), + move |listener| { + let incoming = hyper::server::conn::AddrIncoming::from_listener(listener)?; + + Ok(async { + daemon::systemd_notify(daemon::SystemdNotify::Ready)?; + + hyper::Server::builder(incoming) + .serve(rest_server) + .with_graceful_shutdown(proxmox_rest_server::shutdown_future()) + .map_err(Error::from) + .await + }) + }, + ); + + proxmox_rest_server::write_pid(pbs_buildcfg::PROXMOX_BACKUP_API_PID_FN)?; + + let init_result: Result<(), Error> = try_block!({ + proxmox_rest_server::register_task_control_commands(&mut commando_sock)?; + commando_sock.spawn()?; + proxmox_rest_server::catch_shutdown_signal()?; + proxmox_rest_server::catch_reload_signal()?; + Ok(()) + }); + + if let Err(err) = init_result { + bail!("unable to start daemon - {}", err); + } - let server = hyper::Server::bind(&addr) - .serve(rest_server) - .map_err(|e| eprintln!("server error: {}", e)); + server.await?; + log::info!("server shutting down, waiting for active workers to complete"); + proxmox_rest_server::last_worker_future().await?; - // Run this server for... forever! - hyper::rt::run(server); + log::info!("done - exit server"); Ok(()) }