2019-04-27 06:57:35 +00:00
|
|
|
use failure::*;
|
|
|
|
|
2019-05-07 12:07:00 +00:00
|
|
|
use std::sync::Arc;
|
2019-05-07 09:24:44 +00:00
|
|
|
|
|
|
|
use futures::*;
|
2019-04-27 06:57:35 +00:00
|
|
|
use hyper::header::{HeaderValue, UPGRADE};
|
2019-05-08 15:36:19 +00:00
|
|
|
use hyper::{Body, Response, StatusCode};
|
2019-04-27 06:57:35 +00:00
|
|
|
use hyper::http::request::Parts;
|
2019-05-08 11:17:23 +00:00
|
|
|
use chrono::{Local, TimeZone};
|
2019-04-27 06:57:35 +00:00
|
|
|
|
2019-05-10 08:25:40 +00:00
|
|
|
use serde_json::{json, Value};
|
2019-04-27 06:57:35 +00:00
|
|
|
|
2019-05-07 09:24:44 +00:00
|
|
|
use crate::tools;
|
2019-05-11 14:05:50 +00:00
|
|
|
use crate::tools::wrapped_reader_stream::*;
|
2019-04-27 06:57:35 +00:00
|
|
|
use crate::api_schema::router::*;
|
|
|
|
use crate::api_schema::*;
|
2019-05-08 09:26:54 +00:00
|
|
|
use crate::server::WorkerTask;
|
2019-05-09 11:06:09 +00:00
|
|
|
use crate::backup::*;
|
2019-04-27 06:57:35 +00:00
|
|
|
|
2019-05-08 10:41:58 +00:00
|
|
|
mod environment;
|
|
|
|
use environment::*;
|
|
|
|
|
2019-05-08 15:36:19 +00:00
|
|
|
mod service;
|
|
|
|
use service::*;
|
|
|
|
|
2019-05-09 11:06:09 +00:00
|
|
|
mod upload_chunk;
|
|
|
|
use upload_chunk::*;
|
|
|
|
|
|
|
|
|
2019-05-08 10:35:15 +00:00
|
|
|
pub fn api_method_upgrade_backup() -> ApiAsyncMethod {
|
2019-04-27 06:57:35 +00:00
|
|
|
ApiAsyncMethod::new(
|
2019-05-08 11:17:23 +00:00
|
|
|
upgrade_to_backup_protocol,
|
2019-05-08 10:35:15 +00:00
|
|
|
ObjectSchema::new("Upgraded to backup protocol.")
|
2019-05-08 11:17:23 +00:00
|
|
|
.required("store", StringSchema::new("Datastore name."))
|
|
|
|
.required("backup-type", StringSchema::new("Backup type.")
|
|
|
|
.format(Arc::new(ApiStringFormat::Enum(vec!["vm".into(), "ct".into(), "host".into()]))))
|
|
|
|
.required("backup-id", StringSchema::new("Backup ID."))
|
2019-04-27 06:57:35 +00:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2019-05-08 11:17:23 +00:00
|
|
|
fn upgrade_to_backup_protocol(
|
2019-04-27 06:57:35 +00:00
|
|
|
parts: Parts,
|
|
|
|
req_body: Body,
|
2019-05-08 11:17:23 +00:00
|
|
|
param: Value,
|
2019-04-27 06:57:35 +00:00
|
|
|
_info: &ApiAsyncMethod,
|
2019-05-09 16:01:24 +00:00
|
|
|
rpcenv: Box<RpcEnvironment>,
|
2019-04-27 06:57:35 +00:00
|
|
|
) -> Result<BoxFut, Error> {
|
2019-05-08 11:17:23 +00:00
|
|
|
|
2019-05-08 15:36:19 +00:00
|
|
|
static PROXMOX_BACKUP_PROTOCOL_ID: &str = "proxmox-backup-protocol-h2";
|
|
|
|
|
2019-05-08 11:17:23 +00:00
|
|
|
let store = tools::required_string_param(¶m, "store")?;
|
2019-05-09 11:06:09 +00:00
|
|
|
let datastore = DataStore::lookup_datastore(store)?;
|
|
|
|
|
2019-05-08 11:17:23 +00:00
|
|
|
let backup_type = tools::required_string_param(¶m, "backup-type")?;
|
|
|
|
let backup_id = tools::required_string_param(¶m, "backup-id")?;
|
2019-05-10 08:25:40 +00:00
|
|
|
let backup_time = Local.timestamp(Local::now().timestamp(), 0);
|
2019-04-27 06:57:35 +00:00
|
|
|
|
|
|
|
let protocols = parts
|
|
|
|
.headers
|
|
|
|
.get("UPGRADE")
|
|
|
|
.ok_or_else(|| format_err!("missing Upgrade header"))?
|
|
|
|
.to_str()?;
|
|
|
|
|
2019-05-08 11:17:23 +00:00
|
|
|
if protocols != PROXMOX_BACKUP_PROTOCOL_ID {
|
2019-04-27 06:57:35 +00:00
|
|
|
bail!("invalid protocol name");
|
|
|
|
}
|
|
|
|
|
2019-05-06 08:29:34 +00:00
|
|
|
if parts.version >= http::version::Version::HTTP_2 {
|
|
|
|
bail!("unexpected http version '{:?}' (expected version < 2)", parts.version);
|
|
|
|
}
|
|
|
|
|
2019-05-08 11:17:23 +00:00
|
|
|
let worker_id = format!("{}_{}_{}", store, backup_type, backup_id);
|
2019-05-07 11:42:00 +00:00
|
|
|
|
2019-05-08 09:26:54 +00:00
|
|
|
let username = rpcenv.get_user().unwrap();
|
|
|
|
let env_type = rpcenv.env_type();
|
2019-05-07 09:24:44 +00:00
|
|
|
|
2019-05-11 10:07:09 +00:00
|
|
|
let backup_group = BackupGroup::new(backup_type, backup_id);
|
2019-05-13 05:06:56 +00:00
|
|
|
let last_backup = BackupInfo::last_backup(&datastore.base_path(), &backup_group).unwrap_or(None);
|
2019-05-11 10:07:09 +00:00
|
|
|
let backup_dir = BackupDir::new_with_group(backup_group, backup_time.timestamp());
|
2019-05-10 08:25:40 +00:00
|
|
|
|
2019-05-11 10:13:44 +00:00
|
|
|
let (_path, is_new) = datastore.create_backup_dir(&backup_dir)?;
|
2019-05-10 08:25:40 +00:00
|
|
|
if !is_new { bail!("backup directorty already exists."); }
|
|
|
|
|
2019-05-08 11:17:23 +00:00
|
|
|
WorkerTask::spawn("backup", Some(worker_id), &username.clone(), true, move |worker| {
|
2019-05-11 09:21:13 +00:00
|
|
|
let mut backup_env = BackupEnvironment::new(
|
2019-05-11 10:13:44 +00:00
|
|
|
env_type, username.clone(), worker.clone(), datastore, backup_dir);
|
2019-05-11 09:21:13 +00:00
|
|
|
|
|
|
|
backup_env.last_backup = last_backup;
|
|
|
|
|
2019-05-08 09:26:54 +00:00
|
|
|
let service = BackupService::new(backup_env, worker.clone());
|
2019-05-07 12:07:00 +00:00
|
|
|
|
2019-05-08 05:14:40 +00:00
|
|
|
let abort_future = worker.abort_future();
|
|
|
|
|
2019-04-27 06:57:35 +00:00
|
|
|
req_body
|
|
|
|
.on_upgrade()
|
2019-05-07 09:24:44 +00:00
|
|
|
.map_err(Error::from)
|
2019-04-27 06:57:35 +00:00
|
|
|
.and_then(move |conn| {
|
2019-05-07 11:42:00 +00:00
|
|
|
worker.log("upgrade done");
|
2019-05-07 09:24:44 +00:00
|
|
|
|
|
|
|
let mut http = hyper::server::conn::Http::new();
|
|
|
|
http.http2_only(true);
|
|
|
|
|
2019-05-07 11:42:00 +00:00
|
|
|
http.serve_connection(conn, service)
|
|
|
|
.map_err(Error::from)
|
2019-05-08 11:17:23 +00:00
|
|
|
})
|
2019-05-08 05:14:40 +00:00
|
|
|
.select(abort_future.map_err(|_| {}).then(move |_| { bail!("task aborted"); }))
|
2019-05-08 06:12:49 +00:00
|
|
|
.and_then(|(result, _)| Ok(result))
|
|
|
|
.map_err(|(err, _)| err)
|
2019-05-08 06:21:18 +00:00
|
|
|
})?;
|
|
|
|
|
|
|
|
let response = Response::builder()
|
|
|
|
.status(StatusCode::SWITCHING_PROTOCOLS)
|
2019-05-08 11:17:23 +00:00
|
|
|
.header(UPGRADE, HeaderValue::from_static(PROXMOX_BACKUP_PROTOCOL_ID))
|
2019-05-08 06:21:18 +00:00
|
|
|
.body(Body::empty())?;
|
|
|
|
|
|
|
|
Ok(Box::new(futures::future::ok(response)))
|
2019-04-27 06:57:35 +00:00
|
|
|
}
|
2019-05-07 09:24:44 +00:00
|
|
|
|
|
|
|
fn backup_api() -> Router {
|
|
|
|
|
|
|
|
let test1 = Router::new()
|
|
|
|
.get(
|
|
|
|
ApiMethod::new(
|
|
|
|
test1_get,
|
2019-05-07 10:26:55 +00:00
|
|
|
ObjectSchema::new("Test sync callback.")
|
|
|
|
)
|
|
|
|
);
|
|
|
|
|
|
|
|
let test2 = Router::new()
|
|
|
|
.download(
|
|
|
|
ApiAsyncMethod::new(
|
|
|
|
test2_get,
|
|
|
|
ObjectSchema::new("Test async callback.")
|
2019-05-07 09:24:44 +00:00
|
|
|
)
|
|
|
|
);
|
|
|
|
|
|
|
|
let router = Router::new()
|
2019-05-10 08:25:40 +00:00
|
|
|
.subdir(
|
|
|
|
"dynamic_chunk", Router::new()
|
|
|
|
.upload(api_method_upload_dynamic_chunk())
|
|
|
|
)
|
|
|
|
.subdir(
|
|
|
|
"dynamic_index", Router::new()
|
2019-05-11 14:05:50 +00:00
|
|
|
.download(api_method_dynamic_chunk_index())
|
2019-05-10 08:25:40 +00:00
|
|
|
.post(api_method_create_dynamic_index())
|
|
|
|
)
|
2019-05-15 05:58:05 +00:00
|
|
|
.subdir(
|
|
|
|
"dynamic_close", Router::new()
|
|
|
|
.post(api_method_close_dynamic_index())
|
|
|
|
)
|
2019-05-07 09:24:44 +00:00
|
|
|
.subdir("test1", test1)
|
2019-05-07 10:26:55 +00:00
|
|
|
.subdir("test2", test2)
|
2019-05-07 09:24:44 +00:00
|
|
|
.list_subdirs();
|
|
|
|
|
|
|
|
router
|
|
|
|
}
|
|
|
|
|
2019-05-11 14:05:50 +00:00
|
|
|
pub fn api_method_dynamic_chunk_index() -> ApiAsyncMethod {
|
|
|
|
ApiAsyncMethod::new(
|
|
|
|
dynamic_chunk_index,
|
|
|
|
ObjectSchema::new(r###"
|
|
|
|
Download the dynamic chunk index from the previous backup.
|
|
|
|
Simply returns an empty list if this is the first backup.
|
|
|
|
"###
|
|
|
|
)
|
2019-05-15 05:14:08 +00:00
|
|
|
.required("archive-name", crate::api2::types::BACKUP_ARCHIVE_NAME_SCHEMA.clone())
|
2019-05-11 14:05:50 +00:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
2019-05-10 08:25:40 +00:00
|
|
|
pub fn api_method_create_dynamic_index() -> ApiMethod {
|
|
|
|
ApiMethod::new(
|
|
|
|
create_dynamic_index,
|
|
|
|
ObjectSchema::new("Create dynamic chunk index file.")
|
2019-05-15 05:14:08 +00:00
|
|
|
.required("archive-name", crate::api2::types::BACKUP_ARCHIVE_NAME_SCHEMA.clone())
|
2019-05-10 08:25:40 +00:00
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn create_dynamic_index(
|
|
|
|
param: Value,
|
|
|
|
_info: &ApiMethod,
|
|
|
|
rpcenv: &mut RpcEnvironment,
|
|
|
|
) -> Result<Value, Error> {
|
|
|
|
|
|
|
|
let env: &BackupEnvironment = rpcenv.as_ref();
|
|
|
|
env.log("Inside create_dynamic_index");
|
|
|
|
|
|
|
|
let mut archive_name = tools::required_string_param(¶m, "archive-name")?.to_owned();
|
|
|
|
|
|
|
|
if !archive_name.ends_with(".pxar") {
|
|
|
|
bail!("wrong archive extension");
|
|
|
|
} else {
|
|
|
|
archive_name.push_str(".didx");
|
|
|
|
}
|
|
|
|
|
2019-05-11 10:13:44 +00:00
|
|
|
let mut path = env.backup_dir.relative_path();
|
2019-05-10 08:25:40 +00:00
|
|
|
path.push(archive_name);
|
|
|
|
|
|
|
|
let chunk_size = 4096*1024; // todo: ??
|
|
|
|
|
|
|
|
let index = env.datastore.create_dynamic_writer(path, chunk_size)?;
|
|
|
|
let uid = env.register_dynamic_writer(index);
|
|
|
|
|
|
|
|
|
|
|
|
Ok(json!(uid))
|
|
|
|
}
|
|
|
|
|
2019-05-15 05:58:05 +00:00
|
|
|
pub fn api_method_close_dynamic_index() -> ApiMethod {
|
|
|
|
ApiMethod::new(
|
|
|
|
close_dynamic_index,
|
|
|
|
ObjectSchema::new("Close dynamic index writer.")
|
|
|
|
.required("wid", IntegerSchema::new("Dynamic writer ID.")
|
|
|
|
.minimum(1)
|
|
|
|
.maximum(256)
|
|
|
|
)
|
|
|
|
)
|
|
|
|
}
|
|
|
|
|
|
|
|
fn close_dynamic_index (
|
|
|
|
param: Value,
|
|
|
|
_info: &ApiMethod,
|
|
|
|
rpcenv: &mut RpcEnvironment,
|
|
|
|
) -> Result<Value, Error> {
|
|
|
|
|
|
|
|
let wid = tools::required_integer_param(¶m, "wid")? as usize;
|
|
|
|
|
|
|
|
let env: &BackupEnvironment = rpcenv.as_ref();
|
|
|
|
|
|
|
|
env.dynamic_writer_close(wid)?;
|
|
|
|
|
|
|
|
Ok(Value::Null)
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
2019-05-07 09:24:44 +00:00
|
|
|
fn test1_get (
|
|
|
|
_param: Value,
|
|
|
|
_info: &ApiMethod,
|
2019-05-08 09:26:54 +00:00
|
|
|
rpcenv: &mut RpcEnvironment,
|
2019-05-07 09:24:44 +00:00
|
|
|
) -> Result<Value, Error> {
|
|
|
|
|
2019-05-08 09:26:54 +00:00
|
|
|
|
2019-05-09 11:06:09 +00:00
|
|
|
let env: &BackupEnvironment = rpcenv.as_ref();
|
2019-05-08 09:26:54 +00:00
|
|
|
|
|
|
|
env.log("Inside test1_get()");
|
|
|
|
|
2019-05-07 09:24:44 +00:00
|
|
|
Ok(Value::Null)
|
|
|
|
}
|
2019-05-07 10:26:55 +00:00
|
|
|
|
2019-05-11 14:05:50 +00:00
|
|
|
fn dynamic_chunk_index(
|
|
|
|
_parts: Parts,
|
|
|
|
_req_body: Body,
|
|
|
|
param: Value,
|
|
|
|
_info: &ApiAsyncMethod,
|
|
|
|
rpcenv: Box<RpcEnvironment>,
|
|
|
|
) -> Result<BoxFut, Error> {
|
|
|
|
|
|
|
|
let env: &BackupEnvironment = rpcenv.as_ref();
|
|
|
|
env.log("Inside dynamic_chunk_index");
|
|
|
|
|
|
|
|
let mut archive_name = tools::required_string_param(¶m, "archive-name")?.to_owned();
|
|
|
|
|
|
|
|
if !archive_name.ends_with(".pxar") {
|
|
|
|
bail!("wrong archive extension");
|
|
|
|
} else {
|
|
|
|
archive_name.push_str(".didx");
|
|
|
|
}
|
|
|
|
|
|
|
|
let last_backup = match &env.last_backup {
|
|
|
|
Some(info) => info,
|
|
|
|
None => {
|
|
|
|
let response = Response::builder()
|
|
|
|
.status(StatusCode::OK)
|
|
|
|
.body(Body::empty())?;
|
|
|
|
return Ok(Box::new(future::ok(response)));
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
let mut path = last_backup.backup_dir.relative_path();
|
|
|
|
path.push(archive_name);
|
|
|
|
|
|
|
|
let index = env.datastore.open_dynamic_reader(path)?;
|
|
|
|
// fixme: register index so that client can refer to it by ID
|
|
|
|
|
|
|
|
let reader = ChunkListReader::new(Box::new(index));
|
|
|
|
|
|
|
|
let stream = WrappedReaderStream::new(reader);
|
|
|
|
|
|
|
|
// fixme: set size, content type?
|
|
|
|
let response = http::Response::builder()
|
|
|
|
.status(200)
|
|
|
|
.body(Body::wrap_stream(stream))?;
|
|
|
|
|
|
|
|
Ok(Box::new(future::ok(response)))
|
|
|
|
}
|
|
|
|
|
2019-05-07 10:26:55 +00:00
|
|
|
fn test2_get(
|
2019-05-07 11:42:00 +00:00
|
|
|
_parts: Parts,
|
|
|
|
_req_body: Body,
|
|
|
|
_param: Value,
|
2019-05-07 10:26:55 +00:00
|
|
|
_info: &ApiAsyncMethod,
|
2019-05-09 16:01:24 +00:00
|
|
|
_rpcenv: Box<RpcEnvironment>,
|
2019-05-07 10:26:55 +00:00
|
|
|
) -> Result<BoxFut, Error> {
|
|
|
|
|
|
|
|
let fut = tokio::timer::Interval::new_interval(std::time::Duration::from_millis(300))
|
|
|
|
.map_err(|err| http_err!(INTERNAL_SERVER_ERROR, format!("tokio timer interval error: {}", err)))
|
2019-05-08 05:14:40 +00:00
|
|
|
.take(50)
|
2019-05-07 10:26:55 +00:00
|
|
|
.for_each(|tv| {
|
|
|
|
println!("LOOP {:?}", tv);
|
|
|
|
Ok(())
|
|
|
|
})
|
|
|
|
.and_then(|_| {
|
|
|
|
println!("TASK DONE");
|
|
|
|
Ok(Response::builder()
|
|
|
|
.status(StatusCode::OK)
|
2019-05-08 06:21:18 +00:00
|
|
|
.body(Body::empty())?)
|
2019-05-07 10:26:55 +00:00
|
|
|
});
|
|
|
|
|
|
|
|
Ok(Box::new(fut))
|
|
|
|
}
|