2021-03-30 15:07:59 +00:00
|
|
|
/// Helper to run tape commands as root. Currently only required
|
|
|
|
/// to read and set the encryption key.
|
2020-12-28 10:10:25 +00:00
|
|
|
///
|
|
|
|
/// This command can use STDIN as tape device handle.
|
|
|
|
|
|
|
|
use std::fs::File;
|
|
|
|
use std::os::unix::io::{AsRawFd, FromRawFd};
|
|
|
|
|
2021-01-18 12:36:11 +00:00
|
|
|
use anyhow::{bail, Error};
|
2021-01-14 12:05:26 +00:00
|
|
|
use serde_json::Value;
|
2020-12-28 10:10:25 +00:00
|
|
|
|
|
|
|
use proxmox::{
|
|
|
|
api::{
|
|
|
|
api,
|
|
|
|
cli::*,
|
|
|
|
RpcEnvironment,
|
|
|
|
},
|
2021-01-20 16:27:01 +00:00
|
|
|
tools::Uuid,
|
2020-12-28 10:10:25 +00:00
|
|
|
};
|
|
|
|
|
2021-09-03 07:10:18 +00:00
|
|
|
use pbs_api_types::{
|
|
|
|
Fingerprint, LTO_DRIVE_PATH_SCHEMA, DRIVE_NAME_SCHEMA, TAPE_ENCRYPTION_KEY_FINGERPRINT_SCHEMA,
|
|
|
|
MEDIA_SET_UUID_SCHEMA, LtoTapeDrive,
|
|
|
|
};
|
2021-08-30 09:49:22 +00:00
|
|
|
|
2021-09-13 09:54:24 +00:00
|
|
|
use pbs_tape::linux_list_drives::{open_lto_tape_device, check_tape_is_lto_tape_device};
|
|
|
|
|
2020-12-28 10:10:25 +00:00
|
|
|
use proxmox_backup::{
|
|
|
|
tape::{
|
2021-01-21 16:12:01 +00:00
|
|
|
drive::{
|
|
|
|
TapeDriver,
|
2021-03-30 15:07:59 +00:00
|
|
|
LtoTapeHandle,
|
2021-09-03 07:10:18 +00:00
|
|
|
open_lto_tape_drive,
|
2020-12-28 10:10:25 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2021-03-30 15:07:59 +00:00
|
|
|
fn get_tape_handle(param: &Value) -> Result<LtoTapeHandle, Error> {
|
2021-01-14 12:05:26 +00:00
|
|
|
|
|
|
|
let handle = if let Some(name) = param["drive"].as_str() {
|
2021-09-03 07:10:18 +00:00
|
|
|
let (config, _digest) = pbs_config::drive::config()?;
|
2021-03-30 15:07:59 +00:00
|
|
|
let drive: LtoTapeDrive = config.lookup("lto", &name)?;
|
2021-01-14 12:05:26 +00:00
|
|
|
eprintln!("using device {}", drive.path);
|
2021-09-03 07:10:18 +00:00
|
|
|
open_lto_tape_drive(&drive)?
|
2021-01-14 12:05:26 +00:00
|
|
|
} else if let Some(device) = param["device"].as_str() {
|
|
|
|
eprintln!("using device {}", device);
|
2021-03-30 15:07:59 +00:00
|
|
|
LtoTapeHandle::new(open_lto_tape_device(&device)?)?
|
2021-01-14 12:05:26 +00:00
|
|
|
} else if let Some(true) = param["stdin"].as_bool() {
|
|
|
|
eprintln!("using stdin");
|
2020-12-28 10:10:25 +00:00
|
|
|
let fd = std::io::stdin().as_raw_fd();
|
|
|
|
let file = unsafe { File::from_raw_fd(fd) };
|
2021-03-30 15:07:59 +00:00
|
|
|
check_tape_is_lto_tape_device(&file)?;
|
|
|
|
LtoTapeHandle::new(file)?
|
2021-01-19 10:37:49 +00:00
|
|
|
} else if let Ok(name) = std::env::var("PROXMOX_TAPE_DRIVE") {
|
2021-09-03 07:10:18 +00:00
|
|
|
let (config, _digest) = pbs_config::drive::config()?;
|
2021-03-30 15:07:59 +00:00
|
|
|
let drive: LtoTapeDrive = config.lookup("lto", &name)?;
|
2021-01-14 12:05:26 +00:00
|
|
|
eprintln!("using device {}", drive.path);
|
2021-09-03 07:10:18 +00:00
|
|
|
open_lto_tape_drive(&drive)?
|
2021-01-14 12:05:26 +00:00
|
|
|
} else {
|
2021-09-03 07:10:18 +00:00
|
|
|
let (config, _digest) = pbs_config::drive::config()?;
|
2021-01-14 12:05:26 +00:00
|
|
|
|
|
|
|
let mut drive_names = Vec::new();
|
|
|
|
for (name, (section_type, _)) in config.sections.iter() {
|
2021-03-30 15:07:59 +00:00
|
|
|
if section_type != "lto" { continue; }
|
2021-01-14 12:05:26 +00:00
|
|
|
drive_names.push(name);
|
|
|
|
}
|
|
|
|
|
|
|
|
if drive_names.len() == 1 {
|
|
|
|
let name = drive_names[0];
|
2021-03-30 15:07:59 +00:00
|
|
|
let drive: LtoTapeDrive = config.lookup("lto", &name)?;
|
2021-01-14 12:05:26 +00:00
|
|
|
eprintln!("using device {}", drive.path);
|
2021-09-03 07:10:18 +00:00
|
|
|
open_lto_tape_drive(&drive)?
|
2021-01-14 12:05:26 +00:00
|
|
|
} else {
|
|
|
|
bail!("no drive/device specified");
|
|
|
|
}
|
2020-12-28 10:10:25 +00:00
|
|
|
};
|
2021-01-14 12:05:26 +00:00
|
|
|
|
|
|
|
Ok(handle)
|
2020-12-28 10:10:25 +00:00
|
|
|
}
|
|
|
|
|
2021-01-18 06:16:06 +00:00
|
|
|
#[api(
|
|
|
|
input: {
|
|
|
|
properties: {
|
|
|
|
fingerprint: {
|
|
|
|
schema: TAPE_ENCRYPTION_KEY_FINGERPRINT_SCHEMA,
|
|
|
|
optional: true,
|
|
|
|
},
|
2021-01-20 16:27:01 +00:00
|
|
|
uuid: {
|
|
|
|
schema: MEDIA_SET_UUID_SCHEMA,
|
|
|
|
optional: true,
|
|
|
|
},
|
2021-01-18 06:16:06 +00:00
|
|
|
drive: {
|
|
|
|
schema: DRIVE_NAME_SCHEMA,
|
|
|
|
optional: true,
|
|
|
|
},
|
|
|
|
device: {
|
2021-03-30 15:07:59 +00:00
|
|
|
schema: LTO_DRIVE_PATH_SCHEMA,
|
2021-01-18 06:16:06 +00:00
|
|
|
optional: true,
|
|
|
|
},
|
|
|
|
stdin: {
|
|
|
|
description: "Use standard input as device handle.",
|
|
|
|
type: bool,
|
|
|
|
optional: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
)]
|
|
|
|
/// Set or clear encryption key
|
|
|
|
fn set_encryption(
|
|
|
|
fingerprint: Option<Fingerprint>,
|
2021-01-20 16:27:01 +00:00
|
|
|
uuid: Option<Uuid>,
|
2021-01-18 06:16:06 +00:00
|
|
|
param: Value,
|
|
|
|
) -> Result<(), Error> {
|
|
|
|
|
|
|
|
let result = proxmox::try_block!({
|
|
|
|
let mut handle = get_tape_handle(¶m)?;
|
|
|
|
|
2021-01-20 16:27:01 +00:00
|
|
|
match (fingerprint, uuid) {
|
|
|
|
(Some(fingerprint), Some(uuid)) => {
|
|
|
|
handle.set_encryption(Some((fingerprint, uuid)))?;
|
|
|
|
}
|
|
|
|
(Some(_), None) => {
|
|
|
|
bail!("missing media set uuid");
|
|
|
|
}
|
|
|
|
(None, _) => {
|
|
|
|
handle.set_encryption(None)?;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-18 06:16:06 +00:00
|
|
|
Ok(())
|
|
|
|
}).map_err(|err: Error| err.to_string());
|
|
|
|
|
|
|
|
println!("{}", serde_json::to_string_pretty(&result)?);
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
|
2020-12-28 10:10:25 +00:00
|
|
|
fn main() -> Result<(), Error> {
|
|
|
|
|
|
|
|
// check if we are user root or backup
|
2021-09-02 10:47:11 +00:00
|
|
|
let backup_uid = pbs_config::backup_user()?.uid;
|
|
|
|
let backup_gid = pbs_config::backup_group()?.gid;
|
2020-12-28 10:10:25 +00:00
|
|
|
let running_uid = nix::unistd::Uid::current();
|
|
|
|
let running_gid = nix::unistd::Gid::current();
|
|
|
|
|
|
|
|
let effective_uid = nix::unistd::Uid::effective();
|
|
|
|
if !effective_uid.is_root() {
|
|
|
|
bail!("this program needs to be run with setuid root");
|
|
|
|
}
|
|
|
|
|
2021-01-19 10:06:26 +00:00
|
|
|
if !running_uid.is_root() && (running_uid != backup_uid || running_gid != backup_gid) {
|
|
|
|
bail!(
|
|
|
|
"Not running as backup user or group (got uid {} gid {})",
|
|
|
|
running_uid, running_gid,
|
|
|
|
);
|
2020-12-28 10:10:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
let cmd_def = CliCommandMap::new()
|
2021-01-18 06:16:06 +00:00
|
|
|
.insert(
|
|
|
|
"encryption",
|
|
|
|
CliCommand::new(&API_METHOD_SET_ENCRYPTION)
|
|
|
|
)
|
2020-12-28 10:10:25 +00:00
|
|
|
;
|
|
|
|
|
|
|
|
let mut rpcenv = CliEnvironment::new();
|
|
|
|
rpcenv.set_auth_id(Some(String::from("root@pam")));
|
|
|
|
|
|
|
|
run_cli_command(cmd_def, rpcenv, None);
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
}
|