2019-11-21 13:53:15 +00:00
|
|
|
//use chrono::{Local, TimeZone};
|
2020-04-17 12:11:25 +00:00
|
|
|
use anyhow::{bail, format_err, Error};
|
2019-06-27 07:01:41 +00:00
|
|
|
use futures::*;
|
|
|
|
use hyper::header::{self, HeaderValue, UPGRADE};
|
|
|
|
use hyper::http::request::Parts;
|
2019-11-21 13:53:15 +00:00
|
|
|
use hyper::{Body, Response, StatusCode};
|
2019-06-27 07:01:41 +00:00
|
|
|
use serde_json::Value;
|
|
|
|
|
2019-11-21 12:10:49 +00:00
|
|
|
use proxmox::{sortable, identity};
|
2020-04-17 13:01:56 +00:00
|
|
|
use proxmox::api::{ApiResponseFuture, ApiHandler, ApiMethod, Router, RpcEnvironment, Permission};
|
2019-11-21 13:53:15 +00:00
|
|
|
use proxmox::api::schema::*;
|
2020-01-21 11:28:01 +00:00
|
|
|
use proxmox::http_err;
|
2019-11-21 12:10:49 +00:00
|
|
|
|
2019-06-28 14:27:01 +00:00
|
|
|
use crate::api2::types::*;
|
2019-11-21 13:53:15 +00:00
|
|
|
use crate::backup::*;
|
|
|
|
use crate::server::{WorkerTask, H2Service};
|
|
|
|
use crate::tools;
|
2020-04-17 13:01:56 +00:00
|
|
|
use crate::config::acl::PRIV_DATASTORE_ALLOCATE_SPACE;
|
2020-04-18 06:23:04 +00:00
|
|
|
use crate::config::cached_user_info::CachedUserInfo;
|
2019-06-27 07:01:41 +00:00
|
|
|
|
|
|
|
mod environment;
|
|
|
|
use environment::*;
|
|
|
|
|
2019-11-21 08:36:41 +00:00
|
|
|
pub const ROUTER: Router = Router::new()
|
|
|
|
.upgrade(&API_METHOD_UPGRADE_BACKUP);
|
|
|
|
|
2019-11-21 12:10:49 +00:00
|
|
|
#[sortable]
|
2019-11-21 08:36:41 +00:00
|
|
|
pub const API_METHOD_UPGRADE_BACKUP: ApiMethod = ApiMethod::new(
|
2019-11-23 08:03:21 +00:00
|
|
|
&ApiHandler::AsyncHttp(&upgrade_to_backup_reader_protocol),
|
2019-11-21 08:36:41 +00:00
|
|
|
&ObjectSchema::new(
|
|
|
|
concat!("Upgraded to backup protocol ('", PROXMOX_BACKUP_READER_PROTOCOL_ID_V1!(), "')."),
|
2019-11-21 12:10:49 +00:00
|
|
|
&sorted!([
|
2019-12-11 12:45:23 +00:00
|
|
|
("store", false, &DATASTORE_SCHEMA),
|
2019-11-21 08:36:41 +00:00
|
|
|
("backup-type", false, &StringSchema::new("Backup type.")
|
|
|
|
.format(&ApiStringFormat::Enum(&["vm", "ct", "host"]))
|
|
|
|
.schema()
|
|
|
|
),
|
|
|
|
("backup-id", false, &StringSchema::new("Backup ID.").schema()),
|
|
|
|
("backup-time", false, &IntegerSchema::new("Backup time (Unix epoch.)")
|
|
|
|
.minimum(1_547_797_308)
|
|
|
|
.schema()
|
|
|
|
),
|
|
|
|
("debug", true, &BooleanSchema::new("Enable verbose debug logging.").schema()),
|
2019-11-21 12:10:49 +00:00
|
|
|
]),
|
2019-06-27 07:01:41 +00:00
|
|
|
)
|
2020-04-18 06:23:04 +00:00
|
|
|
).access(
|
|
|
|
// Note: parameter 'store' is no uri parameter, so we need to test inside function body
|
|
|
|
Some("The user needs Datastore.AllocateSpace privilege on /datastore/{store}."),
|
|
|
|
&Permission::Anybody
|
|
|
|
);
|
2019-06-27 07:01:41 +00:00
|
|
|
|
|
|
|
fn upgrade_to_backup_reader_protocol(
|
|
|
|
parts: Parts,
|
|
|
|
req_body: Body,
|
|
|
|
param: Value,
|
2019-11-21 08:36:41 +00:00
|
|
|
_info: &ApiMethod,
|
2019-06-27 07:01:41 +00:00
|
|
|
rpcenv: Box<dyn RpcEnvironment>,
|
2019-12-16 08:59:45 +00:00
|
|
|
) -> ApiResponseFuture {
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
async move {
|
|
|
|
let debug = param["debug"].as_bool().unwrap_or(false);
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2020-04-18 06:23:04 +00:00
|
|
|
let username = rpcenv.get_user().unwrap();
|
2019-11-22 12:02:05 +00:00
|
|
|
let store = tools::required_string_param(¶m, "store")?.to_owned();
|
2020-04-18 06:23:04 +00:00
|
|
|
|
|
|
|
let user_info = CachedUserInfo::new()?;
|
|
|
|
user_info.check_privs(&username, &["datastore", &store], PRIV_DATASTORE_ALLOCATE_SPACE, false)?;
|
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let datastore = DataStore::lookup_datastore(&store)?;
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let backup_type = tools::required_string_param(¶m, "backup-type")?;
|
|
|
|
let backup_id = tools::required_string_param(¶m, "backup-id")?;
|
|
|
|
let backup_time = tools::required_integer_param(¶m, "backup-time")?;
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let protocols = parts
|
|
|
|
.headers
|
|
|
|
.get("UPGRADE")
|
|
|
|
.ok_or_else(|| format_err!("missing Upgrade header"))?
|
2019-06-27 07:01:41 +00:00
|
|
|
.to_str()?;
|
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
if protocols != PROXMOX_BACKUP_READER_PROTOCOL_ID_V1!() {
|
|
|
|
bail!("invalid protocol name");
|
|
|
|
}
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
if parts.version >= http::version::Version::HTTP_2 {
|
|
|
|
bail!("unexpected http version '{:?}' (expected version < 2)", parts.version);
|
|
|
|
}
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let env_type = rpcenv.env_type();
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let backup_dir = BackupDir::new(backup_type, backup_id, backup_time);
|
|
|
|
let path = datastore.base_path();
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
//let files = BackupInfo::list_files(&path, &backup_dir)?;
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let worker_id = format!("{}_{}_{}_{:08X}", store, backup_type, backup_id, backup_dir.backup_time().timestamp());
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
WorkerTask::spawn("reader", Some(worker_id), &username.clone(), true, move |worker| {
|
|
|
|
let mut env = ReaderEnvironment::new(
|
|
|
|
env_type, username.clone(), worker.clone(), datastore, backup_dir);
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
env.debug = debug;
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
env.log(format!("starting new backup reader datastore '{}': {:?}", store, path));
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let service = H2Service::new(env.clone(), worker.clone(), &READER_API_ROUTER, debug);
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let abort_future = worker.abort_future();
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let req_fut = req_body
|
|
|
|
.on_upgrade()
|
|
|
|
.map_err(Error::from)
|
|
|
|
.and_then({
|
|
|
|
let env = env.clone();
|
|
|
|
move |conn| {
|
|
|
|
env.debug("protocol upgrade done");
|
2019-08-27 11:55:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let mut http = hyper::server::conn::Http::new();
|
|
|
|
http.http2_only(true);
|
|
|
|
// increase window size: todo - find optiomal size
|
|
|
|
let window_size = 32*1024*1024; // max = (1 << 31) - 2
|
|
|
|
http.http2_initial_stream_window_size(window_size);
|
|
|
|
http.http2_initial_connection_window_size(window_size);
|
2019-08-27 11:55:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
http.serve_connection(conn, service)
|
|
|
|
.map_err(Error::from)
|
|
|
|
}
|
|
|
|
});
|
|
|
|
let abort_future = abort_future
|
|
|
|
.map(|_| Err(format_err!("task aborted")));
|
2019-08-27 11:55:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
use futures::future::Either;
|
|
|
|
futures::future::select(req_fut, abort_future)
|
|
|
|
.map(|res| match res {
|
|
|
|
Either::Left((Ok(res), _)) => Ok(res),
|
|
|
|
Either::Left((Err(err), _)) => Err(err),
|
|
|
|
Either::Right((Ok(res), _)) => Ok(res),
|
|
|
|
Either::Right((Err(err), _)) => Err(err),
|
|
|
|
})
|
|
|
|
.map_ok(move |_| env.log("reader finished sucessfully"))
|
|
|
|
})?;
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let response = Response::builder()
|
|
|
|
.status(StatusCode::SWITCHING_PROTOCOLS)
|
|
|
|
.header(UPGRADE, HeaderValue::from_static(PROXMOX_BACKUP_READER_PROTOCOL_ID_V1!()))
|
|
|
|
.body(Body::empty())?;
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
Ok(response)
|
|
|
|
}.boxed()
|
2019-06-27 07:01:41 +00:00
|
|
|
}
|
|
|
|
|
2019-11-21 08:36:41 +00:00
|
|
|
pub const READER_API_ROUTER: Router = Router::new()
|
|
|
|
.subdirs(&[
|
|
|
|
(
|
|
|
|
"chunk", &Router::new()
|
|
|
|
.download(&API_METHOD_DOWNLOAD_CHUNK)
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"download", &Router::new()
|
|
|
|
.download(&API_METHOD_DOWNLOAD_FILE)
|
|
|
|
),
|
|
|
|
(
|
|
|
|
"speedtest", &Router::new()
|
|
|
|
.download(&API_METHOD_SPEEDTEST)
|
|
|
|
),
|
|
|
|
]);
|
|
|
|
|
2019-11-21 12:10:49 +00:00
|
|
|
#[sortable]
|
2019-11-21 08:36:41 +00:00
|
|
|
pub const API_METHOD_DOWNLOAD_FILE: ApiMethod = ApiMethod::new(
|
2019-11-23 08:03:21 +00:00
|
|
|
&ApiHandler::AsyncHttp(&download_file),
|
2019-11-21 08:36:41 +00:00
|
|
|
&ObjectSchema::new(
|
|
|
|
"Download specified file.",
|
2019-11-21 12:10:49 +00:00
|
|
|
&sorted!([
|
|
|
|
("file-name", false, &crate::api2::types::BACKUP_ARCHIVE_NAME_SCHEMA),
|
|
|
|
]),
|
2019-06-27 07:01:41 +00:00
|
|
|
)
|
2019-11-21 08:36:41 +00:00
|
|
|
);
|
2019-06-27 07:01:41 +00:00
|
|
|
|
|
|
|
fn download_file(
|
|
|
|
_parts: Parts,
|
|
|
|
_req_body: Body,
|
|
|
|
param: Value,
|
2019-11-21 08:36:41 +00:00
|
|
|
_info: &ApiMethod,
|
2019-06-27 07:01:41 +00:00
|
|
|
rpcenv: Box<dyn RpcEnvironment>,
|
2019-12-16 08:59:45 +00:00
|
|
|
) -> ApiResponseFuture {
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
async move {
|
|
|
|
let env: &ReaderEnvironment = rpcenv.as_ref();
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let file_name = tools::required_string_param(¶m, "file-name")?.to_owned();
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let mut path = env.datastore.base_path();
|
|
|
|
path.push(env.backup_dir.relative_path());
|
|
|
|
path.push(&file_name);
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let path2 = path.clone();
|
|
|
|
let path3 = path.clone();
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let file = tokio::fs::File::open(path)
|
|
|
|
.map_err(move |err| http_err!(BAD_REQUEST, format!("open file {:?} failed: {}", path2, err)))
|
|
|
|
.await?;
|
2019-06-28 05:07:52 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
env.log(format!("download {:?}", path3));
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-12-12 14:27:07 +00:00
|
|
|
let payload = tokio_util::codec::FramedRead::new(file, tokio_util::codec::BytesCodec::new())
|
|
|
|
.map_ok(|bytes| hyper::body::Bytes::from(bytes.freeze()));
|
2019-06-27 07:01:41 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let body = Body::wrap_stream(payload);
|
|
|
|
|
|
|
|
// fixme: set other headers ?
|
|
|
|
Ok(Response::builder()
|
|
|
|
.status(StatusCode::OK)
|
|
|
|
.header(header::CONTENT_TYPE, "application/octet-stream")
|
|
|
|
.body(body)
|
|
|
|
.unwrap())
|
|
|
|
}.boxed()
|
2019-06-27 07:01:41 +00:00
|
|
|
}
|
2019-06-28 14:27:01 +00:00
|
|
|
|
2019-11-21 12:10:49 +00:00
|
|
|
#[sortable]
|
2019-11-21 08:36:41 +00:00
|
|
|
pub const API_METHOD_DOWNLOAD_CHUNK: ApiMethod = ApiMethod::new(
|
2019-11-23 08:03:21 +00:00
|
|
|
&ApiHandler::AsyncHttp(&download_chunk),
|
2019-11-21 08:36:41 +00:00
|
|
|
&ObjectSchema::new(
|
|
|
|
"Download specified chunk.",
|
2019-11-21 12:10:49 +00:00
|
|
|
&sorted!([
|
|
|
|
("digest", false, &CHUNK_DIGEST_SCHEMA),
|
|
|
|
]),
|
2019-06-28 14:27:01 +00:00
|
|
|
)
|
2019-11-21 08:36:41 +00:00
|
|
|
);
|
2019-06-28 14:27:01 +00:00
|
|
|
|
|
|
|
fn download_chunk(
|
|
|
|
_parts: Parts,
|
|
|
|
_req_body: Body,
|
|
|
|
param: Value,
|
2019-11-21 08:36:41 +00:00
|
|
|
_info: &ApiMethod,
|
2019-06-28 14:27:01 +00:00
|
|
|
rpcenv: Box<dyn RpcEnvironment>,
|
2019-12-16 08:59:45 +00:00
|
|
|
) -> ApiResponseFuture {
|
2019-06-28 14:27:01 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
async move {
|
|
|
|
let env: &ReaderEnvironment = rpcenv.as_ref();
|
2019-10-05 09:41:19 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let digest_str = tools::required_string_param(¶m, "digest")?;
|
|
|
|
let digest = proxmox::tools::hex_to_digest(digest_str)?;
|
2019-10-05 09:41:19 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let (path, _) = env.datastore.chunk_path(&digest);
|
|
|
|
let path2 = path.clone();
|
2019-10-05 09:41:19 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
env.debug(format!("download chunk {:?}", path));
|
2019-10-05 09:41:19 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let data = tokio::fs::read(path)
|
|
|
|
.map_err(move |err| http_err!(BAD_REQUEST, format!("reading file {:?} failed: {}", path2, err)))
|
|
|
|
.await?;
|
2019-10-07 10:24:06 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
let body = Body::from(data);
|
2019-10-07 10:24:06 +00:00
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
// fixme: set other headers ?
|
|
|
|
Ok(Response::builder()
|
|
|
|
.status(StatusCode::OK)
|
|
|
|
.header(header::CONTENT_TYPE, "application/octet-stream")
|
|
|
|
.body(body)
|
|
|
|
.unwrap())
|
|
|
|
}.boxed()
|
2019-10-05 09:41:19 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* this is too slow
|
|
|
|
fn download_chunk_old(
|
|
|
|
_parts: Parts,
|
|
|
|
_req_body: Body,
|
|
|
|
param: Value,
|
2019-11-21 08:36:41 +00:00
|
|
|
_info: &ApiMethod,
|
2019-10-05 09:41:19 +00:00
|
|
|
rpcenv: Box<dyn RpcEnvironment>,
|
2019-12-16 08:59:45 +00:00
|
|
|
) -> Result<ApiResponseFuture, Error> {
|
2019-10-05 09:41:19 +00:00
|
|
|
|
2019-06-28 14:27:01 +00:00
|
|
|
let env: &ReaderEnvironment = rpcenv.as_ref();
|
|
|
|
let env2 = env.clone();
|
|
|
|
|
|
|
|
let digest_str = tools::required_string_param(¶m, "digest")?;
|
|
|
|
let digest = proxmox::tools::hex_to_digest(digest_str)?;
|
|
|
|
|
|
|
|
let (path, _) = env.datastore.chunk_path(&digest);
|
|
|
|
|
|
|
|
let path2 = path.clone();
|
|
|
|
let path3 = path.clone();
|
|
|
|
|
|
|
|
let response_future = tokio::fs::File::open(path)
|
|
|
|
.map_err(move |err| http_err!(BAD_REQUEST, format!("open file {:?} failed: {}", path2, err)))
|
|
|
|
.and_then(move |file| {
|
|
|
|
env2.debug(format!("download chunk {:?}", path3));
|
2019-12-12 14:27:07 +00:00
|
|
|
let payload = tokio_util::codec::FramedRead::new(file, tokio_util::codec::BytesCodec::new())
|
|
|
|
.map_ok(|bytes| hyper::body::Bytes::from(bytes.freeze()));
|
2019-06-28 14:27:01 +00:00
|
|
|
|
|
|
|
let body = Body::wrap_stream(payload);
|
|
|
|
|
|
|
|
// fixme: set other headers ?
|
2019-08-27 11:55:41 +00:00
|
|
|
futures::future::ok(Response::builder()
|
2019-06-28 14:27:01 +00:00
|
|
|
.status(StatusCode::OK)
|
|
|
|
.header(header::CONTENT_TYPE, "application/octet-stream")
|
|
|
|
.body(body)
|
|
|
|
.unwrap())
|
|
|
|
});
|
|
|
|
|
|
|
|
Ok(Box::new(response_future))
|
|
|
|
}
|
2019-10-05 09:41:19 +00:00
|
|
|
*/
|
2019-06-28 14:27:01 +00:00
|
|
|
|
2019-11-21 08:36:41 +00:00
|
|
|
pub const API_METHOD_SPEEDTEST: ApiMethod = ApiMethod::new(
|
2019-11-23 08:03:21 +00:00
|
|
|
&ApiHandler::AsyncHttp(&speedtest),
|
2019-11-21 08:36:41 +00:00
|
|
|
&ObjectSchema::new("Test 4M block download speed.", &[])
|
|
|
|
);
|
2019-06-28 14:27:01 +00:00
|
|
|
|
|
|
|
fn speedtest(
|
|
|
|
_parts: Parts,
|
|
|
|
_req_body: Body,
|
|
|
|
_param: Value,
|
2019-11-21 08:36:41 +00:00
|
|
|
_info: &ApiMethod,
|
2019-06-28 14:27:01 +00:00
|
|
|
_rpcenv: Box<dyn RpcEnvironment>,
|
2019-12-16 08:59:45 +00:00
|
|
|
) -> ApiResponseFuture {
|
2019-06-28 14:27:01 +00:00
|
|
|
|
2019-06-29 11:43:10 +00:00
|
|
|
let buffer = vec![65u8; 1024*1024]; // nonsense [A,A,A...]
|
2019-06-28 14:27:01 +00:00
|
|
|
|
|
|
|
let body = Body::from(buffer);
|
|
|
|
|
|
|
|
let response = Response::builder()
|
|
|
|
.status(StatusCode::OK)
|
|
|
|
.header(header::CONTENT_TYPE, "application/octet-stream")
|
|
|
|
.body(body)
|
|
|
|
.unwrap();
|
|
|
|
|
2019-11-22 12:02:05 +00:00
|
|
|
future::ok(response).boxed()
|
2019-06-28 14:27:01 +00:00
|
|
|
}
|