start new pbs-config workspace

moved src/config/domains.rs
This commit is contained in:
Dietmar Maurer
2021-09-02 12:47:11 +02:00
parent df12c9ec4e
commit 2121174827
58 changed files with 207 additions and 181 deletions

View File

@ -483,7 +483,7 @@ fn save_changer_state_cache(
let state = serde_json::to_string_pretty(state)?;
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
let mode = nix::sys::stat::Mode::from_bits_truncate(0o0644);
let options = CreateOptions::new()
.perm(mode)

View File

@ -553,7 +553,7 @@ pub fn set_tape_device_state(
let mut path = PathBuf::from(crate::tape::DRIVE_STATE_DIR);
path.push(drive);
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
let mode = nix::sys::stat::Mode::from_bits_truncate(0o0644);
let options = CreateOptions::new()
.perm(mode)
@ -612,7 +612,7 @@ fn open_device_lock(device_path: &str) -> Result<std::fs::File, Error> {
let mut path = std::path::PathBuf::from(crate::tape::DRIVE_LOCK_DIR);
path.push(lock_name);
let user = crate::backup::backup_user()?;
let user = pbs_config::backup_user()?;
let options = CreateOptions::new()
.perm(Mode::from_bits_truncate(0o660))
.owner(user.uid)

View File

@ -40,6 +40,7 @@ use proxmox::tools::{
};
use pbs_systemd::time::compute_next_event;
use pbs_config::{open_backup_lockfile, BackupLockGuard};
use crate::{
api2::types::{
@ -48,7 +49,6 @@ use crate::{
MediaStatus,
MediaLocation,
},
backup::{open_backup_lockfile, BackupLockGuard},
tape::{
TAPE_STATUS_DIR,
MediaSet,
@ -174,7 +174,7 @@ impl Inventory {
// We cannot use chown inside test environment (no permissions)
CreateOptions::new().perm(mode)
} else {
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
CreateOptions::new()
.perm(mode)
.owner(backup_user.uid)

View File

@ -183,7 +183,7 @@ impl MediaCatalog {
}
fn create_basedir(base_path: &Path) -> Result<(), Error> {
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
let mode = nix::sys::stat::Mode::from_bits_truncate(0o0640);
let opts = CreateOptions::new()
.perm(mode)
@ -217,7 +217,7 @@ impl MediaCatalog {
.create(create)
.open(&path)?;
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
fchown(file.as_raw_fd(), Some(backup_user.uid), Some(backup_user.gid))
.map_err(|err| format_err!("fchown failed - {}", err))?;
@ -275,7 +275,7 @@ impl MediaCatalog {
return Ok(file);
}
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
fchown(file.as_raw_fd(), Some(backup_user.uid), Some(backup_user.gid))
.map_err(|err| format_err!("fchown failed - {}", err))?;

View File

@ -91,7 +91,7 @@ fn write_snapshot_cache(
}
}
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
let mode = nix::sys::stat::Mode::from_bits_truncate(0o0640);
let options = CreateOptions::new()
.perm(mode)

View File

@ -16,9 +16,9 @@ use proxmox::tools::Uuid;
use pbs_api_types::Fingerprint;
use pbs_systemd::time::compute_next_event;
use pbs_config::BackupLockGuard;
use crate::{
backup::BackupLockGuard,
api2::types::{
MediaStatus,
MediaLocation,

View File

@ -71,7 +71,7 @@ pub const COMMIT_BLOCK_SIZE: usize = 128*1024*1024*1024; // 128 GiB
/// Create tape status dir with correct permission
pub fn create_tape_status_dir() -> Result<(), Error> {
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
let mode = nix::sys::stat::Mode::from_bits_truncate(0o0750);
let options = CreateOptions::new()
.perm(mode)
@ -86,7 +86,7 @@ pub fn create_tape_status_dir() -> Result<(), Error> {
/// Create drive lock dir with correct permission
pub fn create_drive_lock_dir() -> Result<(), Error> {
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
let mode = nix::sys::stat::Mode::from_bits_truncate(0o0750);
let options = CreateOptions::new()
.perm(mode)
@ -101,7 +101,7 @@ pub fn create_drive_lock_dir() -> Result<(), Error> {
/// Create drive state dir with correct permission
pub fn create_drive_state_dir() -> Result<(), Error> {
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
let mode = nix::sys::stat::Mode::from_bits_truncate(0o0750);
let options = CreateOptions::new()
.perm(mode)
@ -116,7 +116,7 @@ pub fn create_drive_state_dir() -> Result<(), Error> {
/// Create changer state cache dir with correct permission
pub fn create_changer_state_dir() -> Result<(), Error> {
let backup_user = crate::backup::backup_user()?;
let backup_user = pbs_config::backup_user()?;
let mode = nix::sys::stat::Mode::from_bits_truncate(0o0750);
let options = CreateOptions::new()
.perm(mode)