api: datastore status: make counts recurse over all accesible namespaces
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
This commit is contained in:
parent
de27ebc6b6
commit
22cfad134f
|
@ -36,9 +36,9 @@ use pbs_api_types::{
|
||||||
DataStoreStatus, GarbageCollectionStatus, GroupListItem, Operation, PruneOptions, RRDMode,
|
DataStoreStatus, GarbageCollectionStatus, GroupListItem, Operation, PruneOptions, RRDMode,
|
||||||
RRDTimeFrame, SnapshotListItem, SnapshotVerifyState, BACKUP_ARCHIVE_NAME_SCHEMA,
|
RRDTimeFrame, SnapshotListItem, SnapshotVerifyState, BACKUP_ARCHIVE_NAME_SCHEMA,
|
||||||
BACKUP_ID_SCHEMA, BACKUP_NAMESPACE_SCHEMA, BACKUP_TIME_SCHEMA, BACKUP_TYPE_SCHEMA,
|
BACKUP_ID_SCHEMA, BACKUP_NAMESPACE_SCHEMA, BACKUP_TIME_SCHEMA, BACKUP_TYPE_SCHEMA,
|
||||||
DATASTORE_SCHEMA, IGNORE_VERIFIED_BACKUPS_SCHEMA, NS_MAX_DEPTH_SCHEMA, PRIV_DATASTORE_AUDIT,
|
DATASTORE_SCHEMA, IGNORE_VERIFIED_BACKUPS_SCHEMA, MAX_NAMESPACE_DEPTH, NS_MAX_DEPTH_SCHEMA,
|
||||||
PRIV_DATASTORE_BACKUP, PRIV_DATASTORE_MODIFY, PRIV_DATASTORE_PRUNE, PRIV_DATASTORE_READ,
|
PRIV_DATASTORE_AUDIT, PRIV_DATASTORE_BACKUP, PRIV_DATASTORE_MODIFY, PRIV_DATASTORE_PRUNE,
|
||||||
PRIV_DATASTORE_VERIFY, UPID_SCHEMA, VERIFICATION_OUTDATED_AFTER_SCHEMA,
|
PRIV_DATASTORE_READ, PRIV_DATASTORE_VERIFY, UPID_SCHEMA, VERIFICATION_OUTDATED_AFTER_SCHEMA,
|
||||||
};
|
};
|
||||||
use pbs_client::pxar::{create_tar, create_zip};
|
use pbs_client::pxar::{create_tar, create_zip};
|
||||||
use pbs_config::CachedUserInfo;
|
use pbs_config::CachedUserInfo;
|
||||||
|
@ -61,7 +61,10 @@ use proxmox_rest_server::{formatter, WorkerTask};
|
||||||
|
|
||||||
use crate::api2::backup::optional_ns_param;
|
use crate::api2::backup::optional_ns_param;
|
||||||
use crate::api2::node::rrd::create_value_from_rrd;
|
use crate::api2::node::rrd::create_value_from_rrd;
|
||||||
use crate::backup::{verify_all_backups, verify_backup_dir, verify_backup_group, verify_filter};
|
use crate::backup::{
|
||||||
|
verify_all_backups, verify_backup_dir, verify_backup_group, verify_filter,
|
||||||
|
ListAccessibleBackupGroups,
|
||||||
|
};
|
||||||
|
|
||||||
use crate::server::jobstate::Job;
|
use crate::server::jobstate::Job;
|
||||||
|
|
||||||
|
@ -594,29 +597,13 @@ pub fn list_snapshots(
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
fn get_snapshots_count(
|
fn get_snapshots_count(store: &Arc<DataStore>, owner: Option<&Authid>) -> Result<Counts, Error> {
|
||||||
store: &Arc<DataStore>,
|
ListAccessibleBackupGroups::new(Arc::clone(store), Default::default(), MAX_NAMESPACE_DEPTH, owner)?
|
||||||
filter_owner: Option<&Authid>,
|
|
||||||
) -> Result<Counts, Error> {
|
|
||||||
store
|
|
||||||
.iter_backup_groups_ok(Default::default())? // FIXME: Recurse!
|
|
||||||
.filter(|group| {
|
|
||||||
// FIXME: namespace:
|
|
||||||
let owner = match store.get_owner(&BackupNamespace::root(), group.as_ref()) {
|
|
||||||
Ok(owner) => owner,
|
|
||||||
Err(err) => {
|
|
||||||
let id = store.name();
|
|
||||||
eprintln!("Failed to get owner of group '{}/{}' - {}", id, group, err);
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
};
|
|
||||||
|
|
||||||
match filter_owner {
|
|
||||||
Some(filter) => check_backup_owner(&owner, filter).is_ok(),
|
|
||||||
None => true,
|
|
||||||
}
|
|
||||||
})
|
|
||||||
.try_fold(Counts::default(), |mut counts, group| {
|
.try_fold(Counts::default(), |mut counts, group| {
|
||||||
|
let group = match group {
|
||||||
|
Ok(group) => group,
|
||||||
|
Err(_) => return Ok(counts), // TODO: add this as error counts?
|
||||||
|
};
|
||||||
let snapshot_count = group.list_backups()?.len() as u64;
|
let snapshot_count = group.list_backups()?.len() as u64;
|
||||||
|
|
||||||
// only include groups with snapshots, counting/displaying emtpy groups can confuse
|
// only include groups with snapshots, counting/displaying emtpy groups can confuse
|
||||||
|
|
Loading…
Reference in New Issue