move proxmox-backup-debug back to main crate

we want to add something to it that needs access to the
proxmox_backup::api2 stuff, so it cannot live in a sub crate

Signed-off-by: Dominik Csapak <d.csapak@proxmox.com>
Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
This commit is contained in:
Dominik Csapak
2021-09-21 12:11:13 +02:00
committed by Thomas Lamprecht
parent 3f742f952a
commit d6fcc1170a
9 changed files with 5 additions and 24 deletions

View File

@ -0,0 +1,13 @@
use proxmox::api::cli::{run_cli_command, CliCommandMap, CliEnvironment};
mod proxmox_backup_debug;
use proxmox_backup_debug::*;
fn main() {
let cmd_def = CliCommandMap::new()
.insert("inspect", inspect::inspect_commands())
.insert("recover", recover::recover_commands());
let rpcenv = CliEnvironment::new();
run_cli_command(cmd_def, rpcenv, Some(|future| pbs_runtime::main(future)));
}

View File

@ -0,0 +1,340 @@
use std::collections::HashSet;
use std::fs::File;
use std::io::{Read, Seek, SeekFrom};
use std::path::Path;
use anyhow::{bail, format_err, Error};
use serde_json::{json, Value};
use walkdir::WalkDir;
use proxmox::api::cli::{
format_and_print_result, get_output_format, CliCommand, CliCommandMap, CommandLineInterface,
};
use proxmox::api::{api, cli::*};
use pbs_tools::cli::outfile_or_stdout;
use pbs_tools::crypt_config::CryptConfig;
use pbs_datastore::dynamic_index::DynamicIndexReader;
use pbs_datastore::file_formats::{
COMPRESSED_BLOB_MAGIC_1_0, DYNAMIC_SIZED_CHUNK_INDEX_1_0, ENCRYPTED_BLOB_MAGIC_1_0,
ENCR_COMPR_BLOB_MAGIC_1_0, FIXED_SIZED_CHUNK_INDEX_1_0, UNCOMPRESSED_BLOB_MAGIC_1_0,
};
use pbs_datastore::fixed_index::FixedIndexReader;
use pbs_datastore::index::IndexFile;
use pbs_datastore::DataBlob;
use pbs_config::key_config::load_and_decrypt_key;
use pbs_client::tools::key_source::get_encryption_key_password;
/// Decodes a blob and writes its content either to stdout or into a file
fn decode_blob(
mut output_path: Option<&Path>,
key_file: Option<&Path>,
digest: Option<&[u8; 32]>,
blob: &DataBlob,
) -> Result<(), Error> {
let mut crypt_conf_opt = None;
let crypt_conf;
if blob.is_encrypted() && key_file.is_some() {
let (key, _created, _fingerprint) =
load_and_decrypt_key(&key_file.unwrap(), &get_encryption_key_password)?;
crypt_conf = CryptConfig::new(key)?;
crypt_conf_opt = Some(&crypt_conf);
}
output_path = match output_path {
Some(path) if path.eq(Path::new("-")) => None,
_ => output_path,
};
outfile_or_stdout(output_path)?.write_all(blob.decode(crypt_conf_opt, digest)?.as_slice())?;
Ok(())
}
#[api(
input: {
properties: {
chunk: {
description: "The chunk file.",
type: String,
},
"reference-filter": {
description: "Path to the directory that should be searched for references.",
type: String,
optional: true,
},
"digest": {
description: "Needed when searching for references, if set, it will be used for verification when decoding.",
type: String,
optional: true,
},
"decode": {
description: "Path to the file to which the chunk should be decoded, '-' -> decode to stdout.",
type: String,
optional: true,
},
"keyfile": {
description: "Path to the keyfile with which the chunk was encrypted.",
type: String,
optional: true,
},
"use-filename-as-digest": {
description: "The filename should be used as digest for reference search and decode verification, if no digest is specified.",
type: bool,
optional: true,
default: true,
},
"output-format": {
schema: OUTPUT_FORMAT,
optional: true,
},
}
}
)]
/// Inspect a chunk
fn inspect_chunk(
chunk: String,
reference_filter: Option<String>,
mut digest: Option<String>,
decode: Option<String>,
keyfile: Option<String>,
use_filename_as_digest: bool,
param: Value,
) -> Result<(), Error> {
let output_format = get_output_format(&param);
let chunk_path = Path::new(&chunk);
if digest.is_none() && use_filename_as_digest {
digest = Some(if let Some((_, filename)) = chunk.rsplit_once("/") {
String::from(filename)
} else {
chunk.clone()
});
};
let digest_raw: Option<[u8; 32]> = digest
.map(|ref d| {
proxmox::tools::hex_to_digest(d)
.map_err(|e| format_err!("could not parse chunk - {}", e))
})
.map_or(Ok(None), |r| r.map(Some))?;
let search_path = reference_filter.as_ref().map(Path::new);
let key_file_path = keyfile.as_ref().map(Path::new);
let decode_output_path = decode.as_ref().map(Path::new);
let blob = DataBlob::load_from_reader(
&mut std::fs::File::open(&chunk_path)
.map_err(|e| format_err!("could not open chunk file - {}", e))?,
)?;
let referenced_by = if let (Some(search_path), Some(digest_raw)) = (search_path, digest_raw) {
let mut references = Vec::new();
for entry in WalkDir::new(search_path)
.follow_links(false)
.into_iter()
.filter_map(|e| e.ok())
{
use std::os::unix::ffi::OsStrExt;
let file_name = entry.file_name().as_bytes();
let index: Box<dyn IndexFile> = if file_name.ends_with(b".fidx") {
match FixedIndexReader::open(entry.path()) {
Ok(index) => Box::new(index),
Err(_) => continue,
}
} else if file_name.ends_with(b".didx") {
match DynamicIndexReader::open(entry.path()) {
Ok(index) => Box::new(index),
Err(_) => continue,
}
} else {
continue;
};
for pos in 0..index.index_count() {
if let Some(index_chunk_digest) = index.index_digest(pos) {
if digest_raw.eq(index_chunk_digest) {
references.push(entry.path().to_string_lossy().into_owned());
break;
}
}
}
}
if !references.is_empty() {
Some(references)
} else {
None
}
} else {
None
};
if decode_output_path.is_some() {
decode_blob(
decode_output_path,
key_file_path,
digest_raw.as_ref(),
&blob,
)?;
}
let crc_status = format!(
"{}({})",
blob.compute_crc(),
blob.verify_crc().map_or("BAD", |_| "OK")
);
let val = match referenced_by {
Some(references) => json!({
"crc": crc_status,
"encryption": blob.crypt_mode()?,
"referenced-by": references
}),
None => json!({
"crc": crc_status,
"encryption": blob.crypt_mode()?,
}),
};
if output_format == "text" {
println!("CRC: {}", val["crc"]);
println!("encryption: {}", val["encryption"]);
if let Some(refs) = val["referenced-by"].as_array() {
println!("referenced by:");
for reference in refs {
println!(" {}", reference);
}
}
} else {
format_and_print_result(&val, &output_format);
}
Ok(())
}
#[api(
input: {
properties: {
file: {
description: "Path to the file.",
type: String,
},
"decode": {
description: "Path to the file to which the file should be decoded, '-' -> decode to stdout.",
type: String,
optional: true,
},
"keyfile": {
description: "Path to the keyfile with which the file was encrypted.",
type: String,
optional: true,
},
"output-format": {
schema: OUTPUT_FORMAT,
optional: true,
},
}
}
)]
/// Inspect a file, for blob file without decode only the size and encryption mode is printed
fn inspect_file(
file: String,
decode: Option<String>,
keyfile: Option<String>,
param: Value,
) -> Result<(), Error> {
let output_format = get_output_format(&param);
let mut file = File::open(Path::new(&file))?;
let mut magic = [0; 8];
file.read_exact(&mut magic)?;
file.seek(SeekFrom::Start(0))?;
let val = match magic {
UNCOMPRESSED_BLOB_MAGIC_1_0
| COMPRESSED_BLOB_MAGIC_1_0
| ENCRYPTED_BLOB_MAGIC_1_0
| ENCR_COMPR_BLOB_MAGIC_1_0 => {
let data_blob = DataBlob::load_from_reader(&mut file)?;
let key_file_path = keyfile.as_ref().map(Path::new);
let decode_output_path = decode.as_ref().map(Path::new);
if decode_output_path.is_some() {
decode_blob(decode_output_path, key_file_path, None, &data_blob)?;
}
let crypt_mode = data_blob.crypt_mode()?;
json!({
"encryption": crypt_mode,
"size": data_blob.raw_size(),
})
}
FIXED_SIZED_CHUNK_INDEX_1_0 | DYNAMIC_SIZED_CHUNK_INDEX_1_0 => {
let index: Box<dyn IndexFile> = match magic {
FIXED_SIZED_CHUNK_INDEX_1_0 => {
Box::new(FixedIndexReader::new(file)?) as Box<dyn IndexFile>
}
DYNAMIC_SIZED_CHUNK_INDEX_1_0 => {
Box::new(DynamicIndexReader::new(file)?) as Box<dyn IndexFile>
}
_ => bail!(format_err!("This is technically not possible")),
};
let mut ctime_str = index.index_ctime().to_string();
if let Ok(s) = proxmox::tools::time::strftime_local("%c", index.index_ctime()) {
ctime_str = s;
}
let mut chunk_digests = HashSet::new();
for pos in 0..index.index_count() {
let digest = index.index_digest(pos).unwrap();
chunk_digests.insert(proxmox::tools::digest_to_hex(digest));
}
json!({
"size": index.index_size(),
"ctime": ctime_str,
"chunk-digests": chunk_digests
})
}
_ => bail!(format_err!(
"Only .blob, .fidx and .didx files may be inspected"
)),
};
if output_format == "text" {
println!("size: {}", val["size"]);
if let Some(encryption) = val["encryption"].as_str() {
println!("encryption: {}", encryption);
}
if let Some(ctime) = val["ctime"].as_str() {
println!("creation time: {}", ctime);
}
if let Some(chunks) = val["chunk-digests"].as_array() {
println!("chunks:");
for chunk in chunks {
println!(" {}", chunk);
}
}
} else {
format_and_print_result(&val, &output_format);
}
Ok(())
}
pub fn inspect_commands() -> CommandLineInterface {
let cmd_def = CliCommandMap::new()
.insert(
"chunk",
CliCommand::new(&API_METHOD_INSPECT_CHUNK).arg_param(&["chunk"]),
)
.insert(
"file",
CliCommand::new(&API_METHOD_INSPECT_FILE).arg_param(&["file"]),
);
cmd_def.into()
}

View File

@ -0,0 +1,2 @@
pub mod inspect;
pub mod recover;

View File

@ -0,0 +1,120 @@
use std::fs::File;
use std::io::{Read, Seek, SeekFrom, Write};
use std::path::Path;
use anyhow::{bail, format_err, Error};
use serde_json::Value;
use proxmox::api::api;
use proxmox::api::cli::{CliCommand, CliCommandMap, CommandLineInterface};
use proxmox::tools::digest_to_hex;
use pbs_tools::crypt_config::CryptConfig;
use pbs_datastore::dynamic_index::DynamicIndexReader;
use pbs_datastore::file_formats::{DYNAMIC_SIZED_CHUNK_INDEX_1_0, FIXED_SIZED_CHUNK_INDEX_1_0};
use pbs_datastore::fixed_index::FixedIndexReader;
use pbs_datastore::index::IndexFile;
use pbs_datastore::DataBlob;
use pbs_config::key_config::load_and_decrypt_key;
use pbs_client::tools::key_source::get_encryption_key_password;
#[api(
input: {
properties: {
file: {
description: "Path to the index file, either .fidx or .didx.",
type: String,
},
chunks: {
description: "Path to the directorty that contains the chunks, usually <datastore>/.chunks.",
type: String,
},
"keyfile": {
description: "Path to a keyfile, if the data was encrypted, a keyfile is needed for decryption.",
type: String,
optional: true,
},
"skip-crc": {
description: "Skip the crc verification, increases the restore speed by lot.",
type: Boolean,
optional: true,
default: false,
}
}
}
)]
/// Restore the data from an index file, given the directory of where chunks
/// are saved, the index file and a keyfile, if needed for decryption.
fn recover_index(
file: String,
chunks: String,
keyfile: Option<String>,
skip_crc: bool,
_param: Value,
) -> Result<(), Error> {
let file_path = Path::new(&file);
let chunks_path = Path::new(&chunks);
let key_file_path = keyfile.as_ref().map(Path::new);
let mut file = File::open(Path::new(&file))?;
let mut magic = [0; 8];
file.read_exact(&mut magic)?;
file.seek(SeekFrom::Start(0))?;
let index: Box<dyn IndexFile> = match magic {
FIXED_SIZED_CHUNK_INDEX_1_0 => Box::new(FixedIndexReader::new(file)?) as Box<dyn IndexFile>,
DYNAMIC_SIZED_CHUNK_INDEX_1_0 => {
Box::new(DynamicIndexReader::new(file)?) as Box<dyn IndexFile>
}
_ => bail!(format_err!(
"index file must either be a .fidx or a .didx file"
)),
};
let crypt_conf_opt = if let Some(key_file_path) = key_file_path {
let (key, _created, _fingerprint) =
load_and_decrypt_key(&key_file_path, &get_encryption_key_password)?;
Some(CryptConfig::new(key)?)
} else {
None
};
let output_filename = file_path.file_stem().unwrap().to_str().unwrap();
let output_path = Path::new(output_filename);
let mut output_file = File::create(output_path)
.map_err(|e| format_err!("could not create output file - {}", e))?;
let mut data = Vec::with_capacity(4 * 1024 * 1024);
for pos in 0..index.index_count() {
let chunk_digest = index.index_digest(pos).unwrap();
let digest_str = digest_to_hex(chunk_digest);
let digest_prefix = &digest_str[0..4];
let chunk_path = chunks_path.join(digest_prefix).join(digest_str);
let mut chunk_file = std::fs::File::open(&chunk_path)
.map_err(|e| format_err!("could not open chunk file - {}", e))?;
data.clear();
chunk_file.read_to_end(&mut data)?;
let chunk_blob = DataBlob::from_raw(data.clone())?;
if !skip_crc {
chunk_blob.verify_crc()?;
}
output_file.write_all(
chunk_blob
.decode(crypt_conf_opt.as_ref(), Some(chunk_digest))?
.as_slice(),
)?;
}
Ok(())
}
pub fn recover_commands() -> CommandLineInterface {
let cmd_def = CliCommandMap::new().insert(
"index",
CliCommand::new(&API_METHOD_RECOVER_INDEX).arg_param(&["file", "chunks"]),
);
cmd_def.into()
}