datastore: add check for maintenance in lookup
Signed-off-by: Hannes Laimer <h.laimer@proxmox.com>
This commit is contained in:
parent
2a05c75ff1
commit
e9d2fc9362
@ -1,3 +1,5 @@
|
|||||||
|
use std::borrow::Cow;
|
||||||
|
use anyhow::{bail, Error};
|
||||||
use serde::{Deserialize, Serialize};
|
use serde::{Deserialize, Serialize};
|
||||||
|
|
||||||
use proxmox_schema::{api, ApiStringFormat, const_regex, Schema, StringSchema};
|
use proxmox_schema::{api, ApiStringFormat, const_regex, Schema, StringSchema};
|
||||||
@ -24,7 +26,7 @@ pub enum Operation {
|
|||||||
}
|
}
|
||||||
|
|
||||||
#[api]
|
#[api]
|
||||||
#[derive(Deserialize, Serialize)]
|
#[derive(Deserialize, Serialize, PartialEq)]
|
||||||
#[serde(rename_all="kebab-case")]
|
#[serde(rename_all="kebab-case")]
|
||||||
/// Maintenance type.
|
/// Maintenance type.
|
||||||
pub enum MaintenanceType {
|
pub enum MaintenanceType {
|
||||||
@ -57,3 +59,20 @@ pub struct MaintenanceMode {
|
|||||||
#[serde(skip_serializing_if = "Option::is_none")]
|
#[serde(skip_serializing_if = "Option::is_none")]
|
||||||
message: Option<String>,
|
message: Option<String>,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
impl MaintenanceMode {
|
||||||
|
pub fn check(&self, operation: Option<Operation>) -> Result<(), Error> {
|
||||||
|
let message = percent_encoding::percent_decode_str(self.message.as_deref().unwrap_or(""))
|
||||||
|
.decode_utf8()
|
||||||
|
.unwrap_or(Cow::Borrowed(""));
|
||||||
|
|
||||||
|
if self.ty == MaintenanceType::Offline {
|
||||||
|
bail!("offline maintenance mode: {}", message);
|
||||||
|
} else if self.ty == MaintenanceType::ReadOnly {
|
||||||
|
if let Some(Operation::Write) = operation {
|
||||||
|
bail!("read-only maintenance mode: {}", message);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -19,7 +19,7 @@ use proxmox_sys::fs::{lock_dir_noblock, DirLockGuard};
|
|||||||
|
|
||||||
use pbs_api_types::{
|
use pbs_api_types::{
|
||||||
UPID, DataStoreConfig, Authid, GarbageCollectionStatus, HumanByte,
|
UPID, DataStoreConfig, Authid, GarbageCollectionStatus, HumanByte,
|
||||||
ChunkOrder, DatastoreTuning,
|
ChunkOrder, DatastoreTuning, Operation,
|
||||||
};
|
};
|
||||||
use pbs_config::{open_backup_lockfile, BackupLockGuard, ConfigVersionCache};
|
use pbs_config::{open_backup_lockfile, BackupLockGuard, ConfigVersionCache};
|
||||||
|
|
||||||
@ -68,11 +68,24 @@ pub struct DataStore {
|
|||||||
}
|
}
|
||||||
|
|
||||||
impl DataStore {
|
impl DataStore {
|
||||||
pub fn lookup_datastore(name: &str) -> Result<Arc<DataStore>, Error> {
|
pub fn lookup_datastore(
|
||||||
|
name: &str,
|
||||||
|
operation: Option<Operation>,
|
||||||
|
) -> Result<Arc<DataStore>, Error> {
|
||||||
let version_cache = ConfigVersionCache::new()?;
|
let version_cache = ConfigVersionCache::new()?;
|
||||||
let generation = version_cache.datastore_generation();
|
let generation = version_cache.datastore_generation();
|
||||||
let now = proxmox_time::epoch_i64();
|
let now = proxmox_time::epoch_i64();
|
||||||
|
|
||||||
|
let (config, _digest) = pbs_config::datastore::config()?;
|
||||||
|
let config: DataStoreConfig = config.lookup("datastore", name)?;
|
||||||
|
let path = PathBuf::from(&config.path);
|
||||||
|
|
||||||
|
if let Some(maintenance_mode) = config.get_maintenance_mode() {
|
||||||
|
if let Err(error) = maintenance_mode.check(operation) {
|
||||||
|
bail!("datastore '{}' is in {}", name, error);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
let mut map = DATASTORE_MAP.lock().unwrap();
|
let mut map = DATASTORE_MAP.lock().unwrap();
|
||||||
let entry = map.get(name);
|
let entry = map.get(name);
|
||||||
|
|
||||||
@ -82,10 +95,6 @@ impl DataStore {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
let (config, _digest) = pbs_config::datastore::config()?;
|
|
||||||
let config: DataStoreConfig = config.lookup("datastore", name)?;
|
|
||||||
let path = PathBuf::from(&config.path);
|
|
||||||
|
|
||||||
let datastore = DataStore::open_with_path(name, &path, config, generation, now)?;
|
let datastore = DataStore::open_with_path(name, &path, config, generation, now)?;
|
||||||
|
|
||||||
let datastore = Arc::new(datastore);
|
let datastore = Arc::new(datastore);
|
||||||
|
@ -14,6 +14,7 @@ use crate::fixed_index::FixedIndexReader;
|
|||||||
use crate::dynamic_index::DynamicIndexReader;
|
use crate::dynamic_index::DynamicIndexReader;
|
||||||
use crate::manifest::{archive_type, ArchiveType, CLIENT_LOG_BLOB_NAME, MANIFEST_BLOB_NAME};
|
use crate::manifest::{archive_type, ArchiveType, CLIENT_LOG_BLOB_NAME, MANIFEST_BLOB_NAME};
|
||||||
use crate::DataStore;
|
use crate::DataStore;
|
||||||
|
use pbs_api_types::Operation;
|
||||||
|
|
||||||
/// Helper to access the contents of a datastore backup snapshot
|
/// Helper to access the contents of a datastore backup snapshot
|
||||||
///
|
///
|
||||||
@ -121,7 +122,10 @@ impl <'a, F: Fn(&[u8;32]) -> bool> Iterator for SnapshotChunkIterator<'a, F> {
|
|||||||
};
|
};
|
||||||
|
|
||||||
let datastore =
|
let datastore =
|
||||||
DataStore::lookup_datastore(self.snapshot_reader.datastore_name())?;
|
DataStore::lookup_datastore(
|
||||||
|
self.snapshot_reader.datastore_name(),
|
||||||
|
Some(Operation::Read)
|
||||||
|
)?;
|
||||||
let order = datastore.get_chunks_in_order(&index, &self.skip_fn, |_| Ok(()))?;
|
let order = datastore.get_chunks_in_order(&index, &self.skip_fn, |_| Ok(()))?;
|
||||||
|
|
||||||
self.current_index = Some((Arc::new(index), 0, order));
|
self.current_index = Some((Arc::new(index), 0, order));
|
||||||
|
@ -30,7 +30,7 @@ use pxar::EntryKind;
|
|||||||
|
|
||||||
use pbs_api_types::{ Authid, BackupContent, Counts, CryptMode,
|
use pbs_api_types::{ Authid, BackupContent, Counts, CryptMode,
|
||||||
DataStoreListItem, GarbageCollectionStatus, GroupListItem,
|
DataStoreListItem, GarbageCollectionStatus, GroupListItem,
|
||||||
SnapshotListItem, SnapshotVerifyState, PruneOptions,
|
Operation, SnapshotListItem, SnapshotVerifyState, PruneOptions,
|
||||||
DataStoreStatus, RRDMode, RRDTimeFrame,
|
DataStoreStatus, RRDMode, RRDTimeFrame,
|
||||||
BACKUP_ARCHIVE_NAME_SCHEMA, BACKUP_ID_SCHEMA, BACKUP_TIME_SCHEMA,
|
BACKUP_ARCHIVE_NAME_SCHEMA, BACKUP_ID_SCHEMA, BACKUP_TIME_SCHEMA,
|
||||||
BACKUP_TYPE_SCHEMA, DATASTORE_SCHEMA,
|
BACKUP_TYPE_SCHEMA, DATASTORE_SCHEMA,
|
||||||
@ -170,7 +170,7 @@ pub fn list_groups(
|
|||||||
let user_info = CachedUserInfo::new()?;
|
let user_info = CachedUserInfo::new()?;
|
||||||
let user_privs = user_info.lookup_privs(&auth_id, &["datastore", &store]);
|
let user_privs = user_info.lookup_privs(&auth_id, &["datastore", &store]);
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
let list_all = (user_privs & PRIV_DATASTORE_AUDIT) != 0;
|
let list_all = (user_privs & PRIV_DATASTORE_AUDIT) != 0;
|
||||||
|
|
||||||
let backup_groups = BackupInfo::list_backup_groups(&datastore.base_path())?;
|
let backup_groups = BackupInfo::list_backup_groups(&datastore.base_path())?;
|
||||||
@ -268,7 +268,7 @@ pub fn delete_group(
|
|||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
|
|
||||||
let group = BackupGroup::new(backup_type, backup_id);
|
let group = BackupGroup::new(backup_type, backup_id);
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
check_priv_or_backup_owner(&datastore, &group, &auth_id, PRIV_DATASTORE_MODIFY)?;
|
check_priv_or_backup_owner(&datastore, &group, &auth_id, PRIV_DATASTORE_MODIFY)?;
|
||||||
|
|
||||||
@ -315,7 +315,7 @@ pub fn list_snapshot_files(
|
|||||||
) -> Result<Vec<BackupContent>, Error> {
|
) -> Result<Vec<BackupContent>, Error> {
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let snapshot = BackupDir::new(backup_type, backup_id, backup_time)?;
|
let snapshot = BackupDir::new(backup_type, backup_id, backup_time)?;
|
||||||
|
|
||||||
@ -365,7 +365,7 @@ pub fn delete_snapshot(
|
|||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
|
|
||||||
let snapshot = BackupDir::new(backup_type, backup_id, backup_time)?;
|
let snapshot = BackupDir::new(backup_type, backup_id, backup_time)?;
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
check_priv_or_backup_owner(&datastore, snapshot.group(), &auth_id, PRIV_DATASTORE_MODIFY)?;
|
check_priv_or_backup_owner(&datastore, snapshot.group(), &auth_id, PRIV_DATASTORE_MODIFY)?;
|
||||||
|
|
||||||
@ -414,7 +414,7 @@ pub fn list_snapshots (
|
|||||||
|
|
||||||
let list_all = (user_privs & PRIV_DATASTORE_AUDIT) != 0;
|
let list_all = (user_privs & PRIV_DATASTORE_AUDIT) != 0;
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let base_path = datastore.base_path();
|
let base_path = datastore.base_path();
|
||||||
|
|
||||||
@ -615,7 +615,7 @@ pub fn status(
|
|||||||
_info: &ApiMethod,
|
_info: &ApiMethod,
|
||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<DataStoreStatus, Error> {
|
) -> Result<DataStoreStatus, Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
let storage = crate::tools::disks::disk_usage(&datastore.base_path())?;
|
let storage = crate::tools::disks::disk_usage(&datastore.base_path())?;
|
||||||
let (counts, gc_status) = if verbose {
|
let (counts, gc_status) = if verbose {
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
@ -693,7 +693,7 @@ pub fn verify(
|
|||||||
outdated_after: Option<i64>,
|
outdated_after: Option<i64>,
|
||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<Value, Error> {
|
) -> Result<Value, Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
let ignore_verified = ignore_verified.unwrap_or(true);
|
let ignore_verified = ignore_verified.unwrap_or(true);
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
@ -838,7 +838,7 @@ pub fn prune(
|
|||||||
|
|
||||||
let group = BackupGroup::new(&backup_type, &backup_id);
|
let group = BackupGroup::new(&backup_type, &backup_id);
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
check_priv_or_backup_owner(&datastore, &group, &auth_id, PRIV_DATASTORE_MODIFY)?;
|
check_priv_or_backup_owner(&datastore, &group, &auth_id, PRIV_DATASTORE_MODIFY)?;
|
||||||
|
|
||||||
@ -963,7 +963,7 @@ pub fn prune_datastore(
|
|||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
let to_stdout = rpcenv.env_type() == RpcEnvironmentType::CLI;
|
let to_stdout = rpcenv.env_type() == RpcEnvironmentType::CLI;
|
||||||
|
|
||||||
@ -1007,7 +1007,7 @@ pub fn start_garbage_collection(
|
|||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<Value, Error> {
|
) -> Result<Value, Error> {
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
|
|
||||||
let job = Job::new("garbage_collection", &store)
|
let job = Job::new("garbage_collection", &store)
|
||||||
@ -1043,7 +1043,7 @@ pub fn garbage_collection_status(
|
|||||||
_rpcenv: &mut dyn RpcEnvironment,
|
_rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<GarbageCollectionStatus, Error> {
|
) -> Result<GarbageCollectionStatus, Error> {
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let status = datastore.last_gc_status();
|
let status = datastore.last_gc_status();
|
||||||
|
|
||||||
@ -1119,7 +1119,7 @@ pub fn download_file(
|
|||||||
|
|
||||||
async move {
|
async move {
|
||||||
let store = required_string_param(¶m, "store")?;
|
let store = required_string_param(¶m, "store")?;
|
||||||
let datastore = DataStore::lookup_datastore(store)?;
|
let datastore = DataStore::lookup_datastore(store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
|
|
||||||
@ -1189,7 +1189,7 @@ pub fn download_file_decoded(
|
|||||||
|
|
||||||
async move {
|
async move {
|
||||||
let store = required_string_param(¶m, "store")?;
|
let store = required_string_param(¶m, "store")?;
|
||||||
let datastore = DataStore::lookup_datastore(store)?;
|
let datastore = DataStore::lookup_datastore(store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
|
|
||||||
@ -1303,7 +1303,7 @@ pub fn upload_backup_log(
|
|||||||
|
|
||||||
async move {
|
async move {
|
||||||
let store = required_string_param(¶m, "store")?;
|
let store = required_string_param(¶m, "store")?;
|
||||||
let datastore = DataStore::lookup_datastore(store)?;
|
let datastore = DataStore::lookup_datastore(store, Some(Operation::Write))?;
|
||||||
|
|
||||||
let file_name = CLIENT_LOG_BLOB_NAME;
|
let file_name = CLIENT_LOG_BLOB_NAME;
|
||||||
|
|
||||||
@ -1380,7 +1380,7 @@ pub fn catalog(
|
|||||||
filepath: String,
|
filepath: String,
|
||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<Vec<ArchiveEntry>, Error> {
|
) -> Result<Vec<ArchiveEntry>, Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
|
|
||||||
@ -1450,7 +1450,7 @@ pub fn pxar_file_download(
|
|||||||
|
|
||||||
async move {
|
async move {
|
||||||
let store = required_string_param(¶m, "store")?;
|
let store = required_string_param(¶m, "store")?;
|
||||||
let datastore = DataStore::lookup_datastore(store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
|
|
||||||
@ -1567,7 +1567,7 @@ pub fn get_rrd_stats(
|
|||||||
_param: Value,
|
_param: Value,
|
||||||
) -> Result<Value, Error> {
|
) -> Result<Value, Error> {
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
let disk_manager = crate::tools::disks::DiskManage::new();
|
let disk_manager = crate::tools::disks::DiskManage::new();
|
||||||
|
|
||||||
let mut rrd_fields = vec![
|
let mut rrd_fields = vec![
|
||||||
@ -1615,7 +1615,7 @@ pub fn get_group_notes(
|
|||||||
backup_id: String,
|
backup_id: String,
|
||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<String, Error> {
|
) -> Result<String, Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
let backup_group = BackupGroup::new(backup_type, backup_id);
|
let backup_group = BackupGroup::new(backup_type, backup_id);
|
||||||
@ -1657,7 +1657,7 @@ pub fn set_group_notes(
|
|||||||
notes: String,
|
notes: String,
|
||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<(), Error> {
|
) -> Result<(), Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
let backup_group = BackupGroup::new(backup_type, backup_id);
|
let backup_group = BackupGroup::new(backup_type, backup_id);
|
||||||
@ -1699,7 +1699,7 @@ pub fn get_notes(
|
|||||||
backup_time: i64,
|
backup_time: i64,
|
||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<String, Error> {
|
) -> Result<String, Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
let backup_dir = BackupDir::new(backup_type, backup_id, backup_time)?;
|
let backup_dir = BackupDir::new(backup_type, backup_id, backup_time)?;
|
||||||
@ -1750,7 +1750,7 @@ pub fn set_notes(
|
|||||||
notes: String,
|
notes: String,
|
||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<(), Error> {
|
) -> Result<(), Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
let backup_dir = BackupDir::new(backup_type, backup_id, backup_time)?;
|
let backup_dir = BackupDir::new(backup_type, backup_id, backup_time)?;
|
||||||
@ -1793,7 +1793,7 @@ pub fn get_protection(
|
|||||||
backup_time: i64,
|
backup_time: i64,
|
||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<bool, Error> {
|
) -> Result<bool, Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
let backup_dir = BackupDir::new(backup_type, backup_id, backup_time)?;
|
let backup_dir = BackupDir::new(backup_type, backup_id, backup_time)?;
|
||||||
@ -1838,7 +1838,7 @@ pub fn set_protection(
|
|||||||
protected: bool,
|
protected: bool,
|
||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<(), Error> {
|
) -> Result<(), Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
|
||||||
let backup_dir = BackupDir::new(backup_type, backup_id, backup_time)?;
|
let backup_dir = BackupDir::new(backup_type, backup_id, backup_time)?;
|
||||||
@ -1879,7 +1879,7 @@ pub fn set_backup_owner(
|
|||||||
rpcenv: &mut dyn RpcEnvironment,
|
rpcenv: &mut dyn RpcEnvironment,
|
||||||
) -> Result<(), Error> {
|
) -> Result<(), Error> {
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
let backup_group = BackupGroup::new(backup_type, backup_id);
|
let backup_group = BackupGroup::new(backup_type, backup_id);
|
||||||
|
|
||||||
|
@ -16,7 +16,7 @@ use proxmox_router::{
|
|||||||
use proxmox_schema::*;
|
use proxmox_schema::*;
|
||||||
|
|
||||||
use pbs_api_types::{
|
use pbs_api_types::{
|
||||||
Authid, VerifyState, SnapshotVerifyState,
|
Authid, Operation, VerifyState, SnapshotVerifyState,
|
||||||
BACKUP_ID_SCHEMA, BACKUP_TIME_SCHEMA, BACKUP_TYPE_SCHEMA, DATASTORE_SCHEMA,
|
BACKUP_ID_SCHEMA, BACKUP_TIME_SCHEMA, BACKUP_TYPE_SCHEMA, DATASTORE_SCHEMA,
|
||||||
CHUNK_DIGEST_SCHEMA, PRIV_DATASTORE_BACKUP, BACKUP_ARCHIVE_NAME_SCHEMA,
|
CHUNK_DIGEST_SCHEMA, PRIV_DATASTORE_BACKUP, BACKUP_ARCHIVE_NAME_SCHEMA,
|
||||||
};
|
};
|
||||||
@ -77,7 +77,7 @@ async move {
|
|||||||
let user_info = CachedUserInfo::new()?;
|
let user_info = CachedUserInfo::new()?;
|
||||||
user_info.check_privs(&auth_id, &["datastore", &store], PRIV_DATASTORE_BACKUP, false)?;
|
user_info.check_privs(&auth_id, &["datastore", &store], PRIV_DATASTORE_BACKUP, false)?;
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
let backup_type = required_string_param(¶m, "backup-type")?;
|
let backup_type = required_string_param(¶m, "backup-type")?;
|
||||||
let backup_id = required_string_param(¶m, "backup-id")?;
|
let backup_id = required_string_param(¶m, "backup-id")?;
|
||||||
|
@ -16,8 +16,8 @@ use proxmox_router::{
|
|||||||
use proxmox_schema::{BooleanSchema, ObjectSchema};
|
use proxmox_schema::{BooleanSchema, ObjectSchema};
|
||||||
|
|
||||||
use pbs_api_types::{
|
use pbs_api_types::{
|
||||||
Authid, DATASTORE_SCHEMA, BACKUP_TYPE_SCHEMA, BACKUP_TIME_SCHEMA, BACKUP_ID_SCHEMA,
|
Authid, Operation, DATASTORE_SCHEMA, BACKUP_TYPE_SCHEMA, BACKUP_TIME_SCHEMA,
|
||||||
CHUNK_DIGEST_SCHEMA, PRIV_DATASTORE_READ, PRIV_DATASTORE_BACKUP,
|
BACKUP_ID_SCHEMA, CHUNK_DIGEST_SCHEMA, PRIV_DATASTORE_READ, PRIV_DATASTORE_BACKUP,
|
||||||
BACKUP_ARCHIVE_NAME_SCHEMA,
|
BACKUP_ARCHIVE_NAME_SCHEMA,
|
||||||
};
|
};
|
||||||
use proxmox_sys::fs::lock_dir_noblock_shared;
|
use proxmox_sys::fs::lock_dir_noblock_shared;
|
||||||
@ -81,7 +81,7 @@ fn upgrade_to_backup_reader_protocol(
|
|||||||
bail!("no permissions on /datastore/{}", store);
|
bail!("no permissions on /datastore/{}", store);
|
||||||
}
|
}
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let backup_type = required_string_param(¶m, "backup-type")?;
|
let backup_type = required_string_param(¶m, "backup-type")?;
|
||||||
let backup_id = required_string_param(¶m, "backup-id")?;
|
let backup_id = required_string_param(¶m, "backup-id")?;
|
||||||
|
@ -14,7 +14,7 @@ use proxmox_router::{
|
|||||||
use proxmox_router::list_subdirs_api_method;
|
use proxmox_router::list_subdirs_api_method;
|
||||||
|
|
||||||
use pbs_api_types::{
|
use pbs_api_types::{
|
||||||
Authid, DataStoreStatusListItem, RRDMode, RRDTimeFrame,
|
Authid, DataStoreStatusListItem, Operation, RRDMode, RRDTimeFrame,
|
||||||
PRIV_DATASTORE_AUDIT, PRIV_DATASTORE_BACKUP,
|
PRIV_DATASTORE_AUDIT, PRIV_DATASTORE_BACKUP,
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -57,7 +57,7 @@ pub fn datastore_status(
|
|||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
|
|
||||||
let datastore = match DataStore::lookup_datastore(store) {
|
let datastore = match DataStore::lookup_datastore(&store, Some(Operation::Read)) {
|
||||||
Ok(datastore) => datastore,
|
Ok(datastore) => datastore,
|
||||||
Err(err) => {
|
Err(err) => {
|
||||||
list.push(DataStoreStatusListItem {
|
list.push(DataStoreStatusListItem {
|
||||||
|
@ -10,7 +10,7 @@ use proxmox_schema::api;
|
|||||||
use proxmox_sys::{task_log, task_warn, WorkerTaskContext};
|
use proxmox_sys::{task_log, task_warn, WorkerTaskContext};
|
||||||
|
|
||||||
use pbs_api_types::{
|
use pbs_api_types::{
|
||||||
Authid, GroupFilter, MediaPoolConfig, TapeBackupJobConfig, TapeBackupJobSetup,
|
Authid, GroupFilter, MediaPoolConfig, Operation, TapeBackupJobConfig, TapeBackupJobSetup,
|
||||||
TapeBackupJobStatus, Userid, JOB_ID_SCHEMA, PRIV_DATASTORE_READ, PRIV_TAPE_AUDIT,
|
TapeBackupJobStatus, Userid, JOB_ID_SCHEMA, PRIV_DATASTORE_READ, PRIV_TAPE_AUDIT,
|
||||||
PRIV_TAPE_WRITE, UPID_SCHEMA,
|
PRIV_TAPE_WRITE, UPID_SCHEMA,
|
||||||
};
|
};
|
||||||
@ -158,7 +158,7 @@ pub fn do_tape_backup_job(
|
|||||||
|
|
||||||
let worker_type = job.jobtype().to_string();
|
let worker_type = job.jobtype().to_string();
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&setup.store)?;
|
let datastore = DataStore::lookup_datastore(&setup.store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let (config, _digest) = pbs_config::media_pool::config()?;
|
let (config, _digest) = pbs_config::media_pool::config()?;
|
||||||
let pool_config: MediaPoolConfig = config.lookup("pool", &setup.pool)?;
|
let pool_config: MediaPoolConfig = config.lookup("pool", &setup.pool)?;
|
||||||
@ -328,7 +328,7 @@ pub fn backup(
|
|||||||
|
|
||||||
check_backup_permission(&auth_id, &setup.store, &setup.pool, &setup.drive)?;
|
check_backup_permission(&auth_id, &setup.store, &setup.pool, &setup.drive)?;
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&setup.store)?;
|
let datastore = DataStore::lookup_datastore(&setup.store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let (config, _digest) = pbs_config::media_pool::config()?;
|
let (config, _digest) = pbs_config::media_pool::config()?;
|
||||||
let pool_config: MediaPoolConfig = config.lookup("pool", &setup.pool)?;
|
let pool_config: MediaPoolConfig = config.lookup("pool", &setup.pool)?;
|
||||||
|
@ -17,7 +17,7 @@ use proxmox_sys::{task_log, task_warn, WorkerTaskContext};
|
|||||||
use proxmox_uuid::Uuid;
|
use proxmox_uuid::Uuid;
|
||||||
|
|
||||||
use pbs_api_types::{
|
use pbs_api_types::{
|
||||||
Authid, CryptMode, Userid, DATASTORE_MAP_ARRAY_SCHEMA, DATASTORE_MAP_LIST_SCHEMA,
|
Authid, CryptMode, Operation, Userid, DATASTORE_MAP_ARRAY_SCHEMA, DATASTORE_MAP_LIST_SCHEMA,
|
||||||
DRIVE_NAME_SCHEMA, PRIV_DATASTORE_BACKUP, PRIV_DATASTORE_MODIFY, PRIV_TAPE_READ,
|
DRIVE_NAME_SCHEMA, PRIV_DATASTORE_BACKUP, PRIV_DATASTORE_MODIFY, PRIV_TAPE_READ,
|
||||||
TAPE_RESTORE_SNAPSHOT_SCHEMA, UPID_SCHEMA,
|
TAPE_RESTORE_SNAPSHOT_SCHEMA, UPID_SCHEMA,
|
||||||
};
|
};
|
||||||
@ -75,10 +75,10 @@ impl TryFrom<String> for DataStoreMap {
|
|||||||
if let Some(index) = store.find('=') {
|
if let Some(index) = store.find('=') {
|
||||||
let mut target = store.split_off(index);
|
let mut target = store.split_off(index);
|
||||||
target.remove(0); // remove '='
|
target.remove(0); // remove '='
|
||||||
let datastore = DataStore::lookup_datastore(&target)?;
|
let datastore = DataStore::lookup_datastore(&target, Some(Operation::Write))?;
|
||||||
map.insert(store, datastore);
|
map.insert(store, datastore);
|
||||||
} else if default.is_none() {
|
} else if default.is_none() {
|
||||||
default = Some(DataStore::lookup_datastore(&store)?);
|
default = Some(DataStore::lookup_datastore(&store, Some(Operation::Write))?);
|
||||||
} else {
|
} else {
|
||||||
bail!("multiple default stores given");
|
bail!("multiple default stores given");
|
||||||
}
|
}
|
||||||
|
@ -48,7 +48,7 @@ use proxmox_time::CalendarEvent;
|
|||||||
|
|
||||||
use pbs_api_types::{
|
use pbs_api_types::{
|
||||||
Authid, DataStoreConfig, PruneOptions, SyncJobConfig, TapeBackupJobConfig,
|
Authid, DataStoreConfig, PruneOptions, SyncJobConfig, TapeBackupJobConfig,
|
||||||
VerificationJobConfig,
|
VerificationJobConfig, Operation
|
||||||
};
|
};
|
||||||
|
|
||||||
use proxmox_rest_server::daemon;
|
use proxmox_rest_server::daemon;
|
||||||
@ -560,7 +560,7 @@ async fn schedule_datastore_garbage_collection() {
|
|||||||
};
|
};
|
||||||
|
|
||||||
for (store, (_, store_config)) in config.sections {
|
for (store, (_, store_config)) in config.sections {
|
||||||
let datastore = match DataStore::lookup_datastore(&store) {
|
let datastore = match DataStore::lookup_datastore(&store, Some(Operation::Write)) {
|
||||||
Ok(datastore) => datastore,
|
Ok(datastore) => datastore,
|
||||||
Err(err) => {
|
Err(err) => {
|
||||||
eprintln!("lookup_datastore failed - {}", err);
|
eprintln!("lookup_datastore failed - {}", err);
|
||||||
|
@ -7,7 +7,7 @@ use proxmox_sys::{task_log, task_warn};
|
|||||||
use pbs_datastore::backup_info::BackupInfo;
|
use pbs_datastore::backup_info::BackupInfo;
|
||||||
use pbs_datastore::prune::compute_prune_info;
|
use pbs_datastore::prune::compute_prune_info;
|
||||||
use pbs_datastore::DataStore;
|
use pbs_datastore::DataStore;
|
||||||
use pbs_api_types::{Authid, PRIV_DATASTORE_MODIFY, PruneOptions};
|
use pbs_api_types::{Authid, Operation, PRIV_DATASTORE_MODIFY, PruneOptions};
|
||||||
use pbs_config::CachedUserInfo;
|
use pbs_config::CachedUserInfo;
|
||||||
use proxmox_rest_server::WorkerTask;
|
use proxmox_rest_server::WorkerTask;
|
||||||
|
|
||||||
@ -97,7 +97,7 @@ pub fn do_prune_job(
|
|||||||
auth_id: &Authid,
|
auth_id: &Authid,
|
||||||
schedule: Option<String>,
|
schedule: Option<String>,
|
||||||
) -> Result<String, Error> {
|
) -> Result<String, Error> {
|
||||||
let datastore = DataStore::lookup_datastore(&store)?;
|
let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
|
||||||
|
|
||||||
let worker_type = job.jobtype().to_string();
|
let worker_type = job.jobtype().to_string();
|
||||||
let auth_id = auth_id.clone();
|
let auth_id = auth_id.clone();
|
||||||
|
@ -16,7 +16,7 @@ use proxmox_sys::task_log;
|
|||||||
|
|
||||||
use pbs_api_types::{
|
use pbs_api_types::{
|
||||||
Authid, GroupFilter, GroupListItem, RateLimitConfig, Remote,
|
Authid, GroupFilter, GroupListItem, RateLimitConfig, Remote,
|
||||||
SnapshotListItem,
|
Operation, SnapshotListItem,
|
||||||
};
|
};
|
||||||
|
|
||||||
use pbs_datastore::{BackupDir, BackupInfo, BackupGroup, DataStore, StoreProgress};
|
use pbs_datastore::{BackupDir, BackupInfo, BackupGroup, DataStore, StoreProgress};
|
||||||
@ -57,7 +57,7 @@ impl PullParameters {
|
|||||||
group_filter: Option<Vec<GroupFilter>>,
|
group_filter: Option<Vec<GroupFilter>>,
|
||||||
limit: RateLimitConfig,
|
limit: RateLimitConfig,
|
||||||
) -> Result<Self, Error> {
|
) -> Result<Self, Error> {
|
||||||
let store = DataStore::lookup_datastore(store)?;
|
let store = DataStore::lookup_datastore(store, Some(Operation::Write))?;
|
||||||
|
|
||||||
let (remote_config, _digest) = pbs_config::remote::config()?;
|
let (remote_config, _digest) = pbs_config::remote::config()?;
|
||||||
let remote: Remote = remote_config.lookup("remote", remote)?;
|
let remote: Remote = remote_config.lookup("remote", remote)?;
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
use anyhow::{format_err, Error};
|
use anyhow::{format_err, Error};
|
||||||
|
|
||||||
use proxmox_sys::task_log;
|
use proxmox_sys::task_log;
|
||||||
use pbs_api_types::{Authid, VerificationJobConfig};
|
use pbs_api_types::{Authid, Operation, VerificationJobConfig};
|
||||||
use proxmox_rest_server::WorkerTask;
|
use proxmox_rest_server::WorkerTask;
|
||||||
use pbs_datastore::DataStore;
|
use pbs_datastore::DataStore;
|
||||||
|
|
||||||
@ -22,7 +22,7 @@ pub fn do_verification_job(
|
|||||||
to_stdout: bool,
|
to_stdout: bool,
|
||||||
) -> Result<String, Error> {
|
) -> Result<String, Error> {
|
||||||
|
|
||||||
let datastore = DataStore::lookup_datastore(&verification_job.store)?;
|
let datastore = DataStore::lookup_datastore(&verification_job.store, Some(Operation::Read))?;
|
||||||
|
|
||||||
let outdated_after = verification_job.outdated_after;
|
let outdated_after = verification_job.outdated_after;
|
||||||
let ignore_verified_snapshots = verification_job.ignore_verified.unwrap_or(true);
|
let ignore_verified_snapshots = verification_job.ignore_verified.unwrap_or(true);
|
||||||
|
Loading…
Reference in New Issue
Block a user