move ApiConfig, FileLogger and CommandoSocket to proxmox-rest-server workspace

ApiConfig: avoid using  pbs_config::backup_user()
CommandoSocket: avoid using  pbs_config::backup_user()
FileLogger: avoid using  pbs_config::backup_user()
- use atomic_open_or_create_file()

Auth Trait: moved definitions to proxmox-rest-server/src/lib.rs
- removed CachedUserInfo patrameter
- return user as String (not Authid)

Signed-off-by: Thomas Lamprecht <t.lamprecht@proxmox.com>
This commit is contained in:
Dietmar Maurer 2021-09-21 07:58:40 +02:00 committed by Thomas Lamprecht
parent 037f6b6d5e
commit fd6d243843
34 changed files with 222 additions and 176 deletions

View File

@ -96,7 +96,7 @@ zstd = { version = "0.6", features = [ "bindgen" ] }
pathpatterns = "0.1.2" pathpatterns = "0.1.2"
pxar = { version = "0.10.1", features = [ "tokio-io" ] } pxar = { version = "0.10.1", features = [ "tokio-io" ] }
proxmox = { version = "0.13.0", features = [ "sortable-macro", "api-macro", "cli", "router", "tfa" ] } proxmox = { version = "0.13.3", features = [ "sortable-macro", "api-macro", "cli", "router", "tfa" ] }
proxmox-acme-rs = "0.2.1" proxmox-acme-rs = "0.2.1"
proxmox-apt = "0.7.0" proxmox-apt = "0.7.0"
proxmox-http = { version = "0.4.0", features = [ "client", "http-helpers", "websocket" ] } proxmox-http = { version = "0.4.0", features = [ "client", "http-helpers", "websocket" ] }

View File

@ -14,7 +14,7 @@ openssl = "0.10"
regex = "1.2" regex = "1.2"
serde = { version = "1.0", features = ["derive"] } serde = { version = "1.0", features = ["derive"] }
proxmox = { version = "0.13.0", default-features = false, features = [ "api-macro" ] } proxmox = { version = "0.13.3", default-features = false, features = [ "api-macro" ] }
pbs-systemd = { path = "../pbs-systemd" } pbs-systemd = { path = "../pbs-systemd" }
pbs-tools = { path = "../pbs-tools" } pbs-tools = { path = "../pbs-tools" }

View File

@ -28,7 +28,7 @@ tower-service = "0.3.0"
xdg = "2.2" xdg = "2.2"
pathpatterns = "0.1.2" pathpatterns = "0.1.2"
proxmox = { version = "0.13.0", default-features = false, features = [ "cli" ] } proxmox = { version = "0.13.3", default-features = false, features = [ "cli" ] }
proxmox-fuse = "0.1.1" proxmox-fuse = "0.1.1"
proxmox-http = { version = "0.4.0", features = [ "client", "http-helpers", "websocket" ] } proxmox-http = { version = "0.4.0", features = [ "client", "http-helpers", "websocket" ] }
pxar = { version = "0.10.1", features = [ "tokio-io" ] } pxar = { version = "0.10.1", features = [ "tokio-io" ] }

View File

@ -16,7 +16,7 @@ nix = "0.19.1"
regex = "1.2" regex = "1.2"
once_cell = "1.3.1" once_cell = "1.3.1"
proxmox = { version = "0.13.0", default-features = false, features = [ "cli" ] } proxmox = { version = "0.13.3", default-features = false, features = [ "cli" ] }
pbs-api-types = { path = "../pbs-api-types" } pbs-api-types = { path = "../pbs-api-types" }
pbs-buildcfg = { path = "../pbs-buildcfg" } pbs-buildcfg = { path = "../pbs-buildcfg" }

View File

@ -23,7 +23,7 @@ zstd = { version = "0.6", features = [ "bindgen" ] }
pathpatterns = "0.1.2" pathpatterns = "0.1.2"
pxar = "0.10.1" pxar = "0.10.1"
proxmox = { version = "0.13.0", default-features = false, features = [ "api-macro" ] } proxmox = { version = "0.13.3", default-features = false, features = [ "api-macro" ] }
pbs-api-types = { path = "../pbs-api-types" } pbs-api-types = { path = "../pbs-api-types" }
pbs-tools = { path = "../pbs-tools" } pbs-tools = { path = "../pbs-tools" }

View File

@ -14,7 +14,7 @@ nix = "0.19.1"
regex = "1.2" regex = "1.2"
tokio = { version = "1.6", features = [] } tokio = { version = "1.6", features = [] }
proxmox = "0.13.0" proxmox = "0.13.3"
proxmox-fuse = "0.1.1" proxmox-fuse = "0.1.1"
pbs-tools = { path = "../pbs-tools" } pbs-tools = { path = "../pbs-tools" }

View File

@ -11,6 +11,6 @@ bitflags = "1.2.1"
lazy_static = "1.4" lazy_static = "1.4"
nom = "5.1" nom = "5.1"
proxmox = { version = "0.13.0", default-features = false } proxmox = { version = "0.13.3", default-features = false }
pbs-tools = { path = "../pbs-tools" } pbs-tools = { path = "../pbs-tools" }

View File

@ -18,7 +18,7 @@ bitflags = "1.2.1"
regex = "1.2" regex = "1.2"
udev = ">= 0.3, <0.5" udev = ">= 0.3, <0.5"
proxmox = { version = "0.13.0", default-features = false, features = [] } proxmox = { version = "0.13.3", default-features = false, features = [] }
pbs-api-types = { path = "../pbs-api-types" } pbs-api-types = { path = "../pbs-api-types" }
pbs-tools = { path = "../pbs-tools" } pbs-tools = { path = "../pbs-tools" }

View File

@ -30,7 +30,7 @@ url = "2.1"
walkdir = "2" walkdir = "2"
zstd = { version = "0.6", features = [ "bindgen" ] } zstd = { version = "0.6", features = [ "bindgen" ] }
proxmox = { version = "0.13.0", default-features = false, features = [ "tokio" ] } proxmox = { version = "0.13.3", default-features = false, features = [ "tokio" ] }
pbs-buildcfg = { path = "../pbs-buildcfg" } pbs-buildcfg = { path = "../pbs-buildcfg" }
pbs-runtime = { path = "../pbs-runtime" } pbs-runtime = { path = "../pbs-runtime" }

View File

@ -22,7 +22,7 @@ zstd = { version = "0.6", features = [ "bindgen" ] }
pathpatterns = "0.1.2" pathpatterns = "0.1.2"
pxar = { version = "0.10.1", features = [ "tokio-io" ] } pxar = { version = "0.10.1", features = [ "tokio-io" ] }
proxmox = { version = "0.13.0", features = [ "sortable-macro", "api-macro", "cli", "router" ] } proxmox = { version = "0.13.3", features = [ "sortable-macro", "api-macro", "cli", "router" ] }
pbs-api-types = { path = "../pbs-api-types" } pbs-api-types = { path = "../pbs-api-types" }
pbs-buildcfg = { path = "../pbs-buildcfg" } pbs-buildcfg = { path = "../pbs-buildcfg" }

View File

@ -9,7 +9,7 @@ anyhow = "1.0"
walkdir = "2" walkdir = "2"
serde_json = "1.0" serde_json = "1.0"
proxmox = { version = "0.13.0", features = [ "api-macro", "cli" ] } proxmox = { version = "0.13.3", features = [ "api-macro", "cli" ] }
pbs-config = { path = "../pbs-config" } pbs-config = { path = "../pbs-config" }
pbs-client = { path = "../pbs-client" } pbs-client = { path = "../pbs-client" }

View File

@ -16,7 +16,7 @@ tokio = { version = "1.6", features = [ "io-std", "rt", "rt-multi-thread", "time
pxar = { version = "0.10.1", features = [ "tokio-io" ] } pxar = { version = "0.10.1", features = [ "tokio-io" ] }
proxmox = { version = "0.13.0", features = [ "api-macro", "cli" ] } proxmox = { version = "0.13.3", features = [ "api-macro", "cli" ] }
pbs-api-types = { path = "../pbs-api-types" } pbs-api-types = { path = "../pbs-api-types" }
pbs-buildcfg = { path = "../pbs-buildcfg" } pbs-buildcfg = { path = "../pbs-buildcfg" }

View File

@ -7,3 +7,18 @@ description = "REST server implementation"
[dependencies] [dependencies]
anyhow = "1.0" anyhow = "1.0"
futures = "0.3"
handlebars = "3.0"
http = "0.2"
hyper = { version = "0.14", features = [ "full" ] }
lazy_static = "1.4"
libc = "0.2"
nix = "0.19.1"
serde = { version = "1.0", features = [] }
serde_json = "1.0"
tokio = { version = "1.6", features = ["signal", "process"] }
proxmox = { version = "0.13.3", features = [ "router"] }
# fixme: remove this dependency (pbs_tools::broadcast_future)
pbs-tools = { path = "../pbs-tools" }

View File

@ -12,8 +12,7 @@ use serde::Serialize;
use proxmox::api::{ApiMethod, Router, RpcEnvironmentType}; use proxmox::api::{ApiMethod, Router, RpcEnvironmentType};
use proxmox::tools::fs::{create_path, CreateOptions}; use proxmox::tools::fs::{create_path, CreateOptions};
use crate::tools::{FileLogger, FileLogOptions}; use crate::{ApiAuth, FileLogger, FileLogOptions, CommandoSocket};
use super::auth::ApiAuth;
pub struct ApiConfig { pub struct ApiConfig {
basedir: PathBuf, basedir: PathBuf,
@ -134,7 +133,9 @@ impl ApiConfig {
pub fn enable_file_log<P>( pub fn enable_file_log<P>(
&mut self, &mut self,
path: P, path: P,
commando_sock: &mut super::CommandoSocket, dir_opts: Option<CreateOptions>,
file_opts: Option<CreateOptions>,
commando_sock: &mut CommandoSocket,
) -> Result<(), Error> ) -> Result<(), Error>
where where
P: Into<PathBuf> P: Into<PathBuf>
@ -142,15 +143,13 @@ impl ApiConfig {
let path: PathBuf = path.into(); let path: PathBuf = path.into();
if let Some(base) = path.parent() { if let Some(base) = path.parent() {
if !base.exists() { if !base.exists() {
let backup_user = pbs_config::backup_user()?; create_path(base, None, dir_opts).map_err(|err| format_err!("{}", err))?;
let opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
create_path(base, None, Some(opts)).map_err(|err| format_err!("{}", err))?;
} }
} }
let logger_options = FileLogOptions { let logger_options = FileLogOptions {
append: true, append: true,
owned_by_backup: true, file_opts: file_opts.unwrap_or(CreateOptions::default()),
..Default::default() ..Default::default()
}; };
let request_log = Arc::new(Mutex::new(FileLogger::new(&path, logger_options)?)); let request_log = Arc::new(Mutex::new(FileLogger::new(&path, logger_options)?));

View File

@ -10,17 +10,17 @@ use tokio::net::UnixListener;
use serde::Serialize; use serde::Serialize;
use serde_json::Value; use serde_json::Value;
use nix::sys::socket; use nix::sys::socket;
use nix::unistd::Gid;
/// Listens on a Unix Socket to handle simple command asynchronously // Listens on a Unix Socket to handle simple command asynchronously
fn create_control_socket<P, F>(path: P, func: F) -> Result<impl Future<Output = ()>, Error> fn create_control_socket<P, F>(path: P, gid: Gid, func: F) -> Result<impl Future<Output = ()>, Error>
where where
P: Into<PathBuf>, P: Into<PathBuf>,
F: Fn(Value) -> Result<Value, Error> + Send + Sync + 'static, F: Fn(Value) -> Result<Value, Error> + Send + Sync + 'static,
{ {
let path: PathBuf = path.into(); let path: PathBuf = path.into();
let backup_user = pbs_config::backup_user()?; let gid = gid.as_raw();
let backup_gid = backup_user.gid.as_raw();
let socket = UnixListener::bind(&path)?; let socket = UnixListener::bind(&path)?;
@ -47,7 +47,7 @@ where
// check permissions (same gid, root user, or backup group) // check permissions (same gid, root user, or backup group)
let mygid = unsafe { libc::getgid() }; let mygid = unsafe { libc::getgid() };
if !(cred.uid() == 0 || cred.gid() == mygid || cred.gid() == backup_gid) { if !(cred.uid() == 0 || cred.gid() == mygid || cred.gid() == gid) {
eprintln!("no permissions for {:?}", cred); eprintln!("no permissions for {:?}", cred);
continue; continue;
} }
@ -93,7 +93,7 @@ where
} }
}.boxed(); }.boxed();
let abort_future = super::last_worker_future().map_err(|_| {}); let abort_future = crate::last_worker_future().map_err(|_| {});
let task = futures::future::select( let task = futures::future::select(
control_future, control_future,
abort_future, abort_future,
@ -154,15 +154,17 @@ pub type CommandoSocketFn = Box<(dyn Fn(Option<&Value>) -> Result<Value, Error>
/// You need to call `spawn()` to make the socket active. /// You need to call `spawn()` to make the socket active.
pub struct CommandoSocket { pub struct CommandoSocket {
socket: PathBuf, socket: PathBuf,
gid: Gid,
commands: HashMap<String, CommandoSocketFn>, commands: HashMap<String, CommandoSocketFn>,
} }
impl CommandoSocket { impl CommandoSocket {
pub fn new<P>(path: P) -> Self pub fn new<P>(path: P, gid: Gid) -> Self
where P: Into<PathBuf>, where P: Into<PathBuf>,
{ {
CommandoSocket { CommandoSocket {
socket: path.into(), socket: path.into(),
gid,
commands: HashMap::new(), commands: HashMap::new(),
} }
} }
@ -170,7 +172,7 @@ impl CommandoSocket {
/// Spawn the socket and consume self, meaning you cannot register commands anymore after /// Spawn the socket and consume self, meaning you cannot register commands anymore after
/// calling this. /// calling this.
pub fn spawn(self) -> Result<(), Error> { pub fn spawn(self) -> Result<(), Error> {
let control_future = create_control_socket(self.socket.to_owned(), move |param| { let control_future = create_control_socket(self.socket.to_owned(), self.gid, move |param| {
let param = param let param = param
.as_object() .as_object()
.ok_or_else(|| format_err!("unable to parse parameters (expected json object)"))?; .ok_or_else(|| format_err!("unable to parse parameters (expected json object)"))?;

View File

@ -1,6 +1,10 @@
use anyhow::Error;
use std::io::Write; use std::io::Write;
use anyhow::Error;
use nix::fcntl::OFlag;
use proxmox::tools::fs::{CreateOptions, atomic_open_or_create_file};
/// Log messages with optional automatically added timestamps into files /// Log messages with optional automatically added timestamps into files
/// ///
/// Logs messages to file, and optionally to standard output. /// Logs messages to file, and optionally to standard output.
@ -9,8 +13,7 @@ use std::io::Write;
/// #### Example: /// #### Example:
/// ``` /// ```
/// # use anyhow::{bail, format_err, Error}; /// # use anyhow::{bail, format_err, Error};
/// use proxmox_backup::flog; /// use proxmox_rest_server::{flog, FileLogger, FileLogOptions};
/// use proxmox_backup::tools::{FileLogger, FileLogOptions};
/// ///
/// # std::fs::remove_file("test.log"); /// # std::fs::remove_file("test.log");
/// let options = FileLogOptions { /// let options = FileLogOptions {
@ -23,7 +26,7 @@ use std::io::Write;
/// # std::fs::remove_file("test.log"); /// # std::fs::remove_file("test.log");
/// ``` /// ```
#[derive(Debug, Default)] #[derive(Default)]
/// Options to control the behavior of a ['FileLogger'] instance /// Options to control the behavior of a ['FileLogger'] instance
pub struct FileLogOptions { pub struct FileLogOptions {
/// Open underlying log file in append mode, useful when multiple concurrent processes /// Open underlying log file in append mode, useful when multiple concurrent processes
@ -39,13 +42,11 @@ pub struct FileLogOptions {
pub to_stdout: bool, pub to_stdout: bool,
/// Prefix messages logged to the file with the current local time as RFC 3339 /// Prefix messages logged to the file with the current local time as RFC 3339
pub prefix_time: bool, pub prefix_time: bool,
/// if set, the file is tried to be chowned by the backup:backup user/group /// File owner/group and mode
/// Note, this is not designed race free as anybody could set it to another user afterwards pub file_opts: CreateOptions,
/// anyway. It must thus be used by all processes which doe not run as backup uid/gid.
pub owned_by_backup: bool,
} }
#[derive(Debug)]
pub struct FileLogger { pub struct FileLogger {
file: std::fs::File, file: std::fs::File,
file_name: std::path::PathBuf, file_name: std::path::PathBuf,
@ -82,19 +83,24 @@ impl FileLogger {
file_name: P, file_name: P,
options: &FileLogOptions, options: &FileLogOptions,
) -> Result<std::fs::File, Error> { ) -> Result<std::fs::File, Error> {
let file = std::fs::OpenOptions::new()
.read(options.read)
.write(true)
.append(options.append)
.create_new(options.exclusive)
.create(!options.exclusive)
.open(&file_name)?;
if options.owned_by_backup { let mut flags = OFlag::O_CLOEXEC;
let backup_user = pbs_config::backup_user()?;
nix::unistd::chown(file_name.as_ref(), Some(backup_user.uid), Some(backup_user.gid))?; if options.read {
flags |= OFlag::O_RDWR;
} else {
flags |= OFlag::O_WRONLY;
} }
if options.append {
flags |= OFlag::O_APPEND;
}
if options.exclusive {
flags |= OFlag::O_EXCL;
}
let file = atomic_open_or_create_file(&file_name, flags, &[], options.file_opts.clone())?;
Ok(file) Ok(file)
} }

View File

@ -0,0 +1,54 @@
use anyhow::{bail, Error};
mod state;
pub use state::*;
mod command_socket;
pub use command_socket::*;
mod file_logger;
pub use file_logger::{FileLogger, FileLogOptions};
mod api_config;
pub use api_config::ApiConfig;
pub enum AuthError {
Generic(Error),
NoData,
}
impl From<Error> for AuthError {
fn from(err: Error) -> Self {
AuthError::Generic(err)
}
}
pub trait ApiAuth {
fn check_auth(
&self,
headers: &http::HeaderMap,
method: &hyper::Method,
) -> Result<String, AuthError>;
}
static mut SHUTDOWN_REQUESTED: bool = false;
pub fn request_shutdown() {
unsafe {
SHUTDOWN_REQUESTED = true;
}
crate::server_shutdown();
}
#[inline(always)]
pub fn shutdown_requested() -> bool {
unsafe { SHUTDOWN_REQUESTED }
}
pub fn fail_on_shutdown() -> Result<(), Error> {
if shutdown_requested() {
bail!("Server shutdown requested - aborting task");
}
Ok(())
}

View File

@ -42,7 +42,7 @@ pub fn server_state_init() -> Result<(), Error> {
while stream.recv().await.is_some() { while stream.recv().await.is_some() {
println!("got shutdown request (SIGINT)"); println!("got shutdown request (SIGINT)");
SERVER_STATE.lock().unwrap().reload_request = false; SERVER_STATE.lock().unwrap().reload_request = false;
crate::tools::request_shutdown(); crate::request_shutdown();
} }
}.boxed(); }.boxed();
@ -57,7 +57,7 @@ pub fn server_state_init() -> Result<(), Error> {
while stream.recv().await.is_some() { while stream.recv().await.is_some() {
println!("got reload request (SIGHUP)"); println!("got reload request (SIGHUP)");
SERVER_STATE.lock().unwrap().reload_request = true; SERVER_STATE.lock().unwrap().reload_request = true;
crate::tools::request_shutdown(); crate::request_shutdown();
} }
}.boxed(); }.boxed();

View File

@ -16,7 +16,7 @@ serde_json = "1.0"
tokio = { version = "1.6", features = [ "rt", "rt-multi-thread" ] } tokio = { version = "1.6", features = [ "rt", "rt-multi-thread" ] }
pathpatterns = "0.1.2" pathpatterns = "0.1.2"
proxmox = { version = "0.13.0", default-features = false, features = [] } proxmox = { version = "0.13.3", default-features = false, features = [] }
pxar = { version = "0.10.1", features = [ "tokio-io" ] } pxar = { version = "0.10.1", features = [ "tokio-io" ] }
pbs-client = { path = "../pbs-client" } pbs-client = { path = "../pbs-client" }

View File

@ -1505,7 +1505,7 @@ pub fn pxar_file_download(
EntryKind::Directory => { EntryKind::Directory => {
let (sender, receiver) = tokio::sync::mpsc::channel(100); let (sender, receiver) = tokio::sync::mpsc::channel(100);
let channelwriter = AsyncChannelWriter::new(sender, 1024 * 1024); let channelwriter = AsyncChannelWriter::new(sender, 1024 * 1024);
crate::server::spawn_internal_task( proxmox_rest_server::spawn_internal_task(
create_zip(channelwriter, decoder, path.clone(), false) create_zip(channelwriter, decoder, path.clone(), false)
); );
Body::wrap_stream(ReceiverStream::new(receiver).map_err(move |err| { Body::wrap_stream(ReceiverStream::new(receiver).map_err(move |err| {

View File

@ -295,12 +295,12 @@ fn upgrade_to_websocket(
let (ws, response) = WebSocket::new(parts.headers.clone())?; let (ws, response) = WebSocket::new(parts.headers.clone())?;
crate::server::spawn_internal_task(async move { proxmox_rest_server::spawn_internal_task(async move {
let conn: Upgraded = match hyper::upgrade::on(Request::from_parts(parts, req_body)) let conn: Upgraded = match hyper::upgrade::on(Request::from_parts(parts, req_body))
.map_err(Error::from) .map_err(Error::from)
.await .await
{ {
Ok(upgraded) => upgraded, Ok(upgraded) => upgraded,
_ => bail!("error"), _ => bail!("error"),
}; };

View File

@ -29,8 +29,7 @@ use pbs_tools::format::HumanByte;
use pbs_tools::fs::{lock_dir_noblock, DirLockGuard}; use pbs_tools::fs::{lock_dir_noblock, DirLockGuard};
use pbs_tools::process_locker::ProcessLockSharedGuard; use pbs_tools::process_locker::ProcessLockSharedGuard;
use pbs_config::{open_backup_lockfile, BackupLockGuard}; use pbs_config::{open_backup_lockfile, BackupLockGuard};
use proxmox_rest_server::fail_on_shutdown;
use crate::tools::fail_on_shutdown;
lazy_static! { lazy_static! {
static ref DATASTORE_MAP: Mutex<HashMap<String, Arc<DataStore>>> = Mutex::new(HashMap::new()); static ref DATASTORE_MAP: Mutex<HashMap<String, Arc<DataStore>>> = Mutex::new(HashMap::new());

View File

@ -172,7 +172,7 @@ fn verify_index_chunks(
let check_abort = |pos: usize| -> Result<(), Error> { let check_abort = |pos: usize| -> Result<(), Error> {
if pos & 1023 == 0 { if pos & 1023 == 0 {
verify_worker.worker.check_abort()?; verify_worker.worker.check_abort()?;
crate::tools::fail_on_shutdown()?; proxmox_rest_server::fail_on_shutdown()?;
} }
Ok(()) Ok(())
}; };
@ -184,7 +184,7 @@ fn verify_index_chunks(
for (pos, _) in chunk_list { for (pos, _) in chunk_list {
verify_worker.worker.check_abort()?; verify_worker.worker.check_abort()?;
crate::tools::fail_on_shutdown()?; proxmox_rest_server::fail_on_shutdown()?;
let info = index.chunk_info(pos).unwrap(); let info = index.chunk_info(pos).unwrap();
@ -376,7 +376,7 @@ pub fn verify_backup_dir_with_lock(
}); });
verify_worker.worker.check_abort()?; verify_worker.worker.check_abort()?;
crate::tools::fail_on_shutdown()?; proxmox_rest_server::fail_on_shutdown()?;
if let Err(err) = result { if let Err(err) = result {
task_log!( task_log!(

View File

@ -3,8 +3,10 @@ use futures::*;
use proxmox::try_block; use proxmox::try_block;
use proxmox::api::RpcEnvironmentType; use proxmox::api::RpcEnvironmentType;
use proxmox::tools::fs::CreateOptions;
use pbs_tools::auth::private_auth_key; use pbs_tools::auth::private_auth_key;
use proxmox_rest_server::ApiConfig;
use proxmox_backup::server::{ use proxmox_backup::server::{
self, self,
@ -57,16 +59,25 @@ async fn run() -> Result<(), Error> {
} }
let _ = csrf_secret(); // load with lazy_static let _ = csrf_secret(); // load with lazy_static
let mut config = server::ApiConfig::new( let mut config = ApiConfig::new(
pbs_buildcfg::JS_DIR, pbs_buildcfg::JS_DIR,
&proxmox_backup::api2::ROUTER, &proxmox_backup::api2::ROUTER,
RpcEnvironmentType::PRIVILEGED, RpcEnvironmentType::PRIVILEGED,
default_api_auth(), default_api_auth(),
)?; )?;
let mut commando_sock = server::CommandoSocket::new(server::our_ctrl_sock()); let backup_user = pbs_config::backup_user()?;
let mut commando_sock = proxmox_rest_server::CommandoSocket::new(crate::server::our_ctrl_sock(), backup_user.gid);
config.enable_file_log(pbs_buildcfg::API_ACCESS_LOG_FN, &mut commando_sock)?; let dir_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
let file_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
config.enable_file_log(
pbs_buildcfg::API_ACCESS_LOG_FN,
Some(dir_opts),
Some(file_opts),
&mut commando_sock,
)?;
let rest_server = RestServer::new(config); let rest_server = RestServer::new(config);
@ -78,7 +89,7 @@ async fn run() -> Result<(), Error> {
Ok(ready Ok(ready
.and_then(|_| hyper::Server::builder(incoming) .and_then(|_| hyper::Server::builder(incoming)
.serve(rest_server) .serve(rest_server)
.with_graceful_shutdown(server::shutdown_future()) .with_graceful_shutdown(proxmox_rest_server::shutdown_future())
.map_err(Error::from) .map_err(Error::from)
) )
.map(|e| { .map(|e| {
@ -97,7 +108,7 @@ async fn run() -> Result<(), Error> {
let init_result: Result<(), Error> = try_block!({ let init_result: Result<(), Error> = try_block!({
server::register_task_control_commands(&mut commando_sock)?; server::register_task_control_commands(&mut commando_sock)?;
commando_sock.spawn()?; commando_sock.spawn()?;
server::server_state_init()?; proxmox_rest_server::server_state_init()?;
Ok(()) Ok(())
}); });
@ -107,7 +118,7 @@ async fn run() -> Result<(), Error> {
server.await?; server.await?;
log::info!("server shutting down, waiting for active workers to complete"); log::info!("server shutting down, waiting for active workers to complete");
proxmox_backup::server::last_worker_future().await?; proxmox_rest_server::last_worker_future().await?;
log::info!("done - exit server"); log::info!("done - exit server");

View File

@ -12,13 +12,15 @@ use serde_json::Value;
use proxmox::try_block; use proxmox::try_block;
use proxmox::api::RpcEnvironmentType; use proxmox::api::RpcEnvironmentType;
use proxmox::sys::linux::socket::set_tcp_keepalive; use proxmox::sys::linux::socket::set_tcp_keepalive;
use proxmox::tools::fs::CreateOptions;
use proxmox_rest_server::ApiConfig;
use proxmox_backup::{ use proxmox_backup::{
backup::DataStore, backup::DataStore,
server::{ server::{
auth::default_api_auth, auth::default_api_auth,
WorkerTask, WorkerTask,
ApiConfig,
rest::*, rest::*,
jobstate::{ jobstate::{
self, self,
@ -106,9 +108,18 @@ async fn run() -> Result<(), Error> {
config.register_template("index", &indexpath)?; config.register_template("index", &indexpath)?;
config.register_template("console", "/usr/share/pve-xtermjs/index.html.hbs")?; config.register_template("console", "/usr/share/pve-xtermjs/index.html.hbs")?;
let mut commando_sock = server::CommandoSocket::new(server::our_ctrl_sock()); let backup_user = pbs_config::backup_user()?;
let mut commando_sock = proxmox_rest_server::CommandoSocket::new(crate::server::our_ctrl_sock(), backup_user.gid);
config.enable_file_log(pbs_buildcfg::API_ACCESS_LOG_FN, &mut commando_sock)?; let dir_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
let file_opts = CreateOptions::new().owner(backup_user.uid).group(backup_user.gid);
config.enable_file_log(
pbs_buildcfg::API_ACCESS_LOG_FN,
Some(dir_opts),
Some(file_opts),
&mut commando_sock,
)?;
let rest_server = RestServer::new(config); let rest_server = RestServer::new(config);
@ -158,7 +169,7 @@ async fn run() -> Result<(), Error> {
Ok(ready Ok(ready
.and_then(|_| hyper::Server::builder(connections) .and_then(|_| hyper::Server::builder(connections)
.serve(rest_server) .serve(rest_server)
.with_graceful_shutdown(server::shutdown_future()) .with_graceful_shutdown(proxmox_rest_server::shutdown_future())
.map_err(Error::from) .map_err(Error::from)
) )
.map_err(|err| eprintln!("server error: {}", err)) .map_err(|err| eprintln!("server error: {}", err))
@ -174,7 +185,7 @@ async fn run() -> Result<(), Error> {
let init_result: Result<(), Error> = try_block!({ let init_result: Result<(), Error> = try_block!({
server::register_task_control_commands(&mut commando_sock)?; server::register_task_control_commands(&mut commando_sock)?;
commando_sock.spawn()?; commando_sock.spawn()?;
server::server_state_init()?; proxmox_rest_server::server_state_init()?;
Ok(()) Ok(())
}); });
@ -187,7 +198,7 @@ async fn run() -> Result<(), Error> {
server.await?; server.await?;
log::info!("server shutting down, waiting for active workers to complete"); log::info!("server shutting down, waiting for active workers to complete");
proxmox_backup::server::last_worker_future().await?; proxmox_rest_server::last_worker_future().await?;
log::info!("done - exit server"); log::info!("done - exit server");
Ok(()) Ok(())
@ -304,14 +315,14 @@ async fn accept_connection(
} }
fn start_stat_generator() { fn start_stat_generator() {
let abort_future = server::shutdown_future(); let abort_future = proxmox_rest_server::shutdown_future();
let future = Box::pin(run_stat_generator()); let future = Box::pin(run_stat_generator());
let task = futures::future::select(future, abort_future); let task = futures::future::select(future, abort_future);
tokio::spawn(task.map(|_| ())); tokio::spawn(task.map(|_| ()));
} }
fn start_task_scheduler() { fn start_task_scheduler() {
let abort_future = server::shutdown_future(); let abort_future = proxmox_rest_server::shutdown_future();
let future = Box::pin(run_task_scheduler()); let future = Box::pin(run_task_scheduler());
let task = futures::future::select(future, abort_future); let task = futures::future::select(future, abort_future);
tokio::spawn(task.map(|_| ())); tokio::spawn(task.map(|_| ()));
@ -706,12 +717,12 @@ async fn schedule_task_log_rotate() {
async fn command_reopen_logfiles() -> Result<(), Error> { async fn command_reopen_logfiles() -> Result<(), Error> {
// only care about the most recent daemon instance for each, proxy & api, as other older ones // only care about the most recent daemon instance for each, proxy & api, as other older ones
// should not respond to new requests anyway, but only finish their current one and then exit. // should not respond to new requests anyway, but only finish their current one and then exit.
let sock = server::our_ctrl_sock(); let sock = crate::server::our_ctrl_sock();
let f1 = server::send_command(sock, "{\"command\":\"api-access-log-reopen\"}\n"); let f1 = proxmox_rest_server::send_command(sock, "{\"command\":\"api-access-log-reopen\"}\n");
let pid = server::read_pid(pbs_buildcfg::PROXMOX_BACKUP_API_PID_FN)?; let pid = crate::server::read_pid(pbs_buildcfg::PROXMOX_BACKUP_API_PID_FN)?;
let sock = server::ctrl_sock_from_pid(pid); let sock = crate::server::ctrl_sock_from_pid(pid);
let f2 = server::send_command(sock, "{\"command\":\"api-access-log-reopen\"}\n"); let f2 = proxmox_rest_server::send_command(sock, "{\"command\":\"api-access-log-reopen\"}\n");
match futures::join!(f1, f2) { match futures::join!(f1, f2) {
(Err(e1), Err(e2)) => Err(format_err!("reopen commands failed, proxy: {}; api: {}", e1, e2)), (Err(e1), Err(e2)) => Err(format_err!("reopen commands failed, proxy: {}; api: {}", e1, e2)),

View File

@ -15,9 +15,11 @@ use tokio::sync::mpsc;
use tokio_stream::wrappers::ReceiverStream; use tokio_stream::wrappers::ReceiverStream;
use proxmox::api::RpcEnvironmentType; use proxmox::api::RpcEnvironmentType;
use proxmox_backup::server::{rest::*, ApiConfig};
use pbs_client::DEFAULT_VSOCK_PORT; use pbs_client::DEFAULT_VSOCK_PORT;
use proxmox_rest_server::ApiConfig;
use proxmox_backup::server::rest::*;
mod proxmox_restore_daemon; mod proxmox_restore_daemon;
use proxmox_restore_daemon::*; use proxmox_restore_daemon::*;

View File

@ -4,10 +4,7 @@ use std::io::prelude::*;
use anyhow::{bail, format_err, Error}; use anyhow::{bail, format_err, Error};
use pbs_api_types::Authid; use proxmox_rest_server::{ApiAuth, AuthError};
use pbs_config::CachedUserInfo;
use proxmox_backup::server::auth::{ApiAuth, AuthError};
const TICKET_FILE: &str = "/ticket"; const TICKET_FILE: &str = "/ticket";
@ -20,11 +17,10 @@ impl ApiAuth for StaticAuth {
&self, &self,
headers: &http::HeaderMap, headers: &http::HeaderMap,
_method: &hyper::Method, _method: &hyper::Method,
_user_info: &CachedUserInfo, ) -> Result<String, AuthError> {
) -> Result<Authid, AuthError> {
match headers.get(hyper::header::AUTHORIZATION) { match headers.get(hyper::header::AUTHORIZATION) {
Some(header) if header.to_str().unwrap_or("") == &self.ticket => { Some(header) if header.to_str().unwrap_or("") == &self.ticket => {
Ok(Authid::root_auth_id().to_owned()) Ok(String::from("root@pam"))
} }
_ => { _ => {
return Err(AuthError::Generic(format_err!( return Err(AuthError::Generic(format_err!(

View File

@ -1,11 +1,12 @@
//! Provides authentication primitives for the HTTP server //! Provides authentication primitives for the HTTP server
use anyhow::{format_err, Error}; use anyhow::format_err;
use std::sync::Arc; use std::sync::Arc;
use pbs_tools::ticket::{self, Ticket}; use pbs_tools::ticket::{self, Ticket};
use pbs_config::{token_shadow, CachedUserInfo}; use pbs_config::{token_shadow, CachedUserInfo};
use pbs_api_types::{Authid, Userid}; use pbs_api_types::{Authid, Userid};
use proxmox_rest_server::{ApiAuth, AuthError};
use crate::auth_helpers::*; use crate::auth_helpers::*;
use crate::tools; use crate::tools;
@ -13,26 +14,6 @@ use crate::tools;
use hyper::header; use hyper::header;
use percent_encoding::percent_decode_str; use percent_encoding::percent_decode_str;
pub enum AuthError {
Generic(Error),
NoData,
}
impl From<Error> for AuthError {
fn from(err: Error) -> Self {
AuthError::Generic(err)
}
}
pub trait ApiAuth {
fn check_auth(
&self,
headers: &http::HeaderMap,
method: &hyper::Method,
user_info: &CachedUserInfo,
) -> Result<Authid, AuthError>;
}
struct UserAuthData { struct UserAuthData {
ticket: String, ticket: String,
csrf_token: Option<String>, csrf_token: Option<String>,
@ -80,8 +61,10 @@ impl ApiAuth for UserApiAuth {
&self, &self,
headers: &http::HeaderMap, headers: &http::HeaderMap,
method: &hyper::Method, method: &hyper::Method,
user_info: &CachedUserInfo, ) -> Result<String, AuthError> {
) -> Result<Authid, AuthError> {
let user_info = CachedUserInfo::new()?;
let auth_data = Self::extract_auth_data(headers); let auth_data = Self::extract_auth_data(headers);
match auth_data { match auth_data {
Some(AuthData::User(user_auth_data)) => { Some(AuthData::User(user_auth_data)) => {
@ -111,7 +94,7 @@ impl ApiAuth for UserApiAuth {
} }
} }
Ok(auth_id) Ok(auth_id.to_string())
} }
Some(AuthData::ApiToken(api_token)) => { Some(AuthData::ApiToken(api_token)) => {
let mut parts = api_token.splitn(2, ':'); let mut parts = api_token.splitn(2, ':');
@ -133,7 +116,7 @@ impl ApiAuth for UserApiAuth {
token_shadow::verify_secret(&tokenid, &tokensecret)?; token_shadow::verify_secret(&tokenid, &tokensecret)?;
Ok(tokenid) Ok(tokenid.to_string())
} }
None => Err(AuthError::NoData), None => Err(AuthError::NoData),
} }

View File

@ -52,21 +52,12 @@ pub use environment::*;
mod upid; mod upid;
pub use upid::*; pub use upid::*;
mod state;
pub use state::*;
mod command_socket;
pub use command_socket::*;
mod worker_task; mod worker_task;
pub use worker_task::*; pub use worker_task::*;
mod h2service; mod h2service;
pub use h2service::*; pub use h2service::*;
pub mod config;
pub use config::*;
pub mod formatter; pub mod formatter;
#[macro_use] #[macro_use]
@ -98,7 +89,7 @@ pub mod pull;
pub(crate) async fn reload_proxy_certificate() -> Result<(), Error> { pub(crate) async fn reload_proxy_certificate() -> Result<(), Error> {
let proxy_pid = crate::server::read_pid(pbs_buildcfg::PROXMOX_BACKUP_PROXY_PID_FN)?; let proxy_pid = crate::server::read_pid(pbs_buildcfg::PROXMOX_BACKUP_PROXY_PID_FN)?;
let sock = crate::server::ctrl_sock_from_pid(proxy_pid); let sock = crate::server::ctrl_sock_from_pid(proxy_pid);
let _: Value = crate::server::send_raw_command(sock, "{\"command\":\"reload-certificate\"}\n") let _: Value = proxmox_rest_server::send_raw_command(sock, "{\"command\":\"reload-certificate\"}\n")
.await?; .await?;
Ok(()) Ok(())
} }
@ -106,7 +97,7 @@ pub(crate) async fn reload_proxy_certificate() -> Result<(), Error> {
pub(crate) async fn notify_datastore_removed() -> Result<(), Error> { pub(crate) async fn notify_datastore_removed() -> Result<(), Error> {
let proxy_pid = crate::server::read_pid(pbs_buildcfg::PROXMOX_BACKUP_PROXY_PID_FN)?; let proxy_pid = crate::server::read_pid(pbs_buildcfg::PROXMOX_BACKUP_PROXY_PID_FN)?;
let sock = crate::server::ctrl_sock_from_pid(proxy_pid); let sock = crate::server::ctrl_sock_from_pid(proxy_pid);
let _: Value = crate::server::send_raw_command(sock, "{\"command\":\"datastore-removed\"}\n") let _: Value = proxmox_rest_server::send_raw_command(sock, "{\"command\":\"datastore-removed\"}\n")
.await?; .await?;
Ok(()) Ok(())
} }

View File

@ -29,21 +29,20 @@ use proxmox::api::{
RpcEnvironmentType, RpcEnvironmentType,
}; };
use proxmox::http_err; use proxmox::http_err;
use proxmox::tools::fs::CreateOptions;
use pbs_tools::compression::{DeflateEncoder, Level}; use pbs_tools::compression::{DeflateEncoder, Level};
use pbs_tools::stream::AsyncReaderStream; use pbs_tools::stream::AsyncReaderStream;
use pbs_api_types::{Authid, Userid}; use pbs_api_types::{Authid, Userid};
use proxmox_rest_server::{ApiConfig, FileLogger, FileLogOptions, AuthError};
use super::auth::AuthError;
use super::environment::RestEnvironment; use super::environment::RestEnvironment;
use super::formatter::*; use super::formatter::*;
use super::ApiConfig;
use crate::auth_helpers::*; use crate::auth_helpers::*;
use pbs_config::CachedUserInfo; use pbs_config::CachedUserInfo;
use crate::tools; use crate::tools;
use crate::tools::compression::CompressionMethod; use crate::tools::compression::CompressionMethod;
use crate::tools::FileLogger;
extern "C" { extern "C" {
fn tzset(); fn tzset();
@ -196,10 +195,16 @@ fn log_response(
} }
} }
pub fn auth_logger() -> Result<FileLogger, Error> { pub fn auth_logger() -> Result<FileLogger, Error> {
let logger_options = tools::FileLogOptions { let backup_user = pbs_config::backup_user()?;
let file_opts = CreateOptions::new()
.owner(backup_user.uid)
.group(backup_user.gid);
let logger_options = FileLogOptions {
append: true, append: true,
prefix_time: true, prefix_time: true,
owned_by_backup: true, file_opts,
..Default::default() ..Default::default()
}; };
FileLogger::new(pbs_buildcfg::API_AUTH_LOG_FN, logger_options) FileLogger::new(pbs_buildcfg::API_AUTH_LOG_FN, logger_options)
@ -681,7 +686,6 @@ async fn handle_request(
rpcenv.set_client_ip(Some(*peer)); rpcenv.set_client_ip(Some(*peer));
let user_info = CachedUserInfo::new()?;
let auth = &api.api_auth; let auth = &api.api_auth;
let delay_unauth_time = std::time::Instant::now() + std::time::Duration::from_millis(3000); let delay_unauth_time = std::time::Instant::now() + std::time::Duration::from_millis(3000);
@ -708,8 +712,8 @@ async fn handle_request(
} }
if auth_required { if auth_required {
match auth.check_auth(&parts.headers, &method, &user_info) { match auth.check_auth(&parts.headers, &method) {
Ok(authid) => rpcenv.set_auth_id(Some(authid.to_string())), Ok(authid) => rpcenv.set_auth_id(Some(authid)),
Err(auth_err) => { Err(auth_err) => {
let err = match auth_err { let err = match auth_err {
AuthError::Generic(err) => err, AuthError::Generic(err) => err,
@ -738,6 +742,8 @@ async fn handle_request(
} }
Some(api_method) => { Some(api_method) => {
let auth_id = rpcenv.get_auth_id(); let auth_id = rpcenv.get_auth_id();
let user_info = CachedUserInfo::new()?;
if !check_api_permission( if !check_api_permission(
api_method.access.permission, api_method.access.permission,
auth_id.as_deref(), auth_id.as_deref(),
@ -779,8 +785,9 @@ async fn handle_request(
if comp_len == 0 { if comp_len == 0 {
let language = extract_lang_header(&parts.headers); let language = extract_lang_header(&parts.headers);
match auth.check_auth(&parts.headers, &method, &user_info) { match auth.check_auth(&parts.headers, &method) {
Ok(auth_id) => { Ok(auth_id) => {
let auth_id: Authid = auth_id.parse()?;
if !auth_id.is_token() { if !auth_id.is_token() {
let userid = auth_id.user(); let userid = auth_id.user();
let new_csrf_token = assemble_csrf_prevention_token(csrf_secret(), userid); let new_csrf_token = assemble_csrf_prevention_token(csrf_secret(), userid);

View File

@ -20,12 +20,10 @@ use pbs_buildcfg;
use pbs_tools::logrotate::{LogRotate, LogRotateFiles}; use pbs_tools::logrotate::{LogRotate, LogRotateFiles};
use pbs_api_types::{Authid, TaskStateType, UPID}; use pbs_api_types::{Authid, TaskStateType, UPID};
use pbs_config::{open_backup_lockfile, BackupLockGuard}; use pbs_config::{open_backup_lockfile, BackupLockGuard};
use proxmox_rest_server::{CommandoSocket, FileLogger, FileLogOptions};
use super::UPIDExt; use super::UPIDExt;
use crate::server;
use crate::tools::{FileLogger, FileLogOptions};
macro_rules! taskdir { macro_rules! taskdir {
($subdir:expr) => (concat!(pbs_buildcfg::PROXMOX_BACKUP_LOG_DIR_M!(), "/tasks", $subdir)) ($subdir:expr) => (concat!(pbs_buildcfg::PROXMOX_BACKUP_LOG_DIR_M!(), "/tasks", $subdir))
} }
@ -41,7 +39,7 @@ lazy_static! {
/// checks if the task UPID refers to a worker from this process /// checks if the task UPID refers to a worker from this process
fn is_local_worker(upid: &UPID) -> bool { fn is_local_worker(upid: &UPID) -> bool {
upid.pid == server::pid() && upid.pstart == server::pstart() upid.pid == crate::server::pid() && upid.pstart == crate::server::pstart()
} }
/// Test if the task is still running /// Test if the task is still running
@ -54,14 +52,14 @@ pub async fn worker_is_active(upid: &UPID) -> Result<bool, Error> {
return Ok(false); return Ok(false);
} }
let sock = server::ctrl_sock_from_pid(upid.pid); let sock = crate::server::ctrl_sock_from_pid(upid.pid);
let cmd = json!({ let cmd = json!({
"command": "worker-task-status", "command": "worker-task-status",
"args": { "args": {
"upid": upid.to_string(), "upid": upid.to_string(),
}, },
}); });
let status = super::send_command(sock, &cmd).await?; let status = proxmox_rest_server::send_command(sock, &cmd).await?;
if let Some(active) = status.as_bool() { if let Some(active) = status.as_bool() {
Ok(active) Ok(active)
@ -84,7 +82,7 @@ pub fn worker_is_active_local(upid: &UPID) -> bool {
} }
pub fn register_task_control_commands( pub fn register_task_control_commands(
commando_sock: &mut super::CommandoSocket, commando_sock: &mut CommandoSocket,
) -> Result<(), Error> { ) -> Result<(), Error> {
fn get_upid(args: Option<&Value>) -> Result<UPID, Error> { fn get_upid(args: Option<&Value>) -> Result<UPID, Error> {
let args = if let Some(args) = args { args } else { bail!("missing args") }; let args = if let Some(args) = args { args } else { bail!("missing args") };
@ -128,14 +126,14 @@ pub fn abort_worker_async(upid: UPID) {
pub async fn abort_worker(upid: UPID) -> Result<(), Error> { pub async fn abort_worker(upid: UPID) -> Result<(), Error> {
let sock = server::ctrl_sock_from_pid(upid.pid); let sock = crate::server::ctrl_sock_from_pid(upid.pid);
let cmd = json!({ let cmd = json!({
"command": "worker-task-abort", "command": "worker-task-abort",
"args": { "args": {
"upid": upid.to_string(), "upid": upid.to_string(),
}, },
}); });
super::send_command(sock, &cmd).map_ok(|_| ()).await proxmox_rest_server::send_command(sock, &cmd).map_ok(|_| ()).await
} }
fn parse_worker_status_line(line: &str) -> Result<(String, UPID, Option<TaskState>), Error> { fn parse_worker_status_line(line: &str) -> Result<(String, UPID, Option<TaskState>), Error> {
@ -579,7 +577,6 @@ impl Iterator for TaskListInfoIterator {
/// task/future. Each task can `log()` messages, which are stored /// task/future. Each task can `log()` messages, which are stored
/// persistently to files. Task should poll the `abort_requested` /// persistently to files. Task should poll the `abort_requested`
/// flag, and stop execution when requested. /// flag, and stop execution when requested.
#[derive(Debug)]
pub struct WorkerTask { pub struct WorkerTask {
upid: UPID, upid: UPID,
data: Mutex<WorkerTaskData>, data: Mutex<WorkerTaskData>,
@ -593,7 +590,6 @@ impl std::fmt::Display for WorkerTask {
} }
} }
#[derive(Debug)]
struct WorkerTaskData { struct WorkerTaskData {
logger: FileLogger, logger: FileLogger,
progress: f64, // 0..1 progress: f64, // 0..1
@ -642,7 +638,7 @@ impl WorkerTask {
{ {
let mut hash = WORKER_TASK_LIST.lock().unwrap(); let mut hash = WORKER_TASK_LIST.lock().unwrap();
hash.insert(task_id, worker.clone()); hash.insert(task_id, worker.clone());
super::set_worker_count(hash.len()); proxmox_rest_server::set_worker_count(hash.len());
} }
update_active_workers(Some(&upid))?; update_active_workers(Some(&upid))?;
@ -729,7 +725,7 @@ impl WorkerTask {
WORKER_TASK_LIST.lock().unwrap().remove(&self.upid.task_id); WORKER_TASK_LIST.lock().unwrap().remove(&self.upid.task_id);
let _ = update_active_workers(None); let _ = update_active_workers(None);
super::set_worker_count(WORKER_TASK_LIST.lock().unwrap().len()); proxmox_rest_server::set_worker_count(WORKER_TASK_LIST.lock().unwrap().len());
} }
/// Log a message. /// Log a message.

View File

@ -16,7 +16,6 @@ use futures::future::{self, Either};
use proxmox::tools::io::{ReadExt, WriteExt}; use proxmox::tools::io::{ReadExt, WriteExt};
use crate::server;
use crate::tools::{fd_change_cloexec, self}; use crate::tools::{fd_change_cloexec, self};
#[link(name = "systemd")] #[link(name = "systemd")]
@ -274,11 +273,11 @@ where
).await?; ).await?;
let server_future = create_service(listener, NotifyReady)?; let server_future = create_service(listener, NotifyReady)?;
let shutdown_future = server::shutdown_future(); let shutdown_future = proxmox_rest_server::shutdown_future();
let finish_future = match future::select(server_future, shutdown_future).await { let finish_future = match future::select(server_future, shutdown_future).await {
Either::Left((_, _)) => { Either::Left((_, _)) => {
crate::tools::request_shutdown(); // make sure we are in shutdown mode proxmox_rest_server::request_shutdown(); // make sure we are in shutdown mode
None None
} }
Either::Right((_, server_future)) => Some(server_future), Either::Right((_, server_future)) => Some(server_future),
@ -286,7 +285,7 @@ where
let mut reloader = Some(reloader); let mut reloader = Some(reloader);
if server::is_reload_request() { if proxmox_rest_server::is_reload_request() {
log::info!("daemon reload..."); log::info!("daemon reload...");
if let Err(e) = systemd_notify(SystemdNotify::Reloading) { if let Err(e) = systemd_notify(SystemdNotify::Reloading) {
log::error!("failed to notify systemd about the state change: {}", e); log::error!("failed to notify systemd about the state change: {}", e);
@ -305,7 +304,7 @@ where
} }
// FIXME: this is a hack, replace with sd_notify_barrier when available // FIXME: this is a hack, replace with sd_notify_barrier when available
if server::is_reload_request() { if proxmox_rest_server::is_reload_request() {
wait_service_is_not_state(service_name, "reloading").await?; wait_service_is_not_state(service_name, "reloading").await?;
} }

View File

@ -31,9 +31,6 @@ pub mod ticket;
pub mod parallel_handler; pub mod parallel_handler;
pub use parallel_handler::ParallelHandler; pub use parallel_handler::ParallelHandler;
mod file_logger;
pub use file_logger::{FileLogger, FileLogOptions};
/// Shortcut for md5 sums. /// Shortcut for md5 sums.
pub fn md5sum(data: &[u8]) -> Result<DigestBytes, Error> { pub fn md5sum(data: &[u8]) -> Result<DigestBytes, Error> {
hash(MessageDigest::md5(), data).map_err(Error::from) hash(MessageDigest::md5(), data).map_err(Error::from)
@ -123,27 +120,6 @@ pub fn fd_change_cloexec(fd: RawFd, on: bool) -> Result<(), Error> {
Ok(()) Ok(())
} }
static mut SHUTDOWN_REQUESTED: bool = false;
pub fn request_shutdown() {
unsafe {
SHUTDOWN_REQUESTED = true;
}
crate::server::server_shutdown();
}
#[inline(always)]
pub fn shutdown_requested() -> bool {
unsafe { SHUTDOWN_REQUESTED }
}
pub fn fail_on_shutdown() -> Result<(), Error> {
if shutdown_requested() {
bail!("Server shutdown requested - aborting task");
}
Ok(())
}
/// safe wrapper for `nix::sys::socket::socketpair` defaulting to `O_CLOEXEC` and guarding the file /// safe wrapper for `nix::sys::socket::socketpair` defaulting to `O_CLOEXEC` and guarding the file
/// descriptors. /// descriptors.
pub fn socketpair() -> Result<(Fd, Fd), Error> { pub fn socketpair() -> Result<(Fd, Fd), Error> {

View File

@ -1,6 +1,5 @@
use anyhow::{bail, Error}; use anyhow::{bail, Error};
#[macro_use]
extern crate proxmox_backup; extern crate proxmox_backup;
extern crate tokio; extern crate tokio;
@ -10,8 +9,8 @@ use proxmox::try_block;
use pbs_api_types::{Authid, UPID}; use pbs_api_types::{Authid, UPID};
use proxmox_rest_server::{flog, CommandoSocket};
use proxmox_backup::server; use proxmox_backup::server;
use proxmox_backup::tools;
fn garbage_collection(worker: &server::WorkerTask) -> Result<(), Error> { fn garbage_collection(worker: &server::WorkerTask) -> Result<(), Error> {
@ -45,11 +44,11 @@ fn worker_task_abort() -> Result<(), Error> {
let rt = tokio::runtime::Runtime::new().unwrap(); let rt = tokio::runtime::Runtime::new().unwrap();
rt.block_on(async move { rt.block_on(async move {
let mut commando_sock = server::CommandoSocket::new(server::our_ctrl_sock()); let mut commando_sock = CommandoSocket::new(server::our_ctrl_sock(), nix::unistd::Gid::current());
let init_result: Result<(), Error> = try_block!({ let init_result: Result<(), Error> = try_block!({
server::register_task_control_commands(&mut commando_sock)?; server::register_task_control_commands(&mut commando_sock)?;
server::server_state_init()?; proxmox_rest_server::server_state_init()?;
Ok(()) Ok(())
}); });
@ -73,7 +72,7 @@ fn worker_task_abort() -> Result<(), Error> {
println!("WORKER {}", worker); println!("WORKER {}", worker);
let result = garbage_collection(&worker); let result = garbage_collection(&worker);
tools::request_shutdown(); proxmox_rest_server::request_shutdown();
if let Err(err) = result { if let Err(err) = result {
println!("got expected error: {}", err); println!("got expected error: {}", err);