use std::convert::TryFrom; use std::fmt; use std::os::unix::io::RawFd; use std::path::PathBuf; use std::sync::Arc; use anyhow::{bail, format_err, Error}; use proxmox_sys::fs::{lock_dir_noblock, replace_file, CreateOptions}; use pbs_api_types::{ Authid, BackupNamespace, BackupType, GroupFilter, BACKUP_DATE_REGEX, BACKUP_FILE_REGEX, }; use pbs_config::{open_backup_lockfile, BackupLockGuard}; use crate::manifest::{ BackupManifest, CLIENT_LOG_BLOB_NAME, MANIFEST_BLOB_NAME, MANIFEST_LOCK_NAME, }; use crate::{DataBlob, DataStore}; /// BackupGroup is a directory containing a list of BackupDir #[derive(Clone)] pub struct BackupGroup { store: Arc, ns: BackupNamespace, group: pbs_api_types::BackupGroup, } impl fmt::Debug for BackupGroup { fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { f.debug_struct("BackupGroup") .field("store", &self.store.name()) .field("group", &self.group) .finish() } } impl BackupGroup { pub(crate) fn new( store: Arc, ns: BackupNamespace, group: pbs_api_types::BackupGroup, ) -> Self { Self { store, ns, group } } /// Access the underlying [`BackupGroup`](pbs_api_types::BackupGroup). #[inline] pub fn group(&self) -> &pbs_api_types::BackupGroup { &self.group } #[inline] pub fn backup_ns(&self) -> &BackupNamespace { &self.ns } #[inline] pub fn backup_type(&self) -> BackupType { self.group.ty } #[inline] pub fn backup_id(&self) -> &str { &self.group.id } pub fn full_group_path(&self) -> PathBuf { self.store.group_path(&self.ns, &self.group) } pub fn relative_group_path(&self) -> PathBuf { let mut path = self.store.namespace_path(&self.ns); path.push(self.group.ty.as_str()); path.push(&self.group.id); path } pub fn list_backups(&self) -> Result, Error> { let mut list = vec![]; let path = self.full_group_path(); proxmox_sys::fs::scandir( libc::AT_FDCWD, &path, &BACKUP_DATE_REGEX, |l2_fd, backup_time, file_type| { if file_type != nix::dir::Type::Directory { return Ok(()); } let backup_dir = self.backup_dir_with_rfc3339(backup_time)?; let files = list_backup_files(l2_fd, backup_time)?; let protected = backup_dir.is_protected(); list.push(BackupInfo { backup_dir, files, protected, }); Ok(()) }, )?; Ok(list) } /// Finds the latest backup inside a backup group pub fn last_backup(&self, only_finished: bool) -> Result, Error> { let backups = self.list_backups()?; Ok(backups .into_iter() .filter(|item| !only_finished || item.is_finished()) .max_by_key(|item| item.backup_dir.backup_time())) } pub fn last_successful_backup(&self) -> Result, Error> { let mut last = None; let path = self.full_group_path(); proxmox_sys::fs::scandir( libc::AT_FDCWD, &path, &BACKUP_DATE_REGEX, |l2_fd, backup_time, file_type| { if file_type != nix::dir::Type::Directory { return Ok(()); } let mut manifest_path = PathBuf::from(backup_time); manifest_path.push(MANIFEST_BLOB_NAME); use nix::fcntl::{openat, OFlag}; match openat( l2_fd, &manifest_path, OFlag::O_RDONLY, nix::sys::stat::Mode::empty(), ) { Ok(rawfd) => { /* manifest exists --> assume backup was successful */ /* close else this leaks! */ nix::unistd::close(rawfd)?; } Err(nix::Error::Sys(nix::errno::Errno::ENOENT)) => { return Ok(()); } Err(err) => { bail!("last_successful_backup: unexpected error - {}", err); } } let timestamp = proxmox_time::parse_rfc3339(backup_time)?; if let Some(last_timestamp) = last { if timestamp > last_timestamp { last = Some(timestamp); } } else { last = Some(timestamp); } Ok(()) }, )?; Ok(last) } pub fn matches(&self, filter: &GroupFilter) -> bool { self.group.matches(filter) } pub fn backup_dir(&self, time: i64) -> Result { BackupDir::with_group(self.clone(), time) } pub fn backup_dir_with_rfc3339>( &self, time_string: T, ) -> Result { BackupDir::with_rfc3339(self.clone(), time_string.into()) } pub fn iter_snapshots(&self) -> Result { crate::ListSnapshots::new(self.clone()) } /// Destroy the group inclusive all its backup snapshots (BackupDir's) /// /// Returns true if all snapshots were removed, and false if some were protected pub fn destroy(&self) -> Result { let path = self.full_group_path(); let _guard = proxmox_sys::fs::lock_dir_noblock(&path, "backup group", "possible running backup")?; log::info!("removing backup group {:?}", path); let mut removed_all_snaps = true; for snap in self.iter_snapshots()? { let snap = snap?; if snap.is_protected() { removed_all_snaps = false; continue; } snap.destroy(false)?; } if removed_all_snaps { std::fs::remove_dir_all(&path).map_err(|err| { format_err!("removing group directory {:?} failed - {}", path, err) })?; } Ok(removed_all_snaps) } /// Returns the backup owner. /// /// The backup owner is the entity who first created the backup group. pub fn get_owner(&self) -> Result { self.store.get_owner(&self.ns, self.as_ref()) } /// Set the backup owner. pub fn set_owner(&self, auth_id: &Authid, force: bool) -> Result<(), Error> { self.store .set_owner(&self.ns, &self.as_ref(), auth_id, force) } } impl AsRef for BackupGroup { #[inline] fn as_ref(&self) -> &pbs_api_types::BackupNamespace { &self.ns } } impl AsRef for BackupGroup { #[inline] fn as_ref(&self) -> &pbs_api_types::BackupGroup { &self.group } } impl From<&BackupGroup> for pbs_api_types::BackupGroup { fn from(group: &BackupGroup) -> pbs_api_types::BackupGroup { group.group.clone() } } impl From for pbs_api_types::BackupGroup { fn from(group: BackupGroup) -> pbs_api_types::BackupGroup { group.group } } impl fmt::Display for BackupGroup { #[inline] fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { if self.ns.is_root() { fmt::Display::fmt(&self.group, f) } else { write!(f, "[{}]:{}", self.ns, self.group) } } } impl From for BackupGroup { fn from(dir: BackupDir) -> BackupGroup { BackupGroup { store: dir.store, ns: dir.ns, group: dir.dir.group, } } } impl From<&BackupDir> for BackupGroup { fn from(dir: &BackupDir) -> BackupGroup { BackupGroup { store: Arc::clone(&dir.store), ns: dir.ns.clone(), group: dir.dir.group.clone(), } } } /// Uniquely identify a Backup (relative to data store) /// /// We also call this a backup snaphost. #[derive(Clone)] pub struct BackupDir { store: Arc, ns: BackupNamespace, dir: pbs_api_types::BackupDir, // backup_time as rfc3339 backup_time_string: String, } impl fmt::Debug for BackupDir { fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result { f.debug_struct("BackupDir") .field("store", &self.store.name()) .field("dir", &self.dir) .field("backup_time_string", &self.backup_time_string) .finish() } } impl BackupDir { /// Temporarily used for tests. #[doc(hidden)] pub fn new_test(dir: pbs_api_types::BackupDir) -> Self { Self { store: unsafe { DataStore::new_test() }, backup_time_string: Self::backup_time_to_string(dir.time).unwrap(), ns: BackupNamespace::root(), dir, } } pub(crate) fn with_group(group: BackupGroup, backup_time: i64) -> Result { let backup_time_string = Self::backup_time_to_string(backup_time)?; Ok(Self { store: group.store, ns: group.ns, dir: (group.group, backup_time).into(), backup_time_string, }) } pub(crate) fn with_rfc3339( group: BackupGroup, backup_time_string: String, ) -> Result { let backup_time = proxmox_time::parse_rfc3339(&backup_time_string)?; Ok(Self { store: group.store, ns: group.ns, dir: (group.group, backup_time).into(), backup_time_string, }) } #[inline] pub fn backup_ns(&self) -> &BackupNamespace { &self.ns } #[inline] pub fn backup_type(&self) -> BackupType { self.dir.group.ty } #[inline] pub fn backup_id(&self) -> &str { &self.dir.group.id } #[inline] pub fn backup_time(&self) -> i64 { self.dir.time } pub fn backup_time_string(&self) -> &str { &self.backup_time_string } pub fn relative_path(&self) -> PathBuf { let mut path = self.ns.path(); path.push(self.dir.group.ty.as_str()); path.push(&self.dir.group.id); path.push(&self.backup_time_string); path } /// Returns the absolute path for backup_dir, using the cached formatted time string. pub fn full_path(&self) -> PathBuf { self.store.snapshot_path(&self.ns, &self.dir) } pub fn protected_file(&self) -> PathBuf { let mut path = self.full_path(); path.push(".protected"); path } pub fn is_protected(&self) -> bool { let path = self.protected_file(); path.exists() } pub fn backup_time_to_string(backup_time: i64) -> Result { // fixme: can this fail? (avoid unwrap) proxmox_time::epoch_to_rfc3339_utc(backup_time) } /// load a `DataBlob` from this snapshot's backup dir. pub fn load_blob(&self, filename: &str) -> Result { let mut path = self.full_path(); path.push(filename); proxmox_lang::try_block!({ let mut file = std::fs::File::open(&path)?; DataBlob::load_from_reader(&mut file) }) .map_err(|err| format_err!("unable to load blob '{:?}' - {}", path, err)) } /// Returns the filename to lock a manifest /// /// Also creates the basedir. The lockfile is located in /// '/run/proxmox-backup/locks/{datastore}/{type}/{id}/{timestamp}.index.json.lck' fn manifest_lock_path(&self) -> Result { let mut path = format!("/run/proxmox-backup/locks/{}/{self}", self.store.name()); std::fs::create_dir_all(&path)?; use std::fmt::Write; let ts = self.backup_time_string(); write!(path, "/{ts}{}", &MANIFEST_LOCK_NAME)?; Ok(path) } /// Locks the manifest of a snapshot, for example, to update or delete it. pub(crate) fn lock_manifest(&self) -> Result { let path = self.manifest_lock_path()?; // actions locking the manifest should be relatively short, only wait a few seconds open_backup_lockfile(&path, Some(std::time::Duration::from_secs(5)), true) .map_err(|err| format_err!("unable to acquire manifest lock {:?} - {}", &path, err)) } /// Destroy the whole snapshot, bails if it's protected /// /// Setting `force` to true skips locking and thus ignores if the backup is currently in use. pub fn destroy(&self, force: bool) -> Result<(), Error> { let full_path = self.full_path(); let (_guard, _manifest_guard); if !force { _guard = lock_dir_noblock(&full_path, "snapshot", "possibly running or in use")?; _manifest_guard = self.lock_manifest()?; } if self.is_protected() { bail!("cannot remove protected snapshot"); // use special error type? } log::info!("removing backup snapshot {:?}", full_path); std::fs::remove_dir_all(&full_path).map_err(|err| { format_err!("removing backup snapshot {:?} failed - {}", full_path, err,) })?; // the manifest doesn't exist anymore, no need to keep the lock (already done by guard?) if let Ok(path) = self.manifest_lock_path() { let _ = std::fs::remove_file(path); // ignore errors } Ok(()) } /// Get the datastore. pub fn datastore(&self) -> &Arc { &self.store } /// Returns the backup owner. /// /// The backup owner is the entity who first created the backup group. pub fn get_owner(&self) -> Result { self.store.get_owner(&self.ns, self.as_ref()) } /// Lock the snapshot and open a reader. pub fn locked_reader(&self) -> Result { crate::SnapshotReader::new_do(self.clone()) } /// Load the manifest without a lock. Must not be written back. pub fn load_manifest(&self) -> Result<(BackupManifest, u64), Error> { let blob = self.load_blob(MANIFEST_BLOB_NAME)?; let raw_size = blob.raw_size(); let manifest = BackupManifest::try_from(blob)?; Ok((manifest, raw_size)) } /// Update the manifest of the specified snapshot. Never write a manifest directly, /// only use this method - anything else may break locking guarantees. pub fn update_manifest( &self, update_fn: impl FnOnce(&mut BackupManifest), ) -> Result<(), Error> { let _guard = self.lock_manifest()?; let (mut manifest, _) = self.load_manifest()?; update_fn(&mut manifest); let manifest = serde_json::to_value(manifest)?; let manifest = serde_json::to_string_pretty(&manifest)?; let blob = DataBlob::encode(manifest.as_bytes(), None, true)?; let raw_data = blob.raw_data(); let mut path = self.full_path(); path.push(MANIFEST_BLOB_NAME); // atomic replace invalidates flock - no other writes past this point! replace_file(&path, raw_data, CreateOptions::new(), false)?; Ok(()) } /// Cleans up the backup directory by removing any file not mentioned in the manifest. pub fn cleanup_unreferenced_files(&self, manifest: &BackupManifest) -> Result<(), Error> { let full_path = self.full_path(); let mut wanted_files = std::collections::HashSet::new(); wanted_files.insert(MANIFEST_BLOB_NAME.to_string()); wanted_files.insert(CLIENT_LOG_BLOB_NAME.to_string()); manifest.files().iter().for_each(|item| { wanted_files.insert(item.filename.clone()); }); for item in proxmox_sys::fs::read_subdir(libc::AT_FDCWD, &full_path)?.flatten() { if let Some(file_type) = item.file_type() { if file_type != nix::dir::Type::File { continue; } } let file_name = item.file_name().to_bytes(); if file_name == b"." || file_name == b".." { continue; }; if let Ok(name) = std::str::from_utf8(file_name) { if wanted_files.contains(name) { continue; } } println!("remove unused file {:?}", item.file_name()); let dirfd = item.parent_fd(); let _res = unsafe { libc::unlinkat(dirfd, item.file_name().as_ptr(), 0) }; } Ok(()) } } impl AsRef for BackupDir { fn as_ref(&self) -> &pbs_api_types::BackupNamespace { &self.ns } } impl AsRef for BackupDir { fn as_ref(&self) -> &pbs_api_types::BackupDir { &self.dir } } impl AsRef for BackupDir { fn as_ref(&self) -> &pbs_api_types::BackupGroup { &self.dir.group } } impl From<&BackupDir> for pbs_api_types::BackupGroup { fn from(dir: &BackupDir) -> pbs_api_types::BackupGroup { dir.dir.group.clone() } } impl From for pbs_api_types::BackupGroup { fn from(dir: BackupDir) -> pbs_api_types::BackupGroup { dir.dir.group.into() } } impl From<&BackupDir> for pbs_api_types::BackupDir { fn from(dir: &BackupDir) -> pbs_api_types::BackupDir { dir.dir.clone() } } impl From for pbs_api_types::BackupDir { fn from(dir: BackupDir) -> pbs_api_types::BackupDir { dir.dir } } impl fmt::Display for BackupDir { fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result { if self.ns.is_root() { write!(f, "{}/{}", self.dir.group, self.backup_time_string) } else { write!( f, "[{}]:{}/{}", self.ns, self.dir.group, self.backup_time_string ) } } } /// Detailed Backup Information, lists files inside a BackupDir #[derive(Clone, Debug)] pub struct BackupInfo { /// the backup directory pub backup_dir: BackupDir, /// List of data files pub files: Vec, /// Protection Status pub protected: bool, } impl BackupInfo { pub fn new(backup_dir: BackupDir) -> Result { let path = backup_dir.full_path(); let files = list_backup_files(libc::AT_FDCWD, &path)?; let protected = backup_dir.is_protected(); Ok(BackupInfo { backup_dir, files, protected, }) } pub fn sort_list(list: &mut Vec, ascendending: bool) { if ascendending { // oldest first list.sort_unstable_by(|a, b| a.backup_dir.dir.time.cmp(&b.backup_dir.dir.time)); } else { // newest first list.sort_unstable_by(|a, b| b.backup_dir.dir.time.cmp(&a.backup_dir.dir.time)); } } pub fn is_finished(&self) -> bool { // backup is considered unfinished if there is no manifest self.files.iter().any(|name| name == MANIFEST_BLOB_NAME) } } fn list_backup_files( dirfd: RawFd, path: &P, ) -> Result, Error> { let mut files = vec![]; proxmox_sys::fs::scandir(dirfd, path, &BACKUP_FILE_REGEX, |_, filename, file_type| { if file_type != nix::dir::Type::File { return Ok(()); } files.push(filename.to_owned()); Ok(()) })?; Ok(files) }