From: Christian Ebner <c.ebner@proxmox.com>
To: "Proxmox Backup Server development discussion"
<pbs-devel@lists.proxmox.com>,
"Fabian Grünbichler" <f.gruenbichler@proxmox.com>
Subject: Re: [pbs-devel] [PATCH v5 proxmox-backup 30/31] api: datastore/namespace: return backup groups delete stats on remove
Date: Wed, 30 Oct 2024 14:37:51 +0100 [thread overview]
Message-ID: <0226b9bf-a022-45c9-9d06-d1bd16b6d388@proxmox.com> (raw)
In-Reply-To: <1729847288.zar8jnzpdu.astroid@yuna.none>
On 10/25/24 12:10, Fabian Grünbichler wrote:
> On October 18, 2024 10:42 am, Christian Ebner wrote:
>> Add and expose the backup group delete statistics by adding the
>> return type to the corresponding REST API endpoints.
>>
>> Further, add a `ignore-protected` flag to the api endpoints, allowing
>> to return without error when set.
>
> logical changes look good to me, `ignore-protected` is just slightly
> confusing as a name - just reading that, I would think this removes the
> namespace/group even if something protected is found, not that it would
> make that "error" non-fatal.
>
> can't really think of a catchy alternative though, but wanted to mention
> it in case somebody else can ;)
Renamed this to `error-on-protected` and switched the boolean logic.
That should hopefully make it less susceptible to misinterpretation.
>
> we should probably switch the UI over to present the results now that we
> can?
Not sure I fully understood what you mean here, the remove vanished
stats are already exposed in the summary of the sync job.
>
>>
>> Signed-off-by: Christian Ebner <c.ebner@proxmox.com>
>> ---
>> changes since version 4:
>> - no changes
>>
>> changes since version 3:
>> - make new endpoint failure behaviour opt-in
>>
>> pbs-datastore/src/datastore.rs | 20 ++++++++++++++------
>> src/api2/admin/datastore.rs | 29 +++++++++++++++++++++--------
>> src/api2/admin/namespace.rs | 31 ++++++++++++++++++++++---------
>> src/server/pull.rs | 6 ++++--
>> 4 files changed, 61 insertions(+), 25 deletions(-)
>>
>> diff --git a/pbs-datastore/src/datastore.rs b/pbs-datastore/src/datastore.rs
>> index c8701d2dd..68c7f2934 100644
>> --- a/pbs-datastore/src/datastore.rs
>> +++ b/pbs-datastore/src/datastore.rs
>> @@ -489,16 +489,22 @@ impl DataStore {
>> ///
>> /// Does *not* descends into child-namespaces and doesn't remoes the namespace itself either.
>> ///
>> - /// Returns true if all the groups were removed, and false if some were protected.
>> - pub fn remove_namespace_groups(self: &Arc<Self>, ns: &BackupNamespace) -> Result<bool, Error> {
>> + /// Returns a tuple with the first item being true if all the groups were removed, and false if some were protected.
>> + /// The second item returns the remove statistics.
>> + pub fn remove_namespace_groups(
>> + self: &Arc<Self>,
>> + ns: &BackupNamespace,
>> + ) -> Result<(bool, BackupGroupDeleteStats), Error> {
>> // FIXME: locking? The single groups/snapshots are already protected, so may not be
>> // necessary (depends on what we all allow to do with namespaces)
>> log::info!("removing all groups in namespace {}:/{ns}", self.name());
>>
>> let mut removed_all_groups = true;
>> + let mut stats = BackupGroupDeleteStats::default();
>>
>> for group in self.iter_backup_groups(ns.to_owned())? {
>> let delete_stats = group?.destroy()?;
>> + stats.add(&delete_stats);
>> removed_all_groups = removed_all_groups && delete_stats.all_removed();
>> }
>>
>> @@ -515,7 +521,7 @@ impl DataStore {
>> }
>> }
>>
>> - Ok(removed_all_groups)
>> + Ok((removed_all_groups, stats))
>> }
>>
>> /// Remove a complete backup namespace optionally including all it's, and child namespaces',
>> @@ -527,13 +533,15 @@ impl DataStore {
>> self: &Arc<Self>,
>> ns: &BackupNamespace,
>> delete_groups: bool,
>> - ) -> Result<bool, Error> {
>> + ) -> Result<(bool, BackupGroupDeleteStats), Error> {
>> let store = self.name();
>> let mut removed_all_requested = true;
>> + let mut stats = BackupGroupDeleteStats::default();
>> if delete_groups {
>> log::info!("removing whole namespace recursively below {store}:/{ns}",);
>> for ns in self.recursive_iter_backup_ns(ns.to_owned())? {
>> - let removed_ns_groups = self.remove_namespace_groups(&ns?)?;
>> + let (removed_ns_groups, delete_stats) = self.remove_namespace_groups(&ns?)?;
>> + stats.add(&delete_stats);
>> removed_all_requested = removed_all_requested && removed_ns_groups;
>> }
>> } else {
>> @@ -574,7 +582,7 @@ impl DataStore {
>> }
>> }
>>
>> - Ok(removed_all_requested)
>> + Ok((removed_all_requested, stats))
>> }
>>
>> /// Remove a complete backup group including all snapshots.
>> diff --git a/src/api2/admin/datastore.rs b/src/api2/admin/datastore.rs
>> index 7660dd7f6..81f81b2b3 100644
>> --- a/src/api2/admin/datastore.rs
>> +++ b/src/api2/admin/datastore.rs
>> @@ -34,10 +34,10 @@ use pxar::accessor::aio::Accessor;
>> use pxar::EntryKind;
>>
>> use pbs_api_types::{
>> - print_ns_and_snapshot, print_store_and_ns, Authid, BackupContent, BackupNamespace, BackupType,
>> - Counts, CryptMode, DataStoreConfig, DataStoreListItem, DataStoreStatus,
>> - GarbageCollectionJobStatus, GroupListItem, JobScheduleStatus, KeepOptions, Operation,
>> - PruneJobOptions, SnapshotListItem, SnapshotVerifyState, BACKUP_ARCHIVE_NAME_SCHEMA,
>> + print_ns_and_snapshot, print_store_and_ns, Authid, BackupContent, BackupGroupDeleteStats,
>> + BackupNamespace, BackupType, Counts, CryptMode, DataStoreConfig, DataStoreListItem,
>> + DataStoreStatus, GarbageCollectionJobStatus, GroupListItem, JobScheduleStatus, KeepOptions,
>> + Operation, PruneJobOptions, SnapshotListItem, SnapshotVerifyState, BACKUP_ARCHIVE_NAME_SCHEMA,
>> BACKUP_ID_SCHEMA, BACKUP_NAMESPACE_SCHEMA, BACKUP_TIME_SCHEMA, BACKUP_TYPE_SCHEMA,
>> DATASTORE_SCHEMA, IGNORE_VERIFIED_BACKUPS_SCHEMA, MAX_NAMESPACE_DEPTH, NS_MAX_DEPTH_SCHEMA,
>> PRIV_DATASTORE_AUDIT, PRIV_DATASTORE_BACKUP, PRIV_DATASTORE_MODIFY, PRIV_DATASTORE_PRUNE,
>> @@ -267,8 +267,17 @@ pub fn list_groups(
>> type: pbs_api_types::BackupGroup,
>> flatten: true,
>> },
>> + "ignore-protected": {
>> + type: bool,
>> + optional: true,
>> + default: false,
>> + description: "No error when group cannot be deleted because of protected snapshots",
>> + }
>> },
>> },
>> + returns: {
>> + type: BackupGroupDeleteStats,
>> + },
>> access: {
>> permission: &Permission::Anybody,
>> description: "Requires on /datastore/{store}[/{namespace}] either DATASTORE_MODIFY for any \
>> @@ -279,9 +288,10 @@ pub fn list_groups(
>> pub async fn delete_group(
>> store: String,
>> ns: Option<BackupNamespace>,
>> + ignore_protected: bool,
>> group: pbs_api_types::BackupGroup,
>> rpcenv: &mut dyn RpcEnvironment,
>> -) -> Result<Value, Error> {
>> +) -> Result<BackupGroupDeleteStats, Error> {
>> let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
>>
>> tokio::task::spawn_blocking(move || {
>> @@ -299,10 +309,13 @@ pub async fn delete_group(
>>
>> let delete_stats = datastore.remove_backup_group(&ns, &group)?;
>> if !delete_stats.all_removed() {
>> - bail!("group only partially deleted due to protected snapshots");
>> + if ignore_protected {
>> + warn!("group only partially deleted due to protected snapshots");
>> + } else {
>> + bail!("group only partially deleted due to protected snapshots");
>> + }
>> }
>> -
>> - Ok(Value::Null)
>> + Ok(delete_stats)
>> })
>> .await?
>> }
>> diff --git a/src/api2/admin/namespace.rs b/src/api2/admin/namespace.rs
>> index 889dc1a3d..8f99eb401 100644
>> --- a/src/api2/admin/namespace.rs
>> +++ b/src/api2/admin/namespace.rs
>> @@ -1,13 +1,12 @@
>> use anyhow::{bail, Error};
>> -use serde_json::Value;
>>
>> use pbs_config::CachedUserInfo;
>> use proxmox_router::{http_bail, ApiMethod, Permission, Router, RpcEnvironment};
>> use proxmox_schema::*;
>>
>> use pbs_api_types::{
>> - Authid, BackupNamespace, NamespaceListItem, Operation, DATASTORE_SCHEMA, NS_MAX_DEPTH_SCHEMA,
>> - PROXMOX_SAFE_ID_FORMAT,
>> + Authid, BackupGroupDeleteStats, BackupNamespace, NamespaceListItem, Operation,
>> + DATASTORE_SCHEMA, NS_MAX_DEPTH_SCHEMA, PROXMOX_SAFE_ID_FORMAT,
>> };
>>
>> use pbs_datastore::DataStore;
>> @@ -138,6 +137,12 @@ pub fn list_namespaces(
>> optional: true,
>> default: false,
>> },
>> + "ignore-protected": {
>> + type: bool,
>> + optional: true,
>> + default: false,
>> + description: "No error when namespace cannot be deleted because of protected snapshots",
>> + }
>> },
>> },
>> access: {
>> @@ -149,24 +154,32 @@ pub fn delete_namespace(
>> store: String,
>> ns: BackupNamespace,
>> delete_groups: bool,
>> + ignore_protected: bool,
>> _info: &ApiMethod,
>> rpcenv: &mut dyn RpcEnvironment,
>> -) -> Result<Value, Error> {
>> +) -> Result<BackupGroupDeleteStats, Error> {
>> let auth_id: Authid = rpcenv.get_auth_id().unwrap().parse()?;
>>
>> check_ns_modification_privs(&store, &ns, &auth_id)?;
>>
>> let datastore = DataStore::lookup_datastore(&store, Some(Operation::Write))?;
>>
>> - if !datastore.remove_namespace_recursive(&ns, delete_groups)? {
>> - if delete_groups {
>> - bail!("group only partially deleted due to protected snapshots");
>> + let (removed_all, stats) = datastore.remove_namespace_recursive(&ns, delete_groups)?;
>> + if !removed_all {
>> + let err_msg = if delete_groups {
>> + "group only partially deleted due to protected snapshots"
>> + } else {
>> + "only partially deleted due to existing groups but `delete-groups` not true"
>> + };
>> +
>> + if ignore_protected {
>> + log::warn!("{err_msg}");
>> } else {
>> - bail!("only partially deleted due to existing groups but `delete-groups` not true ");
>> + bail!(err_msg);
>> }
>> }
>>
>> - Ok(Value::Null)
>> + Ok(stats)
>> }
>>
>> pub const ROUTER: Router = Router::new()
>> diff --git a/src/server/pull.rs b/src/server/pull.rs
>> index 3117f7d2c..d7f5c42ea 100644
>> --- a/src/server/pull.rs
>> +++ b/src/server/pull.rs
>> @@ -645,10 +645,12 @@ fn check_and_remove_ns(params: &PullParameters, local_ns: &BackupNamespace) -> R
>> check_ns_modification_privs(params.target.store.name(), local_ns, ¶ms.owner)
>> .map_err(|err| format_err!("Removing {local_ns} not allowed - {err}"))?;
>>
>> - params
>> + let (removed_all, _delete_stats) = params
>> .target
>> .store
>> - .remove_namespace_recursive(local_ns, true)
>> + .remove_namespace_recursive(local_ns, true)?;
>> +
>> + Ok(removed_all)
>> }
>>
>> fn check_and_remove_vanished_ns(
>> --
>> 2.39.5
>>
>>
>>
>> _______________________________________________
>> pbs-devel mailing list
>> pbs-devel@lists.proxmox.com
>> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
>>
>>
>>
>
>
> _______________________________________________
> pbs-devel mailing list
> pbs-devel@lists.proxmox.com
> https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
>
>
_______________________________________________
pbs-devel mailing list
pbs-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pbs-devel
next prev parent reply other threads:[~2024-10-30 13:38 UTC|newest]
Thread overview: 68+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-10-18 8:42 [pbs-devel] [PATCH v5 proxmox-backup 00/31] fix #3044: push datastore to remote target Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 01/31] client: backup writer: refactor backup and upload stats counters Christian Ebner
2024-10-25 10:20 ` Fabian Grünbichler
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 02/31] client: backup writer: factor out merged chunk stream upload Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 03/31] client: backup writer: allow push uploading index and chunks Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 04/31] config: acl: refactor acl path component check for datastore Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 05/31] config: acl: allow namespace components for remote datastores Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 06/31] api types: implement remote acl path method for sync job Christian Ebner
2024-10-25 11:44 ` Fabian Grünbichler
2024-10-25 12:46 ` Christian Ebner
2024-10-28 11:04 ` Fabian Grünbichler
2024-10-28 15:13 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 07/31] api types: define remote permissions and roles for push sync Christian Ebner
2024-10-25 10:15 ` Fabian Grünbichler
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 08/31] fix #3044: server: implement push support for sync operations Christian Ebner
2024-10-25 10:10 ` Fabian Grünbichler
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 09/31] api types/config: add `sync-push` config type for push sync jobs Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 10/31] api: push: implement endpoint for sync in push direction Christian Ebner
2024-10-25 11:45 ` Fabian Grünbichler
2024-10-30 13:48 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 11/31] api: sync: move sync job invocation to server sync module Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 12/31] api: sync jobs: expose optional `sync-direction` parameter Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 13/31] api: admin: avoid duplicate name for list sync jobs api method Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 14/31] api: config: Require PRIV_DATASTORE_AUDIT to modify sync job Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 15/31] api: config: factor out sync job owner check Christian Ebner
2024-10-25 10:16 ` Fabian Grünbichler
2024-10-28 15:17 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 16/31] api: config: extend read access check by sync direction Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 17/31] api: config: extend modify " Christian Ebner
2024-10-25 10:17 ` Fabian Grünbichler
2024-10-25 13:24 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 18/31] bin: manager: add datastore push cli command Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 19/31] ui: group filter: allow to set namespace for local datastore Christian Ebner
2024-10-25 10:32 ` Dominik Csapak
2024-10-28 15:37 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 20/31] ui: sync edit: source group filters based on sync direction Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 21/31] ui: add view with separate grids for pull and push sync jobs Christian Ebner
2024-10-25 10:39 ` Dominik Csapak
2024-10-28 15:52 ` Christian Ebner
2024-10-29 6:22 ` Dominik Csapak
2024-10-29 7:26 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 22/31] ui: sync job: adapt edit window to be used for pull and push Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 23/31] ui: sync: pass sync-direction to allow removing push jobs Christian Ebner
2024-10-25 10:42 ` Dominik Csapak
2024-10-30 13:23 ` Christian Ebner
2024-10-30 13:33 ` Fabian Grünbichler
2024-10-30 13:50 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 24/31] ui: sync view: do not use data model proxy for store Christian Ebner
2024-10-25 10:44 ` Dominik Csapak
2024-10-30 13:29 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 25/31] ui: sync view: set sync direction when invoking run task via api Christian Ebner
2024-10-25 10:44 ` Dominik Csapak
2024-10-30 13:30 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 26/31] datastore: move `BackupGroupDeleteStats` to api types Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 27/31] api types: implement api type for `BackupGroupDeleteStats` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 28/31] api/api-types: refactor api endpoint version, add api types Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 29/31] datastore: increment deleted group counter when removing group Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 30/31] api: datastore/namespace: return backup groups delete stats on remove Christian Ebner
2024-10-25 10:10 ` Fabian Grünbichler
2024-10-30 13:37 ` Christian Ebner [this message]
2024-10-30 13:42 ` Fabian Grünbichler
2024-10-31 9:43 ` Christian Ebner
2024-10-31 12:12 ` Fabian Grünbichler
2024-10-31 12:26 ` Christian Ebner
2024-10-18 8:42 ` [pbs-devel] [PATCH v5 proxmox-backup 31/31] server: sync job: use delete stats provided by the api Christian Ebner
2024-10-25 10:17 ` Fabian Grünbichler
2024-10-30 13:44 ` Christian Ebner
2024-10-31 12:20 ` [pbs-devel] [PATCH v5 proxmox-backup 00/31] fix #3044: push datastore to remote target Christian Ebner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=0226b9bf-a022-45c9-9d06-d1bd16b6d388@proxmox.com \
--to=c.ebner@proxmox.com \
--cc=f.gruenbichler@proxmox.com \
--cc=pbs-devel@lists.proxmox.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.
Service provided by Proxmox Server Solutions GmbH | Privacy | Legal