From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 1C54560287 for ; Wed, 7 Oct 2020 11:04:03 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id E383D2C8BD for ; Wed, 7 Oct 2020 11:03:32 +0200 (CEST) Received: from proxmox-new.maurer-it.com (proxmox-new.maurer-it.com [212.186.127.180]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id 0BC712C89F for ; Wed, 7 Oct 2020 11:03:32 +0200 (CEST) Received: from proxmox-new.maurer-it.com (localhost.localdomain [127.0.0.1]) by proxmox-new.maurer-it.com (Proxmox) with ESMTP id BDBEC45C18 for ; Wed, 7 Oct 2020 11:03:31 +0200 (CEST) From: Hannes Laimer To: pbs-devel@lists.proxmox.com Date: Wed, 7 Oct 2020 11:03:13 +0200 Message-Id: <20201007090324.42928-5-h.laimer@proxmox.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20201007090324.42928-1-h.laimer@proxmox.com> References: <20201007090324.42928-1-h.laimer@proxmox.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-SPAM-LEVEL: Spam detection results: 0 KAM_DMARC_STATUS 0.01 Test Rule for DKIM or SPF Failure with Strict Alignment RCVD_IN_DNSWL_MED -2.3 Sender listed at https://www.dnswl.org/, medium trust SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record URIBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [verify.rs] Subject: [pbs-devel] [PATCH v2 proxmox-backup 04/15] add do_verification_job function to verify.rs X-BeenThere: pbs-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox Backup Server development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 07 Oct 2020 09:04:03 -0000 Signed-off-by: Hannes Laimer --- src/backup/verify.rs | 71 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 71 insertions(+) diff --git a/src/backup/verify.rs b/src/backup/verify.rs index 0c55305f..517ecbb2 100644 --- a/src/backup/verify.rs +++ b/src/backup/verify.rs @@ -8,6 +8,8 @@ use anyhow::{bail, format_err, Error}; use crate::{ server::WorkerTask, api2::types::*, + config::jobstate::Job, + config::verify::VerifyJobConfig, tools::ParallelHandler, backup::{ DataStore, @@ -419,3 +421,72 @@ pub fn verify_all_backups(datastore: Arc, worker: Arc) -> Ok(errors) } + +/// Runs a verification job. +pub fn do_verification_job( + mut job: Job, + verify_job: VerifyJobConfig, + userid: &Userid, + schedule: Option, +) -> Result { + let datastore = DataStore::lookup_datastore(&verify_job.store)?; + let mut backups_to_verify = BackupInfo::list_backups(&datastore.base_path())?; + if verify_job.ignore_verified.unwrap_or(true) { + backups_to_verify.retain(|backup_info| { + if let Ok((manifest, _)) = datastore.load_manifest(&backup_info.backup_dir) { + let verify = manifest.unprotected["verify_state"].clone(); + if let Ok(verify) = serde_json::from_value::(verify) { + let days_since_last_verify = + (proxmox::tools::time::epoch_i64() - verify.upid.starttime) / 86400; + // if outdated_after is None, verifications do not become outdated + verify_job.outdated_after.is_some() && days_since_last_verify > verify_job.outdated_after.unwrap() + } else { true } // was never verified, therefore we always want to verify + } else { false } // manifest could not be loaded, do not verify in that case + }) + } + let job_id = job.jobname().to_string(); + let worker_type = job.jobtype().to_string(); + let upid_str = WorkerTask::new_thread( + &worker_type, + Some(job.jobname().to_string()), + userid.clone(), + false, + move |worker| { + job.start(&worker.upid().to_string())?; + let verified_chunks = Arc::new(Mutex::new(HashSet::with_capacity(1024 * 16))); + let corrupt_chunks = Arc::new(Mutex::new(HashSet::with_capacity(64))); + worker.log(format!("Starting datastore verify job '{}'", job_id)); + if let Some(event_str) = schedule { + worker.log(format!("task triggered by schedule '{}'", event_str)); + } + let result = proxmox::try_block!({ + let mut failed_dirs: Vec = Vec::new(); + for backup_info in backups_to_verify { + if let Ok(false) = verify_backup_dir( + datastore.clone(), + &backup_info.backup_dir, + verified_chunks.clone(), + corrupt_chunks.clone(), + worker.clone(), + ) { failed_dirs.push(backup_info.backup_dir.to_string()); } + } + if !failed_dirs.is_empty() { + worker.log("Failed to verify following snapshots:"); + for dir in failed_dirs { + worker.log(format!("\t{}", dir)); + } + bail!("verification failed - please check the log for details"); + } + Ok(()) + }); + + let status = worker.create_state(&result); + + if let Err(err) = job.finish(status) { + eprintln!("could not finish job state for {}: {}", job.jobtype().to_string(), err); + } + + result + })?; + Ok(upid_str) +} -- 2.20.1